Monthly Archives: January 2017

SEC 360 Full Course NEW

 

SEC 360  Full Course NEW

 

Click Link Below To Buy:

http://hwcampus.com/shop/sec-360-full-course-new/

  Or Visit www.hwcampus.com

 

 

SEC 360 Data Privacy & Security Entire Course DeVry NEW

SEC 360 You Decide Paper Week 2 DeVry

 

Scenario, Your Role, Key Players

Sunshine Machine Works has expanded its infrastructure. When they started there were just three computers, and ten employees. Now there are over 100 employees and their network will have fifty computer terminals, with two servers. During the expansion there has been a lot of discussion about the need for a written computer use policy.

You are the IT Services manager for Sunshine Machine Works. This company has seen rapid growth. Management is looking to you to provide a critical input for an Information Systems Use Security Policy. Although they have a format they can use for the policy, they are looking to you to provide some guidance on areas they will need to address when creating this policy.

When we first started this company there were only a few computers that we used to share our files. Now, with the growth of our company we have a situation where we need to centralize our file storage. I am concerned that if we are not careful, some proprietary information could be compromised. We need a good information systems use policy in place. Keep in mind that I am also looking at expanding our business into some oil field work and the standards we will be required to comply with dictate that we have a written policy in place.

There are a lot of spreadsheets which have our account information on them. There is restricted access so that the only ones to access those files are the CEO, the General Manager, and me. No other employees have access to most of them. When they need access to financial data, I am contacted and provide them with the feedback they request. I hope that we are able to keep this system running efficiently and any policy helps enhance the safeguarding of our financial data.

I look at the way we need to do business now, which entails a lot of online collaboration with our vendors, customers, and activities related to our potential sales outreach. I need to have our staff utilize our computing resources with maximum efficiency; however, I want to balance this with the realization our staff may need to check their personal email accounts, bank information, etc. As our file server has arrived and all file storage has been centralized, we need to look at how we secure our network while keeping productivity up.

Write a paper consisting of 500-1,000 words (double spaced) about your experience in the Week 1 You Decide exercise. Briefly explain some of the issues that a company may face as it experiences growth, and begin to address the proper use of their information systems.

Students should see Appendix C of the textbook for examples of policies that address the issues that companies may face.

Since you are responsible for IT Services and want to keep the systems and network functioning effectively, you will want to identify activities which would be permitted and which activities would be prohibited. Management will take your policy suggestions, finalize the policy and it will be provided to the employees.

Follow the instructions provided in the You Decide Exercise: Information Systems Use Security Policy.

Preview:

Over the years I learned through experience that a good security policy needs to adapt and it must be reviewed and revised as the business adapts. As the company continues to expand and many more users being added to the network environment, I advise to keep in mind that the policies and procedures will need to be adjusted accordingly. I suggest that management considers adding more IT Security….

SEC 360 Physical Security Simulation Report Week 5 DeVry

Compose a report on the experience of performing the Physical Security survey. Students will write a report consisting of 250-500 words (double-spaced) on experiences in the Physical Security Simulation.

Preview:

The first stop in the walkthrough was the security guard shack to the Vehicle Yard. There was a sign that stated that badges must be at the ready. This showed that the company had security badges for its employees. I would recommend…

SEC 360 You Decide Paper Week 6 DeVry

Sunshine Machine Works, who recently expanded its infrastructure, now needs to ensure that any authorized employee can access the intranet. Sales people and management staff frequently travel to remote locations, and often require access to documents stored on the intranet file server.

You are the IT Services manager for Sunshine Machine Works. You are to assess the information presented and provide a response to management on how remote access may be handled for Sunshine Machine Works.

Wilma Stone – Chief Executive Officer

It’s great that we have expanded and are able to reach out to customers all over the country. With the way things are going, I see real potential for continued success as long as our field assets have the ability to access information here on our local network. I don’t have any problem with any or our people getting access to the resources they need. I just don’t want anything compromised because I don’t want to lose any proprietary information or have any of our customer’s data leaked.

Margie Nelson – Chief Financial Officer

I am pretty paranoid when it comes to this remote access stuff. I keep hearing about people getting their networks broken in to and the next thing you know their bank accounts have been drained! However, it is apparent that this is an option whose time has come. I hope we are able to keep our data safe.

Gary Thomas – General Manager

We have workers who travel to remote locations and need to access information here on the Intranet. I would rather have our people accessing information over a secure connection than sending them out to who knows where with a laptop or thumbdrive full of our company information. Let’s see if we can solve the problem of remote access and maintain company proprietary information.

Given the scenario, your role and the information provided by the key players involved, it is time for you to make a decision. If you are finished reviewing this scenario, close this window and return to this Week’s You Decide tab, in eCollege, to complete the activity for this scenario. You can return and review this scenario again at any time.

Preview:

There are two possible options for providing the company employees with secure remote access to the company’s network. One is through the use of a VPN (Virtual Private Network), and the other is through cloud computing. A VPN is a private network that uses a public network to connect with remote sites or users (Frannkk, 2012). On the other hand…

SEC 360 Quiz Week 1, 3, 5, 7 DeVry

 

SEC 360 Quiz Week 1 DeVry

 

(TCO 1) Defense-in-depth is a _____.

Security requirement

Security model

Security strategy

Security policy

Security control

(TCO 1) What are the common effects of controls?

Prevention, detection, and response

Administration, technology, and physical

Detection, accounting, and access control

Identification, audit, and access control

Confidentiality, integrity, and availability

(TCO 1) An organization’s security posture is defined and documented in _____ that must exist before any computers are installed.

Standards

Guidelines

Procedures

Tolerance for risk

All of the above

(TCO 1) The unique security issues and considerations of every system make it crucial to understand all of the following, except _____.

Security standards

Security skills of developers

Hardware and software security configurations

Data sensitivity

The business of the organization

(TCO 2) Which of the following domains is not part of the IISSCC CBK?

Architecture

Project Management

Ethics

Law

Operations Security

(TCO 2) A security event that causes damage is called _____.

A compromise

A violation

An incident

A mishap

A transgression

(TCO 2) What is the enemy of security?

Industry

Foreign nations

Competitors

Complexity

People

(TCO 2) The Cryptography domain includes all of the following topics, except _____.

Block and stream ciphers

Symmetric key algorithms

The OSI model

Public Key Infrastructure

(TCO 1) Policies and procedures are often referred to as _____.

Models

A necessary evil

Guidelines

Documentation

(TCO 2) The Application Development Security domain focuses on _____.

Sound and secure application development techniques

Who may access a system

Single sign-on technologies and their risks

Specific attacks and countermeasures

SEC 360 Quiz Week 3 DeVry

 

(TCO 3) According to your text, what are the four types of corporate policies?

Physical, personnel, technical, and administrative

Programme-level, programme-framework, issue specific, and system specific

Corporate, system, technology, and device

Technical, operational, procedural, and management

Laws, orders, directives, and regulations

(TCO 3) A user cannot access a file/folder to perform his/her required work activities. Who should the user contact?

Security testers

Security administrators

Access coordinators

Network engineers

Chief information security officers

(TCO 3) _____ authorize access to information.

Security administrators

Information owners

Access coordinators

Network engineers

Users

(TCO 3) What does SDLC stands for?

Software development license cycle

Software development life cycle

System development life cycle

System definition life cycle

None of the above

(TCO 4) Various countries have different views of individual privacy. The European Union (EU) has very different privacy laws than the United States has. To allow U.S. companies better ease of operation in the European Union, the Department of Commerce negotiated the _____ with the EU.

Privacy treaty

Memorandum of Agreement regarding privacy

Privacy Reciprocity Act of 1993

International safe harbor principles

Privacy Act of 1983

(TCO 4) Which of the following statements is NOT true?

Patent law can be used to protect systems and processes

Trademark law can be used to protect a company idea

Copyright law can be used to protect source code and user interfaces

Trade secret law can be used to protect processes and source code.

Trademarks can be used to protect domain names

(TCO 5) A reference monitor should have all of the following except which attribute?

Complete in that it mediates all access between subjects and objects

Changeable by other system entities

Simple enough to be completely verified

Highly tamper resistant

Impossible to bypass

(TCO 5) Why are the Bell-LaPadula and Biba models called dual?

They are both confidentiality models

They use exactly the same rules

They are both state transition models

They are the same model with reversed rules

They are both no read up, no write down models

(TCO 4) The _____ program has created the need for companies that create protective equipment to help prevent spies from detecting stray computer signals

Information warfare

Qualitative risk analysis

Information assurance

TEMPEST

None of the above

(TCO 5) What does a product or system have enforced over it by one or more components of the trusted computing base (TCB)?

Tools and methodologies

Unified security policy

Kernel monitoring

Driver signing

SEC 360 Quiz Week 5 DeVry

 

(TCO 6) Which of the following is a consideration in site selection?

Visibility

Transportation

Both of the above

Neither of the above

(TCO 6) Which of the following are categories of intrusion detection devices?

Door sensors

Biometric detectors

Perimeter detectors

Security detectors

All of the above

(TCO 6) All effective security programmes require, among other things, _____.

A good management team

A physical security plan

A sign-in roster

A backup at an off-site location

Security guards

(TCO 7) Security operations generally does not provide controls for _____.

Personnel security

Resource protection

Backup and recovery of locally stored workstation data

Privileged entity controls

Virus scanning

(TCO 7) OPSEC is a(n) _____ discipline.

Information security

Intelligence

Law enforcement

Counterintelligence

Legal

(TCO 8) Disaster recovery planning includes all of the following except _____.

IT systems and applications

Application data

Data entry users

Networks

Communication lines

(TCO 8) A business impact analysis identifies _____.

Risks to the business

Quantifies risks

Risks to the business if critical services are discontinued

Priorities of restoring critical services

All of the above

(TCO 9) What is the U.S. government classification label that means that unauthorized disclosure may seriously damage national security?

CONFIDENTIAL

SECRET

TOP SECRET

NOFORN

RESTRICTED

(TCO 9) For purposes of access controls, identification and authentication applies to _____.

Subjects

Objects

Files

Applications

All of the above

(TCO 9) When a transaction requires only a _____, there is not any actual proof that a particular person conducted that transaction.

Written signature

Digital signature

Password

Driver’s license

Fingerprint scan

SEC 360 Quiz Week 7 DeVry

 

(TCO 10) A digital signature provides verification of _____ and _____.

Sender reliability, message integrity

Message authenticity, message integrity

Message integrity, sender authenticity

Message authenticity, sender integrity

Message reliability, message integrity

(TCO 10) Computers are _____, and at some point a random number generator becomes _____.

Periodic, deterministic

Deterministic, periodic

Pseudorandom, deterministic

Deterministic, pseudorandom

Random, deterministic

(TCO 11) A packet filter that keeps track of the state of a connection is called a _____.

stateful inspection firewall

stateful inspection filter

stateful inspection router

stateful inspection bridge

stateful inspection gateway

(TCO 11) A Layer 2 firewall is also called a(n) _____.

Packet-filtering router

Bastion host

Packet-filtering bridge

Application-level gateway

Circuit-level gateway

(TCO 12) Modern intrusion detection systems act as sensors for hosts and network devices and work in a centrally controlled distributed fashion using _____.

Software

Remote procedure calls

Agent technology

Common interfaces

Access to local audit records

(TCO 12) A decoy used to lure intruders into staying around is called a(n) _____.

Pharm

Phish

Entrapment

Honeypot

Mug of ale

(TCO 12) What are the two major classifications of potential intruders into a network?

Foreign and domestic

Outside and inside

Domestic and international

Anonymous and contracted

None of the above

(TCO 13) Which form of malware is independent of the operating system and replicating?

Trap door

Virus

Worm

Trojan

Logic bomb

(TCO 13) In which system life cycle phase should security policy be established?

Test and evaluation

Operations and maintenance

Requirements definition

Acquisition

Initiation

(TCO 13) Which form of malware contains hidden and malicious functions disguised as a utility program that performs useful work?

Trap door

Virus

Worm

Trojan horse

Logic bomb

SEC 360 Discussions Week 1-7 All Posts 253 Pages DeVry

 

SEC 360 Security Policy and Security CBK Discussions Week 1 All Posts 47 Pages DeVry

 

SEC 360 Security Policy Discussions 1 Week 1 All Posts 21 Pages DeVry

 

Policy is central to affecting security in organizations. Using the security policy for your workplace (or other organization with which you are familiar), what are some key features that allow personnel to control security? Are there any deficiencies? What can be added that would improve security? How do you come up with a set of policies for a particular business?  How do you enforce?  How would you handle non-compliance?  Should you have a policy about Jump Drive if there was ONE incident about Jump Drive in the last 10 years?…

SEC 360 Security CBK Discussions 2 Week 1 All Posts 26 Pages DeVry

 

The security Common Body of Knowledge (CBK) describes what security professionals collectively known about the discipline. What knowledge domains are included in the CBK? What do you think will be added to the CBK in the future? What is the logic behind the concept?  How do we accommodate IOT?

SEC 360 Compliance Legislation and Intellectual Property (IP) Discussions Week 2 All Posts 39 Pages DeVry

 

SEC 360 Compliance Legislation Discussions 1 Week 2 All Posts 21 Pages DeVry

 

How can we utilize the four types of security policies to develop a HIPAA security program for organizations? What kinds of information does HIPAA protect? What kinds of organizations does HIPAA cover? What are the differences between HIPAA and HITECH?…

SEC 360 Intellectual Property (IP) Discussions 2 Week 2 All Posts 18 Pages DeVry

 

Your organization has asked you to assist in the discussion about how to best protect its intellectual property (IP). The engineers in your organization have developed new database and ordering software to support a faster process for fulfilling customer orders. Which of the various forms of IP protection will you recommend for safeguarding the engineers’ work? Should it be protected at all? What does the organization risk by getting IP protection? Is Grand’ma recipe a trade secret?  So if somebody steals the recipe, what are the remedies? How do you make something a trade mark? Would a sorting program protect-able by law?…

SEC 360 Snack Cake Security and Security and the OSI Model Discussions Week 3 All Posts 38 Pages DeVry

 

SEC 360 Snack Cake Security Discussions 1 Week 3 All Posts 18 Pages DeVry

 

Your company has a special recipe for snack cakes. This snack cake is a key product in your company’s lineup, and it is responsible for a large majority of shareholder value. Using a security model described in the text, describe an approach that will allow this important recipe to be kept secure. Think of what is most important and review your Security models? How would you use it then? For example KFC has to give the recipe to the stores? Maybe everything comes premixed?  How would you control access to the recipe?…

SEC 360 Security and the OSI Model Discussions 2 Week 3 All Posts 20 Pages DeVry

 

Security can have a cumulative effect. Consider the OSI model as a key component of the Common Body of Knowledge. For definitions of OSI layers, click here: OSI Layers. What is the OSI model about, and how can we use it when we are selecting security controls? Explain the function of the 7 layers.  How about Confidentiality- where does it fit?  How about Integrity? Where do we implement?  Can you implement filtering at layer 2 (Data Link Layer)?….

SEC 360 Amusement Security and Security Operations Changes Discussions Week 4 All Posts 33 Pages DeVry

 

SEC 360 Amusement Security Discussions 1 Week 4 All Posts 17 Pages DeVry

 

Your company is in the business of entertainment; they run an amusement park. There are thousands of people all over the park every day. It is very important to control who has access to what, and not just for visitors, but for employees as well. Define groups of people, and indicate how you would control physical access for them. How would you handle a shooter in the crowd? How would you handle an evacuation? How about scarf, baseball hats and so on that can prevent identifications of bad folks?…

SEC 360 Security Operations Changes Discussions 2 Week 4 All Posts 16 Pages DeVry

 

Describe how to insert changes in the operational security of the organization. How do you manage those who do not want to accept the changes?…

SEC 360 Backup and Recovery Planning and Access Control Lists Discussions Week 5 All Posts 32 Pages DeVry

 

SEC 360 Backup and Recovery Planning Discussions 1 Week 5 All Posts 17 Pages DeVry

 

Why are backups so often overlooked in an organization? How do we sell the benefits of spending money on backup solutions to business managers and executives? Now that system are redundant, do we still need backup and recovery plans?…

SEC 360 Access Control Lists Discussions 2 Week 5 All Posts 15 Pages DeVry

 

Access control lists are very valuable for administering granular control over an organization’s resources. So why do a lot of organizations opt not to use them in lieu of more general super user or administrator accounts? It is a challenge to remove administrator rights from users? What strategy should be used? Do you think common users need admin rights?…

SEC 360 Cryptography and The Enterprise Firewall is Dead Discussions Week 6 All Posts 33 Pages DeVry

 

SEC 360 Cryptography Discussions 1 Week 6 All Posts 16 Pages DeVry

 

Which algorithm is more secure: AES256 or AES128? Why?  How about stenography?…

SEC 360 The Enterprise Firewall is Dead Discussions 2 Week 6 All Posts 17 Pages DeVry

 

A popular computer network publication stated at one time that the enterprise firewall was dead. It boldly stated that the exterior firewalls of the organization should be torn down and replaced with host-based firewalls instead. Is this insane, or is it the best new practice in security management? Explain your answer. What types of firewalls do we need today? Which type will provide you better protection? Are traditional firewalls still efficient today? Are these efficient? How do they handle encrypted packets?…

SEC 360 Intrusion Detection and Secure as a Car Discussions Week 7 All Posts 31 Pages DeVry

 

SEC 360 Intrusion Detection Discussions 1 Week 7 All Posts 16 Pages DeVry

 

Your organization’s business manager has read an article about how intrusion detection systems can help deter hackers. He or she wants to spearhead a campaign to deploy them around the company’s locations in three states. Since an IDS can help deter hackers, does this make it a worthwhile project, or is there some reason to be wary? Specific to this example, how do you respond to ad hoc security requests like this? In general, how can you keep requests like this in check? Are IDS systems enough to deter hackers?…

SEC 360 Secure as a Car Discussions 2 Week 7 All Posts 15 Pages DeVry

 

Engineering software is like engineering a car; if one were so inclined, there could be a completely bug- and security-free application. Do you agree with this? Why or why not?…

 

 

 

SCI 228 Entire Course Latest

Click Link Below To Buy:

 

http://hwcampus.com/shop/sci-228-entire-course-latest/

  Or Visit www.hwcampus.com

 

SCI 228 Entire Course Nutrition Health & Wellness w/Lab DeVry  

SCI 228 iLab Week 1 DeVry

Part 1

There are several parts to this iLab. Part 1 consists of listing all of the parts of the digestive system with either a list or photo. Many people take a screenshot and use it for Part 1. Feel free to also list the parts as well if you cannot figure out how to take a screenshot.

Part 2

Part 2 technically consists of two parts. The first one includes describing the location of each body part. For example, the appendix is located on the right side of the body under the ascending colon. Another way to do this part would be to write out the parts and put a location/description next to it. The second part of Part 2 for this section is to describe the manner in which you will retain the information of where each body part is located. An example would be, “I will remember the location of each body part by reviewing the photo and memorizing each location.” Some classmates develop interesting methods of memorizing where all of the parts are located, like using mnemonics. Feel free to be creative.

Part 3

For Part 3, which is in a Word document (or the same document that you have been using for Parts 1 and 2), please take the overall categories (mouth, small intestine, esophagus, stomach, and large intestine) and label them with the appropriate mechanisms that occur in each of them (propulsion, absorption, chemical digestion, and mechanical digestion). Please remember that each digestive system part mentioned above may be involved in more than one of the mechanisms.

Part 4

For Part 4, please define each mechanism (propulsion, absorption, chemical digestion, and mechanical digestion) with two to three sentences each.

Preview:

Propulsion – This is the passage of food along the gastrointestinal tract or the digestive tract.  This process involves voluntary movements of swallowing and the involuntary actions of soft muscles that help in propelling the food towards the digestive tract (Opentrax).

Absorption – This is the passage of food from the gastrointestinal tract into the cardiovascular and lymphatic systems for…

SCI 228 iLab Week 2 DeVry

Scenario and Summary

Please select one of the following sweeteners:

  1. Sugar (sucrose)
  2. Fructose
  3. High Fructose Corn Syrup
  4. Stevia
  5. Equal
  6. Splenda
  7. Ace K
  8. Another one that you can find on your own

Deliverables

Answer the following questions about the sweetener that you have selected.

  1. Select a sweetener.
  2. Explore the history of the sweetener (when it was developed, its composition).
  3. Discuss safety and the sweetener that you have selected.
  4. Examine the relationship between the sweetener that you have selected and obesity.

Preview:

Sugars have been part of humans’ diets for thousands of years already and the main sources of sucrose are sugar cane, sugar beets, fruits, or honey.  To this day, sucrose remains to be the standard on how sweeteners are measured against.  In acidic environments, sugar hydrolyzes, thus, changing the flavor or sweetness level of food products.  To use it, the…

SCI 228 iLab Week 3 DeVry

Fast Food Menu Creation Overview

For this assignment, you have been asked to explore the nutritional value of menu items at a local fast-food restaurant. Using the available menu items, plan two meals: the healthiest meal possible and the unhealthiest healthy meal possible. Both meals should include an entrée, a side, a beverage, and dessert. In a Word document, please answer and discuss the following questions.

Deliverables

  1. Describe the healthy meal that you have created from the fast-food restaurant using the nutritional value of menu items.
    1. Name the restaurant, and then write a nutritional analysis of the meal you have created. (Explain all of the nutrients found in the meal, like carbs, protein, fat, and some essential vitamins and minerals.)
    2. Discuss your reaction to the analysis–make sure to explain why you feel the way you do about this meal. For example, if your meal is composed primarily of fat, discuss that point; if your meal supplies a lot of sugar per serving, discuss that as well. Please also remember to link excess or limited amounts of nutrients with diseases or the potential for disease (too much fat may put you at risk for heart disease, not enough calcium may not support bone health, etc.). Please make sure this section is as detailed as possible.
    3. How will this information affect your future food choices? Make sure to explain why you will or will not eat this meal again, and support your answer with the information found in the above sections.
  2. Describe the unhealthy meal that you have created from the fast-food restaurant using the nutritional value of menu items.
    1. Name the restaurant, and then write a nutritional analysis of the meal you have created. (Explain all of the nutrients found in the meal, like carbs, protein, fat, and some essential vitamins and minerals.)
    2. Discuss your reaction to the analysis–make sure to explain why you feel the way you do about this meal. For example, if your meal is composed primarily of fat, discuss that point; if your meal supplies a lot of sugar per serving, discuss that as well. Please also remember to link excess or limited amounts of nutrients with diseases or the potential for disease (too much fat may put you at risk for heart disease, not enough calcium may not support bone health, etc.). Please make sure this section is as detailed as possible.
    3. How will this information affect your future food choices? Make sure to explain why you will or will not eat this meal again, and support your answer with the information found in the above sections.

Preview:

While fast food may be cheaper than regular food, the downside is that ingredients are also made from cheaper food components including “high fat meat, refined grains, and added sugar and fats, instead of nutritious ingredients such as lean meats, whole grains, fresh fruits, and vegetables” (CYWH, 2015). Currently, more people accept…

SCI 228 iLab Week 5 DeVry

Scenario/Summary

The title of your presentation is “Water: An Overlooked Essential Nutrient.” A law firm has requested that you introduce yourself, explain why you are at the firm, and discuss the value of hiqualitytutorialstion. Once those elements have been addressed, the goal of this iLab is to create an essay or handout that compares water, Gatorade, and Powerade on the following categories.

  • Daily recommendations
  • Nutrient content
  • Varieties/sources
  • Cost
  • Advantages of consumption (include research reviews)
  • Safety levels
  • Disadvantages of consumption (include research reviews)
  • Conclusion

Ultimately, you need to make a recommendation on which beverage meets the needs of the law firm, and you need to back your recommendation with three pieces of evidence.

Preview:

Often, when people talk about water, they are referring to the nutrient water, which is readily available from the liquids they drink and the foods they eat although there are other sources of fluids that can help the body stay hiqualitytutorialsted.  The body is composed of over two-thirds water, including the bones, which is about 20% water.  It is crucial in the transportation of various other nutrients, wastes, and hormones in different parts of the body, thus, ensuring the avoidance of dehiqualitytutorialstion is vital.  Water also…

SCI 228 iLab Week 6 DeVry

Part 1

Define BMI: You must define BMI, though not just with a general definition indicating its relationship to height and weight. Please also do not forget to define the actual term BMI!

Part 2

Calculate BMI: Many students use an automated calculator to complete this part of the assignment. I will deduct points if I do not see the actual math calculations. Please include all stages of the math calculations associated with determining your BMI.

Part 3

Compare/Contrast BMI & Individual Plan: There are three sections to this part of the assignment, and for the first part, you need to designate where your BMI falls according to the standard tables (underweight, normal, overweight, obese). In the second part of the assignment, you need to develop a dietary plan for your BMI value, and for the most part, you need to be as detailed as possible. Basically, I would like to see a “day in your life” according to where your current BMI falls. You need to include how many calories you plan on taking in and why, and you also need to develop a day’s worth of eating with specific foods and portions. As far as the exercise plan, again, you need to be as specific as possible. The goal of this section is to develop a plan that incorporates all of the components of a sound fitness program (flexibility, endurance, strength training, body fat, and cardiovascular), as well as discuss specific exercises that you plan on doing. Basically, the goal is to produce a weekly plan, with specific exercises, that has all of the components of a sound fitness plan.

Preview:

The Body Mass Index, or BMI, pertains to a person’s summary measure of height and weight.  This determines whether an individual is overweight or not, including if the individual is underweight. It can also be used to establish if the person is obese.  While the BMI can be used as a tool to classify people as overweight or obese, it is only a substitute measure that tells about the more prevalent issue, that is, excess body fat.  When an…

SCI 228 iLab Week 7 DeVry

Scenario/Summary

Students will select one lifecycle.

  • Prenatal
  • First year of infant’s life
  • Toddler
  • School age
  • Adolescence
  • Adult
  • Lactating female
  • Mature adult

Once a lifecycle has been selected, you will do the following three things.

  1. Describe the lifecycle and the age to be in that lifecycle.
  2. Describe nutritional challenges associated with that particular lifecycle.
  3. Develop a diet specifically tailored to that stage of life (make sure to include all of the macronutrients [percentages of carbs, fats, and protein]), and explain the rationale. Do not forget to discuss specific nutrients that may be of concern during this particular lifecycle and elaborate on the reasons behind the issues and challenges associated with various nutrients.

Preview:

When children reach school age, they encounter various experiences and challenges associated with eating, such as skipping breakfast, having lunch in school with their classmates, and sometimes, having breakfast in school, too.  They learn to make decisions associated with their food preferences and choices, including the amount of food to eat.  Thus, they become…

SCI 228 All Quizzes DeVry

SCI 228 Quiz Week 1 DeVry

 (TCO 1) Which statement is FALSE concerning the field of nutrition?

Nutrition is the study of how food nourishes the body.

Nutrition encompasses how we consume, digest, metabolize, and store food.

Nutrition is an ancient science that dates back to the fourteenth century.

Nutrition involves studying the factors that influence eating patterns.

(TCO 1) Which of the following is NOT an essential nutrient?

Water

Alcohol

Vitamins

Minerals

(TCO 1) Suzie is a stay-at-home mom who generally prepares the majority of meals for her household. Even though she always prepares meals that offer enough calories and nutrients for her family of four, she tends to make the same meals again and again. Which one of the characteristics of a healthy diet is Suzie not incorporating into her meal planning?

Adequacy

Balance

Balance

Balance

(TCO 1) Vitamin C and the B vitamins are termed _________.

Nonessential vitamins

Water-soluble vitamins

Fat-soluble vitamins

Trace vitamins

(TCO 1) Jose’s lunch contains 121 grams of carbohiqualitytutorialstes, 40 grams of protein, and 25 grams of fat. What percent of kilocalories in this meal come from fat?

19%

26%

34%

42%

(TCO 1) Your grandmother has recently been diagnosed with Type II diabetes. Which of the following professionals is most likely to be qualified to offer your grandmother assistance in planning her diabetic diet?

Registered Dietitian (RD)

PhD in nutrition

Medical doctor (MD)

Nutritionist

(TCO 1) The smallest units of matter that normally cannot be broken down are:

Atoms.

Molecules.

Cell.

Lipids.

(TCO 1) The ________ is most responsible for prompting individuals to seek food.

Stomach

Small intestine

Hypothalamus

Mouth

(TCO 3) Which is NOT a symptom of dehiqualitytutorialstion in infants?

Loss of skin elasticity

No wet diapers for three or more hours

Dry mouth and tongue

Bloated abdomen

(TCO 3) Which large vessel transports absorbed nutrients to the liver?

Portal vein

Pulmonary vein

Aorta

Subclavian vein

(TCO 3) Which of the following organs is responsible for the manufacturing and secretion of many digestive enzymes and bicarbonate?

Liver

Stomach

Pancreas

Gallbladder

(TCO 3) All of the following are found in saliva EXCEPT:

Water and mucus

Enzymes

Antibodies

Bicarbonate

(TCO 3) The main symptom associated with Clostridium botulinum intoxication is:

Diarrhea

Paralysis

Anemia

Jaundice

(TCO 3) The food-borne illness caused by Campylobacter jejuni is associated with consuming:

Grains that have been stored in a moist environment.

Water that has been contaminated with fecal material.

Tapeworms.

Contaminated beef or pork.

(TCO 3) Which of the following preservatives is (are) commonly used to prevent rancidity in oils and fats?

BHT (butylated hydroxytoluene)

BHA (butylated hydroxyanisole)

Propionic acids

Both BHT (butylated hydroxytoluene) and BHA (butylated hydroxyanisole)

(TCO 3) Pesticides are:

Chemicals added to food to enhance it in some way.

Chemicals added to food that help prevent microbial spoilage and enzymatic deterioration.

Chemicals used in the field and in storage areas to decrease destruction caused by insects and fungus.

Chemicals produced by microorganisms that harm tissue and elicit an immune response.

(TCO 3) The proper steps developed for canning foods ensures that all endospores of ________ are eliminated when followed carefully.

Salmonella

Clostridium botulinum

Giardia intestinalis

Campylobacter jejuni

(TCO 3) Which of the following describes the prevailing theory in the development of food allergies?

Early weaning and introduction of solids foods to infants produces an allergy.

Genetic manipulation of plants and animals (GMOs) results in new proteins that cause an immune response.

Frequent exposure to food allergens not listed on the food label can cause food allergies.

All of these are part of the prevailing theory on food allergies.

(TCO 3) Which of the following is NOT an advantage of using biopesticides?

Degrade rapidly and are easily washed away by water

Do not leave pesticide residues on crops

Can be produced synthetically and are therefore inexpensive

Are less toxic to humans and the environment

(TCO 3) Which of the following is an example of a persistent organic pollutant?

Mercury

GMO

Sulfite

Coal tar

SCI 228 Quiz Week 2 DeVry

 

(TCO 1) What is the major monosaccharide found in the body?

Glucose

Fructose

Galactose

Glycogen

(TCO 1) Which of the following carbohiqualitytutorialstes is the end product of photosynthesis?

Glycogen

Galactose

Lactose

Glucose

(TCO 1) The term complex carbohiqualitytutorialstes refers to:

Monosaccharides

Disaccharides

Polysaccharides

Glucose

(TCO 1) A disaccharide is formed by the chemical bonding of:

Two monosaccharides

Two polysaccharides

One monosaccharide and one polysaccharide

Two oligosaccharides

(TCO 1) What is the major monosaccharide found in the body?

Glucose

Fructose

Galactose

Glycogen

(TCO 2) All of the following are symptoms/side effects of ketosis EXCEPT:

Bad breath

High blood cholesterol

Dehiqualitytutorialstion

Acidosis (acidic pH of the blood)

(TCO 2) Without sufficient ________, the colon gets too little exercise and becomes weak.

Calories

Protein

Fiber

Water

(TCO 2) How many grams of carbohiqualitytutorialstes

75 grams

100 grams

130 grams

160 grams

(TCO 2) Glucose is the preferred source of energy for which of the following?

Brain cells

Red blood cells

The central nervous system

All of these

(TCO 2) Insulin is synthesized and released by the:

Brain

Liver

Pancreas

Gallbladder

(TCO 2) Glucose is the preferred source of energy for which of the following?

Brain cells

Red blood cells

The central nervous system

All of these

(TCO 3) Individuals with the disease PKU (phenylketonuria) should not consume the artificial sweetener aspartame. Why?

People with PKU are highly prone to development of diabetes.

People with PKU are allergic to the sweetener.

People with PKU experience severe headaches when they consume aspartame.

People with PKU cannot metabolize the amino acid phenylalanine.

(TCO 2) Which of the following BEST describes the glycemic index?

An individual’s glucose/insulin ratio in a fasted state

The amount of insulin required to metabolize 100 grams of glucose

The glucose content of a given food

The extent to which a given food raises blood glucose and insulin

(TCO 3) Diabetes is a condition in which the body doesn’t process ________ properly.

Vitamins

Protein

Carbohiqualitytutorialstes

Fat

(TCO 3) Sean is planning to bake a batch of chocolate chip cookies for his girlfriend. Which of the following artificial sweeteners would be the best substitute for the sugar in the recipe?

Aspartame

Saccharin

Sucralose

Olestra

(TCO 3) Peggy Sue’s doctor wants to screen her for reactive hypoglycemia. If her doctor’s suspicions are correct and Peggy Sue does have reactive hypoglycemia, what would you expect her blood glucose concentration to be at approximately TWO HOURS after she had begun her glucose tolerance test?

Elevated as compared to a normal individual

Depressed as compared to a normal individual

Normal; two hours after consuming the glucose load, her blood concentrations will be no different from those of a normal individual

(TCO 3) Which artificial sweetener was almost banned because of a proposed relationship with bladder cancer in experimental animals?

Saccharin

Sucralose

Aspartame

Acesulfame-K

(TCO 4) Yogurt is tolerated better than milk by many lactase-deficient people because:

Yogurt has no lactose

Bacteria in yogurt help digest the lactose

It has a thicker consistency

Yogurt is acidic

(TCO 3) Which of the following is associated with Type II diabetes?

Autoimmune disease

Obesity

Prone to ketosis

Body fails to produce insulin

(TCO 4) Which of the following ethnic groups has the LOWEST incidence of lactose intolerance?

Asians

African Americans

Caucasians

Hispanics

SCI 228 Quiz Week 3 DeVry

 (TCO 3) The process of adding hydrogen to an unsaturated fatty acid and creating a more solid fat is called:

Emulsification

Pressurization

Hydrogenation

Deamination

(TCO 3) Which of the following fatty acids is generally solid at room temperature?

Short-chain

Saturated

Monounsaturated

Polyunsaturated

(TCO 3) A fatty acid that contains a chain of 10 carbons and one double bond is termed a:

Saturated, medium-chain fatty acid

Saturated, long-chain fatty acid

Monounsaturated, medium-chain fatty acid

Monounsaturated, long-chain fatty acid

(TCO 3) The process of adding hydrogen to an unsaturated fatty acid and creating a more solid fat is called:

Emulsification

Pressurization

Hydrogenation

Deamination

(TCO 6) Why are phospholipids NOT an essential nutrient?

Our bodies manufacture phospholipids

Phospholipids are not naturally found in the healthy body

Beneficial GI bacteria produce phospholipids

They provide no useful function in the human body

(TCO 6) Which of the following is NOT true of fats?

Dietary fats stimulate hunger signals to the brain

Fats add texture and flavor to food.

Fats are found in every cell membrane

Adipose tissue stores fat for future energy use

(TCO 6) How many calories are potentially provided by 25 grams of fat?

23 kilocalories

100 kilocalories

225 kilocalories

2,250 kilocalories

(TCO 6) Which of the following is a fat

Phosphate

Saccharin

Olestra

Trans fat

(TCO 6) Which of the following health problems has been associated with high intakes of fat replacers?

Allergies

Gastrointestinal distress

Elevated blood cholesterol levels

Hypertension

(TCO 6) All of the following organs assist in the digestion of lipids EXCEPT the:

Liver

Large intestine

Gallbladder

Pancreas

(TCO 5) Milk curdles when lemon juice is added to it. The change that occurs in the protein is called:

Denaturation

Translocation

Transcription

Deamination

(TCO 5) Proteases are:

Protein messengers that are released from storage in response to an alteration in the body’s homeostasis.

Transport proteins that move substances throughout the body.

Defense proteins that attack foreign bacteria, viruses, and toxins.

Enzymes that break down protein.

(TCO 5) Per gram, which of the following foods would contain the highest protein content?

Cooked carrots

Chicken

Skim milk

Whole-wheat bread

(TCO 5) Which of the following is NOT typically a nutrient of concern for vegans?

Iron

Vitamin B12

Vitamin C

Calcium

(TCO 5) Which of the following proteins are fundamental to the immune system?

Enzymes

Antibodies

Buffers

Transport proteins

(TCO 5) Of the 20 amino acids relevant to the human body, how many are considered essential?

None

Five

Nine

20

(TCO 5) The type of protein-energy malnutrition characterized by a general lack of protein, energy, and nutrients in the diet is called:

Marasmus

Sickle cell anemia

Cystic fibrosis

Kwashiorkor

(TCO 5) Which of the following is a genetic disorder resulting in debilitating protein abnormalities?

Cystic fibrosis

Mad cow disease

Acidosis

Kwashiorkor

(TCO 5) Which of the following is associated with marasmus?

Distended abdomen

Skin and bones appearance

Enlarged, fatty liver

All of these

SCI 228 Midterm Exam DeVry

 (TCO 1) Which of the following is an example of an organic micronutrient?

Folate

Calcium

Fat

Iron

(TCO 1) What element makes protein different from carbohiqualitytutorialste and fat?

Carbon

Hydrogen

Nitrogen

Oxygen

(TCO 1) The building blocks of proteins are called:

Fatty acids

Amino acids

Saccharides

Nitrogen fragments

(TCO 1) Vitamin C and the B vitamins are termed:

Nonessential vitamins

Water-soluble vitamins

Fat-soluble vitamins

Trace vitamins

(TCO 1) Which statement is FALSE concerning the field of nutrition?

Nutrition is the study of how food nourishes the body

Nutrition encompasses how we consume, digest, metabolize, and store food

Nutrition is an ancient science that dates back to the 14th century

Nutrition involves studying the factors that influence eating patterns

(TCO 1) Which of the following is NOT an essential nutrient?

Water

Alcohol

Vitamins

Minerals

(TCO 1) The ________ are a diverse group of organic substances including triglycerides, phospholipids, and the sterols.

Carbohiqualitytutorialste

Lipids

Vitamins

Proteins

(TCO 1) Which of the following is true regarding the science of nutrition?

As compared to many other scientific disciplines, nutrition is a young science.

Discoveries by the first nutritional scientists established the connection between deficiencies and illness.

In developed countries, current research in nutrition focuses on the relationship between diet and chronic diseases.

All of these are true.

(TCO 1) Which of the following nutrients is organic?

Minerals

Water

Protein

Both minerals and water

(TCO 1) Which of the following is an example of disease that is directly caused by a nutritional deficiency?

Anemia

Cancer

Osteoporosis

Heart disease

(TCO 1) Which of the following BEST describes minerals?

Micronutrients that are broken down easily during digestion

Micronutrients that are easily destroyed by heat and light

Inorganic micronutrients found in a variety of foods

Nutrients that are needed in large amounts by the body

(TCO 2) The ________ is most responsible for prompting individuals to seek food.

Stomach

Small intestine

Hypothalamus

Mouth

(TCO 2) ________ are strongly accepted principles supported by many hypotheses that have been collectively confirmed through repeated research.

Studies

Theories

Placebos

Trials

(TCO 2) Suzie is a stay-at-home mom who generally prepares the majority of meals for her household. Even though she always prepares meals that offer enough calories and nutrients for her family of four, she tends to make the same meals again and again. Which one of the characteristics of a healthy diet is Suzie not incorporating into her meal planning?

Adequacy

Balance

Moderation

Variety

(TCO 2) The term “sin tax” refers to:

Related health consequences of consuming 100 extra kilocalories each day.

A small, sales tax placed on unhealthful items (cigarettes, alcohol) to generate revenue for health programs.

Revenues generated from the sales of junk food items in public school vending machines.

Costs of the recent obesity lawsuits targeting fast food manufactures.

(TCO 2) Overweight status can be evaluated by calculating an individual’s body mass index (BMI) and/or by measuring:

Blood pressure.

Waist circumference.

Caloric intake.

Eating attitudes index.

(TCO 2) The percent daily values (%DV) on food labels are based on the:

DRIs

RDIs

DRVs

All of these

(TCO 2) Which of the following describes the vitamins A, D, E, and K?

Excreted via the urine

Soluble in water

Daily consumption is necessary

Can be stored in adipose and liver tissue

(TCO 2) Which of the following is NOT a regulator of satiety in the body?

GI tract

Hypothalamus

Hormones

Kidney

(TCO 2) Jack is a college athlete who requires 2,800 kilocalories a day to support his total energy needs. Even though Jack likes many different foods and makes it a point to try new things, he only consumes approximately 1,600 kilocalories a day. Which one of the characteristics of a healthy diet is Jack missing?

Adequacy

Balance

Moderation

Variety

(TCO 2) Which group of nutrients would be found in the foods at the base of the Food Guide Pyramid?

Vitamin C and vitamin B12

Calcium and iron

Fiber and complex carbohiqualitytutorialste

Protein and fat

(TCO 2) The information provided on a food label that identifies intake of nutrients based on 2,000 calories a day is called the:

Nutrition Facts Panel

Percent Daily Value

Daily Reference Value

Reference Daily Intake

(TCO 2) Which of the following is required on all food labels?

The net contents of the package

Ingredient list

The name and address of the vendor

All of these

(TCO 3) Immediately after absorption, what circulatory system carries most of the fat-soluble nutrients?

Vascular

Mesenteric

Lymphatic

Enterohepatic

(TCO 3) What is the name of the sphincter that separates the stomach from the small intestine?

Pyloric

Gastroesophageal

Ileocecal

Rectal

(TCO 3) Collectively, the nerves of the gastrointestinal tract are referred to as:

peptic nerves

hepatic nerves

enteric nerves

gastric nerves

(TCO 3) If a person is suffering from GERD, the ________ is malfunctioning.

Gallbladder

Pancreas

Epiglottis

Gastroesophageal sphincter

(TCO 3) In which of the following food sources would a consumer look for the statement “Live Active Cultures,” indicating that the product is a rich source of probiotics?

Whole-wheat bread

Fermented yogurt

Orange juice

Calcium supplements

(TCO 3) Which best explains why carbohiqualitytutorialste digestion ceases when food reaches the stomach?

Carbohiqualitytutorialste is completely digested in the mouth.

Salivary enzymes cannot function in the acid environment of the stomach.

Carbohiqualitytutorialste is completely absorbed in the esophagus.

Intestinal bacteria are needed for carbohiqualitytutorialste digestion.

(TCO 3) What is the primary cause of peptic ulcers?

Stress

  1. pyloribacteria

Prolonged use of aspirin

Eating too many spicy foods

(TCO 3) In which of the following food sources would a consumer look for the statement “Live Active Cultures,” indicating that the product is a rich source of probiotics?

Whole-wheat bread

Fermented yogurt

Orange juice

Calcium supplements

(TCO 4) A disaccharide is formed by the chemical bonding of:

Two monosaccharides

Two polysaccharides

One monosaccharide and one polysaccharide

Two oligosaccharides

(TCO 3) The acidity of the stomach allows for all of the following EXCEPT:

Preparing dietary carbohiqualitytutorialstes for absorption in the small intestine.

Protecting the human body from bacteria in food.

Denaturing protein to allow its breakdown and absorption.

Activating pepsin.

(TCO 4) Which of the following is associated with the development of ketosis?

A diet that contains too much fat

A diet that contains insufficient fat

A diet that contains too much carbohiqualitytutorialste

A diet that contains insufficient carbohiqualitytutorialste

(TCO 4) Major fructose sources include:

Milk and cheese

Nuts and honey

Fruits and vegetables

Breads and cereals

(TCO 4) A diet low in fiber is associated with an increased risk of developing:

Kidney stones

Dental caries

Diabetes

Diverticulosis

(TCO 3) Which of the following organs is responsible for the manufacturing and secretion of many digestive enzymes and bicarbonate?

Liver

Stomach

Pancreas

Gallbladder

(TCO 4) In type 1 diabetes, the ________ may be destroyed by an autoimmune disease.

Hepatocytes of the liver

Beta cells of the pancreas

Neurotransmitters of the brain

Glomerulus cells of the kidney

(TCO 4) After a meal, which hormone is responsible for moving glucose into the body’s cells?

Glucagon

Estrogen

CCK

Insulin

(TCO 4) Lactose intolerance is due to a(n):

Deficiency of lactose

Deficiency of lactase

Deficiency of the GI flora (healthy bacteria)

Allergy to casein (milk protein)

(TCO 4) Which artificial sweetener was almost banned because of a proposed relationship with bladder cancer in experimental animals?

Saccharin

Sucralose

Aspartame

Acesulfame-K

(TCO 1-6) Which of the following is responsible for food spoilage?

Oxygen

Heat

Light

All of these are responsible for food spoilage

(TCO 1-6) The main symptom associated with Clostridium botulinum intoxication is:

Diarrhea

Paralysis

Anemia

Jaundice

(TCO 1-6) Which of the following is an example of a persistent organic pollutant?

Mercury

GMO

Sulfite

Coal tar

(TCO 1-6) Which human organ system is most affected by toxic levels of mercury?

Nervous

Renal

Cardiovascular

Digestive

(TCO 1-6) The two types of fungi are:

Molds and spongiforms

Yeasts and helminthes

Prions and dioxins

Molds and yeasts

(TCO 1-6) Which of the following are the most common form of pesticides?

Insecticides

Herbicides

Fungicides

Biopesticides

(TCO 1-6) A cyclic food allergy is one that:

Occurs every time the offending food is eaten

Develops on a fixed time frame, such as once a month

Develops slowly over time

Occurs during times of physiological stress, such as during illness or surgery

(TCO 1-6) Hepatitis A is a food-borne virus that can result in ________ damage.

Nerve

Intestinal

Liver

Muscle

(TCO 1-6) Which of the following foods is most likely to contain sulfites?

Peas (canned)

Yogurt

Grapes (fresh)

Ground beef

(TCO 5) Sex hormones and adrenal hormones are substances derived from which class of lipid?

Fatty acids

Triglycerides

Phospholipids

Sterols

(TCO 5) Diets high in trans-fatty acids are associated with:

Decreased cancer risk

Increased blood cholesterol levels

Osteoporosis

Decreased blood glucose levels

(TCO 5) One potential problem with a very low-fat diet is that it may be deficient in:

Phosphorus

Cholesterol

Trans fatty acids

Essential fatty acids

(TCO 5) Which of the following foods is the richest source of omega-3 fatty acids?

Broccoli

Sirloin steak

Tofu

Salmon

(TCO 5) Which of the following food items would contain the highest amount of dietary cholesterol?

Steamed broccoli

Olive oil

Skim milk

Butter

(TCO 5) Which of the following is NOT true of fats?

Dietary fats stimulate hunger signals to the brain

Fats add texture and flavor to food

Fats are found in every cell membrane

Adipose tissue stores fat for future energy use

(TCO 5) Which of the following fatty acids is generally solid at room temperature?

Short-chain

Saturated

Monounsaturated

Polyunsaturated

(TCO 5) Which of the following statements is FALSE regarding the process of hydrogenation?

Hydrogenation creates trans fatty acids.

Hydrogenation is the process in which hydrogen atoms are added to double bonds.

Hydrogenation creates a heart-healthy product.

Hydrogenation makes a product more solid at room temperature.

(TCO 6) Which of the following health problems has been associated with high protein intakes?

Elevated blood cholesterol

Marasmus

Edema

Sickle cell anemia

(TCO 6) A complete protein:

Contains all 20 amino acids.

Contains all nine essential amino acids.

Has not been denatured.

Is composed of only di- and tri-peptides.

(TCO 6) Brenda is a reasonably healthy 19-year-old college student who is sedentary. She is 5’8″ tall and weighs 145 pounds. How many grams of protein would you recommend she consume each day?

45 grams

53 grams

65 grams

73 grams

(TCO 6) Vegetarian diets are associated with increased consumption of ________.

Carcinogens

Antioxidants

Prions

Vitamins B12 and D

(TCO 6) The process through which mRNA copies genetic information from DNA and carries it to the ribosome is called:

Translation

Deamination

Denaturation

Transcription

(TCO 6) Which of the following is associated with marasmus?

Distended abdomen

“Skin and bones” appearance

Enlarged, fatty liver

All of these

(TCO 6) Proteases are:

Protein messengers that are released from storage in response to an alteration in the body’s homeostasis.

Transport proteins that move substances throughout the body.

Defense proteins that attack foreign bacteria, viruses, and toxins.

Enzymes that break down protein.

(TCO 6) Conduction of nerve signals and contraction of muscles depends on the proper balance of:

Glucose

Electrolytes

Buffers

Nitrogen

SCI 228 Quiz Week 5 DeVry

 

(TCO 3) How do antioxidant vitamins stabilize free radicals?

Donate electrons or hydrogens

Enzymatic destruction

Phagocytosis

Break down and convert them to less damaging molecules

(TCO 3) Which of the following are required components of antioxidant enzyme systems?

Antioxidant minerals

Antioxidant vitamins

Phytochemicals

Gastrointestinal microflora

(TCO 3) What is an exchange reaction?

A reaction that produces free radicals

A two-part metabolic reaction that includes oxidation and reduction steps

The first stage of cancer development, in which a cell’s DNA mutates

A reaction that converts a provitamin into the metabolically active form

(TCO 3) Which of the following statements is FALSE regarding free radicals?

Free radicals are formed as a by-product of healthy metabolism

Exposure to pollution increases free radical production

Many diseases, such as cancer and heart disease, are linked to free radical damage

(TCO 7) Which water-soluble vitamin can regenerate Vitamin E after it has been oxidized?

Vitamin D

Vitamin B12

Vitamin C

Folate

(TCO 7) Who is at risk for a Vitamin E deficiency?

Premature infants

Postmenopausal women

Male athletes

The elderly

(TCO 7) Which of the following symptoms is associated with consuming a megadose of Vitamin C?

Night blindness

Scurvy

Nausea and diarrhea

Erythrocyte hemolysis

(TCO 7) The doctor has recently told Julie that she is anemic. Julie should consume ________ with her iron supplement to increase its absorption.

A tablespoon of castor oil

A glass of milk

A glass of orange juice

Scrambled eggs

(TCO 7) Which of the following increases the RDA for Vitamin C?

Smoking cigarettes

Drinking alcohol

Being a vegan

Taking supplements of Vitamin C

(TCO 8) The most critical role that Vitamin A plays in the human body is:

Maintaining a healthy reproductive system

Acting as an antioxidant and scavenging free radicals

Maintaining a healthy immune system

Maintaining healthy vision

(TCO 8) What is the definition of a megadose?

A dose two or more times greater than the recommended amount

A dose five or more times greater than the recommended amount

A dose 10 or more times greater than the recommended amount

A dose 100 or more times greater than the recommended amount

(TCO 8) At what stage in the development of cancer is the DNA mutated?

Initiation

Promotion

Progression

Metastasis

(TCO 8) The compact bone that makes up the outer surface of all bone is called:

Cortical

Osteoblast

Collagen

Trabecular

(TCO 8) Which is NOT a symptom of hypercalcemia?

Weakness

Mental confusion

Loss of appetite

Hemorrhaging

(TCO 8) Vitamin D toxicity is associated with:

Sunburns

Suntan lotions

Seafood

Supplements

(TCO 9) Which of the following B-complex vitamins is involved in the metabolism of fatty acids?

Vitamin B6

Vitamin B12

Folate

Pantothenic acid

(TCO 9) High concentrations of homocysteine in the blood are associated with the development of:

Diabetes

Heart disease

Neural tube defects

Osteoporosis

(TCO 9) Vitamin B12 is essential for the proper functioning of:

Epithelial cells

Nerve cells

Gastric (stomach) cells

Hepatic (liver) cells

(TCO 9) Formed in our bones, hydroxyapatite crystals are mineral complexes comprised of calcium and:

Sodium

Chloride

Phosphorus

Vitamin K

SCI 228 Quiz Week 6 DeVry

 (TCO 1) All of the following are considered weight-bearing activities EXCEPT:

Strength training

Swimming

Tennis

Jogging

(TCO 2) Which of the following describes the effect that severe dieting has on basal metabolic rate?

Basal metabolic rate is decreased

Basal metabolic rate is increased

Basal metabolic rate is unchanged

The effect on basal metabolic rate varies

(TCO 2) Consuming an excess of _______ calories in one week will result in a weight gain of one pound per week.

2,500

3,500

3,000

2,000

(TCO 3) Foods with the highest satiety value are high in:

Carbohiqualitytutorialstes

Fat

Protein

Water

(TCO 3) If Mary weighs 140 pounds and her RDA for protein is 0.8 grams per kilogram body weight, what would be her recommended protein intake?

64 grams

112 grams

51 grams

It is impossible to determine from the given information

(TCO 4) Rachel is a gymnast who trains two hours/day on average. She supports her daily activity by consuming 2,500 kilocalories per day. How many kilocalories should she be consuming from carbohiqualitytutorialste sources?

1,125-1,300 kilocalories

1,300-1,500 kilocalories

1,500-1,625 kilocalories

1,625-1,750 kilocalories

(TCO 4) In which of the following events would carbohiqualitytutorialste loading be the most beneficial?

Weight lifting

Baseball game

Cross country skiing

100-yard dash

(TCO 5) Obsessive-compulsive, perfectionism, socially inhibited, compliant, and emotionally restrained describe personality traits of:

Anorexia nervosa

Bulimia nervosa

Binge eating disorder

Obesity

(TCO 5) Which of the following family characteristics is NOT associated with anorexia nervosa?

Rigid family structure

Angry and disruptive family environment

Avoidance of open discussions to resolve disagreements

None of these are associated with anorexia nervosa

(TCO 6) Impulsive, low self-esteem, seeks attention, extroverted, and erratic describe personality traits of:

Anorexia nervosa

Bulimia nervosa

Binge eating disorder

Obesity

(TCO 6) Which of the following BEST explains why adolescents are more vulnerable to the unrealistic media images of the “perfect body” than are adults?

The images target young people

Adolescents cannot comprehend the objective of advertisements

Adolescents are developing their personal identity

Adolescents cannot control their environment in the way adults can

(TCO 7) Which is NOT a symptom of anorexia nervosa?

Refusal to maintain body weight at a minimally normal weight for age and height

Intense fear of gaining weight

Loss of menstrual cycle

Secretive consumption of large amounts of food in a short period of time

(TCO 7) Which of the following BEST describes why the body reduces nonvital body functions in untreated anorexia nervosa?

There is insufficient estrogen to regulate these functions

The body is trying to maintain normal body temperature

The body needs to conserve energy

The individual’s activity level is very low

(TCO 8) Which of the following is the most common eating disorder?

Anorexia nervosa

Bulimia nervosa

Bulimia nervosa

Pica

(TCO 8) All of the following are associated with binge eating EXCEPT:

Loss of self control

Sense of euphoria

Weight loss

Consuming large quantities of food

(TCO 9) For most adults, it is difficult to get adequate nutrients if eating less than ________ kcals a day.

1,000-1,200

1,200-1,500

1,600-1,800

1,800-2,000

(TCO 9) To be a diagnostic symptom of bulimia nervosa, binge eating must occur on average at least ________ for three months.

Once a week

Twice a week

Four times a week

Seven days a week

(TCO 10) According to the American Psychiatric Association, anorexia nervosa is diagnosed when body weight is less than ________ % of expected height and weight.

70

75

85

90

SCI 228 Quiz Week 7 DeVry

 (TCO 4) A low-birth-weight infant will weigh:

Less than 5.5 pounds

Less than 6.0 pounds

Less than 6.5 pounds

Less than 7.0 pounds

(TCO 4) From the third month to term, the developing human is called a(n):

Fetus

Embryo

Zygote

Blastocyst

(TCO 4) In which trimester of pregnancy is the fetus the most vulnerable to teratogens?

First

Second

Third

Fourth

(TCO 5) What percentage of neural tube defects is related to the mother’s intake of folate before and during pregnancy?

25

30

50

70

(TCO 6) Which statement is FALSE regarding zinc during pregnancy?

Inadequate zinc intake can result in premature delivery and malformation of the fetus.

The RDA for zinc increases during pregnancy

Absorption of zinc is inhibited if iron-rich and zinc-rich foods are consumed together in a meal

Vitamin C enhances the absorption of zinc

(TCO 6) Which of the following enhances the absorption of iron?

Caffeine

Bran

Vitamin C

Oxalates

(TCO 7) The only thing that will cure preeclampsia is:

Delivery of the infant

Hypertensive medication

Low-sodium diet

Bedrest

(TCO 7) The hormone that suppresses milk production during pregnancy is:

Estrogen

Prolactin

Progesterone

Both estrogen and progesterone

(TCO 8) At birth, Baby Molly weighs seven pounds. If her growth and development are normal, what would you expect Molly to weigh on her first birthday?

14 pounds

18 pounds

21 pounds

30 pounds

(TCO 8) Which of the following are cues that an infant is ready to accept solid foods?

The infant can sit up with support

The infant’s tongue extrusion reflex has begun to abate

The infant is at least four months old

All of these are signs that an infant is ready for solid foods

(TCO 9) Overweight in children is defined as:

BMI 75th percentile

BMI 85th percentile

BMI 95th percentile

BMI 100th percentile

(TCO 9) All of the following are associated with developing toddlers’ healthy eating habits EXCEPT:

Snacking between meals

Small portion sizes

Rewarding meal completion with dessert

Including toddlers in food shopping and preparation

(TCO 10) All of the following are physiological changes that typically occur with aging EXCEPT:

Decreased lean body mass

Decreased bone density

Decreased fat mass

Decreased immune function

(TCO 10) On average, Americans have a life expectancy that reaches into the:

Early seventies

Late seventies

Early eighties

Late eighties

(TCO 10) The absorption of Vitamin ________ increases in older adults.

A

B12

C

D

(TCO 10) Which of the following is associated with the premature closure of the epiphyseal plate?

Malnourishment

Anabolic steroid use

Obesity

Both malnourishment and anabolic steroid use

(TCO 10) Which of the following is FALSE regarding the RDA for carbohiqualitytutorialstes?

This recommendation stays the same as we age

This amount ensures adequate glucose to the brain

Most healthy individuals require more than this recommendation

This amount is difficult for elderly individuals to consume in their diets

(TCO 10) Which of the following is NOT related to the increased iron needs in adolescence?

Skeletal muscle mass increases

Iron utilization slows down

Iron is lost as a result of menstruation (in girls)

Food choices are often inadequate in iron

SCI 228 Discussions Week 1-7 All Posts 964 Pages DeVry 2 Sets

SCI 228 The Digestive System and Food Safety & Technology Discussions Week 1 All Posts 136 Pages DeVry 2 Sets

SCI 228 The Digestive System Discussions 1 Week 1 All Posts 68 Pages DeVry 2 Sets

Imagine yourself eating a ham and cheese sandwich. What steps take place with regard to digesting the sandwich?

  1. a) Make sure that the students can distinguish between mechanical and chemical digestion.
    b) What role does HCL play with regard to protein digestion and bacteria?
    c) What are the roles of the small and large intestines?

Would the digestive process be different if we had only vegetables (vegetarian sandwich) instead of the ham one? One component of saliva is amylase, an enzyme that starts the process of carbohiqualitytutorialste digestion in the mouth. Explain: What are enzymes?…

Alright, off we go! Let’s start by discussing the anatomical parts involved in digestion and the biochemical processes that occur with those anatomical parts. Does anyone have any experience with probiotics? Even if not, what are your thoughts after reading the information? What is the role of accessory organs in the GI system?  What does “accessory organ” mean?  What are some examples and what is their role?…

SCI 228 Food Safety & Technology Discussions 2 Week 1 All Posts 68 Pages DeVry 2 Sets

What does food safety and technology have to do with me?

  1. a) Food spoilage. How and why does it occur?
    b) What are the four most important things when it comes to food safety?
    c) Define organic foods and the process involved with becoming a certified organic farm.

Why does food get spoiled and what must we do to ensure food safety? Do you know about what percent of food is actually tested by FDA? What is cross contamination and how can we avoid these? What are some of the problems associated with cross contamination? Any examples from either your kitchen or a grocery store?…

This is usually a pretty interesting topic and we can keep it very relevant to what’s going on around us. Let’s start with why you would think the US is concerned with food safety – or are we? Discuss! What exactly is a food-borne illness? How does food spoil? What makes processed foods less susceptible to spoiling? What are food additives, preservatives, and pesticides and how do they influence food safety? Is it important to you to buy organic? If so, why? If not, why? Do you buy certain organic things and other things non-organic?…

SCI 228 Carbohiqualitytutorialstes and Nutrition & Physical Activity Discussions Week 2 All Posts 140 Pages DeVry 2 Sets

SCI 228 Carbohiqualitytutorialstes Discussions 1 Week 2 All Posts 69 Pages DeVry 2 Sets

What role do carbohiqualitytutorialstes play in the diet? What are the problems of a protein rich diet? What is the Mediterranean Diet and how different is it say from The South Beach Diet or a High Protein Diet? How can we easily include fiber foods in our daily diet? What are some of the differences between some of the white and brown carbohiqualitytutorialstes? Is anyone better than the other one? How so?…

Welcome to week 2 class! Let’s start with a general discussion on carbohiqualitytutorialstes and then get into more detail later on in the week. So to begin – what is a carbohiqualitytutorialste? Are there different kinds? What do we need them for (or do we need them at all)? What are the daily recommendations for carbohiqualitytutorialstes? What is the AMDR for carbohiqualitytutorialstes when discussing total energy intake? How many servings are recommended by choose my plate? Do we get enough simple carbohiqualitytutorialstes? What about complex carbohiqualitytutorialstes? Where does the majority of carbohiqualitytutorialste digestion occur? How do salivary and pancreatic amylase assist with digestion? What is the function of the liver in the digestion of carbohiqualitytutorialstes?…

SCI 228 Nutrition & Physical Activity Discussions 2 Week 2 All Posts 71 Pages DeVry 2 Sets

What are the benefits of regular physical activity?  If physical activity is so important to our health, then why do so many people “skip” it? how can one encourage less electronic time and more physical activities? Has anyone done anything that succeeds and would like to share with the class? Which physical activity works for you? How can you improve on this?…

Class, this discussion can take us all over the place (and I hope it does – let’s talk first about the benefits of regular physical activity.  Don’t forget to cite your references!! How much physical activity is recommended?  Is there a difference for children?  Teenagers? Adults? Men?  Women?  The elderly?  What is the FITT principle? What are some examples of each component? Do you follow the FITT principle in your own daily exercise? Are there differences between exercise and physical activity?  What are the definitions for each? To follow up on that there are 5 components of a health related fitness program, let’s talk a little about that.  What are the 5 components? Why are they all important?…

SCI 228 Lipids and Proteins Discussions Week 3 All Posts 142 Pages DeVry 2 Sets

SCI 228 Lipids Discussions 1 Week 3 All Posts 72 Pages DeVry 2 Sets

What is the role of fat in the diet? Where do we get fat from and what is its’ role in our diet?  What are some of the good sources of fat? So what role do these good fats play in a keeping our bodies healthy? Do we have any quantity/amount/suggested amounts per serving?…

Well, carbs last week and fats this week! Many people think fat is the enemy when in actuality it really isn’t. Let’s start the week out by talking about why fat is good? What do we need fat for? How much of our diet should consist of fat per day and does the value vary based on the type of fat? Let’s also talk about disorders related to fat intake and/or metabolism. How can fats both protect against cardiovascular disease and yet promote it as well? What are some risk factors for cardiovascular disease? What are some ways to reduce risk of cardiovascular disease?…

SCI 228 Proteins Discussions 2 Week 3 All Posts 70 Pages DeVry 2 Sets

What role do proteins play in the body? Why would teenage boys and active men require more servings than teenage girls, active women and most men? Does anyone have examples of foods that are common sources of proteins in Asian, African or South American Countries? What roles do proteins have during exercise?…

And the last fuel source to discuss is protein. What are some of necessary functions of proteins? We’ll get into the chemical basis of proteins in a day or two but let’s start out with the basics as to why we need them.  Let’s start with peptides – what is a peptide? What is gene expression? How about translation? Transcription? This is about as molecular as we’ll get but this information is very important in understanding protein functions! Can vegetarians consume adequate amounts of protein? How do they have adjust their diets in order to do so? WHY do people choose to become vegetarians? There are many different reasons! What are some different types of vegetarian diets?…

SCI 228 Fluid and Electrolytes and Fluid and Electrolyte Disorders Discussions Week 4 All Posts 138 Pages DeVry 2 Sets

SCI 228 Fluid and Electrolytes Discussions 1 Week 4 All Posts 71 Pages DeVry 2 Sets

Why is hiqualitytutorialstion so important to our survival? What is Hydration and why is it important to our survival? What are some of the signs that one is actually “overheating”? What are some of the practical ways you can keep yourself and the ones around you hiqualitytutorialsted? What practical ways can we keep kids hiqualitytutorialsted at a summer camp?…

Let’s start with water and why it’s so important – what are some of the functions of water? Why is it called the universal solvent? Also, take a look at the article in your book for some information on bottled and tap water, what are your thoughts? What is the thirst mechanism? How is it stimulated? What are the main ways the body loses water? What is insensible water loss? What situations can increase water loss from the body?…

SCI 228 Fluid and Electrolyte Disorders Discussions 2 Week 4 All Posts 67 Pages DeVry 2 Sets 

What happens to the body when it is dehiqualitytutorialsted? What is dehiqualitytutorialstion? How does a body get dehiqualitytutorialsted and what happens when one gets dehiqualitytutorialsted?  Is it possible to become dehiqualitytutorialsted in cold areas or just in hot locations? When do you perspire more up the mountains or low down in the valleys? Is this due to the attitude, temperature or exercise (hiking/walking) involved?…

Here we go with disorders! Go ahead and pick one and discuss symptoms, diagnosis, treatment, etc. Then we’ll start talking about diets and how to alleviate these disorders. What would be some good sources of calcium in order to prevent hypocalcemia? How is it a fluid disorder? What are the things that affect blood pressure? Class, does anyone know what the recommended numbers are for “good” blood pressure? They’ve recently – within the past 10 years – been revised. How about the different classifications of hypertension?…

SCI 228 Bone Health and To Take or Not To Take Disorders Discussions Week 5 All Posts 135 Pages DeVry 2 Sets

SCI 228 Bone Health Discussions 1 Week 5 All Posts 72 Pages DeVry 2 Sets

What is the role of the skeletal system? How many bones does a new born baby have? Is this the same number as an adult? First and foremost what are the functions of the Skull? Looking at the Zika virus, how is it affecting the skull of the new born babies? Now what is a bone composed of? Are bones considered dead alive? Why so?…

To adequately discuss bone health we need to know a little bit about bones and how they are made up. So let’s start with – what are the functions of bones and the skeletal system? What are the different types of bones? Are bones an organ? One way we can improve bone health is by exercise, there is a certain type of exercise that is specifically good for BONE health in particular – any ideas? There are three processes that our bones undergo: bone growth, modeling and remodeling. What physiological changes occur during those stages?…

SCI 228 To Take or Not To Take Discussions 2 Week 5 All Posts 63 Pages DeVry 2 Sets

What are dietary supplements? What are they and why do some people take them? So one may ask “why take dietary supplements, why not just eat healthy?” How is it determined which nutrient supplements are required, amounts of supplements and length of time supplements should be taken?…

This always makes for a lively discussion! What are your thoughts, do we need vitamins? Vitamins are not direct sources of energy but we can’t generate energy from carbs, fat and protein without them. How do they assist in energy production? What are antioxidants and how do they work? What vitamins and minerals act as antioxidants? Do you take any antioxidants? Why or why not?…

SCI 228 What is a Healthy Body Weight? And Discovered Eating Behaviors Discussions Week 6 All Posts 140 Pages DeVry 2 Sets

SCI 228 What is a Healthy Body Weight? Discussions 1 Week 6 All Posts 71 Pages DeVry 2 Sets

What are the struggles with regard to a healthy body weight? It is common knowledge that many people struggle with maintaining a healthy body weight. Why do people struggle with this? Besides eating well and regular physical activities, what else works for you? How have you maintained or how can one maintain a healthy body weight? What if that particular weight is 20 or 30 pounds more than what would be considered healthy?…

Let’s start this thread out by discussing the different ways to measure body weight and body composition – what are some common ways? What are benefits of the one you chose? Drawbacks? Can anyone point out any specific good or bad things about BMI? In what situations would it be beneficial to use? What is energy expenditure? What is energy intake? What about basal metabolic rate? What causes obesity? Obesity is a multifactorial disease – what does this mean? What is the difference between overweight, obesity and morbid obesity? What are some ways to treat obesity? What is the first line of defense and progression of treatment from there?…

SCI 228 Discovered Eating Behaviors Discussions 2 Week 6 All Posts 69 Pages DeVry 2 Sets

What causes one to have an eating disorder? What is an eating disorder? What are some of the things that cause eating disorders?  What types of treatments are available for assisting someone with an eating disorder?  What are the characteristics of a healthy diet? Might behavior modification also be helpful for people suffering from nutrient and energy deficient eating disorders?…

Let’s start with behaviors that can contribute to eating disorders and disordered eating – what are some things that could influence our eating? We’ll hear more information about what causes an eating disorder but let’s also start to think about how eating disorders are treated. Does anyone have any ideas on effective ways to treat eating disorders? How does family affect food patterns? What about social outlets? The media? What are the three disorders that are clustered together in the female athlete triad? What are the activities most closely associated with the development of this disorder? How is the disorder recognized and how can it be treated?…

SCI 228 Nutrition Throughout the Lifecycle and Can Nutrition Influence a Disease? Discussions Week 7 All Posts 133 Pages DeVry 2 Sets

SCI 228 Nutrition Throughout the Lifecycle Discussions 1 Week 7 All Posts 73 Pages DeVry 2 Sets

What nutrients are important during various lifecycle stages? Human beings require nutrients during various life cycle stages. Which are some of these nutrients? What is the current thinking about weight gain? Is there different weight gain during the different trimesters? So what types of nutrient dense foods might be considered for the few extra daily calories eaten during pregnancy? What are the possible causes of morning sickness? What can women do to limit/reduce/stop morning sickness?…

Let’s start at the very beginning here – how do diet, stress and exercise affect the mother to be and her offspring. Please take a look in the text about these things and tell us what you think after you’ve read a little bit about it! How exactly does lactation work? What maintains milk production? Are a breastfeeding moms nutrient needs different from a pregnant woman? Why are fluid recommendations different? What are some advantages of breastfeeding? What are some problems women encounter while breastfeeding?…
SCI 228 Can Nutrition Influence a Disease? Discussions 2 Week 7 All Posts 60 Pages DeVry 2 Sets

What is a chronic disease, and what role does nutrition play? Let us discuss diabetes.
There is an alarming increase in the number of diabetes around the world, especially juvenile diabetes. What is juvenile diabetes? We have type 1 diabetes and type 2 diabetes, what is the difference? What happens to some women so that they develop diabetes during pregnancy?
Can this be controlled or how can border line patients stop from becoming diabetic?…

What is a chronic illness? What about an infectious disease? How are they different? Let’s also discuss the history of chronic illness a bit. What is an asymptomatic period? How about a symptomatic period?
Lastly, what are some medical interventions used in screening chronic illnesses? What exactly is cardiovascular disease? What are the major risk factors? How is heart disease diagnosed and what are the different types of heart disease?…

SCI 228 Final Exam DeVry

 (TCO 10) Which of the following is NOT a symptom of preeclampsia? (Points : 2)

Protein in the urine

Low blood pressure

Unexplained and rapid weight gain

Edema

(TCO 10)  All of the following can contribute to chronic dehiqualitytutorialstion in elderly individuals EXCEPT: (Points : 2)

Kidney function decreases with advancing age.

The thirst mechanism is impaired in the elderly.

Perspiration increases as we age.

Older adults may limit fluid intake due to urinary incontinence.

(TCO 10) To avoid ________ contamination during pregnancy, fish consumption should not exceed 12 oz. a week. (Points : 2)

Mercury

Lead

Arsenic

Nitrogen

(TCO 9)  What is meant by the notion that eating behaviors are conditioned? (Points : 2)

Eating habits affect our mood

Previous experiences, such as those that occur during childhood, affect our current response to food and eating behaviors

Food consumption only occurs in response to external stimuli

The intensity and duration of physical activity impacts our response to food and eating habits

(TCO 9)  Obsessive-compulsive, perfectionism, socially inhibited, compliant, and emotionally restrained describe personality traits of: (Points : 2)

Anorexia nervosa

Bulimia nervosa

Binge eating disorder

Obesity

(TCO 9)  Rachel is a gymnast who trains two hours/day on average. She supports her daily activity by consuming 2,500 kilocalories per day. How many kilocalories should she be consuming from carbohiqualitytutorialste sources? (Points : 2)

1,125-1,300 kilocalories

1,300-1,500 kilocalories

1,500-1,625 kilocalories

1,625-1,750 kilocalories

(TCO 7)  Diseases that cause the malabsorption of fat can result in a deficiency of: (Points : 2)

Vitamin A

Vitamin E

Vitamin C

Both Vitamin A and Vitamin E

(TCO 7)  Which of the following groups of people is the least likely to develop a Vitamin A deficiency? (Points : 2)

Pregnant women

Children with cystic fibrosis

Alcoholics

Elderly people consuming poor diets

(TCO 7)  How do antioxidant vitamins stabilize free radicals? (Points : 2)

Donate electrons or hydrogens

Enzymatic destruction

Phagocytosis

Break down and convert them to less damaging molecules

(TCO 8)  Which of the following hormones requires selenium for its synthesis? (Points : 2)

Estrogen

Insulin

Cortisol

Thyroxine

(TCO 8)  At which stage of the life cycle is calcium absorption the most efficient? (Points : 2)

Pregnancy

Infancy

Adulthood

Later Life

(TCO 8)  Assuming equal serving sizes, which of the following foods would be the poorest source of calcium? (Points : 2)

Skim milk

Whole milk

Cheddar cheese

Cottage cheese

(TCO 8)  Research studies have consistently demonstrated an association between a reduced risk of cancer and: (Points : 2)

The use of Vitamin C supplements

Increased consumption of fruits and vegetables

Increased consumption of monounsaturated fatty acids

The use of beta-carotene supplements

(TCO 8)  Which of the following statements is FALSE regarding the mineral, selenium? (Points : 2)

Selenium is needed in minute amounts by the human body

Selenium is involved in the maintenance of basal metabolism and body temperature

Selenium is only present in foods of animal origin

Selenium is a component of the antioxidant glutathione peroxidase enzyme system

(TCO 7)  Most of the body’s phosphorus is stored in: (Points : 2)

The liver

Adipose tissue

The skeleton

The kidneys

(TCOs 7, 8)  Dowager’s hump is one characteristic of: (Points : 2)

Fluorosis

Osteoporosis

Rickets

The female athlete triad

(TCOs 7, 8)  Pellagra is the deficiency disease associated with: (Points : 2)

Folate

Niacin

Thiamin

Riboflavin

(TCO 8)  Which of the following do sodium and potassium NOT have in common? (Points : 2)

Rich sources of both include fresh foods, such as bananas, cantaloupe, and potatoes

Both participate in maintaining fluid balance

Both are involved in nerve transmission

Both are major electrolytes in the body

(TCO 8)  Most water is lost daily via the ________. (Points : 2)

Skin

Lungs

Kidneys

Colon

(TCO 8)  Diets rich in ________ are associated with maintaining healthy blood pressure levels. (Points : 2)

Sodium

Chloride

Potassium

Phosphorus

(TCO 8)  Which of the following groups are the MOST vulnerable to dehiqualitytutorialstion? (Points : 2)

Pregnant women and the elderly

Adolescents and children

Infants and pregnant women

Infants and the elderly

(TCO 8)  Why is hypertension often referred to as the silent killer? (Points : 2)

Physicians are just beginning to realize the consequence of this condition.

The symptoms of this condition are not obvious.

Many individuals are embarrassed and don’t like to admit that they have this condition.

There are no effective treatments for this condition.

(TCO 8)  Which of the following is a diuretic? (Points : 2)

Alcohol

Milk

Water

Orange juice

(TCO 5)  Diets high in trans-fatty acids are associated with: (Points : 2)

Decreased cancer risk.

Increased blood cholesterol levels.

Osteoporosis.

Decreased blood glucose levels.

(TCO 5)  What is the primary form of lipid in the diet? (Points : 2)

Sterols

Triglycerides

Phospholipids

Glycerols

(TCO 5)  Which of the following ingredients would alert you to the presence of trans-fatty acids in a product? (Points : 2)

Hydrogenated vegetable oil

Lecithin

Liquid corn oil

Vitamin E

(TCO 6)  Which of the following is a genetic disorder resulting in debilitating protein abnormalities? (Points : 2)

Cystic fibrosis

Mad cow disease

Acidosis

Kwashiorkor

(TCO 6)  The process of transferring the amine group from one amino acid to another is called: (Points : 2)

Gene expression.

Alteration.

Deamination.

Transamination.

(TCO 6)  The type of protein-energy malnutrition characterized by a general lack of protein, energy, and nutrients in the diet is called: (Points : 2)

Marasmus.

Sickle cell anemia.

Cystic fibrosis.

Kwashiorkor.

(TCO 4)  Which of the following BEST describes the glycemic index? (Points : 2)

An individual’s glucose/insulin ratio in a fasted state

The amount of insulin required to metabolize 100 grams of glucose

The glucose content of a given food

The extent to which a given food raises blood glucose and insulin

(TCO 4)  What is the major monosaccharide found in the body? (Points : 2)

Glucose

Fructose

Galactose

Glycogen

(TCO 4)  The term complex carbohiqualitytutorialstes refers to: (Points : 2)

Monosaccharides.

Disaccharides.

Polysaccharides.

Glucose.

(TCO 1)  Which of the following is exempt from standard food labeling regulations? (Points : 2)

Coffee

Spices

Meat

All of the above

(TCO 1)  In which organ does the majority of water absorption occur? (Points : 2)

Mouth

Stomach

Small intestine

Large intestine

(TCO 1)  Which of the following is an example of a persistent organic pollutant? (Points : 2)

Mercury

GMO

Sulfite

Coal tar

(TCO 5) Discuss the factors that contribute to the development of obesity. How can related health promotion programs curb the incidence of obesity? (Points : 20)

The factors that contribute to obesity include lifestyle choices (e.g. too little sleep and the lack of exercise), medical…

(TCOs 3, 5) Beginning with the mouth, describe the digestion and absorption of dietary fat. What is the final fate of fat in the human body? (Points : 20)

The digestion process starts in the mouth. Mechanical digestion takes place when the teeth grind the food and break it down into…

(TCO 8) Our kidneys are constantly trying to maintain fluid balance by either excreting or retaining fluid. How is fluid primarily lost by the body, AND besides answering this question, please list the situations that can cause a significant loss of fluid. (Points : 20)

The body constantly loses fluids through urinating, sweating, and…

(TCO 9) Why does the risk for osteoporosis increase with menopause? What are some of the current treatments for osteoporosis? (Points : 20)

Osteoporosis is a disease of the bones. People who have this condition have weak bones, which easily…

(TCO 9)  Explain in detail how the bones in our body serve as a calcium bank for the body. Give examples and illustrate the chemistry. (Points : 20)

The bones serve as a calcium bank in that almost all of the calcium in our bodies is stored as bone minerals. When the…

(TCO 10) As a common pattern of disordered eating, chronic dieting can have many serious health concerns and conditions associated with this disorder. Please list the health concerns associated with chronic dieting and explain why this practice is detrimental to one’s health.   (Points : 20)

The health concerns associated with chronic dieting include nutrient deficiencies, altered mood, and slowed metabolism. It also makes…

(TCO 1) Discuss the benefits of and concerns regarding genetically modified foods/organisms. What are some legal implications? (Points : 20)

Some of the benefits of GMOs include the faster output of crops; the crops’ resistance to disease, increased nutrients, and a…

(TCO 10) Discuss ways to treat morning sickness during pregnancy. (Points : 20)

Morning sickness can occur at any time of the day, but most of the time it occurs earlier in the day when the…

(TCO 2) Using the My Pyramid food guide, describe a healthy diet plan for a vegan. Include types and servings of food within the five categories of the pyramid, as well as comment on nutrients that may need additional attention. (Points : 20)

Grains – 3 ounces of whole grain pasta, rice, crackers, cereals, or…

 

SEC 340 Full Class Latest Business Continuity

 

SEC 340 Full Class Latest Business Continuity  

Click Link Below To Buy:

http://hwcampus.com/shop/sec-340-full-class-latest-business-continuity/

  Or Visit www.hwcampus.com

SEC 340 Incident Response Plan Paper Week 3 DeVry

 

Students will submit a 750-1,000-word paper (double spaced) this week, identifying and describing the key components of a comprehensive incident response plan for any attack on an organization’s network and data. This paper should start with the identification of trigger events and should include immediate actions that should be taken. The rubric for this assignment is located in Doc Sharing.

Preview:

Implementing the IRP all starts with identifying a threat or incident. Time is of the essence in this stage of the IRP and most Network Administrations would like to get ahead of the curve by installing Intrusion Detection Systems or IDS. An IDS will send an alarm if there is any network traffic that is out of the norm. However, this in…

SEC 340 Disaster Recovery Plan Paper Week 5 DeVry

 

Students will submit a 750-1,000-word paper (double-spaced) this week, identifying and describing the key components of a comprehensive disaster recovery plan for any incident that could disrupt an organization’s network and data. This paper should start with the composition of the disaster recovery team and their respective roles and responsibilities. The rubric for this assignment is located in Doc Sharing.

Preview:

When a hurricane hits and building have been destroyed what measures are in place to ensure a company can recover from this disaster? Sure, there are some things they may seem like they are near impossible to recover from, like a hurricane. However, if a company has a…

SEC 340 You Decide Paper Week 6 DeVry

 

Sunshine Machine Works has an infrastructure which includes over 100 employees working within their one-story headquarters. Management needs a business continuity plan to help them continue with their business in the event of a serious incident.

You are an outside consultant brought in to provide some valuable insight and feedback for Sunshine Machine Works. This company has seen rapid growth and management is looking to you to provide critical input for a business continuity plan. Although they have a format they can use for the policy, they are looking to you to provide some guidance on areas they will need to address when creating this policy.

Wilma Stone – Chief Executive Officer

When we first started this company there were only a few computers that we used to share our files. Now, with the growth of our company we have a situation where we have centralized our file storage, created an extensive online collaboration process, and increased our dependency on all of that information. I am concerned that if we do not make preparations, some type of natural disaster or malicious act could jeopardize the future of our company. We need a good business continuity plan in place.

Margie Nelson – Chief Financial Officer

We have a lot of account information stored on our local server systems. There is restricted access so that the only ones to access those files are the CEO, the General Manager, and I. No other employees have access to most of them. Although our system is running efficiently, management realizes that in certain emergency situation alternative arrangements need to be in place in case of catastrophic damage to our facility or loss of our server systems to damage or theft.

Gary Thomas – General Manager

I look at the way we need to do business now, which entails a lot of online collaboration with our vendors, customers, and activities related to our potential sales outreach. We have made all our file storage centralized and we need to look at how we maintain productivity in the event of some type of disaster or other disruption.

As the expert providing consulting services, you will want to identify and describe the key components of a comprehensive business continuity plan for an attack or incident which could affect Sunshine Machine Work’s network and data. Follow the instructions provided in the You Decide Exercise: Business Continuity Plan.

Preview:

A business continuity plan (BCP) allows critical products or services to be continually provided to customers (Government of Canada, n.d.). It ensures the continuous availability of the company’s critical operations. In turn, it ensures survival, avoids injury, and enables the company to meet its legal and other…

SEC 340 Quiz Week 2 DeVry

 

(TCOs 1, 2, 4) A targeted solution to misuse of a specific vulnerability is called a(n) _____.

Exploit

Vulnerability

Control

Safeguard

(TCOs 1, 2, 4) The risk that remains after a control has been applied is called _____.

Pure risk

Residual risk

Dynamic risk

Static risk

(TCOs 1, 2, 4) Which part of the contingency plan provides detailed scenarios of the potential impact of each type of attack?

Incident response plan

Business impact analysis

Disaster recovery plan

Business continuity plan

(TCOs 1, 2, 4) Which is not a role of the contingency planning management team?

Obtaining commitment and support from senior management

Writing the contingency plan document

Conducting the business impact analysis

Conducting the risk assessment

(TCOs 1, 2, 4) Who should set the policy for the contingency planning process?

Executive management

CIO

Contingency planning management team

Incident response team

(TCOs 1, 2, 4) Which of the following is a method or source for collecting data for the BIA?

Online questionnaires

Focus groups

Application and system logs

All of the above

(TCOs 3, 5) Which of the following is not a possible IR team structure model? (TCOs 3, 5) Which of the following is not a possible IR team structure model?

Central IR team

Distributed IR teams

Decentralized IR team

Coordinating IR team

(TCOs 3, 5) The responsibility for creating an organization’s IR plan rests with the _____.

Chief information security officer (CISO)

Chief security officer

Chief executive officer

Chief planning officer

(TCOs 3, 5) An actual incident that occurs but is not reported is called a _____.

False positive

True positive

False negative

True negative

(TCOs 3, 5) An IDS that monitors traffic on a network segment is called a(n) _____.

Switched-port analysis

Application-based IDS

Host-based IDS

Network-based IDS

(TCOs 3, 5) The _____ should provide the incident response plan as its first deliverable.

Emergency response team

Incident response team

IR planning committee

None of the above

(TCOs 3, 5) Which of the following starts with admitting there is a problem?

Crisis intervention

Risk management

Risk assessment

Successful execution of a business continuity plan

(TCOs 3, 5) Confidentiality, integrity, and availability reflect upon the relative _____ of an information system.

Accessibility

Security

Patch level

None of the above

(TCOs 3, 5) Confidentiality refers to the way in which an information system is capable of identifying those who _____.

Do not have the right to know and access information

Are able to audit the system

Created files on that system

Are the system owners

(TCOs 3, 5) Which of the following is not a problem associated with risk management?

It is a distraction

It is expensive

It is not effective

It can be too effective

(TCO 1) The CNSS model of _____ evolved from a concept known as the CIA triangle.

Information assurance

Information technology

Information security

Security standards

(TCO 1) A threat is a category of all of the following except for what?

Objects

Persons

All of the above

None of the above

(TCOs 2, 4) The _____ takes up where the risk assessment process leaves off.

Risk assessment analysis

Business impact analysis

Qualitative evaluation

Business management board

(TCO 5) When a non-event is categorized as an actual incident, it is also known as a _____.

False negative

False positive

Reliable indicator

Threat vector

(TCO 5) False positives or noise often result from which of the following causes in an incident collection candidate?

Placement

Policy

Awareness

All of the above

SEC 340 Quiz Week 4 DeVry

 

(TCO 7) What type of backup site is a fully configured computer facility with all services, communications links, and physical plant operations and is capable of establishing operations at a moment’s notice?

Hot site

Warm site

Cold site

None of the above

(TCO 7) Which backup method offers the fastest recovery time?

Partial

Full

Incremental

Differential

(TCO 7) Which of the following is not one of the three possible backup strategies?

Six-tape rotation

Grandfather-Father-Son

Tower of Hanoi

All of the above are possible backup strategies.

(TCO 6) CERT provides nine best practices for responding to _____.

Spam

Virus infections

Intrusions

None of the above

(TCO 6) A _____ roster requires that a contact person call each and every person on the roster.

Hierarchical

Notification

Sequential

None of the above

(TCO 6) A hierarchical roster has the first person call _____ on the roster, who in turn call other people on the roster.

Every other person

Certain other people

Supervisors

None of the above

(TCO 6) _____ has its roots in computer science and criminal justice.

Intrusion detection

Computer forensics

Root cause analysis

None of the above

(TCO 6) The use of established _____ can facilitate the collection of legally defensible evidentiary material.

Methodologies

Technology

Tool-kits

None of the above

(TCO 7) The _____ method of backup allows recovery of data for the previous three weeks.

Six-tape rotation

Grandfather-father-son

Towers of Hanoi

None of the above

(TCO 7) The Towers of Hanoi is more complex than other backup approaches and is based on statistical principles to optimize _____.

Recovery

Data segmentation

Media wear

None of the above

(TCO 6) A network decoy system configured to resemble a production system is called a _____.

Honeynet

Honeypot

Honeycomb

None of the above

(TCO 6) Which of the following is not an established method to activate an alert roster?

Sequential roster

Hierarchical roster

Text messaging

None of the above

(TCO 6) A simulation of a real event in a test environment is called a _____.

Full interruption

Parallel test

Simulation

War game

(TCO 6) Which of the following is not a technical aspect of analyzing evidentiary material?

Analyzing original data

Creating a hash of the evidence to provide authentication

Creating working backups of the image

Using an investigative tool that can be used to examine computer evidence

(TCO 6) When analyzing the cost of an incident, which of the following should not be considered?

Cost associated with reproducing lost data

Legal costs associated with prosecuting offenders

Costs associated with loss of market advantage or share due to disclosure of proprietary information

None of the above. They are all factors that should be considered.

(TCO 7) A business resumption plan is considered to have two major elements, which are:

Disaster recovery plan and business continuity plan

Disaster recovery plan and incident response plan

Incident response plan and business resumption plan

None of the above

(TCO 7) There are _____ key procedural mechanisms which facilitate the restoration of critical information and the continuation of business operations.

Two

Three

Four

Five

(TCO 7) First, regardless of the strategy, _____ storage and _____ storage must be secured.

Tape, hard drive

Differential, incremental

Off-site, on-site

Classified, unclassified

(TCO 7) Overall, the _____-tape rotation method of backup offers roughly two weeks of recovery capability.

Gigabit

Red

Six

Four

(TCO 7) Which form of RAID is used to balance safety and redundancy against the costs of acquiring and operating the systems?

RAID level 1

RAID level 0

RAID level 7

RAID level 5

SEC 340 Discussions Week 1-7 All Posts 224 Pages DeVry

 

SEC 340 Risk Management and Threats and Attacks Discussions Week 1 All Posts 35 Pages DeVry

 

SEC 340 Risk Management Discussions 1 Week 1 All Posts 17 Pages DeVry

 

What is meant by the term “risk management” and why is it important in the framework of incident response and disaster recovery? What is the difference between risk identification and risk control in the context of protecting information systems? In order to understand incident response and disaster recovery, we must first understand what is meant by “risk management.”  What is the relationship between BC and risk management? Any ideas?  What strategies can be used to control identified risks to the organization’s information systems?…

SEC 340 Threats and Attacks Discussions 2 Week 1 All Posts 18 Pages DeVry

 

Review the threats and corresponding attacks in Table 2-1 in your textbook. How would you prioritize these threats and attacks as they relate to the computer network at your home, place of work, and/or a school’s computer laboratory? Explain the rationale for how you arrived at your conclusions. What have you done to reduce the risk of these threats to your home computer? In evaluating threats which is more important: probability of occurrence or impact on the organization? What I’m saying is this: is a threat that is likely to happen but will only have a minimal impact on the organization greater than a threat that is unlikely but will have a significant impact on the organization? What do you think? What is the relationship between a recovery point objective and a recovery time objective?…

SEC 340 Incident Response Development and The Sparks Chronicles Discussions Week 2 All Posts 32 Pages DeVry

 

SEC 340 Incident Response Development Discussions 1 Week 2 All Posts 15 Pages DeVry

 

What are the phases of the incident response development process? What are the critical elements of each of these phases? How is an IR plan developed? What are the phases of IR? What are the critical elements of each of these phases? Any ideas? What is involved with the IR “development” process? How are these plans developed? Go to the www.cert.org website and in the search box type in “CSIRT.” What is the CSIRT and what exactly does it do? How is a CSIRT created, operated and staffed?  How can something like the CSIRT help other companies protect their network?…

SEC 340 The Sparks Chronicles Discussions 2 Week 2 All Posts 17 Pages DeVry

 

Review the video “The Sparks Chronicles: Episode 1” at the end of the Week 2 Lecture. What conditions and vulnerabilities do you see at this facility that could threaten the organization’s network and data? What physical security measures and procedures would you implement to enhance the security of the IT room? Is there a potential problem with putting barbed wire on top of a fence surrounding the facility? Could top management say it doesn’t look “aesthetically pleasing?” How does this factor into security measures? Our text provides a very in-depth explanation of Intrusion Detection Systems (IDS).What are some compelling reasons that you can think of to implement and use an Intrusion Detection System (IDS)? How does an IDS help to manage risk?…

SEC 340 Privacy and Regulatory Issues and Recovery Operations Discussions Week 3 All Posts 33 Pages DeVry

 

SEC 340 Privacy and Regulatory Issues Discussions 1 Week 3 All Posts 19 Pages DeVry

 

Conduct research into either Sarbanes-Oxley or HIPAA. Present a brief description of what organizations are required to do under these laws in regard to contingency planning and business continuity. How have these laws affected the way that organizations view the need for business continuity planning? What are some of the possible consequences of not having a robust business continuity plan? How does this regulation affect IT? What role does IT play in financial reporting and why is it important that this process is transparent?  Go back to the Sans Reading Room at www.sans.org/rr. Select one of the papers from within these categories and present a brief overview of the paper to the class. What are some of the salient points in this paper as it relates to Incident Response?…

SEC 340 Recovery Operations Discussions 2 Week 3 All Posts 14 Pages DeVry

 

What should be the primary objective of recovery operations during an incident response? What are some of the key steps that should be used to accomplish recovery?  Where exactly does recovery fit into the incident response plan? I’m looking forward to reading your posts and discussing this with you. What would you state as the overall goal of any Recovery operation?  What is an After-Action Review? What are the primary reasons for undertaking an After-Action Review?…

SEC 340 Privacy and Regulatory Issues and Recovery Operations Discussions Week 4 All Posts 33 Pages DeVry

 

SEC 340 Privacy and Regulatory Issues Discussions 1 Week 4 All Posts 19 Pages DeVry

 

Conduct research into either Sarbanes-Oxley or HIPAA. Present a brief description of what organizations are required to do under these laws in regard to contingency planning and business continuity. How have these laws affected the way that organizations view the need for business continuity planning? What are some of the possible consequences of not having a robust business continuity plan? Go back to the Sans Reading Room at www.sans.org/rr. Select one of the papers from within these categories and present a brief overview of the paper to the class. What are some of the salient points in this paper as it relates to Incident Response?….

SEC 340 Recovery Operations Discussions 2 Week 4 All Posts 14 Pages DeVry

 

What should be the primary objective of recovery operations during an incident response? What are some of the key steps that should be used to accomplish recovery? Where exactly does recovery fit into the incident response plan? I’m looking forward to reading your posts and discussing this with you.  What is an After-Action Review? What are the primary reasons for undertaking an After-Action Review?…

SEC 340 Data Backup, Recovery, and Storage Strategies and Disaster Recovery Versus Business Continuity Discussions Week 5 All Posts 33 Pages DeVry

 

SEC 340 Data Backup, Recovery, and Storage Strategies Discussions 1 Week 5 All Posts 18 Pages DeVry

 

Using an Internet search engine, conduct a search for the terms “data backup,” “data recovery,” and “data storage strategies.” What options are available to disaster recovery planners to perform these tasks? How do they relate to disaster recovery? Which of the various options would you prefer to use if you were in charge of disaster recovery planning? Why?  So, what is your opinion of backing up to the cloud? Do you think that is secure enough at this point to be an option? What problems have occurred or do you think could occur when restoring data from backups?….

SEC 340 Disaster Recovery Versus Business Continuity Discussions 2 Week 5 All Posts 15 Pages DeVry

 

What is the difference between disaster recovery and business continuity planning? What degree of similarity exists between the special needs of the disaster recovery and business continuity planning processes? How is the business impact analysis used in the disaster recovery and business continuity planning process? What are the “triggers” for activating either of these plans? Under what conditions would you activate the DRP vs. the BCP? Conduct Internet research to search for commercial applications using various forms of RAID technologies, such as RAID 0 through RAID 6, plus the other configurations. What is the most common implementation?…

SEC 340 RTO Versus RPO and Alternate Sites Discussions Week 6 All Posts 29 Pages DeVry

 

SEC 340 RTO Versus RPO Discussions 1 Week 6 All Posts 14 Pages DeVry

 

What is the difference between a recovery time objective and a recovery point objective in the context of a business continuity plan? Why is it important to define these two parameters early in the BC planning process? So, how does knowing the RTO and RPO help when developing DR and BC Plans? Can you explain why these are so important in ensuring that these plans meet the business needs of the company? What should be the first step in any given part of a contingency planning process?…

SEC 340 Alternate Sites Discussions 2 Week 6 All Posts 15 Pages DeVry

 

When a decision is made to activate critical services at an alternate site, what important steps/decisions must be taken to implement this decision? What are some of the things that could create confusion and disorder at the alternate site? What are the critical issues that companies must consider when deciding to activate their alternate site? What is meant by the term “continuous improvement” and how does it apply to the BC process?…

SEC 340 CMP Versus CMT and Crisis Communications Discussions Week 7 All Posts 29 Pages DeVry

 

SEC 340 CMP Versus CMT Discussions 1 Week 7 All Posts 16 Pages DeVry

 

What are the differences in roles and responsibilities between the crisis management planning committee and the crisis management team? Who should be on the CMP and who should be on the CMT? How does the size of a company affect the composition of each of these entities? Is it possible that a small company would have many of the same people on each of these? And would a Fortune 500 company really need their CEO to participate on the CMPC, or could that be delegated to someone else? What do you think? What is meant by the term “sudden crisis?” Describe an example either from your professional experience or through an Internet search of “sudden” crisis. What was the root cause of this crisis and how did the organization deal with it?…

SEC 340 Crisis Communications Discussions 2 Week 7 All Posts 13 Pages DeVry

 

What is meant by the term crisis communications? What role does this play in the crisis management plan? What are some bad things that can happen when companies don’t communicate effectively during a crisis? Any ideas or examples from real crises that you can think of? What type of information should be communicated internally to employees? Why is this so important? What type of information do you think should be disseminated to a company’s employees during a crisis that significantly affects the company’s business operations? How does emergency response differ from crisis management?…

Final Exam Not Included

 

SEC 280 Entire Course New

 

SEC 280 Entire Course New

Principles Info System Security

 

Click Link Below To Buy:

http://hwcampus.com/shop/sec-280-entire-course-new/

  Or Visit www.hwcampus.com

 

 SEC 280 Entire Course Principles Info System Security 

A+ NEW

SEC 280 Case Studies Week 1-6

 

SEC 280 Case Study Week 1 Ping Sweeps and Port Scans

 

Your boss has just heard about some nefarious computer activities called ping sweeps and port scans. He wants to know more about them and what their impact might be on the company. Write a brief description of what they are, and include your assessment of whether the activities are something to worry about or not. This assignment requires two to three pages, based upon the APA style of writing.

Preview: 

One main security threat is the reconnaissance attack, which includes the two main types of threat that can affect a company’s network — ping sweeps and port scans. These are the unauthorized discovery of systems, which can lead to…

SEC 280 Case Study Week 2 Information Security Officer

 

You are the Information Security Officer at a medium-sized company (1,500 employees). The CIO asks you to explain why you believe it is important to secure the Windows and Unix/Linux servers from known shortcomings and vulnerabilities. Explain to your CIO what you can do to make sure the network infrastructure is more secure.

Preview:

The company has a network of Windows and Linux servers, business products, and network management tools.  Employees use mobile devices with business applications installed for higher productivity.  In this regard, the IT network has to function at its optimum best so that the business functions smoothly. However, network security risk is a…

SEC 280 Case Study Week 3 ABC Institute

 

ABC Institute of Research has sensitive information that needs to be protected from its rivals. The Institute has collaborated with XYZ Inc. to research genetics. The information must be kept top secret at any cost. At ABC Institute, the researchers are unsure about the type of key (asymmetric or symmetric) to use. Please formulate a possible solution, and describe the advantages and disadvantages of any solution employed.

This assignment requires two to three pages in length, based upon the APA style of writing.

Preview:

There is much information available in the digital form. Some of it is personal; some public; and some are confidential and sensitive in nature. It is important to protect such information so that its confidentiality, integrity, and availability are not compromised upon. It has to be protected throughout the lifecycle of information creation, modification, storage, and disposal.  If it falls into the wrong hands, it can be…

SEC 280 Case Study Week 4 Computer Security

 

Case Study

Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer. Identify some of the techniques an attacker might employ to access information on the system.

This assignment requires two to three pages in length, based upon the APA style of writing.

Use transition words; a thesis statement; an introduction, body, and conclusion; and a reference page with at least two references. Use double-spaced, Arial font, size 12.

Preview:

Nearly18 million people in the United States were victims of identity theft, which mainly targeted people’s credit cards and bank accounts (Williams, 2015). There are a lot of malicious attacks on personal computers. These attacks can make the computer unusable and also compromise the user’s confidential information, as well as that of the network they are connected to. Hackers constantly…

SEC 280 Case Study Week 5 An Information Security Engineer 

 

Case Study

You have just been hired as an Information Security Engineer for a large, multi-international corporation. Unfortunately, your company has suffered multiple security breaches that have threatened customers’ trust in the fact that their confidential data and financial assets are private and secured. Credit-card information was compromised by an attack that infiltrated the network through a vulnerable wireless connection within the organization. The other breach was an inside job where personal data was stolen because of weak access-control policies within the organization that allowed an unauthorized individual access to valuable data. Your job is to develop a risk-management policy that addresses the two security breaches and how to mitigate these risks.

This assignment requires two to three pages in length, based upon the APA style of writing.

Use transition words; a thesis statement; an introduction, body, and conclusion; and a reference page with at least two references. Use double-spaced, Arial font, size 12.

Preview:

Risk is the negative effect of an event or action or the probability of the event or action and its impact.  On the other hand, risk management is the process of identifying and calculating the effect of the negative impacts, taking steps to avoid or mitigate risks, and accepting and managing risks that cannot be avoided or mitigated.  The organization should have a…

SEC 280 Case Study Week 6 Gem Infosys

 

Case Study

Gem Infosys, a small software company, has decided to better secure its computer systems after a malware attack shut down its network operations for 2 full days. The organization uses a firewall, three file servers, two Web servers, one Windows 2008 Active Directory server for user access and authentication, ten PCs, and a broadband connection to the Internet. The management at Gem needs you to formulate an incident-response policy to reduce network down time if future incidents occur. Develop an incident-response policy that covers the development of an incident-response team, disaster-recovery processes, and business-continuity planning.  This assignment requires two to three pages in length, based upon the APA style of writing.

Preview:

In the technology industry, a company is never 100% secure against unauthorized access,  virus attacks, malware attacks, hacking, disasters, and theft of software and hardware. It is therefore important to have an action plan ready to manage incidents that attack the system. An action plan to manage the…

SEC 280 Quiz Week 1-6

 

SEC 280 Quiz Week 1

 

(TCO 1) Ensuring that an individual is who he or she claims to be is the function of _____.

Confidentiality

Integrity

Availability

Authentication

Nonrepudiation

(TCO 1) Background checks, drug testing, retirement, and termination are elements found in what type of policy?

Due diligence

Human resources

Equal opportunity

Privacy

(TCO 1) What is an elite hacker?

A hacker with a high level of technical ability

A hacker who is wealthy and who is politically motivated

A hacker who has elitist ideas and hacks for political purposes

A hacker who searches for scripts and ready-made tools to use for attacks

(TCO 1) What is a port scan?

It identifies what ports can be used to smuggle information across borders

It identifies ports that are open and services that are running

It identifies the USB, parallel, and serial ports that can be used to connect to the system

It identifies the IP addresses of computers on the network

(TCO 1) Who is Kevin Mitnick?

He used social engineering, sniffers, and cloned cell phones to gain unauthorized access to networks belonging to Motorola, Novell, Fujitsu, and Sun Microsystems

He made bank transfers from St. Petersburg using the Citibank cash-management system

He gained access to a loop carrier system operated by NYNEX and cut off FAA control tower and emergency services

He developed the Love Bug love-letter virus that spread to 45 million people

(TCO 1) When information is disclosed to individuals who are not authorized to see it, a _____ has been suffered

Loss of confidentiality

Loss of integrity

Loss of functionality

Loss of availability

(TCO 1) What is the most common name for the first large-scale attack on the Internet, which occurred in November of 1988?

The Code Red Worm

The Morris Worm

The Slammer Worm

The Jester Worm

(TCO 1) Each of the infected systems became part of what is known as a bot network, which could be used to cause a DoS attack on a target or to forward spam e-mail to millions of users as a result of the _____.

Slammer Worm

Morris Worm

Conficker

Melissa Worm

(TCO 1) As the level of sophistication of attacks has increased, _____.

The level of knowledge necessary to exploit vulnerabilities has increased

The level of knowledge necessary to exploit vulnerabilities has decreased

The level of skill necessary to exploit vulnerabilities has increased

The amount of exploit software available on the Internet has decreased

(TCO 1) When users are unable to access information or the systems processing information, they may have suffered a_____.

Loss of confidentiality

Loss of integrity

Loss of functionality

Loss of availability

SEC 280 Quiz Week 2

 

(TCO 2) Pretty good privacy (or PGP) is _____.

A privacy group that fights against the government

A common encryption method for e-mail

A password-management system

A method of securing an operating-system kernel

(TCO 2) All of the following are techniques used by a social engineer except _____.

When an attacker replaces a blank deposit slip in a bank lobby with one containing his account number

When an attacker calls up the IT department posing as an employee and requests a password

When an attacker runs a brute-force attack on a password

When an attacker sends a forged e-mail with a link to a bogus website that has been set to obtain personal information

(TCO 2) When creating a password, users tend to use _____.

All capital letters

Passwords that are too long

Names of family members, pets, or teams

Numbers only

 (TCO 2) What is PKCS?

One of the standards used in implementing a public-key infrastructure

A method of private cryptography used by the military

A method of encrypting e-mail from the IRS

The method of encryption that used a 40 bit encryption key

 (TCO 8) Which law mandates that information that is no longer needed must be properly disposed of, either by burning, pulverizing, or shredding?

FCRA

PCI DSS

FACTA

GBLA

(TCO 8) The Wassenaar Arrangement can be described as which of the following?

An international arrangement on export controls for conventional arms as well as dual-use goods and technologies

An international arrangement on import controls

A rule governing the import of encryption in the United States

A rule governing the export of encryption in the United States

 (TCO 8) What do you call a law that is based on previous events or precedents?

Statutory law

Administrative law

Common law

Blue law

(TCO 8) Which of the following is a standard that provides guidance and the level of expected protection on the elements of a credit-card transaction that needs protection?

FCRA

PCI DSS

FACTA

GBLA

(TCO 8) The Electronic Communications Privacy Act (ECPA) of 1986 _____.

Implements the principle that a signature, contract, or other record may not be deleted

Denies legal effect, validity, or enforceability solely because it is in electronic form

Addresses a myriad of legal privacy issues that resulted from the increasing use of computers and other technology specific to telecommunications

Makes it a violation of federal law to knowingly use another’s identity

Is a major piece of legislation affecting the financial industry and containing significant privacy provisions for individuals

(TCO 8) A video rental store shares its customer database with a private investigator. The rental store may have violated which law?

COPPA

VPPA

FERPA

CFAA

SEC 280 Quiz Week 3

  

(TCO 4) The difference between centralized and decentralized infrastructures is _____.

That the key pairs and certificates do not have a set lifetime in centralized infrastructures

That the location where the cryptographic key is generated and stored is different

That the network administrator sets up the distribution points in centralized infrastructures

That, in a decentralized infrastructure, the certificate may have an extended lifetime

(TCO 4) Agents intercept an encrypted message. They use various techniques to try to decipher the plain-text message. This is an example of _____.

Desteganographying

Decrypting

Uncrypting

Cryptanalysis

(TCO 4) The cipher that replaces each letter of the alphabet with a different letter (not in sequence) is a _____.

Shift cipher

Substitution cipher

Transposition cipher

Vigenère cipher

 (TCO 4) Why construct and implement a PKI?

To eliminate certificate authorities

To provide identification to individuals and to ensure availability

To provide a higher level of trust than can be obtained through other applications and protocols

To enable a centralized directory to store the registered certificate and to distribute private keys to users who request them

 (TCO 4) Which of the following is a critical concept common to all PKIs?

Cryptographic hardware is required for PKI construction

The server that centrally stores the keys should not be available

The private key must be computer generated and centrally stored

Private keys must remain private

(TCO 4) The encryption method based on the idea of using a shared key for the encryption and decryption of data is _____.

A hashing function

Symmetric encryption

Asymmetric encryption

Elliptical-curve encryption

(TCO 4) Attackers need a certain amount of information before launching their attack. One common place to find information that could be useful to the attacker is to go through the trash of the target. The process of going through a target’s trash is known in the community as _____.

Trash rummaging

Garbage surfing

Piggy diving

Dumpster diving

(TCO 4) A special mathematical function that performs one-way encryption is called _____.

Asymmetric encryption

Transposition cipher

A hashing function

Multiple encryption

(TCO 4) A trust domain is defined as _____.

The agreed upon, trusted third party

A scenario where one user needs to validate the other’s certificate

A construct of systems, personnel, applications, protocols, technologies, and policies that work together to provide a certain level of protection

A scenario in which the certificate’s issuer and the subject fields hold the same information

(TCO 4) Encrypting a message by simply rearranging the order of the letters is a function of the _____.

Shift cipher

Substitution cipher

Transposition cipher

Vigenère cipher

SEC 280 Quiz Week 4

 

(TCO 3) What is Certification Authority?

A third party that issues digital certificates

An auditing firm that ensures encryption security

A certified professional who audits systems for security

A third party that encrypts information for people

(TCO 3) Which of the following is not a network topology?

Star

Ring

Integrated

Mixed

 (TCO 3) A Class _____ address supports 65,000 hosts on each of 16,000 networks and allows two sections of the IP address to be devoted to host addressing.

A

B

C

D

(TCO 3) What is Wired Equivalent Privacy (WEP)?

A method used to encrypt wireless communications in an 802.11 environment

A signal that jams other wireless devices attempting to access the system

A method to change encryption standards during a transmission

An encryption method used to secure bank passwords

(TCO 3) Which of the following is a benefit that Network Address Translation (NAT) provides?

Compensates for the lack of IP addresses

Allows devices using two different protocols to communicate

Creates a DMZ

Translates MAC addresses to IP addresses

(TCO 3) Unfortunately, hackers abuse the ICMP protocol by using it to _____.

Send Internet worms

Launch denial-of-service (DoS) attacks

Steal passwords and credit-card numbers

Send spam

(TCO 3) What is PKCS?

One of the standards used in implementing a public-key infrastructure

A method of private cryptography used by the military

A method of encrypting e-mail from the IRS

The method of encryption that uses a 40-bit encryption key

(TCO 5) In addition to “What users know,” “What users have,” and “What users are,” what did the author add for authenticating a user?

“What users should have”

“What users should think”

“What users can argue they should be”

“What users do”

(TCO 5) The three major components of the SSH protocol are the_____.

Transport Layer Protocol, User Authentication Protocol, and Connection Protocol

User Datagram Protocol, User Authentication Protocol, and Connection Protocol

Transport Layer Protocol, User Encryption Protocol, and Connection Protocol

User Datagram Protocol, User Encryption Protocol, and Connection Protocol

(TCO 5) Which protocol enables the secure transfer of data from a remote PC to a server by creating a VPN across a TCP/IP network?

PPPP

PPTP

PTPN

PPTN

SEC 280 Quiz Week 5

 

(TCO 6) The best fire extinguisher for petroleum products is a_____.

Class A

Class B

Class C

Class D

(TCO 6) When a biometric is scanned and allows access to someone who is not authorized, it is called a _____.

False negative

False positive

True negative

True positive

 (TCO 6) A new breed of IDS that is designed to identify and prevent malicious activity from harming a system is called _____.

Preemptive IDS

Preventive IDS

Active IDS

Dynamic IDSA

(TCO 6) The best fire extinguisher for wood, paper, and cloth fires is a _____.

Class A

Class B

Class C

Class D

(TCO 6) Multifactor authentication is all of these except _____.

“What you are”

“What you have”

“What you know”

“What you calculate”

(TCO 6) _____ are applications designed to detect, log, and respond to unauthorized network or host use, both in real time and after the fact.

Windows Operating Systems

Intrusion-detection systems (IDSs)

Firewalls

Twisted-wire pairs

(TCO 6) Media can be divided into three categories: _____.

Paper, plastic, and cloth

Magnetic, optical, and electronic

Confidential, integrity, and authority

Red, yellow, and blue

 (TCO 6) What does a host-based IDS monitor?

A single system

Networks

Physical intrusions into facilities

A system and all its surrounding systems

 (TCO 6) Egress filtering _____.

Scans incoming mail to catch SPAM

Scans outgoing mail to catch SPAM

Scans messages for specific words or phrases

Filters out POP traffic

(TCO 6) _____ are characterized by the use of a laser to read data stored on a physical device.

Authentication rules

FTP sites

Modems

Optical media

SEC 280 Quiz Week 6

 

(TCO 3) An attack where the attacker captures a portion of a communication between two parties and retransmits it at another time is called a _____ attack.

Smurf

Denial-of-service

Viral

Replay

(TCO 3) The art of “secret writing” is called _____.

Spoofing

Smurfing

Cryptography

Cryptanalysis

(TCO 3) Making data look like they came from a different source is called _____.

Sniffing

A man-in-the-middle attack

A replay attack

Spoofing

(TCO 5) Malicious code that is scripted to send itself to other users is known as a _____.

Virus

Worm

Trojan

Logic bomb

(TCO 5) What is the primary reason for the spread of the ILOVEYOU worm?

Network firewalls failed

Systems did not have the appropriate software patch

Automatic execution, such as Microsoft Outlook’s preview pane

The virus-scan software was not updated

 (TCO 5) Which of the following is not one of the three primary e-mail protocols?

SMTP

SNMP

POP3

IMAP

(TCO 5) A worm is a type of virus that _____.

Is scripted to send itself to other systems

Is designed to crawl in under a firewall

Buries itself between the kernel and the Application Layer of the operating system

Is passed through e-mails with a subject heading that has the word “worm” in it

(TCO 6) ActiveX refers to a _____.

Collection of APIs, protocols, and programs developed by Microsoft to automatically download and execute code over the Internet

Library of security protocols for Microsoft’s Internet Explorer

Patch to fix a vulnerability that hackers exploit where the user downloads an MP3 file and the buffers of the sound card are overwritten

Method of blocking java scripts that come from non-Microsoft websites

(TCO 6) With the RSA and Diffie-Hellman handshakes, _____.

The server and the client agree on what type of browser to use

Parameters are agreed upon and certificates and keys are exchanged

Parameters are agreed upon so that java scripts cannot execute inside the client system

Office applications are able to e-mail secure documents

(TCO 6) Which are the most common exploits used to hack into a system?

Buffer overflows

Birthday attacks

Weak-key attacks

Man-in-the-middle attacks

SEC 280 Final Exam

 

(TCO 2) What is XKMS?

Key Management Specification, which defines services to manage PKI operations within the Extensible Markup Language (XML) environment

An XML standard for e-mail encryption

An XML standard that is used for wireless data exchange

A primary XML standard that is for application development

(TCO 2) All of the following are techniques used by a social engineer EXCEPT for which one?

An attacker replaces a blank deposit slip in a bank lobby with one containing his own account number

An attacker calls up the IT department posing as an employee and requests a password reset

An attacker runs a brute-force attack on a password

An attacker sends a forged e-mail with a link to a bogus website that has been set to obtain personal information

(TCO 2) Attackers need a certain amount of information before launching their attack. One common place to find information is to go through the trash of the target to find information that could be useful to the attacker. This process of going through a target’s trash is known in the community as _____

Trash rummaging

Garbage surfing

Piggy diving

Dumpster diving

 (TCO 2) What are the SSL and TLS used for?

A means of securing application programs on the system

To secure communication over the Internet

A method to change from one form of PKI infrastructure to another

A secure way to reduce the amount of SPAM a system receives

(TCO 2) What are the security risks of installing games on an organization’s system?

There are no significant risks

Users can’t always be sure where the software came from and it may have hidden software inside of it.

The users may play during work hours instead of during breaks

The games may take up too much memory on the computer and slow down processing, making it difficult to work

(TCO 2) What is the ISO 17799?

A standard for creating and implementing security policies

A standard for international encryption of e-mail

A document used to develop physical security for a building

A document describing the details of wireless encryption

(TCO 3) A(n) _____ is a network typically smaller in terms of size and geographic coverage, and consists of two or more connected devices. Home or office networks are typically classified as this type of network

Local-area network

Office-area network

Wide-area network

(TCO 3) What is the main difference between TCP and UDP packets?

UDP packets are a more widely used protocol

TCP packets are smaller and thus more efficient to use

TCP packets are connection oriented, whereas UPD packets are connectionless

UDP is considered to be more reliable because it performs error checking

Internal-area network

(TCO 3) Unfortunately, hackers abuse the ICMP protocol by using it to _____.

Send Internet worms

Launch denial-of-service (DoS) attacks

Steal passwords and credit card numbers

Send spam

(TCO 3) Which transport layer protocol is connectionless?

UDP

TCP

IP

ICMP

(TCO 3) Which of the following is a benefit provided by Network Address Translation (NAT)?

Compensates for the lack of IP addresses

Allows devices using two different protocols to communicate

Creates a DMZ

Translates MAC addresses to IP addresses

(TCO 3) Which transport layer protocol is connection oriented?

UDP

RCP

IS

ICMP

(TCO 3) Which of the following is an example of a MAC address?

00:07:H9:c8:ff:00

00:39:c8:ff:00

00:07:e9:c8:ff:00

00:07:59:c8:ff:00:e8

(TCO 4) All of the following statements sum up the characteristics and requirements of proper private key use EXCEPT which one?

The key should be stored securely

The key should be shared only with others whom you trust

Authentication should be required before the key can be used

The key should be transported securely

(TCO 4) It is easier to implement, back up, and recover keys in a _____.

Centralized infrastructure

Decentralized infrastructure

Hybrid infrastructure

Peer-to-peer infrastructure

(TCO 4) When a message sent by a user is digitally signed with a private key, the person will not be able to deny sending the message. This application of encryption is an example of _____.

Authentication

Nonrepudiation

Confidentiality

Auditing

(TCO 4) Outsourced CAs are different from public CAs in what way?

Outsourced services can be used by hundreds of companies

Outsourced services provide dedicated services and equipment to individual companies

Outsourced services do not maintain specific servers and infrastructures for individual companies

Outsourced services are different in name only. They are essentially the same thing

(TCO 4) Cryptographic algorithms are used for all of the following EXCEPT _____.

Confidentiality

Integrity

Availability

Authentication

(TCO 6) A hub operates at which of the following?

Layer 1, the physical layer

Layer 2, the data-link layer

Layer 2, the MAC layer

Layer 3, the network layer

(TCO 6) Alice sends an e-mail that she encrypts with a shared key, which only she and Bob have. Upon receipt, Bob decrypts the e-mail and reads it. This application of encryption is an example of _____.

Confidentiality

Integrity

Authentication

Nonrepudiation

(TCO 6) The following are steps in securing a workstation EXCEPT _____.

Install NetBIOS and IPX

Install antivirus

Remove unnecessary software

Disable unnecessary user accounts

(TCO 8) Which of the following is a characteristic of the Patriot Act?

Extends the tap-and-trace provisions of existing wiretap statutes to the Internet, and mandates certain technological modifications at ISPs to facilitate electronic wiretaps on the Internet

A major piece of legislation affecting the financial industry, and also one with significant privacy provisions for individuals

Makes it a violation of federal law to knowingly use another’s identity

Implements the principle that a signature, contract, or other record may not be deleted

Denies legal effect, validity, or enforceability solely because it is electronic form

(TCO 8) The Wassenaar Arrangement can be described as which of the following?

An international arrangement on export controls for conventional arms as well as dual-use goods and technologies

An international arrangement on import controls

A rule governing import of encryption in the United States

A rule governing export of encryption in the United States

(TCO 8) What is the Convention on Cybercrime?

A convention of black hats who trade hacking secrets

The first international treaty on crimes committed via the Internet and other computer networks

A convention of white hats who trade hacker prevention knowledge

A treaty regulating international conventions

(TCO 8) The electronic signatures in the Global and National Commerce Act _____.

Implement the principle that a signature, contract, or other record may not be denied legal effect, validity, or enforceability solely because it is electronic form

Address a myriad of legal privacy issues resulting from the increased use of computers and other technology specific to telecommunications

Make it a violation of federal law to knowingly use another’s identity

Are a major piece of legislation affecting the financial industry, and contains significant privacy provisions for individuals

(TCO 2) Give an example of a hoax and how it might actually be destructive

(TCO 2) What are the various ways a backup can be conducted and stored?

Backups should include the organization’s critical data, and…

(TCO 2) List at least five types of disasters that can damage or destroy the information of an organization

(TCO 2) List the four ways backups are conducted and stored.

Full back up, differential backup,…

(TCO 2) List at least five types of disasters that can damage or destroy the information of an organization.

Flood, chemical spill…

(TCO 2) Your boss wants you to give him some suggestions for a policy stating what the individual user responsibilities for information security should be. Create a bulleted list of those responsibilities.

Do not divulge sensitive information to individuals…

(TCO 3) What is the difference between TCP and UDP?

UDP is known as a connectionless protocol, as it has very few…

(TCO 3) List three kinds of information contained in an IP packet header

A unique identifier, distinguishing this packet from other packets…

(TCO 4) What are the laws that govern encryption and digital rights management?

Encryption technology is used to protect digital…

(TCO 5) Describe the laws that govern digital signatures

Digital signatures have the same…

(TCO 6) What are some of the security issues associated with web applications and plug-ins?

Web browsers have mechanisms to enable…

(TCO 6) What are the four common methods for connecting equipment at the physical layer?

Coaxial cable, twisted-pair…

(TCO 6) Describe the functioning of the SSL/TLS suite

SSL and TLS use a combination of symmetric and…

(TCO 6) Explain a simple way to combat boot disks

Disable them or… them in the…

(TCO 7) What are some ethical issues associated with information security?

Ethics is the social-moral environment in which a person makes…

(TCO 9) What are password and domain password policies?

Password complexity policies are designed to deter brute force attacks by increasing the number of possible passwords…

SEC 280 Discussions Week 1-2-3-4-6-7 All Posts 187 Pages

 

Week 5 is not included

SEC 280 Exposing Your Data on the Internet and Security Practices Discussions Week 1 All Posts 29 Pages

 

SEC 280 Exposing Your Data on the Internet Discussions 1 Week 1 All Posts 16 Pages

 

Have you or someone you know been the victim of computer fraud because of information about them being data mined on the Internet? Have you been subject to harassment or major inconvenience because of eMarketers’ data-mining activities? Do you think companies should collect information about you and share that information without your explicit knowledge? Why or why not? Feel free to comment on the responses of your colleagues here!…

SEC 280 Security Practices Discussions 2 Week 1 All Posts 13 Pages

 

Because of what they hear on the radio and read in the paper, lots of people who connect their systems to the Internet rush out and buy the latest copies of firewalls and virus-protection software and begin tinkering without first considering what they’re protecting themselves against. Is this a good idea? Instead, what should they do first? What are they doing wrong?…

SEC 280 Security Policies and Laws and Ethics Discussions Week 2 All Posts 28 Pages

 

SEC 280 Security Policies Discussions 1 Week 2 All Posts 15 Pages

 

The executive committee for your company needs some help determining if any changes are needed to the existing security policies and procedures. Describe the types of security policies and procedures that your organization has and how effective you feel they are. How can they be compromised by internal personnel?…

SEC 280 Laws and Ethics Discussions 2 Week 2 All Posts 13 Pages

 

Ethical issues in corporate governance now influence security issues through the stricter management controls surrounding corporate financial-data integrity under Sarbanes-Oxley. Let’s discuss these issues….

SEC 280 Asymmetric Versus Symmetric Encryption and Trust Models Discussions Week 3 All Posts 28 Pages

 

SEC 280 Asymmetric Versus Symmetric Encryption Discussions 1 Week 3 All Posts 15 Pages

 

Discuss or describe how asymmetric encryption allows PKI to function. Also, how does symmetric encryption work to protect files?…

SEC 280 Trust Models Discussions 2 Week 3 All Posts 13 Pages  

Let’s compare and contrast the hierarchical trust model, the peer-to-peer trust model, and the hybrid trust model….

SEC 280 Network Security and Remote Access Discussions Week 4 All Posts 25 Pages

 

SEC 280 Network Security Discussions 1 Week 4 All Posts 13 Pages

 

Networks present a lot of opportunities for security challenges. What type of network are you on, and what security elements are employed? Are they effective? Why or why not?…

SEC 280 Remote Access Discussions 2 Week 4 All Posts 12 Pages

 

Aren’t we employing remote access with the school? How does this environment work for access, authentication, and the working environment? How is your organization setup? …

SEC 280 Attacks and Malware and Identity Theft Discussions Week 6 All Posts 33 Pages

 

SEC 280 Attacks and Malware Discussions 1 Week 6 All Posts 20 Pages

 

There are many ways an organization or individual can be attacked through the use of software.  Currently, what are the most popular ways these attacks are being implemented?  What defenses are being implemented?…

SEC 280 Identity Theft Discussions 2 Week 6 All Posts 13 Pages

 

This one is significant, and we need to understand the laws involved with identity theft, privacy, and cybercrime. Therefore, what are the main laws, and how do they affect us if a breach occurs?…

SEC 280 Mitigating Risk and Incident Handling Discussions Week 7 All Posts 24 Pages

 

SEC 280 Mitigating Risk Discussions 1 Week 7 All Posts 12 Pages

 

Your CEO says to you, “You mentioned that risks always exist. If I take enough measures, can’t I eliminate risks?” Explain why risks always exist. What are some of the ways you can quantify risk in order to determine how and where to take measures e.g. spend money?…

SEC 280 Incident Handling Discussions 2 Week 7 All Posts 12 Pages

 

Let’s start the week by discussing the incident-handling process. Risk management involves the process of understanding vulnerabilities and providing the appropriate level of security to handle the possibilities. When an incident occurs, we need to effectively identify how it occurred and what we will do to see that it is less likely to occur in the future. Who are the members of the IRT?…

 

MIS 600 Entire Course New

 

MIS 600 Entire Course New

 Information Systems Capstone

 

Click Link Below To Buy:

 

 

http://hwcampus.com/shop/mis-600-entire-course-new/

 

  Or Visit www.hwcampus.com

MIS 600 Entire Course Information Systems Capstone Keller 

MIS 600 Course Project Information Systems Capstone Keller

Week 1

Check into the introduction thread, if you did not do so in Week 0.

Your Professor will assign teams at the beginning of the week. Once teams are assigned, here are some things you should be doing this week.

  1. Elect a team leader (recommended but not required). You can have the same leader throughout the course or change leaders each week. The leader will schedule meetings, facilitate discussion in the meetings, and put team deliverables in the Dropbox.
  2. Purchase a headset (if you don’t have one)—You will need a headset with microphone to meet with your team in iConnect.
  3. (10 points)Hold an iConnect meeting with your team and record it (this is part of your participation grade). The iConnect areas will be active after your professor assigns teams.
  4. (10 points)Ensure that you meet individual posting requirements in the graded discussion area (this is also part of your participation grade).
  5. (25 points)Select a business problem that can be solved with technology (the solution must have a software component, a database component, and hardware infrastructure). Your team will be consultants documenting business requirements and building a project plan to solve the business problem. Fill out the System Request Form in Doc Sharing. One team member should submit the completed form to the Dropbox for the team.
  6. (10 points)Fill out a Team Status Report by end of week and turn it in to the Dropbox. There is a status report template in the Dropbox. Be sure to show which team member is responsible for the course deliverables this week and to indicate when you plan to have your team meeting in Week 2.

FYI—Next week you will be presenting your proposed project solution to management in your first of two iConnect presentation meetings with management.

PROPOSAL

Preview:

Top Dog is a hotdog cart business that sells hotdogs, chips, and sodas at local sporting events, catered outdoor parties, and within industrial parks around the city.  With ten carts that require maintenance, licensing, and periodic health inspections and with 12 employees in his company, Top Dog owner John Smith is having a difficulty keeping all of the company information updated and accessible.  This prevents him from accessing information in a timely manner, which in turn affects the profitability of his business.

In particular, some of the problems that John Smith encounters concern the management of employee attendance data and payroll, inventory management, and procurement.  All of this information and tasks are currently handled manually, which slows down their completion, and which results in inaccurate or untimely information….

Week 2

Welcome to Week 2! Here are the activities this week.

  1. (10 points)Hold at least one iConnect meeting with your team and record it (this is part of your participation grade).
  2. (10 points)Ensure that you meet individual posting requirements in the graded discussion area (this is also part of your participation grade).
  3. (10 points)Fill out a Team Status Report by end of week and turn it in to the Dropbox. There is a status report template in the Dropbox. Be sure to show which team member is responsible for each of the course deliverables in the course and the due dates for each deliverable. Also, indicate when you plan to have your team meeting in Week 3.
  4. (75 points)Milestone One—The project document you will prepare throughout the class should be prepared using APA guidelines. The paper should be double-spaced, using Arial or equivalent, 12-point font. One team member should submit the completed Milestone Project Paper to the Dropbox for the team each week. This week the Milestone Project Paper should contain the following items.
    1. Cover Page
    2. Table of Contents
    3. Executive Summary
    4. Project Charter (Scope Definition)
    5. Project Value Statement
  5. (50 points)PowerPoint Presentation to Management—The presentation to management should be prepared using Microsoft PowerPoint. In the presentation, you should discuss the project you are undertaking, the scope, and key points on the value of the project to the business. The presentation should be created as though you were convincing senior management of the value of this project. This presentation will both be posted this week in the Dropbox and recorded in iConnect.

Preview:

Top Dog Hotdog is an MIS project that focuses on developing a cloud-based information system that is aimed at aiding the Top Dog Hotdog business to effectively manage different business operations. The system will contain a number of modules that include communication management, payroll management, procurement management and inventory management modules. The modules will focus on solving the problems experienced by the business in management of its operations. These problems are solved differently by different modules. In this regard, the project developer will…

Week 3

Welcome to Week 3! Here are the activities this week:

  1. (10 points)Hold at least one iConnect meeting with your team and record it (this is part of your participation grade).
  2. (10 points)Ensure that you meet individual posting requirements in the graded discussion area (this is also part of your participation grade).
  3. (10 points)Fill out a Team Status Report by end of week and turn it in to the Dropbox. There is a status report template in the Dropbox. Be sure to show which team member is responsible for each of the course deliverables in the course and the due dates for each deliverable. Also, indicate when you plan to have your team meeting in Week 4.
  4. (50 points)Milestone Two—The project document you will prepare throughout the class should be prepared using APA guidelines. The paper should be double-spaced, using Arial or equivalent, 12-point font. One team member should submit the completed Milestone Project Paper to the Dropbox for the team each week. This week the Milestone Project Paper should contain all of the Milestone One items and the following Milestone Two items:
    1. Project Strategy Statement
    2. Project Methodology
    3. Business Requirements and Rules
      1) Context-level data flow diagram (Visio)
      2) Use case list (normal business activities/work flows)
      3) Use case scenarios (description or narrative steps in each use case)
  5. (10 points) Peer Reviews—There is a Peer Review Template in Doc Sharing. Complete an individual review of each member of your team (including yourself) with comments (combine the evaluations in one Word file and place them in your individual Dropbox). These forms are confidential and should only be shared with your professor. Use them to let your professor know how to improve the course and/or the capstone experience.
  6. (25 points) Initial baseline Microsoft Project Plan in Microsoft Project. If you do not already have Microsoft Project software, it is available for free in the Student Software Store. In this initial effort, create a Gantt chart that shows all of your project activities from project initiation to project closing, in chronological order.  Include duration, start date, finish date, and predecessors for each item.

Preview:

The second stage will involve the definition of the requirement or documentation of the project specification. This will be drawn based on the survey results. Each identified problem will be evaluated and a possible solution will be defined where particular aspects that need to be fulfilled to enhance the…

Week 4

Welcome to Week 4! Here are the activities this week:

  1. (10 points)Hold at least one iConnect meeting with your team and record it (this is part of your participation grade).
  2. (10 points)Ensure that you meet individual posting requirements in the graded discussion area (this is also part of your participation grade).
  3. (10 points)Fill out a Team Status Report by end of week and turn it in to the Dropbox. There is a status report template in the Dropbox. Be sure to show which team member is responsible for each of the course deliverables in the course and the due dates for each deliverable. Also, indicate when you plan to have your team meeting in Week 5.
  4. (50 points)Milestone Three—The project document you will prepare throughout the class should be prepared using APA guidelines. The paper should be double-spaced, using Arial or equivalent, 12-point font. One team member should submit the completed Milestone Project Paper to the Dropbox for the team each week. This week the Milestone Project Paper should contain all of the Milestone One and Two items and the following Milestone Three items:
    1. Logical Entity Relationship Diagram (Visio)
    2. Physical Entity Relationship Diagram (Visio)
    3. UML Use Case Diagram (Visio)
    4. UML Sequence Diagram for four Use Cases (Visio)
    5. UML Class Diagram (Visio)

Preview:

The payroll management solution will provide the business with a computerized/software based payroll management system that will allow a high degree of accuracy in keeping track of an employee’s personal information as well as benefits and time off.

The inventory management solution will provide a database with internet access for storing inventory and give the business the ability to calculate weekly orders based on historic sales data, allowing the business conserve capital expenditures and reduce waste and spoilage.

The communication management solution will provide a…

Week 5

Welcome to Week 5! Here are the activities this week:

  1. (10 points)Hold at least one iConnect meeting with your team and record it (this is part of your participation grade).
  2. (10 points)Ensure that you meet individual posting requirements in the graded discussion area (this is also part of your participation grade).
  3. (10 points)Fill out a Team Status Report by end of week and turn it in to the Dropbox. There is a status report template in the Dropbox. Be sure to show which team member is responsible for each of the course deliverables in the course and the due dates for each deliverable. Also, indicate when you plan to have your team meeting in Week 6.
  4. (50 points)Milestone Four—The project document you will prepare throughout the class should be prepared using APA guidelines. The paper should be double-spaced, using Arial or equivalent, 12-point font. One team member should submit the completed Milestone Project Paper to the Dropbox for the team each week. This week the Milestone Project Paper should contain all of the Milestone One, Two, and Three items and the following Milestone Four items:
    1. System Alternatives Descriptions
    2. Feasibility Analysis
    3. Technical Requirements and Assumptions
    4. Analysis of Needs vs. Capabilities for Contractors
  5. (10 points) Peer Reviews—There is a Peer Review Template in Doc Sharing. Complete an individual review of each member of your team (including yourself) with comments. Combine the evaluations in one Word file and place them in your individual Dropbox. These forms are confidential and should only be shared with your professor. Use them to let your professor know how to improve the course and/or the Capstone experience.

Preview:

To improve Top Dog’s manual process by using technology to optimize and access information in a timely manner for effective business decision-making and increase sales by 10%.  To provide hungry sport fans in….

Week 6

Welcome to Week 6! Here are the activities this week:

  1. (10 points)Hold at least one iConnect meeting with your team and record it (this is part of your participation grade).
  2. (10 points)Ensure that you meet individual posting requirements in the graded discussion area (this is also part of your participation grade).
  3. (10 points)Fill out a Team Status Report by end of week and turn it in to the Dropbox. There is a status report template in the Dropbox. Be sure to show which team member is responsible for each of the course deliverables in the course and the due dates for each deliverable. Also, indicate when you plan to have your team meeting in Week 7.
  4. (50 points)Milestone Five—The project document you will prepare throughout the class should be prepared using APA guidelines. The paper should be double-spaced, using Arial or equivalent, 12-point font. One team member should submit the completed Milestone Project Paper to the Dropbox for the team each week. This week the Milestone Project Paper should contain all of the Milestone One, Two, Three, Four and the following Milestone Five items:
    1. Project Risk Analysis and Risk Management Plan
    2. Project Costs, Staffing, Resources, Dependencies, and Schedule

Preview:

Managing information, tracking inventory, and making smart business decisions based on readily available information are elements which enable a company to continue to profit in any marketplace. A cloud-based ERP is a system that will manage…

Week 7

Welcome to Week 7! Here are the activities this week:

  1. (10 points)Hold at least one iConnect meeting with your team and record it (this is part of your participation grade).
  2. (10 points)Ensure that you meet individual posting requirements in the graded discussion area (this is also part of your participation grade).
  3. (10 points)Fill out a Team Status Report by end of week and turn it in to the Dropbox. There is a status report template in the Dropbox. Be sure to show which team member is responsible for each of the course deliverables in the course and the due dates for each deliverable. Also, indicate when you plan to have your team meeting in Week 8.
  4. (50 points)Milestone Six—The project document you will prepare throughout the class should be prepared using APA guidelines. The paper should be double-spaced, using Arial or equivalent, 12-point font. One team member should submit the completed Milestone Project Paper to the Dropbox for the team each week. This week the Milestone Project Paper should contain all of the Milestone One, Two, Three, Four, Five, and the following Milestone Six items:
    1. Integration of Internal and External Systems
    2. System Administration, Security, Backup and Recovery
    3. Scope Administration and Change Control Procedure
  5. (200 Points)Final Project Plan—After you complete Milestone Six, go through the entire Milestone Project Plan as a team to ensure that you have made any changes suggested by your professor during previous weeks and that all of the Milestones fit together in one cohesive, professional document. Your sponsor should be able to pick up the document, read it from cover to cover, and understand the project well enough to make a funding decision.
  6. (50 Points)The Final .mpp file, prepared in Microsoft Project, is also a deliverable for Week 7. Update your initial plan with any new steps you have discovered since it was created and add the resources you have described in Weeks 4 – 6.

Preview:

The project will be based on normal information system development techniques. In this case, a systematic system development technique that resembles the waterfall system development technique will be employed. This will involve an initial investigation to enhance the…

Week 8

  1. (50 points)Final PowerPoint Presentation to management—The presentation to management should be prepared using Microsoft PowerPoint. In the presentation, you should discuss the project you are undertaking, the scope, and key points on the value of the project to the business. The presentation should be created as though you were convincing senior management of the value of this project. This presentation will both be posted this week in the Dropbox and recorded in iConnect.
  2. (10 points) Peer Reviews—There is a Peer Review Template in Doc Sharing. Complete an individual review of each member of your team (including yourself) with comments. Combine the evaluations in one Word file and place them in your individual Dropbox. These forms are confidential and should only be shared with your professor. This is your final chance to make Capstone better for future students. Don’t hesitate to tell us what you think.

Power Point Presentation

MIS 600 Capstone Discussions Week 1-7 All Students Posts 128 Pages Keller

 

MIS 600 Capstone Project Idea Discussions Week 1 All Students Posts 26 Pages Keller

 

Discuss potential capstone project ideas and your thoughts on why it would be a good project. What are some concerns you would have for this type of project?…

MIS 600 Milestone 1 Discussions Week 2 All Students Posts 19 Pages Keller

 

What makes a good Executive Summary? How is it different from the Project Charter or the Value Statement?…

MIS 600 Milestone 2 Discussions Week 3 All Students Posts 18 Pages Keller

 

What is the best way to document business requirements and rules?  In addition to Milestone 2, we also need to complete an initial Microsoft Project file, peer reviews, and your status report. To get started, what does Microsoft Project software bring to your projects? Why do we use it?…

MIS 600 Milestone 3 Discussions Week 4 All Students Posts 19 Pages Keller

 

Can you explain the difference between data and entity models, data flow diagrams and process models?  Class to get us started, what is a sequence diagram and why might we use one?  If you are not familiar with UML diagrams you may wish to review them in the textbook…

MIS 600 Milestone 4 Discussions Week 5 All Students Posts 15 Pages Keller

 

The system alternative assessment section sets the tone for the rest of the project. Why do we look at alternatives before we look at technical requirements?  What are the alternatives?”. Why is it important to look at alternatives before defining technical solutions? Can you offer an example?…

MIS 600 Milestone 5 Discussions Week 6 All Students Posts 16 Pages Keller

 

When we do a risk analysis, why is it important to be as specific as possible? What should or should not be included in this analysis?  What are the steps suggested by the Project Management Institute (PMI)? How might you apply them to your project?…

MIS 600 Final Project Document Discussions Week 7 All Students Posts 15 Pages Keller

 

The Final Project Document brings all six milestones together into one, integrated document. What are some ways to make the document more professional?  What are some techniques that help to make a plan more professional? How can you make your plan “stand alone” so anyone who picks it up understands its merits and how to implement it?…

 

MGMT 404 Full Course Project Management Latest

 

MGMT 404 Full Course Project Management Latest

Click Link Below To Buy:

 

http://hwcampus.com/shop/mgmt-404-full-course-project-management-latest/

  Or Visit www.hwcampus.com

 

 

MGMT 404 Entire Course Project DeVry

 

MGMT 404 Course Project Week 1 DeVry

 

Due Week 1: Project Proposal/Approval

Each professor will decide if the course will have project teams or be assigned to each individual student to complete the course project. Your professor will notify you of the decision and if the course is going to have project teams, you will be notified of your team assignment.

If the professor assigns individual projects, your Week 1 assignment will be to:

Provide an outline of your proposed project to your instructor for approval. The project you select will be the same project you will plan for the 8 week course.

If the professor assigns teams for the course project, your team will work together to complete the entire Statement of Participation template located in the doc sharing area. All sections for the entire 8 weeks must be completed.

Deliverables for Week 1:

If you are assigned individual projects:

  • A one-page document outlining your proposed project. This document should contain particulars, such as what will be created, why this project is important, how long it would likely take, and how much it would likely cost.

If you are assigned team projects:

  • Teams need to complete the entire Statement of Participation with the team and team leader assignments for Weeks 2–8. Lastly, teams need to update the status of participation for Week 1.

Preview:

For the MGMT 404 course project, I propose to undertake a software development project.  In particular, a web-based timekeeping system will be developed for a small office.  This intends to automate the employees’ office log-ins and log-outs, so that the process of manually signing into a log book can be eliminated.  The manual process is…

MGMT 404 Course Project Week 2 DeVry

 

Due Week 2: Project Charter

Provide a project charter of your selected project in accordance with the charter template found in Doc Sharing.

Please put this in proper business writing format. Consider me to be your boss. If working in a group, include the updated Statement of Participation for Week 2, describing how each person contributed to this project deliverable. Please place the updated Statement of Participation in your teams’ Doc Sharing area for review. A charter should be a minimum of 3–5 pages long.

Deliverables for Week 2:

  • Completed Project Charter (in MS Word)
  • Statement of Participation and status update

Preview:

This project aims to automate the company’s timesheet system in order to increase the company’s productivity and to ensure the accuracy of the employees’ salary computations and performance evaluation tasks. This in turn contributes to the…

MGMT 404 Course Project Week 3 DeVry

Due Week 3: Scope Statement

Prepare a scope statement using the template in Doc Sharing. Remember to be tangible, measurable, and specific. Be sure to include all sections required in the Week 2 Lecture. A scope should be a minimum of 10–15 pages long.

Deliverables for Week 3:

  • Project Scope Statement (in MS Word)
  • Statement of Participation and status update

Preview:

This project aims to develop a web-based timesheet system for Company XYZ. With this system, the employees will no longer have to manually log in by signing in the company’s log book.  This ensures the integrity, availability, and accessibility of the data.  In particular, the timesheet system will accurately record the time when the employee arrives and leaves the….

MGMT 404 Course Project Week 4 DeVry

Due Week 4: Work Breakdown Structure

According to the PMBOK® Guide, “the WBS is a deliverable-oriented hierarchical decomposition of the work to be executed by the project team, to accomplish the project objectives and create the required deliverables.” In other words, it lists the project’s deliverables and work packages. For this week, you will create a work breakdown structure (WBS) for the project you selected during Week 1.

Remember that the WBS starts with your major deliverables (that you stated in your scope management plan) at the highest level. The lower levels have the work package required to complete those deliverables. Review the textbook (and the PMBOK® Guide, if you have it) for some suggestions on how to create a WBS. From your work breakdown structure, develop a project task list with dependencies and add durations, using MS Project.

Develop the Work Breakdown Structure

  • Your WBS should have a minimum of 100–150 line items in MS Project and be three levels deep.
  • Make sure to use verb-object task names (for example, “Develop software”).
  • Enter tasks in MS Project.
  • Create the predecessor relationships.
  • DO NOT LINK SUMMARY TASKS OR ASSIGN RESOURCES!

Deliverables for Week 4:

  • Statement of Participation and status update
  • The MS Project file (.mpp) saved from the Tracking Gantt chart screen

Preview:

Task Name Duration Start Finish Predecessors Resource Names
XYZ Timesheet System 261 days Mon 8/1/16 Mon 7/31/17
   Design 90 days Mon 8/1/16 Fri 12/2/16
      Business Requirements Document (BRD) 65 days Mon 8/1/16 Fri 10/28/16
         Gather requirements 15 days Mon 8/1/16 Fri 8/19/16
         Write the BRD 40 days Mon 8/22/16 Fri 10/14/16 4……….

MGMT 404 Course Project Week 5 DeVry

Due Week 5: Risk Management Plan

Remember, risk is an uncertain event or condition that can have a positive or negative impact on the project. This week, you will be identifying and analyzing your project risks and developing a risk management plan to monitor and track your project. You will evaluate each task in your project schedule to identify any risk factors associated with the execution of the deliverable. You will then add your list of risk to the risk register template in Doc Sharing. The number of risks will depend on the project deliverables in your schedule; however, 20–25 positive and 20–25 negative risks would be considered the minimum. Review the instructions on the first sheet of the template and complete your risk register in its entirety.

Deliverables for Week 5:

  • Use the Risk Register Template spreadsheet found in Doc Sharing (there is a separate tab for each portion of the risk management plan).
  • Statement of Participation and status update

Preview: Total of 43 Risks

MGMT 404 Course Project Week 6 DeVry

Due Week 6: Project Schedule and Budget

A project plan cannot be considered complete until the resources have been assigned (including budget and cost estimate). This week, you will assign the resources required to work on your project to your scheduled tasks. In addition, you will add the cost of the resources per hour and any direct or indirect cost required for project contracts, materials, or supplies.

You will submit a two-part summary report (business professional format) of your project budget and resources, which includes the following:

Part 1: Project Budget (Cost Management)

  1. Explain your approach to estimating the project cost (e.g., top down, bottom up, etc.) and why that method was chosen.
  2. Create a table that shows the original budgeted cost (from the charter) and the actual budgeted cost (side by side). Include line items for labor, materials, contract, equipment, travel cost, and so on.
  3. Compare the budget from the charter to the final budget and explain any variances that occurred from your original budgeted cost in the project charter and the current project cost (include your original estimated cost for the project).
  4. Explain your budget contingency plan and how much is budgeted for contingency.

Part 2: Resource Management

  1. Explain the results of your resource assignments. Did you assign enough people to the project? Were there any resources over-allocated? What approach will you take to fix any allocation problems?
  2. Develop a plan to manage your project team and define how you will motivate your team and how you will handle team conflicts.
  3. What structure would you select for your project: functional, weak matrix, balanced matrix, strong matrix, or pure project? Why?

Deliverables for Week 6:

  1. MS project file (.mpp) updated with resource assignments and cost
  2. MS Word file with report of project budget and resource management
  3. Statement of Participation and status update

Preview: Work Breakdown Structure Included

The top-down approach was used in estimating the project cost. This approach involvers beginning with the final deliverable or the project goal, and breaking it down into smaller chunks for planning, which can also be referred to as work packages (Makar, 2015). Each of the work packages are then further broken down into tasks, which are…

MGMT 404 Course Project Week 7 DeVry

Due Week 7: Communication Plan

According to the PMBOK® Guide, “the Communications Planning process determines the information and communications needs of the stakeholders; for example, who needs what information, when they will need it, how it will be given to them, and by whom.” In other words, it lists the general communication requirements for the project. This week, you will create a simple communication plan for the execution of your project. Each team will need to complete the Communications Plan found in Doc Sharing.

Deliverables for Week 7:

  • Communication Plan
  • Statement of Participation and status update

Preview:

The XYZ Timesheet System involves various teams and stakeholders who play different roles in the project’s completion.  As such, it is important for all important information be communicated to all of them in a timely manner.  This ensures that…

MGMT 404 Course Project Week 8 DeVry

Due Week 8: Final Project Package

You will need to create a project plan. This plan should be completely integrated and presented in a logical order. It should be written professionally and should be mistake-free in terms of spelling and grammar. The final project plan should incorporate any changes that occurred along the way, including corrections and advice given by colleagues or your professor. Any tables or graphs should be labeled correctly.

Deliverables for Week 8:

  1. Statement of Participation and status update
  2. Your final project plan should consist of the following items.
    • Executive Summary
    • Project Charter
    • Scope Statement
    • Work Breakdown Structure
    • Budget and Resource Management Reports
    • Risk Management Plan
    • Communication Management Plan

Preview: 52 Pages and Work Breakdown Structure Included

The XYZ Timesheet Project aims to develop a timesheet system for Company XYZ in order to automate the login process for employees and enable the employs to record and keep track of their daily tasks and accomplishments. This in turn can be used as basis for their   performance evaluations. In addition, the login data that is entered into the system will be used by the company’s payroll system, specifically for the computation of the employees’ salaries.

In this regard, Ripple Web Solutions shall be responsible for the development of the XYZ Timesheet System. Ripple will be responsible for the various phases of the application development…

MGMT 404 Quiz Week 4 DeVry

 (TCO 1) Which document is created during the initiation phase of a project? (Points : 5)

The scope

The project schedule

The project charter

The project communication plan

(TCO 1) Projects have specific attributes. Which of the following is not an attribute of a project? (Points : 5)

It is an ongoing endeavor

It has a defined objective

It requires resources

It has a defined start and stop

(TCO 1) The purpose of a project charter is to

Define the project.

Allow for the creation of a WBS.

Authorize the project.

Define detailed project risks.

(TCO 1) Which document on a project authorizes the project manager to begin work on the project? (Points : 5)

The scope

The schedule

The charter

The risk management plan
(TCO 2) Which step of the project life cycle defines the project scope? (Points : 5)

Initiation

Planning

Execution

Close out

(TCO 2) Which statement is an example of a project deliverable? (Points : 5)

“If the parts arrive late, we will not finish on time.”

“We must get permits before we start work.”

“I believe the contracts will be signed by the 15th.”

“The paving of the parking is lot is major piece of work for this project.”

(TCO 2) Which statement is an example of a project constraint? (Points : 5)

“If the parts arrive late, we will not finish on time.”
“We must get permits before we start work.”

“I believe the contracts will be signed by the 15th.”

“The paving of the parking lot is a major piece of work for this project.”

(TCO 2) Which statement is an example of a project assumption?

“If the parts arrive late, we will not finish on time.”

“We must get permits before we start work.”

“I believe the contracts will be signed by the 15th.”

“The paving of the parking lot will be completed within this project.”

(TCO 3) The longest continuous path of activities from beginning to end on a project describes the (Points : 5)

Deliverables

Slack

Critical path

Work packages

(TCO 3) The critical path in a project describes which of the following? (Points : 5)

The path containing the most important pieces of work

The longest path in a project

The activities with the highest risk

The activities with the highest cost to the project

(TCO 3) Hammock activities are used to do which of the following?

Ensure critical path work is done on time.

Capture lessons learned on two or more activities.

Summarize duration and cost information on related activities.

Summarize duration and cost information on related activities.

(TCO 3) What values are calculated on the backward pass of a project network? (Points : 5)

Early start; late start

Early start; early finish

Late start; late finish

Early finish; late finish

(TCO 3) What values are calculated on the forward pass of a project network? (Points : 5)

Early start; early finish

Late start; late finish

Early finish; late finish

Early start; late start
(TCO 5) In which process of risk management is the risk register initially created? (Points : 5)

Plan risk management

Identify risks

Control risks

Qualitative risk analysis

(TCO 5) A risk matrix is used to _____.  A risk register is a _____. (Points : 5)

Prioritize risks; list of risks

Identify risks; way to categorize risks

Create risk strategies; way to monitor negative risks

Simulate project risks; way to categorize risks

(TCO 5) In which process of risk management are risks prioritized or ranked?

Plan risk management

Identify risks

Control risks

Control risks

(TCO 5) In which process of risk management are proactive and reactive strategies considered? (Points : 5)

Plan risk management

Plan risk responses

Control risks

Qualitative risk analysis

(TCO 5) Contingency plans are created (Points : 5)

To proactively address the risk.
To respond to the risk should the risk occur.
To gather information on vital risks.
To avoid red risks in the project plan .

(TCO 1) Before one can begin writing a charter, one must consider the most appropriate organization for the project. You are the project manager for a company that integrates custom data solutions for large corporate enterprises. This project will span two or three years and will cost tens of millions of dollars. This is a large, very involved project. Which of the five organization structures is most suitable? Why? (Points : 20)

(TCO 1) Compare and contrast the project charter and the project scope as used in project management. (Points : 20)

The project scope defines what will be delivered as part of the project, and in some ways, it can be likened to the term vision. Whenever a company plans for the…

(TCO 2) You are reaching the end of your graduate school program and are planning a large party to celebrate your success! You have rented out the local forest preserve as the venue for your party. Applying your project management skills, you want to ensure you have everything planned out and you’ve asked your family and friends to be a part of your team to hold this party. At your party, you have made it clear to your team what you want to have delivered. After all, it’s your party— you can have whatever you want! Some of the key items you want at your party include:
graduation announcements;
party invitations;
live entertainment;
games (for adults and for children);
food;
beverages; and
convenience for all (parking, restroom facilities, etc.).
Part 1: To ensure you have a clear scope for your team, create a 2-level WBS. Don’t forget to include your WBS numbering (15 points).
Part 2: In your WBS, how many work packages have been created? (5 points) (Points : 20)

(TCO 5) A firm hosts data-mining servers and performs data mining for other companies that do not desire the costs of hardware, software, or expertise to data mine their data. The firm is planning to roll out faster data-mining software that will reduce the time to sift through customers’ data by a fraction of the present time.
Part 1: List and discuss the major risk management functions from a project management perspective for the data-mining software project. (15 points)
Part 2: Describe a positive and negative risk event, the consequences, and the risk-response plans for the data-mining software project. (15 points) (Points : 20)

(TCO 9) Compare and contrast how a scope is created in traditional project management versus one created in agile project management. (Points : 20)

(TCO 3) Compare and contrast fast tracking and scope reduction as means of schedule compression. (Points : 20)

Fast tracking and scope reduction are the three techniques where a project can be brought back on the schedule or for the compression of schedule. Fast tracking…

MGMT 404 Quiz Week 7 DeVry

 (TCO 4) An example of resource leveling would be (Points : 5)

Fast tracking a project to finish early.
Crashing a project to meet a critical deadline.

Ensuring resource usage is balanced.

Removing work from a project to compress its schedule.

(TCO 6) You are the project manager of a major IT project in Italy. You review your earned value report and you see that your SPI is 1.18. What does this mean to you? (Points : 5)

The project is doing fine. It should be completed 18 months ahead of schedule.

The project is slightly ahead of schedule. No corrections are needed.
The project is slightly behind schedule. Corrections are needed.

The project is very much behind schedule. Immediate corrections are needed.

(TCO 6) You are the project manager of a major IT project in Italy. You review your earned value report and you see that your SPI is .68. What does this mean to you? (Points : 5)

The project is doing fine. No corrective actions are needed.

The project is slightly ahead of schedule. No corrections are needed.
The project is slightly behind schedule. Corrections are needed.

The project is very much behind schedule. Immediate corrections are needed.
(TCO 4) Which of the below is an example of a fixed cost to a project? (Points : 5)

Cost of mortgage on a building needed for the project

Cost of a day rental van needed for the project

Cost of labor to support the project

Cost of electricity needed to operate a machine needed for the project

(TCO 4) Which of the below is an example of an indirect cost to a project? (Points : 5)

Concrete needed to complete a parking garage

A consultant for an IT project

Boats for a river rescue

Janitorial services for an entire building
(TCO 7) Which of the following is an example of an informal verbal form of communication? (Points : 5)

A major status meeting with project clients on the project’s progress

Presentations to senior management on the project status

Contracts with a client

A memo from the senior VP of the company

(TCO 7) Which of the following is an example of a formal written form of communication? (Points : 5)

Meeting notes made at a meeting with the VP of the company

E-mails between an important client and yourself

Contracts with a client

A memo from the senior VP of the company

(TCO 8) What document provides the project manager with information as to whom must be consulted and informed of the completion of a particular project activity? (Points : 5)

The WBS

The RACI

The OBS

The RBS

(TCO 8) You are the project manager of a large, virtual HR project. You want to improve the functioning of the project team. Which of the techniques below would not likely improve the effectiveness and efficiency of the project team? (Points : 5)

Keep all team members informed and communicating.

Create a code of conduct for all team members.

Hold face-to-face meetings whenever possible.

Ensure the WBS is as accurate as possible at all times.

(TCO 8) You are the project manager of a large, virtual HR project. You want to improve the functioning of the project team. Which of the techniques below would not likely improve the effectiveness and efficiency of the project team? (Points : 5)

Let team members disappear as needed from the project.

Create a process to handle conflict.

Hold face-to-face meetings whenever possible.

Keep all team members informed and communicating.

(TCO 9) Stand-up meetings in agile project management do all of the following except which? (Points : 5)

Provide project status.

Report on anticipated issues.

Permit group problem resolution.

Enhance collaboration.

(TCO 9) Agile project managers make use of iterations. What are iterations also known as in agile project management? (Points : 5)

Sprints

Stand-up meetings

Stories

Burn down charts

(TCO 6) To control your project, you decide to use milestone analysis. Which of the below is not a benefit of using milestone analysis to control a project?(Points : 5)

Milestones eliminate unnecessary changes to a project.
Milestones align schedules with suppliers.
Milestones trigger other team members’ participation in the project.
Milestones allow for periodic review of the project.

(TCO 4) Compare and contrast top-down and bottom-up project estimating techniques. (Points : 20)

In top-down project estimation, every major aspect of the project is identified and then they are broken down further into work packages or…

(TCO 4) Compare and contrast top-down and three-point estimating techniques. (Points : 20)

Top-down estimating is also known as analogous. Many believe that this…

(TCO 6) You are comparing two projects. Using the data below, calculate the CV, SV, SPI, and CPI.   Second, use the values to provide the status of each project. All values are in dollars.

  Project A Project B
EV 850 550
PV 875 575
AC 900 650

(Points : 20)

(TCOs 4 and 6) What is resource leveling on a project and what are its objectives? (Points : 20)

Resource leveling is a project management technique that overlooks resource allocation and resolves the possible problems that may arise from over-allocation. Some of…

(TCO 8) Compare and contrast leaders versus managers on a project. (Points : 20)

While both the project manager and the project leader are tasked with the planning, execution, and closing of a project, only the project leader motivates and…

(TCO 9) Agile project teams are typically co-located. Why is this so important to an agile project and what does it facilitate on an agile project? (Points : 20)

The co-location of team members in an agile project is important as the agile method requires that all team members work on the project at the same…

(TCO 9) Compare and contrast project control in an agile environment and in a traditional environment. (Points : 20)

In agile environment there would a changes and adjusted to finish the work. This is because the team accepts changes as part of their planning. Thus, the…

MGMT 404 Discussions Week 1-7 All Posts 427 Pages DeVry

MGMT 404 Case Study: Keflavik Paper Company and Case Study: Widgets ‘R Us Discussions Week 1 All Posts 63 Pages DeVry

MGMT 404 Case Study: Keflavik Paper Company Discussions 1 Week 1 All Posts 34 Pages

Read Case Study 3.1

The Keflavik Paper Company is a case with a problem in determining a project management process for new product development.

Answer the following questions:

  • What does this case demonstrate about the effect of poor project screening methods on a firm’s ability to manage projects effectively?
  • How would project portfolio management help to improve the situation at Keflavik?
  • If you think about it, all business problems are case studies. To effectively evaluate the situation, you must approach the problem in a methodological manner. A proven technique to do this is to do the following:
    1. list the facts;
    2. identify the issues;
    3. based on the facts of the case and your knowledge, analyze the issues of the case;
    4. prepare recommended solutions and their possible outcomes;
    5. implement the optimal solution (not always the one with the best outcome, because the cost or other things could be impractical); and
    6. monitor the implementation and outcomes.

So when you read and prepare to respond to this case, please follow the above guidelines. I don’t necessarily expect you to perform Steps 4–6, but I do expect your response to be based on the facts and your knowledge. Remember—your first impressions may not be correct!

What have you seen as effective techniques to help build collaborative relationships? Examples?  What is ROI (return on investment) and why is it important? What types of documents are used by a project manager to update the team and the stakeholders on the status of the project? Examples?…
MGMT 404 Case Study: Widgets ‘R Us Discussions 2 Week 1 All Posts 29 Pages DeVry

Read Case Study 2.4

The Widgets ‘R Us case study is a case with a problem of how the company is set up and how the company will handle operations with its projected growth.

Answer the following questions:

  • You have been called in as a consultant to analyze the operations at WRU. Based on the readings, what would you advise Widgets ‘R Us to do in order to sustain the competitive advantage in the widget market?
  • What structural design changes might be undertaken to improve the operations at the company?

Have you been involved in a project that has failed to live up to the expected results? What was the cause of the failure?  Is a task that is repeated over time within a normal business operation a project? Why or Why not?…
MGMT 404 Project Scope and Case Study: Project Management at Dotcom.com Discussions Week 2 All Posts 64 Pages DeVry

MGMT 404 Project Scope Discussions 1 Week 2 All Posts 34 Pages DeVry

As we have seen this week, project scope creation is very different in traditional project management versus Agile project management. What advantages and disadvantages can you see with the process of scope creation in the traditional project management world? What advantages and disadvantages can you see with the process of scope creation in the Agile project management world? Share your experiences with projects that were created using either Agile or traditional project management techniques.

What are the different types of task relationships and how are these concepts connected to both predecessors and lead/lag time?…

MGMT 404 Case Study Project Management at Dotcom.com Discussions 2 Week 2 All Posts 30 Pages DeVry

Read Case Study 5.3: Project Management at Dotcom.com. Dotcom.com is a software engineering and systems development consulting firm that needs some organizational improvements in the area of project management processes that will cut cost and potentially increase the profit margin for the company.

Answer the following questions:

  • Discuss how you would begin redesigning dotcom.com’s project management processes to minimize the problems it is experiencing with poor scope management.
  • Why do you think configuration management and project change control are difficult to perform in the middle of a complex software development project, such as those implemented at dotcom.com?
  • Share any experiences you have with project change requests.

Are there any advantages to chaos over order? What has been your experience with chaos and what have you found to be effective techniques to avoid or mitigate chaotic situations? How does the software insure that one task or set of tasks is completed before the next task or set of tasks is accomplished?…

MGMT 404 Project Schedule and Agile Schedule Development Discussions Week 3 All Posts 55 Pages DeVry

MGMT 404 Project Schedule Discussions 1 Week 3 All Posts 28 Pages DeVry

To develop a schedule for a project, we will use the concept of a project network, which shows work activities taken from the work breakdown structure and is organized according to the logical flow in time and relationships governing when the work will be performed. By combining this network of work activities with estimates of the time duration for performing each of the activities, we can create a schedule for the project work. What types of information can we learn about the project by reviewing the project schedule and all the information used to generate it? Any time you try to reduce a project schedule, there are trade-offs (cost, quality, availability of resources for other projects, etc.) What are some methods to reduce a project’s schedule? Are there any advantages or disadvantages to the various methods that should be considered? What are the various ways that you have seen to capture estimate the cost per time for an individual that is working on a project? Is it always the same based on an individual’s overall compensation in a company or firm?….
MGMT 404 Agile Schedule Development Discussions 2 Week 3 All Posts 27 Pages DeVry

As we have seen, traditional and Agile schedule developments are quite different. Agile project management was originally developed to do software development. Could a traditional process be successfully used to develop a new software program? Why or why not? Could an Agile methodology be used to build a strip mall in your home town? Why or why not?  Does it require more or less resources to perform tasks in parallel?  How so? The schedule is something you will want to keep close watch on during the project. What are some examples of when you would want or need to reduce the project’s duration? Would there be any concerns you might want to consider when discussing the possibility of shortening the project?…

MGMT 404 Risk Management and Risk Management Part II Discussions Week 4 All Posts 63 Pages DeVry

MGMT 404 Risk Management Discussions 1 Week 4 All Posts 33 Pages DeVry

Assume you have just been assigned to a project risk team composed of five members. Your task, as project manager, is to develop a process for handling risks to the project. Because this is the first time your organization has formally set up a risk team for a project, it is hoped that your team will develop a process that can be used on all future projects. Your first team meeting is next Monday morning. Each team member has been asked to prepare for the meeting by developing, in as much detail as possible, an outline that describes how you believe the team should proceed in handling project risks. Each team member will hand out his or her proposed outline at the beginning of the meeting. Your outline should include, but not be limited to, the following information:

  • What methods should be used for identifying risks?
  • Who should be involved in identifying risks?
  • What should be considered when identifying risks?

Provide an example of team norms, of what is expected of fellow team members. Why is this important for an effective project team?  Often times, more information is communicated than anyone wants to consider! Part of developing the communication plan is to decide WHO should get WHAT information. Not everyone wants or needs to know everything. For instance, most executives do not want the detail of the project–only the summary. What are some other instances where information should not be shared in whole? Or shared with everyone?….

MGMT 404 Risk Management Part II Discussions 2 Week 4 All Posts 30 Pages DeVry

As the work of your risk management team (from the first discussion question) continues, the discussion of your team’s risk management plan outline moves on and considers the following questions:

  • How should the risks be prioritized?
  • Who should do the prioritization of the project risks?
  • How should project risks be monitored and controlled?
  • Who should develop risk responses and contingency plans?
  • Who should own these responses and plans?

Scheduling people is one of the most difficult duties because you do not have control over the time of those resources. They are on the project temporarily and usually are part-time resources. Their functional manager is usually pulling them back to their regular duties even for time they are scheduled to work on the project. Class, how can you overcome some of that to get a more finite schedule?….

MGMT 404 Case Study The Problems of Multitasking and Reducing Project Duration Discussions Week 5 All Posts 65 Pages DeVry

MGMT 404 Case Study The Problems of Multitasking Discussions 1 Week 5 All Posts 34 Pages DeVry

Read Case Study 12.1: The Problems of Multitasking. Answer the following questions:

  1. How does multitasking confuse the resource availability of project team personnel?
  2. In modern organizations, it is impossible to eliminate multitasking for the average employee. Why?
  3. How would resource loading or resource leveling help address multitasking situations?

Provide an example from your experience or the Web to help explain the difference between mitigating a risk and contingency planning?  Being more efficient means saving money, right? What have you seen that improved efficiency in your company? How did the improvement save money?….

MGMT 404 Reducing Project Duration Discussions 2 Week 5 All Posts 31 Pages DeVry

In your own words, describe crashing, fast tracking, and scope reduction as means of schedule compression. When would each be appropriate? Which methods would you consider better first-choice methods by most project sponsors? Would any of these methods apply to Agile projects? How does Agile address schedule compression?  Give an example of a team goal that you have worked on recently. How was the goal established? By the team? By others?  If you were a research scientist, what would you research?…

MGMT 404 Project Communications and Case Study Finding the Emotional Intelligence Discussions Week 6 All Posts 61 Pages DeVry

MGMT 404 Project Communications Discussions 1 Week 6 All Posts 30 Pages DeVry

Discuss the importance of communication and information exchange to project success. What are the crucial features and elements of effective communication and information exchange in successful projects? How are key stakeholders involved in this process? Are communication requirements different on an Agile project versus a traditional project?

How often should the baseline change? Should it? What is the “break-even” point for a project? How is the baseline or other tracking documents used to determine the break-even point?…

MGMT 404 Case Study Finding the Emotional Intelligence Discussions 2 Week 6 All Posts 31 Pages DeVry

Read Case Study 4.2: Finding the Emotional Intelligence.

  1. What are the differences between leaders and managers?
  2. Can anyone be a leader? Which would you prefer to work for: a leader or a manager? Why?
  3. Select one of the characteristics of an effective project manager and tell why it is important.
  4. Is leadership of a project different in an Agile environment than in a traditional project environment?
  5. Take the Future Time Perspective scale on page 129. Share your results and comments with the class.

How would an auditor determine if the communications among team members was adequate? Examples?  Would you audit different factors at different stages of a project?  How so?  Examples?…

MGMT 404 Project Baseline and Agile Project Control Discussions Week 7 All Posts 56 Pages DeVry

MGMT 404 Project Baseline Discussions 1 Week 7 All Posts 29 Pages DeVry

We have now moved from the planning stage to the execution stage of project management. Following good project management practices, we have set a baseline. How is a project baseline used to guide the execution of the project’s work, to evaluate progress and performance, and to control the project? Also, as you continue to think about monitoring and controlling the project, specifically consider the question: How can the project baseline and the earned value approach for variance analysis be used to monitor and report project progress?

What does it mean to be a “systems thinker?” Example? Is a proven track record (experience and success) more valuable than a certificate? For those who have looked at various job postings in different industries, what did you conclude about this? Did most of them require experience, or require certification?…

MGMT 404 Agile Project Control Discussions 2 Week 7 All Posts 27 Pages DeVry

In the first discussion, we looked at traditional project control. Is project control different in an Agile project? What is the role of a project manager in controlling an Agile project? What is the role of the project client, sponsor, or customer at controlling project changes?

Involving the customer and communicating regularly (there’s that communication need again!) is the first step in making sure they know what the project entails. Class, which documents would be most useful in managing their expectations? How do you personally exceed your customers (or supervisors) expectations?…

 

 

MGMT 404 Entire Course New

 

MGMT 404 Entire Course New

 

 Click Link Below To Buy:

 

 

http://hwcampus.com/shop/mgmt-404-entire-course-new/

 

  Or Visit www.hwcampus.com

 

MGMT 404 Entire Course  

 

 

 

MGMT 404 Course Project DeVry

 

MGMT 404 Course Project Outline Proposal Week 1

Meet and Assess Current Park Situation and Facilities

A playground provides many advantages to the community.  Children can play and be engaged in healthy physical activities.  Adults can play games or use it as a community hub and…

MGMT 404 Course Project Charter Week 2

The mission for the redevelopment of our community outdoor park and playing ground is to create a safe and easy access park for all children and families to enjoy for relaxation…

MGMT 404 Course Project Scope Statement Week 3

The scope of this project is to revamp, renovate, and modernize the park so that the 60 acres it occupies is better utilized by the community.  The aim of this project is to provide a state-of-the-art playground so that as citizens, children and adults have a sense of their own space in the city.  It will be a place where people can socialize with each other.  The project team will work on…

MGMT 404 Course Project Work Breakdown Structure/Gantt Chart Week 4

Chart completed in excel.

MGMT 404 Course Project Risk Management Plan Week 5

The first sheet, titled Risk Register, shows a number of fields to use for gathering the following information about risks.
Risk ID is some unique value that identifies the risk.
Risk Name is a short description of the risk.
Risk Description “If this risk occurs, then what impact will it have on the project?” It should be written as an “If, then” statement.
Impact as rated on a very low, low, medium, high, and very high scale.
Probability as rated on a very low, low, medium, high, and very high scale.
Risk Ranking: Using the risk matrix found on the right on the Risk Register sheet, determine the color code (risk ranking) for each risk.
Positive/Negative: Is this risk a positive risk (an opportunity) or a negative risk?
Proactive Response Plan is a detailed plan of what changes will be made to the project, project scope, and/or WBS proactively to try to make the risk happen (positive risk) or stop it if it is a negative risk.
Trigger Event is a description of how you will know if the risk has occurred or is about to occur.
Reactive Contingency Plan is the description of what you plan to do if the risk happens. How will you react to the risk once it occurred?

MGMT 404 Course Project Schedule and Budget Week 6

The team will consist of a project manager, a design team, civil construction laborers, marketing team, civil engineers and a procurement team.  The team allocation is present in the Excel file attached.  The team allocation has been optimum.  There has been no over allocation or under allocation of resources.  The civil engineer might have to…

MGMT 404 Course Project Communication Plan Week 7

The Poplar Park redevelopment project is a project involving different teams and many team members.  It will go on for a long duration and it is important that all interested parties are aware of the progress and current status of…

MGMT 404 Final Project Week 8

The project aims to redevelop Poplar Park so that the 60 acre open area can be useful to the community.  The project will aim to revamp, renovate and modernize the park so that citizens, children, and adults have a sense of their own space in the city….

MGMT 404 Discussions Week 1-7 All Posts 265 Pages DeVry

 

MGMT 404 Case Study: Keflavik Paper and Case Study Widgets ‘R Us Company Discussions Week 1 All Posts 63 Pages DeVry

 

MGMT 404 Case Study: Keflavik Paper Company Discussions 1 Week 1 All Posts 37 Pages DeVry

Read Case Study 3.1

The Keflavik Paper Company is a case with a problem in determining a project management process for new product development.

Answer the following questions:

  • What does this case demonstrate about the effect of poor project screening methods on a firm’s ability to manage projects effectively?
  • How would project portfolio management help to improve the situation at Keflavik?
  • If you think about it, all business problems are case studies. To effectively evaluate the situation, you must approach the problem in a methodological manner. A proven technique to do this is to do the following:
    1. list the facts;
    2. identify the issues;
    3. based on the facts of the case and your knowledge, analyze the issues of the case;
    4. prepare recommended solutions and their possible outcomes;
    5. implement the optimal solution (not always the one with the best outcome, because the cost or other things could be impractical); and
    6. monitor the implementation and outcomes.

So when you read and prepare to respond to this case, please follow the above guidelines. I don’t necessarily expect you to perform Steps 4–6, but I do expect your response to be based on the facts and your knowledge. Remember—your first impressions may not be correct!

What is the difference between Portfolio, Project and Programs?  Give an example of each? In your opinion and experience, what are the top 3 reasons why you think projects fail?  Has technology increase or decrease the chances of project failure today?  Explain in detail why or why not?…

MGMT 404 Case Study Widgets ‘R Us Discussions 2 Week 1 All Posts 26 Pages DeVry

Read Case Study 2.4

The Widgets ‘R Us case study is a case with a problem of how the company is set up and how the company will handle operations with its projected growth.

Answer the following questions:

  • You have been called in as a consultant to analyze the operations at WRU. Based on the readings, what would you advise Widgets ‘R Us to do in order to sustain the competitive advantage in the widget market?
  • What structural design changes might be undertaken to improve the operations at the company?

What are the advantages and disadvantages of each structure weak matrix, balanced matrix, strong matrix, functional, and pure project? Name the three organizational structures and describe each of them? What organizational structure do you think might fit Widgets ‘R Us and why? What are some key decision criteria that will help it determine which model makes the most sense? What is Google and Amazon’s organization structure? Compare and contrast the two structures in your own words?…

MGMT 404 Case Study: Project Management at Dotcom.com Discussions Week 2 All Posts 30 Pages DeVry

 

Read Case Study 5.3: Project Management at Dotcom.com. Dotcom.com is a software engineering and systems development consulting firm that needs some organizational improvements in the area of project management processes that will cut cost and potentially increase the profit margin for the company.

Answer the following questions:

  • Discuss how you would begin redesigning dotcom.com’s project management processes to minimize the problems it is experiencing with poor scope management.
  • Why do you think configuration management and project change control are difficult to perform in the middle of a complex software development project, such as those implemented at dotcom.com?
  • Share any experiences you have with project change requests.

Pinto (2013) discusses the conceptual development in terms of the start of a new project. What key steps of information does he mention that are required to start a project?  Why are they key? What is the difference between the Project Management Life Cycle and the Software/System Development Life Cycle? What are the top 3 challenges in creating the project charter?  Explain in detail? If you have the PMBOK 5, use it as a resource for these questions. If not, use the textbook and/or web resources?…

MGMT 404 Project Schedule Discussions Week 3 All Posts 33 Pages DeVry

 

To develop a schedule for a project, we will use the concept of a project network, which shows work activities taken from the work breakdown structure and is organized according to the logical flow in time and relationships governing when the work will be performed. By combining this network of work activities with estimates of the time duration for performing each of the activities, we can create a schedule for the project work. What types of information can we learn about the project by reviewing the project schedule and all the information used to generate it?  What is the difference between the Work Breakdown Structure (WBS), Network Diagram, Project Schedule & Work Packages?  Explain in detail? What are predecessors?  When and how do you determine them throughout your project schedule?  How do they ensure the effectiveness of your project schedule? Give an example?…

MGMT 404 Risk Management Discussions Week 4 All Posts 40 Pages DeVry

 

Assume you have just been assigned to a project risk team composed of five members. Your task, as project manager, is to develop a process for handling risks to the project. Because this is the first time your organization has formally set up a risk team for a project, it is hoped that your team will develop a process that can be used on all future projects. Your first team meeting is next Monday morning. Each team member has been asked to prepare for the meeting by developing, in as much detail as possible, an outline that describes how you believe the team should proceed in handling project risks. Each team member will hand out his or her proposed outline at the beginning of the meeting. Your outline should include, but not be limited to, the following information:

  • What methods should be used for identifying risks?
  • Who should be involved in identifying risks?
  • What should be considered when identifying risks?

How should the risks be prioritized? Who should do the prioritization of the project risks? How should project risks be monitored and controlled? Who should develop risk responses and contingency plans?

Who should own these responses and plans? What is the difference between Qualitative and Quantitative Risk Analysis?  Give an example of each?

MGMT 404 Case Study: The Problems of Multitasking Discussions Week 5 All Posts 31 Pages DeVry

 

Read Case Study 12.1: The Problems of Multitasking. Answer the following questions:

  1. How does multitasking confuse the resource availability of project team personnel?
  2. In modern organizations, it is impossible to eliminate multitasking for the average employee. Why?
  3. How would resource loading or resource leveling help address multitasking situations?

What are some of the resource constraints that would make the project challenging? How does multitasking make it difficult to accurately resource-level a project? What is a Sprint? What is a Backlog? How does it help make the SCRUM development process effective?..

MGMT 404 Case Study: Finding the Emotional Intelligence Discussions Week 6 All Posts 34 Pages DeVry

 

Read Case Study 4.2: Finding the Emotional Intelligence.

  1. What are the differences between leaders and managers?
  2. Can anyone be a leader? Which would you prefer to work for: a leader or a manager? Why?
  3. Select one of the characteristics of an effective project manager and tell why it is important.
  4. Is leadership of a project different in an Agile environment than in a traditional project environment?
  1. Take the Future Time Perspective scale on page 129. Share your results and comments with the class.

Who would you consider to the top 3 most effective leaders in your life time?   Explain why? Do you think leadership skills can be learned or you have to be born with them? Give an example to support your position? Is there anything you could have done individually to expedite the stages your team went through?  Are there any lessons learned?…

MGMT 404 Project Baseline Discussions Week 7 All Posts 34 Pages DeVry

 

We have now moved from the planning stage to the execution stage of project management. Following good project management practices, we have set a baseline. How is a project baseline used to guide the execution of the project’s work, to evaluate progress and performance, and to control the project? Also, as you continue to think about monitoring and controlling the project, specifically consider the question: How can the project baseline and the earned value approach for variance analysis be used to monitor and report project progress?  Is project control different in an Agile project? What is the role of a project manager in controlling an Agile project? What is the role of the project client, sponsor, or customer at controlling project changes? What is the difference between Schedule Baseline and Scope Baseline? How do a project manager use both baseline documents to control the project effectively?…

MGMT 404 Quiz Week 4 DeVry

 

(TCO 1) Which document is created during the initiation phase of a project? (Points : 5)

The scope

The project schedule

The project charter

The project communication plan

(TCO 1) The purpose of a project charter is to

Define the project.

Define the project.

Authorize the project.

Define detailed project risks.

(TCO 1) Which document on a project authorizes the project manager to begin work on the project? (Points : 5)

The scope

The schedule

The charter

The risk management plan

(TCO 2) Which step of the project life cycle defines the project scope? (Points : 5)

Initiation

Planning

Execution

Close out

(TCO 2) Which statement is an example of a project constraint? (Points : 5)

“If the parts arrive late, we will not finish on time.”

“We must get permits before we start work.”

“I believe the contracts will be signed by the 15th.”
“The paving of the parking lot is a major piece of work for this project.”

(TCO 2) Which statement is an example of a project assumption?

“If the parts arrive late, we will not finish on time.”

“We must get permits before we start work.”

“I believe the contracts will be signed by the 15th.”

“The paving of the parking lot will be completed within this project.”

(TCO 3) The critical path in a project describes which of the following? (Points : 5)

The path containing the most important pieces of work

The longest path in a project

The activities with the highest risk

The activities with the highest cost to the project

(TCO 3) The longest continuous path of activities from beginning to end on a project describes the

Deliverables

Slack

Critical path

Work packages

(TCO 3) Hammock activities are used to do which of the following?

Ensure critical path work is done on time.

Capture lessons learned on two or more activities.

Provide information on project slack.

Summarize duration and cost information on related activities.

Provide information on project slack.

(TCO 3) What values are calculated on the forward pass of a project network? (Points : 5)

Early start; late start
Early start; early finish

Late start; late finish

Early finish; late finish

(TCO 5) In which process of risk management are proactive and reactive strategies considered? (Points : 5)

Plan risk management

Plan risk responses

Control risks

Qualitative risk analysis

(TCO 5) Contingency plans are created (Points : 5)

To proactively address the risk.

To respond to the risk should the risk occur.

To gather information on vital risks.

To avoid red risks in the project plan.

(TCO 5) In which process of risk management are risks prioritized or ranked?

Plan risk management

Identify risks

Control risks

Qualitative risk analysis

(TCO 5) A risk matrix is used to _____.  A risk register is a _____.

Prioritize risks; list of risks

Identify risks; way to categorize risks

Create risk strategies; way to monitor negative risks

Simulate project risks; way to categorize risks

(TCO 1) Compare and contrast the project charter and the project scope as used in project management. (Points : 20)

The project scope defines what will be delivered as part of the project, and in some ways, it can be likened to the term vision. Whenever a company plans for…

(TCO 1) Before one can begin writing a charter, one must consider the most appropriate organization for the project. You are the project manager for an organization that builds doors and windows for homes. Which organization structure of the five types is most suitable? Why?

As the project manager for an organization that builds doors and windows, I feel a functional…

(TCO 2) You are reaching the end of your graduate school program and are planning a large party to celebrate your success! You have rented out the local forest preserve as the venue for your party. Applying your project management skills, you want to ensure you have everything planned out and you’ve asked your family and friends to be a part of your team to hold this party. At your party, you have made it clear to your team what you want to have delivered. After all, it’s your party— you can have whatever you want! Some of the key items you want at your party include

graduation announcements;·
party invitations;·
live entertainment;·
games (for adults and for children);·
food;·
beverages; and·
convenience for all (parking, restroom facilities, etc.).·

Part 1: To ensure you have a clear scope for your team, create a 2-level WBS. Don’t forget to include your WBS numbering (15 points).

Part 2: In your WBS, how many work packages have been created? (5 points) (Points : 20)

Three work packages have been created to plan and prepare…

(TCO 3) Compare and contrast fast tracking and scope reduction as means of schedule compression. (Points : 20)

Fast tracking and scope reduction are the three techniques where a project can be brought back on the schedule or for the compression of schedule. Fast tracking…

(TCO 5) A firm hosts data-mining servers and performs data mining for other companies that do not desire the costs of hardware, software, or expertise to data mine their data. The firm is planning to roll out faster data-mining software that will reduce the time to sift through customers’ data by a fraction of the present time.

Part 1: List and discuss the major risk management functions from a project management perspective for the data-mining software project. (15 points)

Part 2: Describe a positive and negative risk event, the consequences, and the risk-response plans for the data-mining software project. (15 points) (Points : 20)

Part 1 The risk management functions are:

Risk Management Planning: The data mining project could use a risk management template if available in the organization to analyze the…

Part 2: A risk for the data mining project would be that the infrastructure that is needed (server, software, licenses) are not…

(TCO 9) Compare and contrast how a scope is created in traditional project management versus one created in agile project management. (Points : 20)

In traditional project management, the project scope may specify the color of paint on the walls of a new building or the…

MGMT 404 Quiz Week 7 DeVry

 

(TCO 4) An example of resource leveling would be (Points : 5)

Fast tracking a project to finish early.

Crashing a project to meet a critical deadline.
Ensuring resource usage is balanced.

Removing work from a project to compress its schedule.

(TCO 6) You are the project manager of a major IT project in Italy. You review your earned value report and you see that your SPI is .68. What does this mean to you? (Points : 5)

The project is doing fine. No corrective actions are needed.

The project is slightly ahead of schedule. No corrections are needed.
The project is slightly behind schedule. Corrections are needed.
The project is very much behind schedule. Immediate corrections are needed.

(TCO 4) Which of the below is an example of an indirect cost to a project? (Points : 5)

Concrete needed to complete a parking garage

A consultant for an IT project

Boats for a river rescue

Janitorial services for an entire building

(TCO 7) Which of the following is an example of a formal written form of communication? (Points : 5)

Meeting notes made at a meeting with the VP of the company

E-mails between an important client and yourself

Contracts with a client
A memo from the senior VP of the company
(TCO 8) What document provides the project manager with information as to whom must be consulted and informed of the completion of a particular project activity? (Points : 5)

The WBS

The RACI

The OBS

The RBS

(TCO 8) You are the project manager of a large, virtual HR project. You want to improve the functioning of the project team. Which of the techniques below would not likely improve the effectiveness and efficiency of the project team? (Points : 5)

Let team members disappear as needed from the project.

Create a process to handle conflict.

Hold face-to-face meetings whenever possible.

Keep all team members informed and communicating.

(TCO 9) Stand-up meetings in agile project management do all of the following except which?

Provide project status.

Report on anticipated issues.

Permit group problem resolution.

Enhance collaboration.

(TCO 9) Agile project managers make use of iterations. What are iterations also known as in agile project management? (Points : 5)

Sprint

Stand-up meetings

Stories

Burn down charts

(TCO 6) You are the project manager of a major IT project in Italy. You review your earned value report and you see that your SPI is 1.18. What does this mean to you?

The project is doing fine. It should be completed 18 months ahead of schedule.

The project is doing fine. It should be completed 18 months ahead of schedule.

The project is slightly behind schedule. Corrections are needed.

The project is very much behind schedule. Immediate corrections are needed.

(TCO 6) To control your project, you decide to use milestone analysis. Which of the below is not a benefit of using milestone analysis to control a project? (Points : 5)

Milestones eliminate unnecessary changes to a project.

Milestones align schedules with suppliers.

Milestones trigger other team members’ participation in the project.

Milestones allow for periodic review of the project.

(TCO 4) Compare and contrast top-down and three-point estimating techniques. (Points : 20)

Top-down estimating is also known as analogous. Many believe that this method is simply an imposed budget by senior management, but…

(TCO 6) You are comparing two projects. Using the data below, calculate the CV, SV, SPI, and CPI.   Second, use the values to provide the status of each project.  All values are in dollars.

  Project A Project B
EV 650 550
PV 750 575
AC 675 525

(Points : 20)

Cost Variance = EV- AC…

(TCOs 4 and 6) What is resource leveling on a project and what are its objectives? (Points : 20)

Resource leveling is the process to address project constraints. Its objectives are:…

(TCO 8) Compare and contrast leaders versus managers on a project. (Points : 20)

Both managers and leaders work on a project with the aim of successfully executing the…

(TCO 9) Stand-up meetings in agile project management do all of the following except which?

Provide project status.

Report on anticipated issues.

Permit group problem resolution.

Enhance collaboration

(TCO 9) Compare and contrast project control in an agile environment and in a traditional environment. (Points : 20)

In agile environment there would a changes and adjusted to finish the work. This is because the team accepts changes as part of their…

 

MATH 221 Entire Course

 

MATH 221 Entire Course

Statistics for Decision-Making

 

 Click Link Below To Buy:

 

 

http://hwcampus.com/shop/math-221-entire-course/

  Or Visit www.hwcampus.com

MATH 221 Entire Course Statistics for Decision-Making NEW 

This Course Includes ALL iLabs, Homework, Quizzes, Final Exam, and All Discussions  

Week 3 Quiz – 3 Sets

Week 5 Quiz – 3 Sets

Week 7 Quiz 4 Sets

 

 Statistical Concepts that you will learn after completing this iLab:

  • Using Excel for Statistics
  • Graphics
  • Shapes of Distributions
  • Descriptive Statistics
  • Empirical Rule

Week 2 iLab Instructions-BEGIN

  • Data have already been formatted and entered into an Excel worksheet.
  • Obtain the data file for this lab from your instructor.
  • The names of each variable from the survey are in the first row of the Worksheet. This row has a background color of gray to identify it as the variable names. All other rows of the Worksheet represent a certain students’ answers to the survey questions. Therefore, the rows are called observations and the columns are called variables. On page 6 of this lab, you will find a code sheet that identifies the correspondence between the variable names and the survey questions.
  • Follow the directions below and then paste the graphs from Excel in the grey areas for question 1 through 3. Type your answers to questions 4 through 11 where noted in the grey areas. When asked for explanations, please give thorough, multi-sentence or paragraph length explanations.
  • PLEASE NOTE that various versions of Excel may have slightly different formula commands. For example, some versions use =STDEV.S while other versions would use =STDEVS (without the dot before the last “S”).
  • The completed iLab Word Document with your responses to the 11 questions will be the ONE and only document submitted to the dropbox. When saving and submitting the document, you are required to use the following format: Last Name_ First Name_Week2iLab.

Week 2 iLab Instructions-END

Creating Graphs

Create a pie chart for the variable Car Color: Select the column with the Car variable, including the title of Car Color.  Click on Insert, and then Recommended Charts.  It should show a clustered column and click OK.  Once the chart is shown, right click on the chart (main area) and select Change Chart Type.  Select Pie and OK.  Click on the pie slices, right click Add Data Labels, and select Add Data Callouts.  Add an appropriate title.  Copy and paste the chart here. (4 points)

Create a histogram for the variable Height. You need to create a frequency distribution for the data by hand.  Use 5 classes, find the class width, and then create the classes.  Once you have the classes, count how many data points fall within each class. It may be helpful to sort the data based on the Height variable first.  Create a new worksheet in Excel by clicking on the + along the bottom of the screen and type in the categories and the frequency for each category.  Then select the frequency table, click on Insert, then Recommended Charts and choose the column chart shown and click OK.  Right click on one of the bars and select Format Data Series.  In the pop up box, change the Gap Width to 0.  Add an appropriate title and axis label.  Copy and paste the graph here. (4 points)

  1. Type up a stem-and-leaf plot chart in the box below for the variable Money, with a space between the stems and the group of leaves in each line. Use the tens value as the stem and the ones value for the leaves.  It may be helpful to sort the data based on the Money variable first.

An example of a stem-and-leaf plot would look like this:

  • 4  5  6  9  3
  • 5  6  3  6
  • 9  2

The stem-and-leaf plot shown above would be for data 4, 5, 6, 9, 3, 15, 16, 13, 16, 29, and 22. (4 points)

Calculating Descriptive Statistics

  1. Calculate descriptive statistics for the variable Height by Gender. Click on Insert and then Pivot Table.  Click in the top box and select all the data (including labels) from Height through Gender.  Also click on “new worksheet” and then OK.  On the right of the new sheet, click on Height and Gender, making sure that Gender is in the Rows box and Height is in the Values   Click on the down arrow next to Height in the Values box and select Value Field Settings.  In the pop up box, click Average then OK.  Type in the averages below.  Then click on the down arrow next to Height in the Values box again and select Value Field Settings.  In the pop up box, click on StdDev then OK.  Type the standard deviations below. (3 points)

Short Answer Writing Assignment

All answers should be complete sentences.

What is the most common color of car for students who participated in this survey? Explain how you arrived at your answer. (5 points)

What is seen in the histogram created for the heights of students in this class (include the shape)? Explain your answer.  (5 points)

What is seen in the stem and leaf plot for the money variable (include the shape)? Explain your answer.  (5 points)

Compare the mean for the heights of males and the mean for the heights of females in these data. Compare the values and explain what can be concluded based on the numbers.   (5 points)

Compare the standard deviation for the heights of males and the standard deviation for the heights of females in the class. Compare the values and explain what can be concluded based on the numbers.  (5 points)

Using the empirical rule, 95% of female heights should be between what two values? Either show work or explain how your answer was calculated.  (5 points)

Using the empirical rule, 68% of male heights should be between what two values? Either show work or explain how your answer was calculated.   (5 points)

MATH 221 iLab Week 4 NEW DeVry

 

Statistical Concepts:

  • Probability
  • Binomial Probability Distribution

Calculating Binomial Probabilities

  • Open a new MINITAB worksheet.
  • We are interested in a binomial experiment with 10 trials. First, we will make the probability of a success ¼. Use MINITAB to calculate the probabilities for this distribution. In column C1 enter the word ‘success’ as the variable name (in the shaded cell above row 1. Now in that same column, enter the numbers zero through ten to represent all possibilities for the number of successes. These numbers will end up in rows 1 through 11 in that first column. In column C2 enter the words ‘one fourth’ as the variable name. Pull up Calc > Probability Distributions > Binomial and select the radio button that corresponds to Probability. Enter 10 for the Number of trials: and enter 0.25 for the Event probability:. For the Input column: select ‘success’ and for the Optional storage: select ‘one fourth’. Click the button OK and the probabilities will be displayed in the Worksheet.
  • Now we will change the probability of a success to ½. In column C3 enter the words ‘one half’ as the variable name. Use similar steps to that given above in order to calculate the probabilities for this column. The only difference is in Event probability: use 0.5.
  • Finally, we will change the probability of a success to ¾. In column C4 enter the words ‘three fourths’ as the variable name. Again, use similar steps to that given above in order to calculate the probabilities for this column. The only difference is in Event probability: use 0.75.

Plotting the Binomial Probabilities

  1. Create plots for the three binomial distributions above. Select Graph > Scatter Plot and Simple then for graph 1 set Y equal to ‘one fourth’ and X to ‘success’ by clicking on the variable name and using the “select” button below the list of variables.  Do this two more times and for graph 2 set Y equal to ‘one half’ and X to ‘success’, and for graph 3 set Y equal to ‘three fourths’ and X to ‘success’.  Paste those three scatter plots below.

Calculating Descriptive Statistics

  • Open the class survey results that were entered into the MINITAB worksheet.
  1. Calculate descriptive statistics for the variable where students flipped a coin 10 times. Pull up Stat > Basic Statistics > Display Descriptive Statistics and set Variables: to the coin. The output will show up in your Session Window. Type the mean and the standard deviation here.

Short Answer Writing Assignment – Both the calculated binomial probabilities and the descriptive statistics from the class database will be used to answer the following questions.

  1. List the probability value for each possibility in the binomial experiment that was calculated in MINITAB with the probability of a success being ½. (Complete sentence not necessary)
  2. Give the probability for the following based on the MINITAB calculations with the probability of a success being ½. (Complete sentence not necessary)
  3. Calculate the mean and standard deviation (by hand) for the MINITAB created binomial distribution with the probability of a success being ½. Either show work or explain how your answer was calculated. Mean = np, Standard Deviation =
  4. Calculate the mean and standard deviation (by hand) for the MINITAB created binomial distribution with the probability of a success being ¼ and compare to the results from question 5. Mean = np, Standard Deviation =
  5. Calculate the mean and standard deviation (by hand) for the MINITAB created binomial distribution with the probability of a success being ¾ and compare to the results from question 6. Mean = np, Standard Deviation =
  6. Explain why the coin variable from the class survey represents a binomial distribution.
  7. Give the mean and standard deviation for the coin variable and compare these to the mean and standard deviation for the binomial distribution that was calculated in question 5. Explain how they are related. Mean = np, Standard Deviation =

MATH 221 iLab Week 6 NEW DeVry 

 

Statistical Concepts:

  • Data Simulation
  • Confidence Intervals
  • Normal Probabilities

Short Answer Writing Assignment

All answers should be complete sentences.

We need to find the confidence interval for the SLEEP variable.  To do this, we need to find the mean and then find the maximum error.  Then we can use a calculator to find the interval, (x – E, x + E).

First, find the mean.  Under that column, in cell E37, type =AVERAGE (E2:E36).  Under that in cell E38, type =STDEV (E2:E36).   Now we can find the maximum error of the confidence interval.  To find the maximum error, we use the “confidence” formula.  In cell E39, type =CONFIDENCE.NORM (0.05, E38, 35).  The 0.05 is based on the confidence level of 95%, the E38 is the standard deviation, and 35 is the number in our sample.  You then need to calculate the confidence interval by using a calculator to subtract the maximum error from the mean (x-E) and add it to the mean (x+E).

  1. Give and interpret the 95% confidence interval for the hours of sleep a student gets. (6 points)
  2. Give and interpret the 99% confidence interval for the hours of sleep a student gets. (6 points)
  3. Compare the 95% and 99% confidence intervals for the hours of sleep a student gets. Explain the difference between these intervals and why this difference occurs. (6 points)
  4. Give and interpret the 95% confidence intervals for males and females on the HEIGHT variable. Which is wider and why?  (9 points)
  5. Give and interpret the 99% confidence intervals for males and females on the HEIGHT variable. Which is wider and why?  (9 points)
  6. Find the mean and standard deviation of the DRIVE variable by using =AVERAGE(A2:A36) and =STDEV(A2:A36). Assuming that this variable is normally distributed, what percentage of data would you predict would be less than 40 miles?  This would be based on the calculated probability.  Use the formula =NORM.DIST(40, mean, stdev,TRUE).  Now determine the percentage of data points in the dataset that fall within this range.  To find the actual percentage in the dataset, sort the DRIVE variable and count how many of the data points are less than 40 out of the total 35 data points.  That is the actual percentage.  How does this compare with your prediction?   (12 points)
  7. What percentage of data would you predict would be between 40 and 70 and what percentage would you predict would be more than 70 miles? Subtract the probabilities found through =NORM.DIST(70, mean, stdev, TRUE) and =NORM.DIST(40, mean, stdev, TRUE) for the “between” probability.  To get the probability of over 70, use the same =NORM.DIST(70, mean, stdev, TRUE) and then subtract the result from 1 to get “more than”.  Now determine the percentage of data points in the dataset that fall within this range, using same strategy as above for counting data points in the data set.  How do each of these compare with your prediction and why is there a difference?   (12 points)

MATH 221 iLab Week 2 DeVry

 

Statistical Concepts:

  • Using Minitab
  • Graphics
  • Shapes of Distributions
  • Descriptive Statistics
  • Empirical Rule

Data in Minitab

  • Minitab is a powerful, yet user-friendly, data analysis software package. You can launch Minitab by finding the icon and double clicking on it. After a moment you will see two windows, the Session Window in the top half of the screen and the Worksheet or Data Window in the bottom half.
  • Data have already been formatted and entered into a Minitab worksheet. Go to the eCollege Doc sharing site to download this data file. The names of each variable from the survey are in the first row of the Worksheet. This row has a background color of gray to identify it as the variable names. All other rows of the Minitab Worksheet represent a certain students’ answers to the survey questions. Therefore, the rows are called observations and the columns are called variables. Included with this lab, you will find a code sheet that identifies the correspondence between the variable names and the survey questions.
  • Complete the questions after the Code Sheet and paste the Graphs from Minitab in the grey areas for question 1 through 3. Type your answers to questions 4 through 11 where noted in the grey areas. When asked for explanations, please give thorough, multi-sentence or paragraph length explanations. The completed iLab Word Document with your responses to the questions will be the ONE and only document submitted to the dropbox. When saving and submitting the document, you are required to use the following format: Last Name_ First Name_Week2iLab.

Code Sheet

Do NOT answer these questions. The Code Sheet just lists the variables name and the question used by the researchers on the survey instrument that produced the data that are included in the Minitab data file. This is just information. The first question for the lab is after the code sheet….

MATH 221 iLab Week 4 DeVry

 

Statistical Concepts:

  • Probability
  • Binomial Probability Distribution

Calculating Binomial Probabilities

  • Open a new MINITAB worksheet.
  • We are interested in a binomial experiment with 10 trials. First, we will make the probability of a success ¼. Use MINITAB to calculate the probabilities for this distribution. In column C1 enter the word ‘success’ as the variable name (in the shaded cell above row 1. Now in that same column, enter the numbers zero through ten to represent all possibilities for the number of successes. These numbers will end up in rows 1 through 11 in that first column. In column C2 enter the words ‘one fourth’ as the variable name. Pull up Calc > Probability Distributions > Binomial and select the radio button that corresponds to Probability. Enter 10 for the Number of trials: and enter 0.25 for the Event probability:. For the Input column: select ‘success’ and for the Optional storage: select ‘one fourth’. Click the button OK and the probabilities will be displayed in the Worksheet.
  • Now we will change the probability of a success to ½. In column C3 enter the words ‘one half’ as the variable name. Use similar steps to that given above in order to calculate the probabilities for this column. The only difference is in Event probability: use 0.5.
  • Finally, we will change the probability of a success to ¾. In column C4 enter the words ‘three fourths’ as the variable name. Again, use similar steps to that given above in order to calculate the probabilities for this column. The only difference is in Event probability: use 0.75.

Plotting the Binomial Probabilities

  1. Create plots for the three binomial distributions above. Select Graph > Scatter Plot and Simple then for graph 1 set Y equal to ‘one fourth’ and X to ‘success’ by clicking on the variable name and using the “select” button below the list of variables.  Do this two more times and for graph 2 set Y equal to ‘one half’ and X to ‘success’, and for graph 3 set Y equal to ‘three fourths’ and X to ‘success’.  Paste those three scatter plots below…..

MATH 221 iLab Week 6 Devry 

 

Statistical Concepts:

  • Data Simulation
  • Discrete Probability Distribution
  • Confidence Intervals

Calculations for a set of variables

  • Open the class survey results that were entered into the MINITAB worksheet.
  • We want to calculate the mean for the 10 rolls of the die for each student in the class. Label the column next to die10 in the Worksheet with the word mean. Pull up Calc > Row Statistics and select the radio-button corresponding to Mean. For Input variables: enter all 10 rows of the die data. Go to the Store result in: and select the mean Click OK and the mean for each observation will show up in the Worksheet.
  • We also want to calculate the median for the 10 rolls of the die. Label the next column in the Worksheet with the word median. Repeat the above steps but select the radio-button that corresponds to Median and in the Store results in: text area, place the median

Calculating Descriptive Statistics

  • Calculate descriptive statistics for the mean and median columns that where created above. Pull up Stat > Basic Statistics > Display Descriptive Statistics and set Variables: to mean and median. The output will show up in your Session Window. Print this information.

Calculating Confidence Intervals for one Variable

  • Open the class survey results that were entered into the MINITAB worksheet.
  • We are interested in calculating a 95% confidence interval for the hours of sleep a student gets. Pull up Stat > Basic Statistics > 1-Sample t and set Samples in columns: to Sleep. Click the OK button and the results will appear in your Session Window.
  • We are also interested in the same analysis with a 99% confidence interval. Use the same steps except select the Options button and change the Confidence level: to 99. Short Answer Writing Assignment

All answers should be complete sentences.

MATH 221 Quiz Week 3 ALL Answers are 100% Correct 3 Sets

 

These quizzes include formulas in Excel and in Word that can be used if numeric data is different from the one listed below

  1. These quizzes include formulas in Excel and in Word that can be used if numeric data is different from the one listed below.
    1. Use the Venn diagram to identify the population and the sample.

Choose the correct description of the population.

  1.  The number of home owners in the state
  2.  The income of home owners in the state who own a car
  3.  The income of home owners in the state
  4.  The number of home owners in the state who own a car

Choose the correct description of the sample

  1.  The income of home owners in the state who own a car
  2.  The income of home owners in the state
  3.  The number of home owners in the state who own a car
  4.  The number of home owners in the state
    1. Determine whether the variable is qualitative or quantitative.

Favorite sport

Is the variable qualitative or quantitative?

  1.  Qualitative
  2.  Quantitative
    1. Students in an experimental psychology class did research on depression as a sign of stress. A test was administered to a sample of 30 students. The scores are shown below.

43  50  10  91  76  35  64  36  42  72  53  62  35  74  50

72  36  28  38  61  48  63  35  41  22  36  50  46  85  13

To find the 10% trimmed mean of a data set, order the data, delete the lowest 10% of the entries and highest 10% of the entries, and find the mean of the remaining entries.  Complete parts (a) through (c).

(a) Find the 10% trimmed mean for the data.

The 10% trimmed mean is.  (Round to the nearest tenth as needed.)

(b) Compare the four measures of central tendency, including the midrange.

Mean =  (Round to the nearest tenth as needed.)

Median =

Mode =  (Use a comma to separate answers as needed.)

Midrange =  (Round to the nearest tenth as needed.)

(c) What is the benefit of using a trimmed mean versus using a mean found using all data entries?

  1.  It simply decreases the number of computations in finding the mean.
  2.  It permits the comparison of the measures of central tendency.
  3.  It permits finding the mean of a data set more exactly.
  4.  It eliminates potential outliers that could affect the mean of the entries.
    1. Construct a frequency distribution for the given data set using 6 classes. In the table, include the midpoints, relative frequencies, and cumulative frequencies. Which class has the greatest frequency and which has the least frequency?

Amount (in dollars) spent on books for a semester

457  146  287  535  442  543  46  405  496  385  517  56  33  132  64

99  378  145  30  419  336  228  376  227  262  340  172  116  285

Complete the table, starting with the lowest class limit.  Use the minimum data entry as the lower limit of the first class. (Type integers or decimals rounded to the nearest thousandth as needed.)

Which class has the greatest frequency?

The class with the greatest frequency is from  to.

Which class has the least frequency?

The class with the least frequency is from to.

    1. Identify the data set’s level of measurement.

The nationalities listed in a recent survey (for example, American, German, or Brazilian)

  1.  Nominal
  2.  Ordinal
  3.  Interval
  4.  Ratio
    1. Explain the relationship between variance and standard deviation. Can either of these measures be negative?

Choose the correct answer below.

  1.  The standard deviation is the negative square root of the variance. The standard deviation can be negative but the variance can never be negative.
  2.  The standard deviation is the positive square root of the variance. The standard deviation and variance can never be negative.  Squared deviations can never be negative.
  3.  The variance is the negative square root of the standard deviation. The variance can be negative but the standard deviation can never be negative.
  4.  The variance is the positive square root of the standard deviation. The standard deviation and variance can never be negative.  Squared deviations can never be negative.
    1. For the following data (a) display the data in a scatter plot, (b) calculate the correlation coefficient r, and (c) make a conclusion about the type of correlation.

The number of hours 6 students watched television during the weekend and the scores of each student who took a test the following Monday.

Hours spent watching TV, x   0          1          2          3          3          5

Test score, y                            98        90        84        74        93        65

(a) Choose the correct scatter plot below.

(b) The correlation coefficient r is (Round to three decimal places as needed)

(c) Which of the following best describes the type of correlation that exists between number of hours spent watching television and test scores?

  1.  Strong negative linear correlation
  2.  No linear correlation
  3.  Weak negative linear correlation
  4.  Strong positive linear correlation
  5.  Weak positive linear correlation
    1. Suppose a survey of 526 women in the United States found that more than 70% are the primary investor in their household. Which part of the survey represents the descriptive branch of statistics?

Choose the best statement of the descriptive statistic in the problem.

  1.  There is an association between the 526 women and being the primary investor in their household.
  2.  526 women were surveyed.
  3.  70% of women in the sample are the primary investor in their household.
  4.  There is an association between U.S. women and being the primary investor in their household.

Choose the best inference from the given information.

  1.  There is an association between the 526 women and being the primary investor in their household.
  2.  There is an association between U.S. women and being the primary investor in their household.
  3.  70% of women in the sample are the primary investor in their household
  4.  526 women were surveyed.
    1. Identify the sampling technique used.

A community college student interviews everyone in a particular statistics class to determine the percentage of students that own a car.

  1.  Random
  2.  Cluster
  3.  Convenience
  4.  Stratified
  5.  Systematic
    1. Use the frequency polygon to identify the class with the greatest, and the class with the least frequency.

What are the boundaries of the class with the greatest frequency?

  1.  25.5-30.5
  2.  25-31
  3.  26.5-29.5
  4.  28-31

What are the boundaries of the class with the least frequency?

  1.  10-13
  2.  5-11.5
  3.  7-13
  4.  5-12.5
    1. Determine whether the given value is a statistic or a parameter

In a study of all 2377 students at a college, it is found that 35% own a computer

Choose the correct statement below.

  1.  Parameter because the value is a numerical measurement describing a characteristic of a population.
  2.  Statistic because the value is a numerical measurement describing a characteristic of a population.
  3.  Statistic because the value is a numerical measurement describing a characteristic of a sample.
  4.  Parameter because the value is a numerical measurement describing a characteristic of a sample.
    1. Compare the three data sets

(a) Which data set has the greatest sample standard deviation?

  1.  Data set (iii), because it has more entries that are farther away from the mean
  2.  Data set (ii), because it has two entries that are far away from the mean.
  3.  Data set (i), because it has more entries that are close to the mean.

Which data set has the least sample standard deviation?

  1.  Data set (i), because it has more entries that are close to the mean.
  2.  Data set (ii), because it has less entries that are farther away from the mean.
  3.  Data set (iii), because it has more entries that are farther away from the mean.

(b) How are the data sets the same? How do they differ?

  1.  The three data sets have the same standard deviations but have different means.
  2.  The three data sets have the same mean, median and mode but have different standard deviation.
  3.  The three data sets have the same mean and mode but have different medians and standard deviations.
  4.  The three data sets have the same mode but have different standard deviations and means
    1. Decide which method of data collection you would use to collect data for the study.

A study of the effect on the human digestive system of a popular soda made with a caffeine substitute.

Choose the correct answer below.

  1.  Observational Study
  2.  Simulation
  3.  Survey
  4.  Experiment
    1. Use the given frequency distribution to find the:
    • (a) Class width
    • (b) Class midpoint of the first class
    • (c) Class boundaries of the first class
  1.  (a) 4 (b) 137.5 (c) 134.5-139.5
  2.  (a) 5 (b) 137 (c) 135-139
  3.  (a) 5 (b) 137 (c) 134.5-139.5
  4.  (a) 4 (b) 137.5 (c) 135-139
    1. Consider the following sample data values.

5          14        15        21        16        13        9          19

(a) Calculate the range

(b) Calculate the variance

(c) Calculate the standard deviation

  1.  The range is. (Type an integer or a decimal)
  2.  The sample variance is. (Type an integer or decimal rounded to two decimal places as needed)
  3.  The sample standard deviation is. (Type an integer or decimal rounded to two decimal places as needed)
    1. Find the equation of the regression line for the given data. Then construct a scatter plot of the data and draw the regression line.  (the pair of variables have a significant correlation.)  Then use the regression equation to predict the value of y for each of the given x-values, if meaningful.  The number of hours 6 students spent for a test and their scores on that test are shown below.

Find the regression equation.

^

Y = x + () (Round to three decimal places as needed)

Choose the correct graph below.

(a)  Predict the value of y for x = 4. Choose the correct answer below.

    1. 1
    2. 8
    3. 8
    4. Not meaningful
    • (b) Predict the value of y for x = 4.5. Choose the correct answer below.
    1. 1
    2. 8
    3. 0
    4. Not meaningful

(c)  Predict the value of y for x = 12.  Choose the correct answer below.

    1. 8
    2. 1
    3. 0
    4. Not meaningful

(d) Predict the value of y for x = 2.5. Choose the correct answer below.

  1.  57.8
  2.  47.8
  3.  111.0
  4.  Not meaningful

1.Students in an experimental psychology class did research on depression as a sign of stress. A test was administered to a sample of 20 students. The scores are given below.
27 15 39 43 23 14 49 33 57 35
36 14 13 38 22 24 22 48 14 23

    1. Suppose that a study based on a sample from a targeted population shows that people at a pizza restaurant are hungrier than people at a coffee shop.
      A) make an inference based on the results of this study.
      B) what might this inference incorrectly imply?

3.Decide which method of data collecting you would use to collect data for the study below:
A study of how fast a virus would spread in a school of fish.

    1. Identify the sampling technique used:
      The name of 50 contestants are written on 50 cards. The cards are placed in a bag, and three names are picked from the bag.

5.In a poll of 1002 women in a country were asked whether they favor or oppose of the use of federal tax dollars to fund medical research using stem cells obtained from embryos. Among the women, 48% said they were in favor.

    1. Identify the data set’s level of measurement.
      The years the summer Olympics were held in a particular country

7.Use the frequency histogram to answer each question.
A) determine the # of classes
B) estimate the frequency of the class with the least frequency.
C) estimate the frequency of the class with the greatest frequency.
D) determine the class width.

8.The data represents the time, in minutes, spent reading a political blog in a day. Construct a frequency distribution using 5 classes. In the table, include midpoints, relative frequencies, and cumulative frequencies. Which class had the greatest and least frequency?

    1. Given a data set, how do you know whether to calculate σ or s?

10.Compare the three data sets on the right.

11.Use the given minimum and maximum data entries and the number of classes to find class width, lower class limits, and upper class limits.
min = 9, max = 83, classes = 6

12.Find the equation of the regression line for the given data. Then construct a scatter plot of the data and draw the regression line. (The pair of variables have a significant correlation.) Then use the regression equation to predict the value of y for each of the given x-values, if meaningful. The table below shows the heights (in feet) and the number of stories of six notable buildings in a city.

13.For the following data (a) display the data in a scatter plat, (b) calculate the correlation coefficient r, and (c) make a conclusion about the type of correlation.
The ages (in years) of 6 children and the number of words in their vocabulary.

Age, X 1 2 3 4 5 6
Vocabulary Size 350 950 1200 1700 2250 2600

14.Determine whether the underlined numerical value is a parameter or a statistic. In a poll of a sample of 12,000 adults, in a certain city, 12% said they left for work before 6am.

15.Both data sets have a mean of 225. One has a SD of 16 and the other has an SD of 24.

16.Use the Venn diagram to identify the population and the sample.

17.Determine whether the variable is qualitative or quantitative. Breed of cat.

18.Use the relative frequency histogram below to complete each part.
A) identify the class with the greatest and the class with the least frequency.
B) approximate the greatest and least relative frequencies.
C) approximate the relative frequency of the second class.

19.Use the given frequency distribution to find the:
A) class width
B) class midpoint of the first class
C) class boundaries of the first class.

Height (in inches)
Class Frequency
50-52 5
53-55 8
56-58 12
59-61 13
62-64 11

20.For the following data (a) display the data in a scatter plot, (b) calculate the correlation coefficient r, and (c) make a conclusion about that type of correlation.
The number of hours 6 students watched television during the weekend and the scores of each student who took a test the following monday.

Hours spent Watching TV 0 1 2 3 3 5
Test Score 98 89 86 70 81 66

21.Explain the relationship below between variance and standard deviation. Can either of these measures be negative?

22.Students in an experimental psychology class did research on depression as a sign of stress. A test was administered to a sample of 30 students. The scores are shown below.
44        50        10        91        77        35        64        36        43        72        54        62        35        75        50

72        36        29        39        61        49        63        35        41        21        36        50        47        86        13

To find the 10% trimmed mean of a data set, order the data, delete the lowest and highest 10% of the entries

23.Find the equation of the regression line for the given data. Then construct a scatter plot of the data and draw the regression line. (the pair of variables have a significant correlation.) then use the regression equation to predict the value of y for each of the given x-values, if meaningful. The number of hours 6 students spent for a test and their scores on that test are shown below.

    1. Determine whether the underlined numerical value is a parameter or a statistic. Explain your reasoning.
      the average grade on the midterm exam in a certain math class of 50 students was an 88.

25.Suppose that a study based on a sample from a targeted population shows that people who own a fax machine have more money than people who do not.
A) Make an inference based on the results of this study.
B) What might this inference incorrectly imply?

    1. Identify the data set’s level of measurement.
      The average daily temperatures (in degrees Fahrenheit) on five randomly selected days.
      23, 33, 28, 34, 35

27.Identify the sampling technique used.
The name of 100 contestants are written on 100 cards. The cards are placed in a bag, and three names are picked from the bag.

28.Which method of data collection should be used to collect data for the following study.
The average weight of 175 students in a high school.

MATH 221 Quiz Week 5 ALL Answers are 100% Correct 3 Sets

 

These quizzes include formulas in Excel and in Word that can be used if numeric data is different from the one listed below

    1. Sixty percent of households say they would feel secure if they had $50,000 in savings. You randomly select 8 households and ask them if they would feel secure if they had $50,000 in savings.  Find the probability that the number that say they would feel secure is (a) exactly five, (b) more than five, and (c) at most five.

(a) Find the probability that the number that say they would feel secure is exactly five

P(5) = (Round to three decimal places as needed)

(b) Find the probability that the number that say they would feel secure is more than five.

P(x>5) = (Round to three decimal places as needed)

(c) Find the probability that the number that say they would feel secure is at most five.

P(x≤5) = (Round to three decimal places as needed)

    1. Suppose 80% of kids who visit a doctor have a fever, and 25% of kids with a fever have sore throats. What’s the probability that a kid who goes to the doctor has a fever and a sore throat?

The probability is. (Round to three decimal places as needed)

    1. Find the mean, variance, and standard deviation of the binomial distribution with the given values of n and p. n = 90, p = 0.8

The mean, µ is (Round to the nearest tenth as needed)

The variance, σ2, is (Round to the nearest tenth as needed)

The standard deviation, σ is (Round to the nearest tenth as needed)

    1. Use the bar graph below, which shows the highest level of education received by employees of a company, to find the probability that the highest level of education for an employee chosen at random is E.

The probability that the highest level of education for an employee chosen at random is E is.  (Round to the nearest thousandth as needed)

    1. A company that makes cartons finds that the probability of producing a carton with a puncture is 0.05, the probability that a carton has a smashed corner is 0.09, and the probability that a carton has a puncture and has a smashed corner is 0.005. Answer parts (a) and (b) below.
    • Are the events “selecting a carton with a puncture” and “selecting a carton with a smashed corner” mutually exclusive?
    • A. No, a carton can have a puncture and a smashed corner.
  1. Yes, a carton can have a puncture and a smashed corner
  2. Yes, a carton cannot have a puncture and a smashed corner
  3. Mo, a carton cannot have a puncture and a smashed corner
  • If a quality inspector randomly selects a carton, find the probability that the carton has a puncture or has a smashed corner.

The probability that a carton has a puncture or a smashed corner is 0.135.  (Type an integer or a decimal.  Do not round)

    1. Given that x has a Poisson distribution with µ = 8, what is the probability that x = 3?

P(3) ≈ (Round to four decimal places as needed)

    1. Perform the indicated calculation.

= (Round to four decimal places as needed)

    1. A frequency distribution is shown below. Complete parts (a) through (d)

The number of televisions per household in a small town

Televisions      0          1          2          3

Households     26        448      730      1400

  1. Use the frequency distribution to construct a probability distribution

X                     P(x)

0

1

2

3

(Round to the nearest thousandth as needed)

  1. Graph the probability distribution using a histogram. Choose the correct graph of the distribution below.

Describe the histogram’s shape.  Choose the correct answer below.

  1. Skewed right
  2. Skewed left
  3. Symmetric
  4. Find the mean of the probability distribution

µ = (round to the nearest tenth as needed)

Find the variance of the probability distribution

σ2 = (round to the nearest tenth as needed)

Find the standard deviation of the probability distribution

σ = (round to the nearest tenth as needed)

Interpret the results in the context of the real-life situation.

  1. The mean is 2.3, so the average household has about 3 television. The standard deviation is 0.6 of the households differ from the mean by no more that about 1 television
  2. The mean is 0.6, so the average household has about 1 television. The standard deviation is 0.8 of the households differ from the mean by no more that about 1 television
  3. The mean is 2.3, so the average household has about 2 television. The standard deviation is 0.8 of the households differ from the mean by no more that about 1 television
  4. The mean is 0.6, so the average household has about 1 television. The standard deviation is 2.3 of the households differ from the mean by no more that about 3 television
    1. In the general population, one woman in eight will develop breast cancer. Research has shown that 1 woman is 650 carries a mutation of the BRCA gene.  Nine out of 10 women with this mutation develop breast cancer. a. Find the probability that a randomly selected woman will develop breast cancer given that she has a mutation of the BRCA gene.

The probability that a randomly selected woman will develop breast cancer given that she has a mutation of the BRCA gene is. (Round to one decimal place as needed)

  1. Find the probability that a randomly selected woman will carry the mutation of the BRCA gene and will develop breast cancer.

The probability that a randomly selected woman will carry the gene nutation and develop breast cancer is. (Round to four decimal places as needed)

  1. Are the events of carrying this mutation and developing breast cancer independent or dependent?
  2. Dependent
  3. Independent
    1. Students in a class take a quiz with eight questions. The number x of questions answered correctly can be approximated by the following probability distribution.  Complete parts (a) through (e)

X                     0          1          2          3          4          5          6          7          8

P(x)                 0.04     0.04     0.06     0.06     0.12     0.24     0.23     0.14     0.07

  1. Use the probability distribution to find the mean of the probability distribution

µ= (Round to the nearest tenth as needed)

  1. Use the probability distribution to find the variance of the probability distribution

σ2= (Round to the nearest tenth as needed)

  1. Use the probability distribution to find the standard deviation of the probability distribution

2.0 (Round to the nearest tenth as needed)

  1. Use the probability distribution to find the expected value of the probability distribution

4.9 (Round to the nearest tenth as needed)

  1. Interpret the results
  2. The expected number of questions answered correctly is 2.0 with a standard deviation of 4.9 questions.
  3. The expected number of questions answered correctly is 4 with a standard deviation of 2.0 questions.
  4. The expected number of questions answered correctly is 4.9 with a standard deviation of 0.04 questions.
  5. The expected number of questions answered correctly is 4.9 with a standard deviation of 2.0 questions.
    1. Identify the sample space of the probability experiment and determine the number of outcomes in the sample space. Randomly choosing a multiple of 5 between 21 and 49

The sample space is {}  (Use a comma to separate answers as needed.  Use ascending order)

There are outcome(s) in the sample space.

    1. Decide if the events shown in the Venn diagram are mutually exclusive.

Are the events mutually exclusive?

  1.  Yes
  2.  No
    1. Determine whether the random variable is discrete or continuous.
  1. The number of free-throw attempts before the first shot is made
  2. The weight of a T-bone steak
  3. The number of bald eagles in the country
  4. The number of points scored during a basketball game
  5. The number of hits to a website in a day

(a) Is the number of free-throw attempts before the first shot is made discrete or continuous?

  1. The random variable is continuous

B, The random variable is discrete

(b) Is the weight of a T-bone steak discrete or continuous?

  1. The random variable is discrete
  2. The random variable is continuous

(c) Is the number of bald eagles in the country discrete or continuous?

  1. The random variable is discrete
  2. The random variable is continuous

(d) Is the number of points scored during a basketball game discrete or continuous?

  1. The random variable is discrete
  2. The random variable is continuous

(e) Is the number of hits to a website in a day discrete or continuous?

  1. The random variable is discrete
  2. The random variable is continuous
  3.  A survey asks 1100 workers: Has the economy forced you to reduce the amount of vacation you plan to take this year?” Fifty-six percent of those surveyed say they are reducing the amount of vacation.  Twenty workers participating in the survey are randomly selected.  The random variable represents the number of workers who are reducing the amount of vacation.  Decide whether the experiment is a binomial experiment.  If it is, identify a success, specify the values of n, p, and q, and list the possible values of the random variable x.

Is the experiment a binomial experiment?

  1. Yes
  2. No

What is a success in this experiment?

  1.  Selecting a worker who is reducing the amount of vacation
  2.  Selecting a worker who is not reducing the amount of vacation
  3.  This is not a binomial experiment

Specify the value of n.  Select the correct choice and fill in any answer boxes in your choice

  1.  N=
  2. This is not a binomial experiment

Specify the value of p.  Select the correct choice below and fill in any answer boxes in your choice.

  1.  P= (Type an integer or a decimal)
  2.  This is not a binomial experiment

Specify the value of q.  Select the correct choice below and fill in any answer boxes in your choice.

  1.  Q= (Type an integer r a decimal)
  2.  This is not a binomial experiment

List the possible values of the random variable x

  1.  X=0, 1, 2,…, 20
  2.  X=1, 2, 3,…, 1100
  3.  1, 2,…, 20
  4.  This is not a binomial experiment
  5.  Determine whether the distribution is a discrete probability distribution.

Is the distribution a discrete probability distribution?  Why?  Choose the correct answer below.

  1.  Yes, because the probabilities sum to 1 and are all between 0 and 1, inclusive
  2.  No, because the total probability is not equal to 1
  3.  Yes, because the distribution is symmetric
  4.  No, because some of the probabilities have values greater than 1 or less than 0
  5.  The table below shows the results of a survey that asked 2872 people whether they are involved in any type of charity work. A person is selected at random from the sample.  Complete parts (a) through (e).

Frequency       Occasionally    Not at all         Total

Male                226                  455                  793                  1474

Female             206                  450                  742                  1398

Total                432                  905                  1535                2872

  1.  Find the probability that the person is frequently or occasionally involved in charity work

P(being frequently involved or being occasionally involved) =  (Round to the nearest thousandth as needed)

  1.  Find the probability that the person is male or frequently involved in charity work

P(being male or being frequently involved) =

  1.  Find the probability that the person is female or not involved in charity work at all

P(being female or not being involved) = 0.763 (Round to the nearest thousandth as needed)

  1. Find the probability that the person is female or not frequently involved in charity work

P(being female or not being frequently involved) = (Round to the nearest thousandth as needed)

  1.  Are the events “being female” and “being frequently involved in charity work” mutually exclusive?
  2.  No, because 206 females are frequently involved in charity work.
  3.  Yes, because no females are frequently involved in charity work.
  4.  Yes, because 206 females are frequently involved in charity work.
  5.  No, because no females are frequently involved in charity work.
  6.  For the given pair of events, classify the two events as independent or dependent.

Swimming all day at the beach

Getting a sunburn

Choose the correct answer below.

  1.  The two events are independent because the occurrence on one does not affect the probability of the occurrence of the other.
  2.  The two events are dependent because the occurrence of one does not affect the probability of the occurrence of the other.
  3.  The two events are independent because the occurrence of one affects the probability of the occurrence of the other.
  4.  The two events are dependent because the occurrence of one affects the probability of the occurrence of the other.
  5.  Outside a home, there is a 9-key keypad with letters A, B, C, D, E, F, G, H, and I that can be used to open the garage if the correct nine-letter code is entered. Each key may be used only once.  How many codes are possible?

The number of possible codes is.

  1.  Determine the number of outcomes in the event. Decide whether the event is a simple event or not.

A computer is used to select randomly a number between 1 and 9, inclusive.  Event C is selecting a number less than 5.

Event has outcome(s)

Is the event a simple event?

1.Decide whether the random variable x is discrete or continuous
X represents the number of home theater systems sold per month at an electronics store.

1.Evaluate the given expression and express the results using the usual format for writing numbers (instead of scientific notation
36C2

2.Find the mean, variance, and standard deviation of the binomial distribution with the given values of n and p.

N = 80, p = 0.4

2.Find the mean, variance, and standard deviation of the binomial distribution with the given values of n and p.

N = 128, p = 0.36

    1. A new phone answering system for a company is capable of handling four calls every 10 minutes. Prior to installing the new system, company analysts determined that the incoming calls to the system are Poisson distributed with a mean equal to one every 10 minutes. If this incoming call distribution is what the analysts think it is, what is the probability that in a 10 – minute period more calls will arrive than the system can handle?

3.Suppose 90% of kids who visit a doctor have a fever, and 35% of kids with a fever have sore throats. What’s the probability that a kid who goes to the doctor has a fever and a sore throat?

    1. You randomly select one card from a standard deck. Event A is selecting a nine. Determine the number of outcomes in event A. then decide whether the event is a simple event or not.

4.A frequency distribution is shown below. Complete parts (a) through €.
The number of dogs per household in a small town.

Dogs 0 1 2 3 4 5
Households 1295 416 163 47 27 12

5.22% of college students say they use credit cards because of the rewards program. You randomly select 10 college students and ask each to name the reason he or she uses credit cards. Find the probability that the number of students who say they use credit cards because of the rewards program is (a) exactly two, (b) more than two, and (c) between two and five inclusive. If convenient, use technology to find the probabilities.

5.The table below shows the results of a survey that asked 2870 people whether they are involved in any type of charity work. A person is selected at random from the sample. Complete parts (a) through (e).

6.The table below shows the results of a survey that asked 2885 people whether they are involved in any type of charity work. A person is selected at random from the sample. Complete parts (a) through (e).

6.Identify the sample space of the probability experiment and determine the number of outcomes in a sample space.
Randomly choosing an even number between 10 and 20, inclusive.

7.Students in a class take a math quiz with eight questions. The number x of questions answered correctly can be approximated by the following probability distributions. Complete parts (a) through €

7.Determine whether the events E and F are independent or dependent. Justify your answer.

8.A certain lottery has 29 numbers. In how many different ways can 4 of the numbers be selected? (assume that order of selection is not important.)

8.Determine the required value of the missing probability to make the distribution a discrete probability distribution

9.Determine whether the distribution Is a discrete probability distribution.

9.The histogram shows the distribution of stops for red traffic lights a commuter must pass through on her way to work. Use the histogram to find the mean, variance, standard deviation, and expected value of the probability distribution.

10.Decide if the events are mutually exclusive.
Event A: Randomly selecting someone who is married
Event B: Randomly selecting someone who is a bachelor

10.A standard deck of cards contains 52 cards. One card is selected from the deck.
A)  compute the probability of randomly selecting a six or three.
B) compute the probability of randomly selecting a six, three, or king.
C) compute the probability of randomly selecting an eight or club.

11.A survey asks 1200 workers, “has the economy forced you to reduce the amount of vacation you plan to take this year?” 52% of those surveyed say they are reducing the amount of vacation. Ten workers participating in the survey are randomly selected. The random variable represents the number of workers who are reducing the amount of vacation. Decide whether the experiment is a binomial experiment. If it is, identify a success, specify the values of n, p and q.

11.A study found that 36% of the assisted reproductive technology (ART) cycles resulted in pregnancies. Twenty eight percent of the ART pregnancies resulted in multiple births.

12.Use the bar graph below, which shows the highest level of education received by employees of a company, to find the probability that the highest level of education for an employee chosen random is E.

12.A golf-course architect has four linden trees, five white birch trees, and two bald cypress tress in a row along a fairway. In how many ways can the landscaper plant the trees in a row, assuming that the trees are evenly spaced?

13.Identify the sample space of the probability experiment and determine the number of outcomes in the sample space.

13.Decide if the events are mutually exclusive.
Event A) Receiving a phone call from someone who opposes all cloning
Event B) Receiving a phone call from someone who approves of cloning sheep.

14.Determine whether the events E and F are independent or dependent. Justify your answer.

14.47% of men consider themselves a professional baseball fan. You randomly select 10 men and ask each if he considers himself a professional baseball fan. Find the probability tha the number who consider themselves baseball fans is (a) 8, (b) at least 8, and (c) less than eight. If convenient, use technology to find the probabilities.

15.Suppose 60% of kids who visit a doctor have a fever, and 30% of kids with a fever have sore throats. What’s the probability that a kid who goes to the doctor has a fever and a sore throat?

15.Given that x has a Poisson distribution with ᶙ = 8, what is the probability that x = 1?

16.Perform the indicated calculation.

16.Use the frequency distribution, which shows the responses of a survey of college students when asked, “how often do you wear a seat belt when riding a car driven by someone else?” find the following probabilities of responses of college students from the survey chosen at random.

17.A frequency distribution is shown below. Complete parts (a) through (d).
The number of televisions per household in a small town.

Televisions 0 1 2 3
Households 2 443 723 1409

17.About 30% of babies born with a certain ailment recover fully. A hospital is caring for six babies born with this ailment. The random variable represents the number of babies that recover fully.  Decide whether the experiment is a binomial experiment. If it is, identify a success, specify the values of n, p, and q, and list the possible values of the random variable x.

18.A study found that 37% of the assisted reproductive technology (ART) cycles resulted in pregnancies. 24% of the ART pregnancies resulted in multiple births.
A) find the probability that a random selected ART cycle resulted in a pregnancy and produced a multiple birth.
B) find the probability that a randomly selected ART cycle that resulted in a pregnancy did not produce a multiple birth.
C) would it be unusual for a randomly selected ART cycle to result in a pregnancy and produce a multiple birth?

    1. You randomly select one card from a standard deck. Event A is selecting a three. Determine the number of outcomes in event A. then decide whether the event is a simple event or not.

19.A company that makes cartons finds the probability of producing a carton with a puncture is 0.07, the probability that a carton has a smashed corner is 0.1, and the probability that a carton has a puncture and has a smashed corner is 0.007. answer parts (a) and (b)

19.Determine whether the random variable is discrete or continuous.
a. the # of bald eagles in the country.
b. the weight of a t-bone steak.
c. the time it takes for a light bulb to burn out.
d. the number of fish caught during a fishing tournament.
e. the distance a baseball travels in the air after being hit.

MATH 221 Quiz Week 7 with All Formulas ALL Answers are 100% Correct 4 Sets

 

These quizzes include formulas in Excel and in Word that can be used if numeric data is different from the one listed below

  1. These quizzes include formulas in Excel and in Word that can be used if numeric data is different from the one listed below.
    1. A mechanic sells a brand of automobile tire that has a life expectancy that is normally distributed, with a mean life of 35,000 miles and a standard deviation of 2800 miles. He wants to give a guarantee for free replacement of tires that don’t wear well. How should he word his guarantee if he is willing to replace approximately 10% of the tires?

Tires that wear out by …miles will be replaced free of charge.

    1. Find the indicated z-score shown in the graph to the right.

The z-score is

    1. A researcher wishes to estimate, with 95% confidence, the amount of adults who have high-speed internet access. Her estimate must be accurate within 4% of the true proportion.
      a) find the minimum sample size needed, using a prior study that found that 32% of the respondents said they have high-speed internet access(b) no preliminary estimate is available. Find the minimum sample size needed.a) =
      b) =
    2. The total cholesterol levels of a sample of men aged 35-44 are normally distributed with a mean of 221 milligrams per deciliter and a standard deviation of 37.7 milligrams per deciliter.
      (a) what percent of men have a total cholesterol level less than 228 milligrams per deciliter of blood?
      (b) if 251 men in the 35-44 age group are randomly selected, about how many would you expect to have a total cholesterol level greater than 264 milligrams per deciliter of blood?
      a) =
      b) =
    3. Find the z-score that has a 12.1% of the distribution’s area to it’s left.
      Answer =
    4. A doctor wants to estimate the HDL cholesterol of all 20-29 year old females. How many subjects are needed to estimate the HDL cholesterol within 2 points with 99% confidence assuming σ = 18.1? suppose the doctor would be content with 90% confidence. How does the decrease in confidence affect the sample size required?
      99% =
      90% =
      how does the decrease in confidence affect the sample size required?
      Answer:
    5. Use a table of cumulative areas under the normal curve to find the z-score that corresponds to the given cumulative area. If the area is not in the table, use the entry closest to the area. If the area is halfway between two entries, use the z-score halfway between the corresponding z-scores. If convenient, use technology to find the z-score. 0.054
      Answer:
    6. In a survey of 3076 adults, 1492 say they have started paying bills online in the last year.
      Construct a 99% confidence interval for the population proportion. Interpret the results.
      Answer:
      With 99% confidence, it can be said that the…
    7. Assume the random variable x is normally distributed with mean u = 89 and standard deviation o = 4. Find the indicated probability. P(76<x<82)
      Answer:
    1. Find the margin of error for the given values of c,s, and n.
      c = .90, s = 3.1, n =49
      Answer:
    1. Find the critical value Tc for the confidence level c = .90 and sample size n = 29.
      Tc =
    2. The mean height of women in a country (ages 20-29) is 63.9 inches. A random sample of 65 women in this age group is selected. What is the probability that the mean height for the sample is greater than 65 inches? Assume o = 2.91
      Answer =
    1. A survey was conducted to measure the height of men. In the survey, respondents were grouped by age. In the 20-29 age group, the heights were normally distributed with a mean of 67.9 inches and a standard deviation of 3.0 inches. A study participant is randomly selected. Complete parts (A) through (C).
      (a) the probability that his height is less than 68 inches.
      Answer:
      (b) the probability that his height is between 68-71 inches.
      Answer:
      (c) the probability that his height is more than 71 inches.
      Answer:
    1. For the standard normal distribution shown on the right, find the probability of z occurring in the region.

      Probability =

    1. Find the indicated probability using the standard normal distribution.
      (P – 1.35 < z < 1.35) =
    1. Find the margin of error for the given values of c, s, n.
      c = 0.98, s = 5, n = 6
      Answer:
    1. The systolic blood pressures of a sample of adults are normally distributed with a mean pressure of 115 millimeters of mercury and a standard deviation of 3.6 millimeters of mercury. The systolic blood pressures of four adults selected at random are 122 millimeters of mercury, 113 millimeters of mercury, 106 millimeters of mercury, and 128 millimeters of mercury. The graph of the standard normal distribution is below. Complete parts a – c.

(a) Match the values with the letters a/b/c/d.
A =
B =
C =
D =
(b) Find the z-scores that corresponds to each value
A =
B =
C =
D =

(c) Determine if any of the values are unusual, and classify them as either unusual or very unusual.

Answer: The unusual value(s) is

    1. You are given a sample mean and standard deviation. Use this information to construct the 90% and 95% confidence intervals for the population mean. Interpret the results and compare the widths of the confidence intervals. If convenient, use technology to construct the confidence intervals. A random sample of 60 home theater systems has a mean price of $134.00 and a standard deviation is $19.60The 90% confidence interval is
      The 95% confidence interval isInterpret the results.

Answer: With 90% confidence, it can be…

    1. The monthly incomes for 12 randomly select people, each with a bachelor’s degree in economics, are shown on the right. Assume the population is normally distributed.

Mean =
Standard Deviation =
99% confidence interval =

    1. What is the total area under the normal curve?
      Answer =
    2. A population has a mean u = 82 and a standard deviation o = 36. Find the mean and standard deviation of a sampling distribution of sample means with sample size n = 81
  1.  The amounts of time employees at a large corporation work each day are normally distributed, with a mean of 7.4 hours and a standard deviation of 0.38 hour. Random sample of size 25 and 37 are drawn from the population and the mean of each sample is determined. What happens to the mean and the standard deviation of the distribution of sample means as the size of the sample increases?

Mean of distribution =
Standard deviation of distribution =

If the sample size is n = 37, find the mean and standard deviation.

Mean =
Standard deviation =

What happens to the mean and standard deviation of the distribution of sample means as the size of the sample increases?
Answer: The mean stays the same, the but standard deviation decreases.

  1.  Assume a member is selected at random from the population represented by the graph. Find the probability that the member selected at random is from the shaded area of the graph.

1.Find the probability and interpret the results. If convenient, use technology to find the probability.

The population mean annual salary for environmental compliance specialist is about $64,000. A random sample of 35 specialists is drawn from this population. What is the probability that the mean salary of the sample is less than $62,000? Assume σ = $5,700

1.Use the standard normal table to find the z-score that corresponds to the cumulative area 0.1084. if the area is not in the table, use the entry closest to the area. If the area is halfway between two entries, use the z-score halfway between the corresponding z scores.

1.In a survey of women in a certain country (ages 20-29), the mean height was 63.8 inches with a standard deviation of 2.94 inches. Answer the following questions about the specified normal distribution.
A) what height represents the 99th percentile?
B) what height represents the first quartile?

2.Find the probability and interpret the results. If convenient, use technology to find the probability.
The population mean annual salary for environmental compliance specialists is about $61,000. A random sample of 42 specialists is drawn from this population. What is the probability that the mean salary of the sample is less than $57,500? Assume σ = $6,000

2.Assume a member is selected at random from the population represented by the graph. Find the probability that the member selected at random is from the shaded area of the graph. Assume the variable x is normally distributed.

    1. In a recent year, scores on a standardized test for high school students with a 3.50 – 4.00 GPA were normally distributed with a mean of 39.3 and a standard deviation of 2.3. A student with a 3.50 – 4.00 GPA who took the standardized test Is randomly selected.
    2. Find the z-scores for which 5% of the distribution area lies between –z and z.
    3. Use the central time limit theorem to find the mean and standard error of the mean of the indicated sampling distribution. Then sketch a graph of the sampling distribution.
      The per capita consumption of red meat by people in a country in a recent year was normally distributed, with a mean of 106 pounds and a standard deviation of 39.7 pounds. Random samples of size 19 are drawn from this population and the mean of each sample is determined.
    4. The mean height of women in a country (ages 20-29) is 64.2 inches. A random sample of 70 women in this age group is selected. What is the probability that the mean height for the sample is greater than 65 inches? Assume σ = 2.94
    5. The total cholesterol levels of a sample of men aged 35-44 are normally distributed with a mean of 202 milligrams per deciliter and a standard deviation of 37.6 milligrams per deciliter.

Answers:
A) The % of the men that have a total cholesterol level less than 213 milligrams per deciliter of blood is B) of the 259 men… would be expected to have a total cholesterol level greater 257 milligrams per deciliter of blood.

5.A researcher wishes to estimate, with 95% confidence, the proportion of adults who have high-speed internet access. Her estimate must be accurate within 2% of the true proportion.

Answers:

A – What is the minimum sample size needed using a prior study that found that 52% of the respondents said they have high-speed internet access? =
B – Minimum sample size needed? =5.

Find the margin of error for the given clues of c,s, and n.
c = 0.95, s = 2.7, n = 36

5.If a z-score is zero, which of the following is true?
5.Assume a member is selected at random from the population represented by the graph. Find the probability that the member selected is from the shaded area.

6.Find the z-score that has 2.5% of the distribution area to it’s right.

6.Find the z-score that has 28.1% of the distribution’s area to its left

7.Find the margin of error for the given values of c,s, and n.
C = 0.95, s = 3.1, N = 100

    1. Find the critical value Tc for the confidence level c = 0.90 and sample size of n = 17
    2. In a survey of women in a certain country (ages 20-29) the mean height was 64.1 inches with a standard deviation of 2.94 inches. Answer the following questions about the specified normal distribution
      A) what height represents the 98th percentile?
      B) what height represents the first quartile

8.The SAT is an exam used by colleges and universities to evaluate the undergraduate applicants. The test scores are normally distributed. In a recent year, the mean test score was 1510 and the standard deviation was 315. The test scores of 4 random students are as follows: 1946, 1266, 2199, and 1407

(A) Without converting to z-scores, match the values with the letters a/b/c/d on the given graph of the standard normal distribution.

(B) Find the z-scores that corresponds to each value

  1. C) Determine whether any of the values are unusual.
    Answer: The unusual value(s) is/are
    1. A beverage company uses a machine to fill one-liter bottles with water. Assume that the population of volumes is normally distributed. (a) the company wants to estimate the mean value of water the machine is putting in the bottles within 1 milliliter. Determine the minimum sample size required to construct a 95% confidence interval for the population mean. Assume the population standard deviation is 4 milliliters.
      (b) Repeat part (a) using an error tolerance of 3 milliliters. Which error tolerance requires a larger sample size?

Answers:
(A) the minimum sample size required for an error tolerance of 1 is… bottles
(b) the minimum sample size required for an error tolerance of 3 is …bottles

The error tolerance of … requires a larger sample size. As the error size decreases, a larger sample must be taken to obtain sufficient information from the population to ensure accuracy.

    1. A population has a mean u = 83 and a standard deviation o = 23. Find the mean and standard deviation of sample means with sample size n = 247.
      Answer
    2. The monthly income for 12 randomly selected people, each with a bachelor’s degree in economics, are shown on the right. Assume the population is normally distributed.

9.Assume a member is selected at random from the population represented by the graph. Find the probability that the member selected at random is from the shaded area of the graph.

    1. Find the indicated probability using standard normal distribution.
      P(-0.78 < Z < 0.78)
      10.Use the normal distribution of fish lengths for which the mean is 11 inches and the standard deviation is 5 inches. Assume the variable x is normally distributed.
      (a) what percent of fish are longer than 13 inches?
      (b) if 500 fish are randomly selected, how many would be shorter than 9 inches?
    2. Find the margin of error for the given values of c,s, and n.
      C = 0.90, s = 3.2, n =100
    3. A researcher wishes to estimate, with 90% confidence, the proportion of adults who have high-speed internet access. Her estimate must be accurate within 4% of the true proportion.
      A – Find the minimum sample size needed using a study of 46%
      B – No estimate is available. Find the minimum sample size.

11.A doctor wants to estimate the HDL cholesterol of all 20-29 year old females. How many subjects are needed to estimate the HDL cholesterol within 2 points with 99% confidence assuming o = 17.3? suppose the doctor would be content with 90% confidence. How does the decrease in confidence affect the sample size?

11.The systolic blood pressures of a sample of adults are normally distributed, with a mean pressure of 115 millimeters of mercury and a standard deviation of 3.6 millimeters of mercury. The systolic blood pressures of four adults selected at random are 121 millimeters of mercury, 114 millimeters of mercury, 105 millimeters of mercury, and 126 millimeters of mercury. The graph of the standard normal distribution is shown to the right. Complete parts (a) through (c) below.

a….

b….

  1. The unusual value(s) is/are …. The very unsual(s) is/are …
  2. In a recent year, scores on a standardized test for high school students with a 3.50 to 4.00 gpa were normally distributed, with a mean of 39.7 and a standard deviation of 2.5. A student with a 3.50 to 4.00 gpa who took the standardized test is randomly selected.A. find the probability that the student’s test score is less than 35.
    find the probability that the student’s test score is between 35.7 and 43.7
    C. find the probability that the student’s test score is more than 41.7
  3. Find the margin of error for the given values of c,s, and n.
    C = 0.95, S = 4, N = 27
  4. Assume the random variable x is normally distributed with mean u = 50 and standard deviation o = 7. Find the indicated probability. P(X>39)
    The systolic blood pressures of a sample of adults are normally distributed, with a mean pressure of 115 millimeters of mercury and a standard deviation of 3.6 millimeters of mercury. The systolic blood pressures of four adults selected at random are 119 millimeters of mercury, 113 millimeters of mercury, and 127 millimeters of mercury. The graph of the standard normal distribution is shown to the right. Complete parts (a) through (c) below.
  • Without converting to z-scores, match the values with the letters A, B, V, and D on the given graph above of the standard normal distribution.
  • Find the z-score that corresponds to each value and check your answers to part (a)
  • Determine whether any of the values are unusual, and classify them as either unusual or very unusual. Select the correct answer below and, if necessary, fill in the answer box(es) within your choice….
    1. Use a table of cumulative areas under the normal curve to find the z-score that corresponds to the given cumulative area. If the area is not in the table, use the entry closest to the area. If the area is halfway between two entries, use the z-score halfway between corresponding z-scores. If convenient, use technology to find the z-score. 0.049.
    2. Find the critical value t for the confidence level c =0.99 and sample size n = 13.

Click the icon to view the t-distribution table.

    1. Find the margin of terror for the given values of c,s, and n.
      C = 0.95, S = 3.9, N = 26

14 For the standard normal distribution shown on the right, find the probability of z occurring in the indicated region. -0.62

Answer =

    1. You are given the sample mean and sample and the sample standard deviation. Use this information to construct the 90% and 95% confidence intervals for the population mean. Which interval is wider? If convenient, use technology to construct the confidence intervals.

A random sample of 36 gas grills has a mean price of $637.60 and a standard deviation of $55.80

14.Use the central limit theorem to find the mean and the standard error of the mean of the indicated sampling distribution. The sketch a graph of the sampling distribution.

The per capita consumption of red meat by people in a country in a recent year was normally distributed, with a mean of 113 pounds and a standard deviation of 39.1 pounds. Random samples of size 18 are drawn from this population and the mean of each sample is determined.

    1. What requirements are necessary for a normal probability distribution to be a standard normal probability distribution?

15.Find the indicated probability using the standard normal distribution.
P (-0.21 < z < 0.21)

    1. You are given the sample mean and the sample standard deviation. Use this information to construct 90% and 95% confidence intervals for the population mean. Interpret the results and compare the widths of the confidence intervals. If convenient, use technology to construct confidence intervals.
      A random sample of 40 home theater systems has a mean price of $1111.00 and a standard deviation is $15.50
    2. A population has a mean u = 80 and a standard deviation o = 30. Find the mean and standard deviation of a sampling distribution of sample means with sample size 250.
    3. The monthly incomes for 12 randomly selected people, each with a bachelor’s degree in economics, are shown above. Assume the population is normally distributed.

16.A population has a mean of 75 and standard deviation of 36. Find the mean/sd of a sampling distribution of sample means with sample size n = 81.

Mean = 75
Standard deviation = 4

17.Find the indicated probability using the standard normal distribution.
P ( -0.37 < z < 0.37)
17. Find the indicated z-scores shown in the graph.

    1. In a survey of 3455 adults, 1467 say they have started paying bills online in the last year.
      Construct a 99% confidence interval for the population proportion. Interpret the results.

18.The amounts of time employees at a large corporation work each day are normally distributed, with a mean of 7.8 hours and a standard deviation of 0.33 hour. Random sample of size 25 and 38 are drawn from the population and the mean of each sample is determined. What happens to the mean and the standard deviation of the distribution of sample means as the size of the sample increases?

If the sample size n = 25, find the mean and standard deviation of the distribution of sample means.

    1. Find the margin of error for the given values of c,s, and n.
      C = 0.98, s = 5, n = 24
    2. A researcher wishes to estimate, with 99% confidence, the proportion of adults who have high-speed internet access. Her estimate must be accurate within 4% of the true proportion.
      A) find the minimum sample size needed, using a prior study that found that 54% of the respondents said that they have high speed internet access.
      B) no preliminary estimate is available. Find the minimum sample size needed.

19.In a survey of women in a certain country (ages 20-29), the mean height was 63.4 inches with a standard deviation of 2.87 inches. Answer the following questions about the specified normal distribution.
A) what height represents the 95th percentile?
B) what height represents the first quartile

    1. In a normal distribution, which is greater, the mean or the median?

Find the indicated z-score shown in the graph

    1. In a normal distribution, which is greater, the mean or the median? Explain.
      20. You are given the sample mean and the sample standard deviation. Use this information to construct the 90% and 95% confidence intervals for the population mean. Which interval is wider?
      A random sample of 31 gas grills has a mean price of $631.70 and a standard deviation of $55.10
    2. The monthly incomes for 12 randomly selected people, each with a bachelor’s degree in economics, are shown on the right. Assume the population is normally distributed.
    3. A beverage company uses a machine to fill cone-liter bottles (see figure). Assume that the population of volumes is normally distributed.

(a) The company wants to estimate the mean volume of water the machine is putting in the bottles within 1 milliliter.  Determine the minimum sample size required to construct a 95% confidence interval for the population mean.  Assume the population standard deviation is 3 milliliters.

(b) Repeat part (a) using an error tolerance of 2 milliliters.  Which error tolerance requires a larger sample size?  Explain.

    1. Find the standard normal distribution show on the right, find the probability of z occurring in the indicated region.
    1. Assume the random variable x is normally distributed with mean = 50 and standard deviation = 7. P (X>35)

Answer =

21.In a survey of 3068 adults, 1462 say they have started paying bills online in the last year.  Construct a 99% confidence interval for the population proportion.  Interpret the results.  Choose the correct answer below…

    1. Use a table of cumulative areas under the normal curve to find the z-score that corresponds to the given cumulative area. If the area is not in the table, use the try closest to the area. If the area is halfway between two entries, use the z-score halfway between the corresponding z-scores. If convenient, use technology to find the z-score. 0.051.

Answer =

    1. In a survey of 640 male ages 18-64, 392 say they have gone to the dentist in the past year. Construct a 90% and 95% confidence intervals for the population proportion. Interpret the results and compare the confidence intervals. If convenient, use technology to construct the confidence intervals.

The 90% confidence interval is 0.580, 0.644
The 95% confidence interval is 0.575, 0650
With the given confidence, it can be said that the population proportion of males ages 18-64 who say they have gone to the dentist in the past year is between the endpoints of the given confidence interval.

    1. Find the critical value Tc for the confidence level c = 0.80 and sample size n = 14.

Tc = 1.350

    1. Assume the random variable x is normally distributed with mean u = 50 and standard deviation = 7. P ( X > 38)
      23. For the standard normal distribution shown on the right, find the probability in the indicated region.

23.The total cholesterol levels of a sample of men aged 35-44 are normally distributed with a mean of 206 milligrams per deciliter and a standard deviation of 37.6 milligrams per deciliter.
A) what % of the men have a total cholesterol level less than 240 milligrams per deciliter of blood?
B) if 240 men in the 35-44 age group are randomly selected, about how many would you expect to have total cholesterol level greater than 252 milligrams per deciliter of blood?

MATH 221 Homework Week 1

 

1  Determine whether the data set is a population or a sample. Explain your reasoning.

The age of each resident in an apartment building.

1  Determine whether the data set is a population or a sample. Explain your reasoning.

The salary of each baseball player in a league

  1. Determine whether the data set is a population or a sample. The number of restaurants in each city in a state.

2  Determine whether the underlined value is a parameter or a statistic.

The average age of men who have walked on the moon was 39 years, 11 months, 15 days.

Is the value a parameter or a statistic?

2  Determine whether the data set is a population or a sample.  Explain your reasoning.

The number of pets for 20 households in a town of 300 households.

Choose the correct answer below.

  1. Determine whether the data is a population or sample. The age of one person per row in a cinema.

3  Determine whether the given value is a statistic or a parameter.

In a study of all 3336 professors at a college, it is found that 55% own a vehicle.

3  Determine whether the underlined value is a parameter or a statistic.

In a national survey of high school students (grades 9-12), 25% or respondents reported that someone had offered, sold, or given them an illegal drug on school property.

  1. Determine whether the underlined value is a parameter or a statistic.
    The average age of men who have walked on the moon was 39 years, 11 months, 15 days.

4  Determine whether the given value is a statistic or a parameter.

In a study of all 4901 professors at a college, it is found that 35% own a television.

4  Determine whether the given value is a parameter or a statistic.

In a study of all 1290 employees at a college, it is found that 40% own a computer.

  1. Determine whether the given value is a statistic or a parameter.
    A sample of professors is selected and it is found that 65% own a television.
    5  Determine whether the variable is qualitative or quantitative.

Favorite film Is the variable qualitative or quantitative?

5  Determine whether the given value is a statistic or a parameter.

A sample of employees is selected and it is found that 45% own a vehicle.

  1. Determine whether the given value is a statistic or a parameter.
    A sample of seniors is selected and it is found that 65% own a computer.

6  Determine whether the variable is qualitative or quantitative.

Hair color Is the variable qualitative or quantitative?

6  Determine whether the variable is qualitative or quantitative.

Favorite sport Is the variable qualitative or quantitative?

  1. Determine whether the variable is qualitative or quantitative
    Favorite Film

7  The regions of a country with the six highest per capital incomes last year are shown below.

  1. Southeast Western  3 Eastern  4 Northeast  5 Southeast   6 Northern

Determine whether the data are qualitative or quantitative and identify the data set’s level of measurement.  What is the data set’s level of measurement?

  1.  Ratio B.  Ordinal C.  Interval  D. Nominal

7  Determine whether the variable is qualitative or quantitative.

Car license  Is the variable Quantitative?

7.Determine whether the variable is qualitative or quantitative
Gallons of water in a swimming pool

8  Which method of data collection should be used to collect data for the following study.  The average age of the 105 residents of a retirement community.

8  The region representing the top salesperson is a corporation for the past six years is shown below.

Northern          Northern          Eastern                        Southeast        Eastern                        Northern

Determine whether the data are qualitative or quantitative and identify the data set’s level of measurement.  Are the data qualitative or quantitative?  What is the data set’s level of measurement?

  1. The region of a country with the longest life expectancy for the past six years is shown below.

Western, Southeast, Southwest, Northeast, Northeast, Southeast,

9  Decide which method of data collection you would use to collect data for the study.

A study of the effect on the taste of a popular soda made with a caffeine substitute.

9  Which method of data collection should be used to collect data for the following study.

The average weight of 188 students in a high school.

  1. Which method of data collection should be used to collect data for the following study.
    The average age of 124 residents of a retirement community

10  Microsoft wants to administer a satisfaction survey to its customers. Using their customer database, the company randomly selects 60 customers and asks them about their level of satisfaction with the company.  What type of sampling is used?

10 Decide which method of data collection you would use to collect data for the study.

A study of the effect on the human digestive system of a snack food made with a sugar substitute.

  1. Decide which method of data collection you would use to collect data for the study.
    A study of the effect on human digestive system of a snack food made with a fat substitute.
    11  A newspaper asks its readers to call in their opinion regarding the number of books they have read this month. What type sampling is used?

11  General Motors wants to administer a satisfaction survey to its current customers.  Using their customer database, the company randomly selects 80 customers and asks them about their level of satisfaction with the company.  What type of sampling is used?

12  Determine whether you would take a census or a sampling to collect data for the study described below.

The most popular chain restaurant among the 60,000 employees of a company.  Would you take a census or use a sampling?

  1. Sony wants to administer a satisfaction survey to its current customers. Using their customer database, the company randomly selects 50 customers and asks them about what their level of satisfaction with the company.
    12  A magazine asks its readers to call in their opinion regarding the quality of the articles. What type of sampling is used?
  2. A television station asks its viewers to call in their opinion regarding the desirability of programs in high definition TV.

13  Math the plot with a possible description of the sample.

Choose the correct answer below.

  1.  Top speeds (in miles per hour) of a sample of sports cars
  2.  Time (in minutes) it takes a sample of employees to drive to work
  3.  Grade point averages of a sample of students with finance majors
  4.  Ages (in years) of a sample of residents of a retirement home

13  Determine whether you would take a census or use a sampling to collect data for the study described below.

The most popular house color among the 40,000 employees of a company.  Would you take a census or use a sampling?

  1. Determine whether you would take a census or use a sampling to collect data for the study described below. The most popular chain restaurant among the 35 employees of a company.

14  Use a stem-and-leaf plot to display the data. The data represent the heights of eruptions by geyser.  What can you conclude about the data?

108                  90                    110                  150

140                  120                  100                  130

110                  100                  118                  106

98                    102                  105                  120

111                  130                  96                    124

Choose the correct stem-and-leaf plot. (Key: 15 ǀ 5 = 155)

What can you conclude about the data?

14  Match the plot with a possible description of the sample.

Choose the correct answer below.

  1.  Fastest serve (in miles per hour) of a sample of top tennis players
  2.  Grade point averages of a sample of students with finance major
  3.  Time (in minutes) it takes a sample of employees to drive to work
  4.  Ages (in years) of a sample of residents of a retirement home

14.Match the plot with a possible description of the sample.

15  Determine whether the approximate shape of the distribution in the histogram is symmetric, uniform, skewed left, skewed right, or none of these.

Choose the best answer below.

  1.  Skewed right
  2.  Skewed left
  3.  Symmetric
  4.  Uniform
  5.  None of these

15  Use a stem-and-leaf plot to display the data.  The data represent the heights of eruptions by a geyser.  What can you conclude about the data?

106                  90                    110                  150

140                  120                  100                  130

110                  101                  115                  100

99                    107                  103                  120

115                  130                  95                    121

What can you conclude about the data?

16  The maximum number of seats in a sample of 13 sport utility vehicles are listed below. Find the mean, median, and mode of the data.

5 7 8 8 5 6 4 4 4 4 4 4 5

Find the mean.  Select the correct choice below and, if necessary, fill in the answer box to complete your choice.

  1.  The mean is

(Type the integer or decimal rounded to the nearest tenth as needed)

  1.  The data does not have a mean.

Find the median.  Select the correct choice below and, if necessary, fill in the answer box to complete your choice.

  1.  The median is

(Type the integer or decimal rounded to the nearest tenth as needed)

  1.  The data does not have a median.

Find the mode.  Select the correct choice below and, if necessary, fill in the answer box to complete your choice.

  1.  The median is

(Type the integer or decimal rounded to the nearest tenth as needed)

  1.  The data does not have a mode.

16  Determine whether the approximate shape of the distribution in the histogram is symmetric, uniform, skewed left, skewed right, or none of those.

Choose the best answer below.

  1.  Skewed right
  2.  Skewed left
  3.  Symmetric
  4.  Uniform
  5.  None of these

Determine whether the approximate shape of the distribution in the histogram is symmetric, uniform, skewed left, skewed right, or none of these.

17  Find the range, mean, variance, and standard deviation of the sample data set.

14 12 13 8 20 7 18 16 15

The range is

17 The maximum number of seats in a sample of 13 sport utility vehicles are listed below.  Find the mean, median, and mode of the data.

8 10 11 11 8 7 7 7 9 7 7 7 8

Find the mean.  Select the correct choice below and, if necessary, fill in the answer box to complete your choice.

  1.  The mean is

(Type the integer or decimal rounded to the nearest tenth as needed)

  1.  The data does not have a mean.

Find the median.  Select the correct choice below and, if necessary, fill in the answer box to complete your choice.

  1.  The median is

(Type the integer or decimal rounded to the nearest tenth as needed)

  1.  The data does not have a median

Find the mode.  Select the correct choice below and, if necessary, fill in the answer box to complete your choice.

  1.  The mode is

(Type the integer or decimal rounded to the nearest tenth as needed)

  1.  The data does not have a mode
  2. The maximum # of seats in a sample of 13 sport utility vehicles are listed below. Find the mean, median, and mode of the data. 8 8 11 11 8 7 7 7 9 7 7 7 10

Find the mean. Select the correct choice below and, if necessary, fill in the answer box to complete your choice.

18  The ages of 10 brides at their first marriage are given below.

35.9  32.6  28.7  37.7  44.7  31.3  29.5  23.2  22.4  33.6

(a) Find the range of the data set.

Range = (round to the nearest tenth as needed)

(b) Change 44.7 to 61.3 and find the range of the new data set.

Range = 38.9 (round to the nearest tenth as needed)

(c) Compare your answer to part (a) with your answer to part (b)

  1.  Changing the maximum value of the data set does not affect the range
  2.  Changing the minimum value of the data set does not affect the range
  3.  Changing the minimum value of the data set greatly affects the range
  4.  Changing the maximum value of the data set greatly affects the range

18  Find the range, mean, variance, and standard deviation of the sample data set.

10 14 13 5 19 11 18 12 9

The range is

  1. Find the range, mean, variance, and standard deviation of the sample data set.
    8 15 14 17 9 7 13 11 20

19  Heights of men on a baseball team have a bell-shaped distribution with a mean of 185 cm and a standard deviation of 6 cm. Using the empirical rule, what is the approximate percentage of the men between the following values?

  1.  173 cm and 197 cm
  2.  167 cm and 203 cm

A % of the men are between 173 cm and 197 cm

B % of the men are between 167 cm and 203 cm (Do not round)

19.The ages of 10 brides at their first marriage are given below.
24.4 31.8 35.8 32.5 44.2 24.5 26.2 24.6 22.5 27.2

20  The mean value of land and buildings per acre from a sample of farms is $1400, with a standard deviation of $100. The data set has a bell-shaped distribution.  Assume the number of farms in the sample is 70.

  1.  Use the empirical rule to estimate the number of farms whose land and building values per acre are between $1300 and $1500.

farms (Round to the nearest whole number as needed)

  1.  If 28 additional farms were sampled, about how many of these additional farms would you expect to have land and building value between $1300 per acre and $1500 per acre?
  2. Heights of men on a baseball team have a bell-shaped distribution with a mean of 182 cm and a standard deviation of 6 cm. Using the empirical rule, what is the approximate percentage of the men between the following values?
    A. 170 cm and 194 cm
    B. 176 cm and 188 cm

21   Use the box-and-whisker plot to identify

(a)  The minimum entry

(b)  The maximum entry

(c)  The first quartile

(d)  The second quartile

(e)  The third quartile

(f)  The interquartile range

(a)  Min =

(b)  Max =

(c)  Q 1 =

(d)  Q 2 =

(e)  Q 3 =

(f)  IQR =

19  The ages of 10 brides at their first marriage are given below

22.6  23.7  35.6  39.2  44.7  29.6  30.8  31.7  24.5  28.2

(a) Find the range of the data set

Range =

(b) Change 44.7 to 68.3 and find the range of the new data set

Range =

(c)  Compare your answer to part (a) with your answer to part (b).

  1.  Changing the maximum value of the data set greatly affects the range
  2.  Changing the minimum value of the data set greatly affects the range
  3.  Changing the maximum value of the data set does not affect the range
  4.  Changing the minimum value of the data set does not affect the range

20  Heights of men on a baseball team have a bell-shaped distribution with a mean of 172 cm and a standard deviation of 7 cm.  Using the empirical rule, what is the approximate percentage of the men between the following values?

  1.  151 cm and 193 cm
  2.  165 cm and 179 cm
  3.  % of the men are between 151 cm and 193 cm (Do not round)
  4.  % of the men are between 165 cm and 179 cm (Do not round)

20  The midpoints A, B, and C are marked on the histogram. Match them to the indicated scores.  Which scores, if any, would be considered unusual?

The point A corresponds with z = The point B corresponds with z =

The point C corresponds with z =

Which scores, if any, would be considered unusual?

  1.  41
  2.  -2.17
  3.  0
  4.  None

MATH 221 Homework Week 2

 

    1. Two variables have a positive linear correlation. Does the dependent variable increase or decrease as the independent variable increases?
    2. Two variables have a positive linear correlation. Does the dependent variable increase or decrease as the independent variable increases?
    3. Discuss the difference between r and p

Choose the correct answers below.

R represents the sample correlation coefficient.

P represents the population correlation coefficient

    1. Discuss the difference between r and p.
    2. The scatter plot of a paired data set is shown. Determine whether there is a perfect positive linear correlation, a strong positive linear correlation, a perfect negative linear correlation, a strong negative linear correlation, or no linear correlation between the variables.

Choose the correct answer below.

  1.  no linear correlation
  2.  strong positive linear correlation
  3.  strong negative linear correlation
  4.  perfect negative linear correlation
  5.  perfect positive linear correlation

3   The scatter plot of a paired data set is shown.  Determine whether there is a perfect positive linear correlation, a strong positive linear correlation, a perfect negative linear correlation, a strong negative linear correlation, or no linear correlation between the variables.

    1. The scatter plot of a paired data set is shown. Determine whether there is a perfect positive linear correlation, a strong positive linear correlation, a perfect negative linear correlation, a strong negative linear correlation, or no linear correlation between the variables.

4  Identify the explanatory variable and the response variable.

A golfer wants to determine if the amount of practice every year can be used to predict the amount of improvement in his game.

4  Identify the explanatory variable and the response variable.

A teacher wants to determine if the amount of textbook used by her students can be used to predict the students’ test scores

4.Identify the explanatory variable and the response variable.
a golfer wants to determine if the amount of practice every year can be used to predict the amount of improvement in his game.

5   Two variables have a positive linear correlation. Is the slope of the regression line for the variables positive or negative?

5.Two variables have a positive linear correlation. Is the slope of the regression line for the variables positive or negative?

6  Given a set of data and a corresponding regression line, describe all values of x that provide meaningful predictions for y.

  1. Prediction values are meaningful for all x-values that are realistic in the context of the original data set.
  2. Prediction values are meaningful for all x-values that are not included in the original data set.
  3. Prediction values are meaningful for all x-values in (or close to) the range of the original data.

5.Two variables have a positive linear correlation. Is the slope of the regression line for the variables positive or negative?

7  Match this description with a description below.

The y-value of a data point corresponding to

Choose the correct answer below.

8  Match this description with a description below.

The y-value for a point on the regression line corresponding to

Choose the correct answer below.

    1. Match this description with a description below.
      the y-value of a data point corresponding to x

9  Match the description below with its symbol(s).

The mean of the y-values

Select the correct choice below.

10  Match the regression equation  with the appropriate graph.

Choose the correct answer below.

10  Match the regression equation with the appropriate graph.

11

    1. Match the regression equation y = 1.662x + 83.34 with the appropriate graph.

12  Use the value of the linear correlation coefficient to calculate the coefficient of determination. What does this tell you about the explained variation of the data about the regression line? About the unexplained variation?

R= -0.312

Calculate the coefficient of determination

What does this tell you about the explained variation of the data about the regression line?

% of the variation can be explained by the regression line.  About the unexplained variation?

% of the variation is unexplained and is due to other factors or to sampling error.  (Round to three decimal places as needed)

12  Use the value of the linear correlation coefficient to calculate the coefficient of determination.  What does this tell you about the explained variation of the data about the regression line? About the unexplained variation?

R= -0.324

Calculate the coefficient of determination

What does this tell you about the explained variation of the data about the regression line?

% of the variation can be explained by the regression line.  About the unexplained variation?

% of the variation is unexplained and is due to other factors or to sampling error.

12  Use the value of the linear correlation coefficient to calculate the coefficient of determination. What does this tell you about the explained variation of the data about the regression line? About the unexplained variation?

R = 0.481

Calculate the coefficient of determination

What does this tell you about the explained variation of the data about the regression line?

% of the variation can be explained by the regression line.

% of the variation is unexplained and is due to other factors or to sampling error.

12  Use the value of the linear correlation coefficient to calculate the coefficient of determination.  What does this tell you about the explained variation of the data about the regression line? About the unexplained variation?

R = 0.224

Calculate the coefficient of determination

What does this tell you about the explained variation of the data about the regression line?

% of the variation can be explained by the regression line.

% of the variation is unexplained and is due to other factors or to sampling error.

12  The equation used to predict college GPA (range 0-4.0) is

is high school GPA (range 0-4.0) and x2 is college board score (range 200-800). Use the multiple regression equation to predict college GPA for a high school GPA of 3.5 and college board score of 400.

The predicted college GOA for a high school GPA of 3.5 and college board of 400 is.  (Round to the nearest tenth as needed).

    1. Use the value of the linear correlation coefficient to calculate the coefficient of determination. What does this tell you about the explained variation of the data about the regression line? About the unexplained variation? R = 0.862

13  Use the value of the linear correlation coefficient to calculate the coefficient of determination.  What does this tell you about the explained variation of the data about the regression line? About the unexplained variation?

R = 0.909

Calculate the coefficient of determination

What does this tell you about the explained variation of the data about the regression line?

% of the variation can be explained by the regression line.

% of the variation is unexplained and is due to other factors or to sampling error.  (Round to three decimal places as needed)

13  The equation used to predict the total body weight (in pounds) of a female athlete at a certain school is the female athlete’s height (in inches) and x2 is the female athlete’s percent body fat. Use the multiple regression equation to predict the total body weight for a female athlete who is 64 inches tall and has 17% body fat.

The predicted total body weight for a female athlete who is 64 inches tall and has 17% body fat is pounds.

13.Use the value of the linear correlation coefficient to calculate the coefficient of determination. What does this tell you about the explained variation of the about the regression line? About the unexplained variation? R = 0.592

14  The equation used to predict college GPA (range 0-4.0) is

high school GPA (range 0-4.0) and X2 is college board score (range 200-800). Use the multiple regression equation to predict college GPA for a high school GPA of 3.2 and a college board score of 500.

The predicted college GPA for a high school GPA of 3.2 and college board score of 500 is.

14.The equation used to predict college GPA (range 0-4.0) is y = 0.21 + 0.52x + 0.002x, where x is high school GPA (range 0-4.0) and x is college board score (range 200-800). Use the multiple regression equation to predict college gpa for a high school gpa of 3.2 and a college board score of 600.

15  The equation used to predict the total body weight (in pounds) of a female athlete at a certain school is  the female athlete’s height (in inches) and X2 is the female athlete’s percent body fat. Use the multiple regression equation to predict the total body weight for a female athlete who is 67 inches tall and has 24% body fat.

The predicted total body weight for a female athlete who is 67 inches tall and has 24% body fat is pounds.

15.The equation used to predict the total body weight of a female athlete at a certain school is y = -112 + 3.29x + 1.64x, where x is the female athlete’s height and x is the females athlete’s % body fat. Use the multiple regression equation to predict the total body weight for a female athlete who is 63 inches tall and has 19% body fat.

MATH 221 Homework Week 3

 

1  The access code for a car’s security system consist of four digits. The first digit cannot be zero and the last digit must be odd.  How many different codes are available?

 1  The access code for a car’s security system consist of four digits. The first digit cannot be 6 and the last digit must be even or zero.  How many different codes are available?

1.The access code for a car’s security system consists of four digits. The first digit cannot be 1 and must e even or 0. How many different codes are there?

2  A probability experiment consists of rolling a 6-sided die. Find the probability of the event below:

Rolling a number is less than 5

2  A probability experiment consists of rolling a 6-sided die. Find the probability of the event below:

Rolling a number is less than 4

  1. A probability experiment consists of rolling a 6-sided die. Find the probability of rolling a number less than 4.

3  Use the frequency distribution, which shows the responses of a survey of college students when asked, “How often do you wear a seat belt when riding in a car driven by someone else?” Find the following probabilities of responses of college students from the survey chosen at random.

Use the frequency distribution, which shows the responses of a survey of college students when asked, “how often do you wear a seat belt when riding in a car driven by someone else? Find the following probability of responses of college students from the survey chosen at random.

4  Determine whether the events E and F are independent or dependent. Justify your answer.

  1.  E: A person having an at-fault accident.

F: The same person being prone to road rage.

  1.  E and F are dependent because having an at-fault accident has no effect on the probability of a person being prone to road rage.
  2.  E and F are dependent because being prone to road rage can affect the probability of a person having an at-fault accident.
  3.  E and F are independent because having an at-fault accident has no effect on the probability of a person being prone to road rage.
  4.  E and F are independent because being prone to road rage has no effect on the probability of a person having an at-fault accident.
  5.  E: A randomly selected person accidentally killing a spider.

F: Another randomly selected person accidentally swallowing a spider.

  1.  E can affect the probability of F, even if the two people are randomly selected, so the events are dependent.
  2.  E can affect the probability of F because the people were randomly selected, so the events are dependent.
  3.  E cannot affect F and vice versa because the people were randomly selected, so the events are independent.
  4.  E cannot affect F because “person 1 accidentally killing a spider” could never occur, so the events are neither dependent nor independent.
  5.  E: The consumer demand for synthetic diamonds.

F: The amount of research funding for diamond synthesis.

  1.  The consumer demand for synthetic diamonds could not affect the amount of research funding for diamond synthesis, so E and F are independent.
  2.  The consumer demand for synthetic diamonds could affect the amount of research funding for diamond synthesis, so E and F are dependent.
  3.  The amount of research funding for diamond synthesis could affect the consumer demand for synthetic diamonds, so E and F are dependent.
  4.  E: The unusually foggy weather in London on May 8

F: The number of car accidents in London on May 8

  1.  The unusually foggy weather in London on May 8 could not affect the number of car accidents in London on May 8, so E and F are independent.
  2.  The number of car accidents in London on May 8 could affect the unusually foggy weather in London on May 8, so E and F are dependent
  3.  The unusually foggy weather in London on May 8 could affect the number of car accidents in London on May 8, so E and F are dependent
  4. Determine whether the events E and F are independent or dependent. Justify your answer.
    (a)
    E: A person having an at-fault accident
    F: The same person being prone to road rage

(b)
E: A randomly selected person accidentally killing a spider.
F: Another random person swallowing a spider

(c)
E: The consumer demand for synthetic diamonds
F: The amount of research funding for diamond synthesis

5  The table below shows the results of a survey in which 147 families were asked if they own a computer and if they will be taking a summer vacation this year.

Summer Vacation This Year
                                               Yes                 No                  Total
Own a             Yes                  46                    11                    57
Computer        No                   56                    34                    90
Total                                        102                  45                    147
  1.  Find the probability that a randomly selected family is not taking a summer vacation this year.

The probability is (Round to the nearest thousandth as needed.)

  1.  Find the probability that a randomly selected family owns a computer.

The probability is (Round to the nearest thousandth as needed.)

  1.  Find the probability that a randomly selected family is taking a summer vacation this year given that they own a computer.

The probability is (Round to the nearest thousandth as needed.)

  1.  Find the probability that a randomly selected family is taking a summer vacation this year and owns a computer.

The probability is (Round to the nearest thousandth as needed.)

  1.  Are the events of owning a computer and taking a summer vacation this year independent or dependent events?

6  The table below shows the results of a survey in which 147 families were asked if they own a computer and if they will be taking a summer vacation this year.

Summer Vacation This Year
Yes                  No                   Total
Own a             Yes                  47                    11                    58
Computer        No                   56                    33                    89
Total                                        103                  44                    147
  1.  Find the probability that a randomly selected family is not taking a summer vacation this year.

The probability is

  1.  Find the probability that a randomly selected family owns a computer.

The probability is

  1.  Find the probability that a randomly selected family is taking a summer vacation this year given that they own a computer.

The probability is

  1.  Find the probability that a randomly selected family is taking a summer vacation this year and owns a computer.

The probability is (Round to the nearest thousandth as needed.)

  1.  Are the events of owning a computer and taking a summer vacation this year independent or dependent events?
  2. The table below shows the results of a survey in which 146 families were asked if they own a computer and if they will be taking a summer vacation this year.(A) Find the probability that a random family is not taking a summer vacation this year.
    (B) Find the probability that a random family owns a computer
    (C) Find the probability that a random family is taking a vacation given that they own a computer
    (D) Find the probability that a random family is taking a vacation and own a computer.
    (E) Are the events of owning a computer and taking a vacation independent or dependent?6  The table below shows the results of a survey in which 147 families were asked if they own a computer and if they will be taking a summer vacation this year.
Summer Vacation This Year
Yes                  No                   Total
Own a             Yes                  47                    11                    58
Computer        No                   56                    33                    89
Total                                        103                  44                    147
    1. a.  Find the probability that a randomly selected family is not taking a summer vacation this year.

The probability is

    1.  Find the probability that a randomly selected family owns a computer.

The probability is

    1.  Find the probability that a randomly selected family is taking a summer vacation this year given that they own a computer.

The probability is

    1.  Find the probability that a randomly selected family is taking a summer vacation this year and owns a computer.

The probability is

    1.  Are the events of owning a computer and taking a summer vacation this year independent or dependent events?

7  A distribution center receives shipments of a product from three different factories in the quantities of 50, 30, and 20. Three times a product is selected at random, each time without replacement.  Find the probability that (a) all three products came from the second factory and (b) none of the three products came from the second factory.

7  A distribution center receives shipments of a product from three different factories in the quantities of 50, 30, and 20. Three times a product is selected at random, each time without replacement.  Find the probability that (a) all three products came from the second factory and (b) none of the three products came from the second factory.

  1.  The probability that all three products came from the second factory is
  2.  The probability that none of the three products came from the second factory is
  1.  The probability that all three products came from the second factory is

(Round to the nearest thousandth as needed.)

  1.  The probability that none of the three products came from the second factory is

(Round to the nearest thousandth as needed.)

8  A standard deck of cards contains 52 cards. One card is selected from the deck.

  1.  Compute the probability of randomly selecting a spade or heart
  2.  Compute the probability of randomly selecting a spade or heart or diamond
  3.  Compute the probability of randomly selecting a seven or club
  4.  P(spade of heart)= (Type an integer or a simplified fraction.)
  5.  P(spade or heart or diamond)= (Type an integer or a simplified fraction.)
  6.  P(seven or club)= (Type an integer or a simplified fraction.)

8  A standard deck of cards contains 52 cards. One card is selected from the deck.

  1.  Compute the probability of randomly selecting a three or eight
  2.  Compute the probability of randomly selecting a three or eight of king
  3.  Compute the probability of randomly selecting a queen or diamond
  4.  P(spade of heart)= (Type an integer or a simplified fraction.)
  5.  P(spade or heart or diamond)= (Type an integer or a simplified fraction.)
  6.  P(seven or club)= (Type an integer or a simplified fraction.)

9  The percent distribution of live multiple-delivery births (three or more babies) in a particular year for a women 15 to 54 years old is shown in the pie chart. Find each probability.

10  The table below shows the number of male and female students enrolled in nursing at a university for a certain semester. A student is selected at random.  Complete parts (a) through (d).

Nursing majors                        Non-nursing majors                 Total

Males                                       92                                1019                            1111

Females                                   700                              1725                            2425

Total                                        792                              2744                            3536

  1.  Find the probability that the student is male or a nursing major

P (being male or being nursing major) =

  1.  Find the probability that the student is female or not a nursing major.

P( being female or not a nursing major) =

  1.  Find the probability that the student is not female or a nursing major

P(not being female or being a nursing major) =

Are the events “being male” and “being a nursing major” mutually exclusive?

  1.  No, because there are 92 males majoring in nursing
  2.  No, because one can’t be male and a nursing major at the same time
  3.  Yes, because one can’t be male and a nursing major at the same time
  4.  Yes, because there are 97 males majoring in nursing

10  The table below shows the number of male and female students enrolled in nursing at a university for a certain semester. A student is selected at random.  Complete parts (a) through (d).

Nursing majors                        Non-nursing majors                 Total

Males                                       97                                1017                            1114

Females                                   700                              1727                            2427

Total                                        797                              2744                            3541

  1.  Find the probability that the student is male or a nursing major

P (being male or being nursing major) =

  1.  Find the probability that the student is female or not a nursing major.

P( being female or not a nursing major) =

  1.  Find the probability that the student is not female or a nursing major

P(not being female or being a nursing major)

Are the events “being male” and “being a nursing major” mutually exclusive?

  1.  No, because there are 97 males majoring in nursing
  2.  No, because one can’t be male and a nursing major at the same time
  3.  Yes, because one can’t be male and a nursing major at the same time
  4.  Yes, because there are 97 males majoring in nursing
  5. Outside a home, there is a 4-key keypad with the letters a,b,c, and d that can open the garage if the correct 4 letter code is entered. Each key may only be used once, how many possible codes are there?

11   Outside a home, there is an 10-key keypad with letters A, B, C, D, E, F, G and H that can be used to open the garage if the correct ten-letter code is entered. Each key may be used only once.  How many codes are possible?

The number of possible codes is

  1. Outside a home, there is a 4-key keypad with the letters a,b,c, and d that can open the garage if the correct 4 letter code is entered. Each key may only be used once, how many possible codes are there?

12  How many different 10-letter words (real or imaginary) can be formed from the following letters?

Z, V, U, G, X, V, H, G, D

ten-letter words (real or imaginary) can be formed with the given letters.

12  How many different 10-letter words (real or imaginary) can be formed from the following letters?

K, I, B, W, E, Z, I, O, R, Z

ten-letter words (real or imaginary) can be formed with the given letters.

  1. A horse race has 13 entries and one person owns 2 of those horses. Assuming that there are no ties, what is the probability that those 2 horses finish first and second (regardless of order)

13  A horse race has 13 entries and one person owns 2 of those horses. Assuming that there are no ties, what is the probability that those four horses finish first, second, third, and fourth (regardless of order)?

The probability that those two horses finish first, second, third, and fourth is

13  A horse race has 13 entries and one person owns 4 of those horses. Assuming that there are no ties, what is the probability that those four horses finish first, second, third, and fourth (regardless of order)?

The probability that those four horses finish first, second, third, and fourth is

  1. Determine the required value of the missing probability to make the distribution a discrete probability distribution.

14  Determine the required value of the missing probability to make the distribution a discrete probability distribution.

X         P(x)

3          0.19

4          ?

5          0.34

6          0.28

P() = (Type an integer or a decimal)

14  Determine the required value of the missing probability to make the distribution a discrete probability distribution.

X         P(x)

3          0.16

4          ?

5          0.38

6          0.17

P() = (Type an integer or a decimal)

  1. A frequency distribution is shown below. Complete a – e.

X         P(x)
0          0.635
1          0.228
2          0.089
3          0.024
4          0.014
5          0.009

15.

Students in a class take a quiz with 8 questions. The number x of questions answered correctly can be approximated by the following probability distribution. Complete a – e.

15  A frequency distribution is shown below. Complete parts (a) through (e).

Dogs                0          1          2          3          4          5

Household       1324    436      162      46        27        15

  1.  Use the frequency distribution to construct a probability distribution.

X         P(x)

0

1

2

3

4

5

  1.  Find the mean of the probability distribution

µ = (Round to the nearest thousandth as needed.)

  1.  Find the variance of the probability distribution

= (Round to the nearest tenth as needed)

  1.  Find the standard deviation of the probability distribution
  • = (Round to the nearest tenth as needed)
  • e.  Interpret the results in the context of the real-life situation.
  • A.  A household on average has 0.5 dog with a standard deviation of 0.9 dog.
  1. B.  A household on average has 0.5 dog with a standard deviation of 15 dog.
  2. C.  A household on average has 0.9 dog with a standard deviation of 0.5 dog.
  3. D.  A household on average has 0.9 dog with a standard deviation of 0.9 dog.

17  Students in a class take a quiz with eight questions. The number x of questions answered correctly can be approximated by the following probability distribution.  Complete parts (a) through (e).

X         0          1          2          3          4          5          6          7          8

P(x)     0.02     0.02     0.06     0.06     0.14     0.24     0.27     0.12     0.07

(a)  Use the probability distribution to find the mean of the probability distribution

µ =

(b)  Use the probability distribution to find the variance of the probability distribution

=

(c)  Use the probability distribution to find the standard deviation of the probability distribution

(d)  Use the probability distribution to find the expected value of the probability distribution

Interpret the results

  1.  The expected number of questions answered correctly is 5.1 with a standard deviation of 1.8 questions.
  2.  The expected number of questions answered correctly is 1.8 with a standard deviation of 5.1 questions.
  3.  The expected number of questions answered correctly is 5.1 with a standard deviation of 0.02 questions.
  4.  The expected number of questions answered correctly is 3.1 with a standard deviation of 1.8 questions.

MATH 221 Homework Week 4

 

    1. The histograms each represents part of a binomial distribution. Each distribution has the same probability of success, p, but different numbers of trials, n.  Identify the unusual values of x in each histogram
  1.  Choose the correct answer below. Use histogram
  2.  X = 0, x = 1, x = 2, x = 3, and x = 4
  3.  X = 3 and x = 4
  4.  X = 0 and x = 1
  5.  There are no unusual values of x in the histogram
  6.  X = 7
  7.  X = 0, x = 1, x = 2, x = 3, and x = 4
  8.  X = 0 and x = 1
  9.  X = 0 and x = 1
  10.  There are no unusual values of x in the histogram

2  The histograms each represents part of a binomial distribution. Each distribution has the same probability of success, p, but different numbers of trials, n.  Identify the unusual values of x in each histogram.

(a)  N = 4

(b)  N = 8

  1.  Choose the correct answer below. Use histogram (a).
  2.  X = 4
  3.  X = 0, x =7, and x = 8
  4.  X = 2
  5.  There are no unusual values of x in the histogram
  6.  Choose the correct answer below. Use the histogram (b)
  7.  X =0, x =7, and x = 8
  8.  X = 4
  9.  X = 4
  10.  There are no unusual values of x in the histogram

2  The histograms each represents part of a binomial distribution. Each distribution has the same probability of success, p, but different numbers of trials, n.  Identify the unusual values of x in each histogram.

(a)  N = 4

(b)  N = 8

  1. Choose the correct answer below. Use histogram (a)
  2. X = 4
  3. X = 0, x =7, and x = 8
  4. X = 2
  5. There are no unusual values of x in the histogram

b.Choose the correct answer below. Use the histogram (b)

  1. X =0, x =7, and x = 8
  2. X = 4
  3. X = 4
  4. There are no unusual values of x in the histogram
  5. About 30% of babies born with a certain ailment recover fully. A hospital is caring for 7 babies born with this ailment. The random variable represents the # of babies that recover fully. Decide whether the experiment is a binomial experiment. If it is, identify a success, specific the values of n, p , and q, and list the values of random variable x.

3  About 80% of babies born with a certain ailment recover fully. A hospital is caring for five babies born with this ailment.  The random variable represents the number of babies that recover fully.  Decide whether the experiment is a binomial experiment.  If it is, identify a success, specify the values of n, p, and q, and list the possible values of the random variable x.

Is the experiment a binomial experiment?

Yes

No

What is a success in this experiment?

Baby doesn’t recover

Baby recovers

This is not a binomial experiment

Specify the value of n.  Select the correct choice below and fill in any answer boxes in your choice.

N =

This is not a binomial experiment

Specify the value of p.  Select the correct choice below and fill in any answer boxes in your choice.

P =

This is not a binomial experiment

Specify the value of q.  Select the correct choice below and fill in any answer boxes in your choice.

Q =

This is not a binomial experiment

List the possible values of the random variable x.

X = 1, 2, 3,…, 5

X = 0, 1, 2, ….4

X = 0, 1, 2, …5

This is not a binomial experiment

3  About 70% of babies born with a certain ailment recover fully. A hospital is caring for six babies born with this ailment.  The random variable represents the number of babies that recover fully.  Decide whether the experiment is a binomial experiment.  If it is, identify a success, specify the values of n, p, and q, and list the possible values of the random variable x.

Is the experiment a binomial experiment?

  1.  No
  2.  Yes

What is a success in this experiment?

  1.  Baby recovers
  2.  Baby doesn’t recover
  3.  This is not a binomial experiment

Specify the value of n.  Select the correct choice below and fill in any answer boxes in your choice.

  1.  N =
  2.  This is not a binomial experiment

Specify the value of p. Select the correct choice below and fill in any answer boxes in your choice.

p=

This is not a binomial experiment

Specify the value of q. Select the correct choice below and fill in any answer boxes in your choice.

q =

This is not a binomial experiment

List the possible values of the random variable x.

  1.  X = 0, 1, 2,…,5
  2.  X = 0, 1, 2,…6
  3.  X = 1, 2, 3,…6
  4.  This is not a binomial experiment
    1. Find the mean, variance, and standard deviation of the binomial distribution with the given values of n and p.
      n = 125, p = 0.81

4  Find the mean, variance, and standard deviation of the binomial distribution with the given values of n and p.

N = 129, p = 0.43

The mean, µ is (Round to the nearest tenth as needed.)

The variance,  is (Round to the nearest tenth as needed.)

The standard deviation,  is (Round to the nearest tenth as needed.)

    1. 56% of men consider themselves professional baseball fans. You randomly select 10 men and ask each if he considers himself a professional baseball fan. Find the probability that the # who consider themselves baseball fans is (a) 8, (b) at least 8, (c) less than 8.

5  Find the mean, variance, and standard deviation of the binomial distribution with the given values of n and p.

N = 121, p = 0.27

The mean, µ is (Round to the nearest tenth as needed.)

The variance,  is (Round to the nearest tenth as needed.)

The standard deviation,  is (Round to the nearest tenth as needed.)

    1. 45% of households say they would feel secure if they had at least $50,000 in savings. You randomly select 8 households and ask them if they would feel secure if they had $50,000 in savings. Find the probability that the # that they say would feel secure is (a) exactly 5, (b) more than 5 or (c) at most 5.

6  48% of men consider themselves professional baseball fans. You randomly select 10 men and ask each if he considers himself a professional baseball fan.  Find the probability that the number who consider themselves baseball fans is (a) exactly eight, (b) at least eight, and (c) less than eight.  If convenient, use technology to find the probabilities.

  1.  P(8) = (Round to the nearest thousandth as needed)
  2.  P(x≥8) = (Round to the nearest thousandth as needed)
  3.  P(x<8) = (Round to the nearest thousandth as needed)
    1. 43% of adults say cashews are their favorite kind of nut. You randomly select 12 adults and ask them to name his or her favorite nut. Find the probability that the # who say cashews are their favorite nut is (a) exactly 4, (b) at least 4, and (c) at most 2.

7  Seventy-five percent of households say they would feel secure if they had $50,000 in savings. You randomly select 8 households and ask them if they would feel secure if they had $50,000 in savings.  Find the probability that the number that say they would feel secure is (a) exactly five, (b) more than five, and (c) at most five.

  1.  Find the probability that the number that say they would feel secure is exactly five.

P(5) = (Round to three decimal places as needed)

  1.  Find the probability that the number sat they would feel secure is more than five.

P(x>5) = (Round to three decimal places as needed)

  1.  Find the probability that the number that say they would feel secure is at most five.

P(x≤5) = (Round to three decimal places as needed)

    1. 24% of college students say they use credit cards. You randomly select 10 students and ask them why they use credit cards because of the rewards program. (a) Exactly 2, (b) more than 2, and (c) between 2 and 5 inclusive.

8  Sixty-five percent of households say they would feel secure if they had $50,000 in savings. You randomly select 8 households and ask them if they would feel secure if they had $50,000 in savings.  Find the probability that the number that say they would feel secure is (a) exactly five, (b) more than five, and (c) at most five.

  1.  Find the probability that the number that say they would feel secure is exactly five.

P(5) = (Round to three decimal places as needed)

  1.  Find the probability that the number sat they would feel secure is more than five.

P(x>5) = (Round to three decimal places as needed)

  1.  Find the probability that the number that say they would feel secure is at most five.

P(x≤5) = (Round to three decimal places as needed)

    1. 34% of women consider themselves of baseball. You randomly select 6 women and ask each if she considers herself a fan of baseball.

X         p(x)
0          0.083
1          0.255
2          0.329
3          0.226
4          0.087
5          0.018
6          0.002

9  34% of adults say cashews are their favorite kind of nut. You randomly select 12 adults and ask each to name his or her favorite nut.  Find the probability that the number who say cashews are their favorite nut is (a) exactly three, (b) at least four, and (c) at most two. If convenient, use technology to find the probabilities.

  1.  P(3) = (Round to the nearest thousandth as needed.)
  2.  P(x > 4) = (Round to the nearest thousandth as needed.)
  3.  P(x < 2) = (Round to the nearest thousandth as needed)
    1. Given that x has a Poisson distribution with mean = 4, what is the probability that x = 2?

10   33% of adults say cashews are their favorite kind of nut. You randomly select 12 adults and ask each to name his or her favorite nut.  Find the probability that the number who say cashews are their favorite nut is (a) exactly three, (b) at least four, and (c) at most two. If convenient, use technology to find the probabilities

  1.  P(3) = (Round to the nearest thousandth as needed.)
  2.  P(x > 4) = (Round to the nearest thousandth as needed.)
  3.  P(x < 2) = (Round to the nearest thousandth as needed)
    1. Given that x has a Poisson distribution with mean = 1.9, what is the probability that x = 3?
  1.  21% of college students say they use credit cards because of the rewards program. You randomly select 10 college students and ask each to name the reason he or she uses credit cards. Find the probability that the # of college students who say they use credit cards because of the rewards program is (a) exactly 2, (b) more than 2, and (c) between 2 and 5 inclusive. If convenient, use technology to find the probabilities.
  2.  P(2) = (Round to the nearest thousandth as needed.)
  3.  P(X > 2) = (Round to the nearest thousandth as needed.)
  4.  P(X < 5) = (Round to the nearest thousandth as needed.)
    1. Decide whether binomial, geometric, or Poisson applies to this question.
      In a certain city, the mean # of days with 0.01 inch or more precipitation for May is 13.What is the probability that the city has 21 days with 0.01 inch or more next may?
  1.  38% of college students say they use credit cards because of the rewards program. You randomly select 10 college students and ask each to name the reason he or she uses credit cards. Find the probability that the # of college students who say they use credit cards because of the rewards program is (a) exactly 2, (b) more than 2, and (c) between 2 and 5 inclusive. If convenient, use technology to find the probabilities.
  2.  P(2) = (Round to the nearest thousandth as needed.)
  3.  P(X > 2) = (Round to the nearest thousandth as needed.)
  4.  P(X < 5) = (Round to the nearest thousandth as needed.)
    1. Decide whether binomial, geometric, or Poisson applies to this question.
      The mean # of oil tankers at a port city is 6 per day. The port has facilities to handle up to 9 oil tankers in a day. What is the probability that too many tankers will arrive on a given day?
  1.  36% of women consider themselves fan of professional baseball. You randomly select 6 women and ask each if they consider themselves a fan of professional baseball.
  2.  Construct a binomial distribution using n = 6 and p = 0.36

X                     P(x)

0

1

  1.  Choose the correct histogram for this distribution below.
  2.  Describe the shape of the histogram
  3.  Skewed right
  4.  Skewed left
  5.  Symmetrical
  6.  None of these
  7.  Find the mean of the binomial distribution

µ = (round to the nearest 10th as needed)

( e ) find the variance of the binomial distribution.

= (round to the nearest 10th as needed.)

( f ) Find the standard deviation of the binomial distribution.

= (round to the nearest 10th as needed)

( g ) Interpret the results in the context of the real-life situation. What values of the random variable would you consider unusual? Explain your reasoning.

On average, out of 6 women consider themselves baseball fans, with a standard deviation of  women. The values x=6 and x= would be unusual because their probabilities are less than 0.05.

    1. Find the indicated probabilities using geometric distribution or Poisson distribution. Then determine if the events are unusual. If convenient, use a Poisson probability table or technology to find the probabilities.

Assume the probability that you will make a sale on any given telephone call is 0.18. find the probability that you (a) make your first sale on the 5th call, (b) make your sale on the 1st, 2nd, or 3rd call, and (C) do not make the sale on the first 3 calls.

  1.  38% of women consider themselves fan of professional baseball. You randomly select 6 women and ask each if they consider themselves a fan of professional baseball

(a) Construct a binomial distribution using n = 6 and p = 0.38

X                     P(x

0

1

2

3

4

5

6

(b)  Choose the correct histogram for this distribution below.

(c).  Describe the shape of the histogram

  1.  Skewed right
  2.  Skewed left
  3.  Symmetrical
  4.  None of these

(d)  Find the mean of the binomial distribution

µ = (round to the nearest 10th as needed)

( e ) find the variance of the binomial distribution.

= (round to the nearest 10th as needed.)

( f ) Find the standard deviation of the binomial distribution.

=  (round to the nearest 10th as needed)

( g ) Interpret the results in the context of the real-life situation. What values of the random variable would you consider unusual? Explain your reasoning.

On average, out of 6 women consider themselves baseball fans, with a standard deviation of women. The values x= and x= would be unusual because their probabilities are less than .

    1. Find the indicated probabilities using geometric distribution or Poisson distribution. Then determine if the events are unusual. If convenient, use a Poisson probability table or technology to find the probabilities. A newspaper finds that the mean # of typographical errors per page is 7. Find the probability that (a) exactly 6 typos are found on a page, (b) at most 6 are found on a page, and (c) more than 6 are found on a page.
    2. Find the indicated probabilities using geometric distribution or Poisson distribution. Then determine if the events are unusual. If convenient, use a Poisson probability table or technology to find the probabilities. A major hurricane is a hurricane with wind speeds of 111 miles per hour or more. During the last century, the mean # of major hurricanes to strike was about 0.62. find the probability that in a given year is (a) exactly one hurricane, (b) at most one, and (c) more than one.
  1.  Given that x has a Poisson distribution with µ = 3, what is the probability that x = 5?

P(5) ≈ (round to 4 decimal places as needed.)

    1. Given that x has a Poisson distribution with µ = 4, what is the probability that x = 3?

P(3) ≈ (round to 4 decimal places as needed.)

    1. Given that x has a Poisson distribution with µ = 1.6, what is the probability that x = 5?

P(5) ≈ (round to 4 decimal places as needed.)

    1. Given that x has a Poisson distribution with µ = 0.5, what is the probability that x = 0?

P(0) ≈ (round to 4 decimal places as needed.)

    1. Decide which probability distribution – binomial, geometric, or Poisson – applies to the question. You do not need 2 answer the question.

Given: of students ages 16 to 18 with A or B averages who plan to attend college after graduation, 60% cheated to get higher grades. 10 randomly chosen students with A or B to attend college after graduation were asked if they cheated to get higher grades. Question: what is the probability that exactly two students answered no?

  1.  Poisson distribution
  2.  Binomial distribution
  3.  Geometric distribution
    1. Decide which probability distribution – binomial, geometric, or Poisson – applies to the question. You do not need 2 answer the question. Instead, justify your choice.
      Question: what is the probability that t00 many tankers will arrive on a given day?
  1. Binomial.  You are interested in counting the number of successes out of n trials.
  2. Poisson.  You are interested in counting the number of occurrences that take place within a given unit of time.
  3.  Geometric.  You are interested in counting the number of trials until the first success.
    1. Decide which probability distribution – binomial, geometric, or Poisson – applies to the question. You do not need to answer the question.

Given: Of students ages 16 to 18 with A or B averages who plan to attend college after graduation, 65% cheated to get higher grades.  Ten randomly chosen students with A or B attend college after graduation were asked if the cheated to get higher grades.  Question: What is the probability that exactly two students answered no?

What type of distribution applies to the given question?

  1.  Binomial distribution

B,  Geometric distribution

  1.  Poisson distribution
    1. Decide which probability distribution – binomial, geometric, or Poisson – applies to the question. You do not need to answer the question.  Instead, justify your choice.

Given: The mean number of oil tankers at a port city is 12 per day.  The port has facilities to handle up to 18 oil tankers in a day.

Choose the correct probability distribution below.

  1.  Poisson.  You are interested in counting the number of occurrences that take place within a given unit of time.
  2.  Binomial.  You are interested in counting the number of successes out of n trials.
  3.  Geometric.  You are interested in counting the number of trials until the first success.
    1. Find the indicated probabilities using the geometric distribution or Poisson distribution. Then determine if the events are unusual. If convenient, use a Poisson probability table or technology to find the probabilities.

Assume the probability that you will make a sale on any given telephone call is 0.14. Find the probability that you (a) make your first sale on the fifth call, (b) make your sale on the 1st, 2nd, or 3rd call, and (c) do not make a sale on the first 3 calls.
(a) P(make your first sale on the fifth call) =
(Round to three decimal places as needed.)

(b) P(make your sale on the first, second, or third call) =

(Round to three decimal places as needed.)

(c) P(do not make a sale on the first three calls) =

(Round to three decimal places as needed.)

Which of the events are unusual?  Select all that apply.

  1.  The event in part (a), “make your first sale on the fifth call”, is unusual
  2. The event in part (b), “make you sale on the first, second, or third call”, is unusualC.
  3.  The event in part (c), “do not make a sale on the first three calls”, is unusual
  4.  None of the events are unusual
    1. Find the indicted probabilities using the geometric distribution or Poisson distribution. Then determine if the events are unusual. If convenient, use a Poisson probability table or technology to find the probabilities.
      A newspaper finds the mean number of typographical errors per page is four. Find the probability that (a) exactly five typographical errors are found on a page, (b) at most five typographical errors are found on a page, and (c) more than five typo errors are found on a page.
      (a) P(exactly five typo errors are found on a page) =
      (Round to four decimal places as needed.)
    2. (b)P(at most five typographical errors are found on a page) =

(Round to four decimal places as needed.)

(c) P(more than five typo errors are found on a page) =

(Round to four decimal places as needed)

Which of the events are unusual?  Select all that apply.

  1.  The event in part (a) is unusual.
  2.  The event in part (b) is unusual.
  3.  The event in part (c) is unusual.
  4.  None of the events are unusual
    1. Find the indicted probabilities using the geometric distribution or Poisson distribution. Then determine if the events are unusual. If convenient, use a Poisson probability table or technology to find the probabilities.

A major hurricane is a hurricane with winds of 111 mph or greater. During the lsat century, the mean # of major hurricanes to strike a certain country’s mainland per year was about 0.46. Find the probability that in a given year (a) exactly one major hurricane will strike the mainland, (b) at most one major hurricane will strike the mainland, and (c) more than one major hurricane will strike the mainland.
(a) P(exactly one major hurricane will strike the mainland) =
(Round to three decimal places as needed.)

(b) P(at most one major hurricane will strike the mainland) =

(Round to three decimal places as needed.)

(c) P(more than one major hurricane will strike the mainland) =

(Round to three decimal places as needed.)

Which of the events are unusual?  Select all that apply.

  1.  The event in part (a) is unusual.
  2.  The event in part (b) is unusual.
  3.  The event in part (c) is unusual.
  4.  None of the events are unusual

MATH 221 Homework Week 5

 

1 A study was conducted that resulted in the following relative frequency histogram. Determine whether or not the histogram indicates a normal distribution could be used a model for the variable.

  1.  The histogram is not bell-shaped, so a normal distribution could not be used as a model for the variable.
  2.  The histogram is bell-shaped, so a normal distribution could be used as a model for the variable.
  3.  The histogram is not bell-shaped, so a normal distribution could be used as a model for the variable.
  4.  The histogram is bell-shaped, so a normal distribution could not be used as a model for the variable.

1  A study was conducted that resulted in the following relative frequency histogram. Determine whether or not the histogram indicates a normal distribution could be used a model for the variable.

1.

A study was conducted that resulted in the following relative frequency histogram. Determine whether or not the histogram indicates that a normal distribution could be used as a model for the variable.

  1.  The histogram is not bell-shaped, so a normal distribution could not be used as a model for the variable.
  2.  The histogram is bell-shaped, so a normal distribution could be used as a model for the variable.
  3.  The histogram is not bell-shaped, so a normal distribution could be used as a model for the variable.
    D.  The histogram is bell-shaped, so a normal distribution could not be used as a model for the variable.

2 Find the area of the shaded region. The graph depicts  the standard normal distribution with mean 0 and standard deviation 1.

The area of the shaded region is
(round to 4 decimal places as needed.)

2.

Find the area of the shaded region.

F  Find the area of the indicated region under the standard normal curve

The area between z = 0 and z = 1 under the standard normal curve is
(round to 4 decimal places as needed.)

3  Find the area of the indicated region under the standard normal curve.

The area between z  = 0 and z = 1.3 under the standard normal curve is
(round to 4 decimal places as needed.)

4  Find the indicated area under the standard normal curve.

To the left of z =

The area to the left of z = -0.28 under the standard normal curve is
(round to 4 decimal places as needed.)

4  Find the indicated area under the standard normal curve.

To the left of z =
The area to the left of z = – 0.28 under the standard normal curve is
round to four decimal places as needed.

  1. Find the area under the standard normal curve. To the left of z = 2.26

5 Find the indicated area under the normal curve.
between z = -1.08 and z = 1.08

The area between z= -1.08 and z = 1.08 under the standard normal curve is
(round to 4 decimal places as needed.)

  1. Find the indicated area under the standard normal curve. To the right of z = 0.42

6  Find the indicated area under the standard normal curve.

To the left of z =

The area to the left of z = under the standard curve is

6  Find the indicated area under the standard normal curve.

To the right of z =

The area to the right of z = under the standard normal curve is.

6  Find the indicated area under the standard normal curve.

Between z = and z =

The area between z = and z = under the standard normal curve is.

  1. Find the indicated area under the standard normal curve. Between z = -0.48 and 0.48

7  Assume the random variable x is normally distributed with mean µ = 82 and standard deviation .  Find the indicated probability.

P(x<75)

P(x<75) = (Round to four decimal places as needed)

7  Assume random variable x is normally distributed with mean µ = 82 and standard deviation. Find the indicated probability.

P(x<78)
P(X<78) = (round to 4 decimal places as needed.

7  Assume random variable x is normally distributed with mean µ = 87 and standard deviation . Find the indicated probability.
P(75<x<84)
P(75<x<84) =
(round to 4 decimal places as needed.)

  1. Assume the random variable x is normally distributed with a mean of 81 and standard deviation of 4. P(X<77)

8 Assume the random variable x is normally distributed with mean µ = 84 and standard deviation σ = 5.  Find the indicated probability.

P(68<x<74)

P(68<x74<) =

(Round to four decimal places as needed)

  1. Assume the random variable x is distributed with mean of 90 and standard deviation of 5. P(63<x<88)

9  A survey was conducted to measure the height of men.  In the survey, respondents were grouped by age.  In the 20-29 age group, the heights were normally distributed, with a mean of 67.5 inches and a standard deviation of 2.0 inches.  A study participant is randomly selected.  Complete parts (a) through (c).

  1.  Find the probability that his height is less than 67 inches.

The probability that the study participant selected at random is less than 67 inches tall is (Round to four decimal places as needed)

  1.  Find the probability that his height is between 67 and 72 inches.

The probability that the study participant selected at random is between 67 inches and 72 inches tall is. (Round to four decimal places as needed)

  1.  Find the probability that his height is more than 72 inches.

The probability that the study participant selected at random is more than 72 inches tall is (Round to four decimal places as needed)

9  A survey was conducted to measure the height of men. In the survey, respondents were grouped by age. In the 20-29 group, the heights were normally distributed, with a mean of 69.9 inches and a standard deviation of 3.0 inches. A study participant is randomly selected. Complete parts (a) through (c).

  1. find the probability that his height is less than 68 inches.
    The probability that the student participant selected at random is less than 68 inches tall is (round to 4 decimal places as needed.)
    B. find the probability that his height is between 68 and 71 inches
    the probability that the student participant selected at random is between 68 and 71 inches tall is   (round to 4 decimal places as needed.)
  2.  find the probability that his height is more than 71 inches.

The probability that the study participant selected at random is more than 71 inches tall is (round to 4 decimal places as needed).

  1. A survey was conducted to measure the height of men. In the survey, respondents were grouped by age. In the 20-29 age group, the heights were normally distributed, with a mean of 69.6 inches and a standard deviation of 3 inches. Complete parts a – c.
    A) Find that probability that his height is less than 65 inches.
    B) Find the probability that his height is between 65-70 inches.
    C Find the probability that his height is more than 70 inches.

10 Use the normal distribution of SAT critical reading scores for which the mean is 515 and the standard deviation is 108.  Assume the variable x is normally distributed.

(a)  What percent of the SAT verbal scores are less than 650?

(b)  If 1000 SAT verbal scores are randomly selected, about how many would you expect to be greater than 575?

  1.  Approximately % of the SAT verbal scores are less than 650. (Round to two decimal places as need)
  2.  You would expect that approximately SAT verbal scores would be greater than 575.  (Round to the nearest whole number as needed)

10 Use the normal distribution of Sat critical reading scores for which the mean is 514 and the standard deviation is 124. Assume the variable x is normally distributed.

  1. Use the normal distribution of SAT crtical reading scores for which the mean is 502 and standard deviation is 119. Assume the variable x is normally distributed.
    A) what % of the SAT scores are less than 675?
    B) if 1000 SAT verbal scores are randomly selected, how many would be greater than 525?
  1. what percent of the SAT verbal score is less than 500?
    B. if 1000 sat scores are randomly selected, how many would be greater than 525?
    A: %
    B: greater than 525

11  Find the indicated z-score shown in the graph to the right.

The z-score is (Round to two decimal places as needed)

11 Find the indicated z-score shown in the graph to the right.

The z-score is

11  Find the indicated z-score shown in the graph to the right.

  1. Find the z-score shown in the graph.

12 Find the indicated z-score shown in the graph to the right.

The z-score is

The z-score is (Round to two decimal places as needed)

  1. Find the z-score shown in the graph.

13  Find the z-score that has 11.9% of the distribution’s area to its right.

The z-score is (Round to two decimal places as needed)

  1. Find the z-score that has 27.1% of the distribution’s area to it’s right

13  Find the z-score that has 11.9% of the distribution’s area to its right.

The z-score is (Round to two decimal places as needed)

14  Find the z-scores for which 70% of the distribution’s area lies between –z and z.

The z-scores are

(Use a comma to separate answers as needed.  Round to two decimal places as needed)

14  Find the z-scores for which 98% of the distribution’s area lies between – z and z.

The z-scores are (Use a comma to separate answers as needed)

  1. Find the z-score for which 70% of the distribution’s area is between –z and z.
  2. In a survey of women in a certain country (ages 20-29), the mean height was 64.9 inches with a standard deviation of 2.86 inches. Answer the following questions:
    A) what height represents the 85th percentile
    B) what height represents the first quartile?

15 In a survey of women in a certain country (ages 20-29), the mean height was 66.5 inches with a standard deviation of 2.84 inches.  Answer the following questions about the specified normal distribution.

(a)  What height represents the 85th percentile?

(b)  What height represents the first quartile?

  1.  The height the represents the 85th percentile is inches. (Round to two decimal places as needed)
  2.  The height that represents the first quartile is inches. (Round to two decimal places as needed)

15  In a survey of women in a certain country (ages 20-29), the mean height was 65.9 inches with a standard deviation of 2.74 inches. Answer the following questions about the specified normal distribution.

(a)  What height represents the 95th percentile?

(b)  What height represents the first quartile?

  1.  The height that represents the 95th percentile is inches. (Round to two decimal places as needed)
  2.  The height that represents the first quartile is inches. (Round to two decimal places as needed)

16  The time spent (in days) waiting for a heart transplant in two states for patients with type A + blood can be approximately by a normal distribution, as shown in the graph.  Complete parts (a) and (b) below.

(a)  What is the shortest time spent waiting for a heart that would still place a patient in the top 30% of waiting times?

days (Round to two decimal places as needed)

(b) What is the longest time spent waiting for a heart that would still place a patient in the bottom 29% of waiting times?

days. (Round to two decimal places as needed)

16  The time spent (in days) waiting for a heart transplant in two states for patients with type A + blood can be approximated by a normal distribution, as shown in the graph to the right. Complete parts (a) and (b) below.

(a)  What is the shortest time spent waiting for a heart that would still place a patient in the top 15% or waiting times?

days ( Round to two decimal places as needed)

(b) What is the longest time spent waiting for a heart that would still place a patient in the bottom 5% of waiting times?

days ( Round to two decimal places as needed)

  1. The time spent waiting for a heart transplant in two states for patients with type A blood can be approximated by a normal distribution, as shown in the graph to the right.
    A) what is the shortest time spent waiting for a heart that would still place a patient in the top 30% of waiting times?
    B) what is the longest time spent waiting for a heart that would still place a patient in the bottom 1% of waiting times?

17   population has a mean µ = 86 and a standard deviation σ = 14.  Find the mean and standard deviation of a sampling distribution of a sampling distribution of sample means with sample size n = 49.

  1. A population has a mean of 90 and standard deviation of 12. Find the mean and standard deviation of a sampling distribution of sample means with sample size n =36

18  The graph of the waiting time (in seconds) at a red light is shown below on the left with its mean and standard deviation. Assume that a sample size of 100 is drawn from the population.  Decide which of the graphs labeled (a)-(c) would most closely resemble the sampling distribution of the sample means.  Explain your reasoning.

  1. The graph of waiting times at a red light is shown below on the left with its mean and standard deviation. Assume that a sample size of 100 is drawn from the population. Decide which of the graphs labeled a – c would most likely resemble the sampling distribution of the sample means.

18  The graph of the waiting time (in seconds) at a red light is shown below on the left with its mean and standard deviation.  Assume that a sample size of 100 is drawn from the population.  Decide which of the graphs labeled (a)-(c) would most closely resemble the sampling distribution of the sample means.  Explain your reasoning.

Graph ( ) most closely resembles the sampling distribution of the sample means, because

µ – =, σ – =, and the graph approximates a normal curve.

X              x

(Type an integer or a decimal)

19 A machine used to fill gallon-sized paint cans is regulated so that the amount of paint dispensed has a mean of 133 ounces and a standard deviation of 0.30 ounce.  You randomly select 50 cans and carefully measure the contents.  The sample mean of the cans is 132.9 ounces.  Does the machine need to be reset?  Explain your reasoning.

19  A machine used to fill gallon-sized paint cans is regulated so that the amount of paint dispensed has a mean of 132 ounces and a standard deviation of 0.30 ounces. You randomly select 45 cans and carefully measure the contents. The sample mean of the cans is 131.9 ounces.  Does the machine need to be reset?  Explain your reasoning.

20  A manufacturer claim that the life span of its tires is 50,000 miles.  You work for a consumer protection agency and you are testing these tires.  Assume the life spans of the tires are normally distributed.  You select 100 tires at random and test them.  The mean life span is 49,741 miles.  Assume σ = 900.  Complete parts (a) through (c)

  1.  Assuming the manufacturer’s claim is correct, what is the probability that the mean of the sample is 49,741 miles of less?

(Round to four decimal places as needed)

  1.  using your answer form part (a), what do you think of the manufacturer’s claim?
  2.  ssuming the manufacturer’s claim is true, would it be unusual to have an individual tire with a life span of 49, 741 mile? Why or why not?
  1. A machine used to fill gallon-sized paint cans is regulated so that the amount of paint dispenses has a mean of 122 ounces and a standard deviation of 0.30 ounce. You randomly select 40 cans and carefully measure the contents. The sample mean of cans is 121.9 ounces. Does the machine need to be reset? Explain your reasoning.

20  A manufacturer claims that the life span of its tires is 49,000 miles. You work for a consumer protection agency and you are testing these tires. Assume the life spans of the tires are normally distributed.  You select 100 tires at random and test them.  The mean life span is 48, 778 miles.  Assume σ = 900. Complete parts (a) through (c).

  1.  Assuming the manufacturer’s claim is correct, what is the probability that the mean of the sample is 48,778 miles or less?

(Round to four decimal places as needed)

  1.  Using your answer from part (a), what do you think of the manufacturer’s claim?.
  2.  Assuming the manufacturer’s claim is true, would it be unusual to have an individual tire with a life span of 48,778 mile? Why or why not?
  3. A manufacturer claims that the life spam of its tires is 49,000 miles. You work for a consumer protection agency and you are testing these tires. Assume the life spans of the tires are normally distributed. You select 100 tires at random and test them. The mean life span is 48,807 miles. Assume the mean = 800.

MATH 221 Homework Week 6

 

1  Given the same sample statistics, which level of confidence would produce the widest confidence interval?

Choose the correct answer below.

  1.  90%
  2.  98
  3.  99%
  4.  95%
  1. Given the same sample statistics, which level of confidence would produce the widest confidence interval?

Choose the correct answer below.

  1.  99%
  2.  95%
  3.  98%
  4.  90%

Use the values on the number line to find the sampling error.

The sampling error is

  1. Use the following values to find the sampling error:
    u = 25.36
    x = 26.74

3  Find the margin of error for the given values of c, s, and n.

C=0.90, s=3.4, n=81

E= (Round to three decimal places as needed)

3  Find the margin of error for the given values of c, s, and n.

C=0.90, s=3.6, n=81

  1. Find the margin of error for the given values of c,s, and n.
    C = 0.95, S = 3.1, N = 64

E= (Round to three decimal places as needed)

4  Construct the confidence interval for the population mean µ.

A 98% confidence interval for µ is ( ) (Round to two decimal places as needed)

4  Construct the confidence interval for the population meanµ.

  1. Construct the confidence interval for the population mean.
    c = 0.90, x = 5.9, s = 0.8, and n = 44

A 98% confidence interval for µ is ( ),  (Round to two decimal places as needed)

5  Construct the confidence interval for the population mean µ.

A 90% confidence interval for µ is ( ). (Round to one decimal place as needed)

5  Construct the confidence interval for the population mean µ.

  1. Construct the confidence interval for the population mean.
    c = 0.90, x = 15.7, s = 10.0, and n = 80

A 98% confidence interval for µ is ( ). (Round to one decimal place as needed)

6  Use the confidence interval to find the estimated margin of error.  Then find the sample mean.

A biologist reports a confidence interval of (4.3,5.1) when estimating the mean height (in centimeters) of a sample of seedlings.

The estimated margin of error is

The sample mean is

6  Use the confidence interval to find the estimated margin of error. Then find the sample mean.

A biologist reports a confidence interval of (1.6,3.2) when estimating the mean height (in centimeters) of a sample of seedlings.

The estimated margin of error is

The sample mean is

  1. Use the confidence interval to find the estimated margin of terror. Then find the mean.
    A biologist reports a confidence interval of (4.7,5.1) when estimating the mean height of a sample of seedlings.

7  Find the minimum sample size n needed to estimate µ for the given values of c, s, and E

C=0.90, s=7.7, and E=1

Assume that a preliminary sample has at least 30 members

N= (Round up to the nearest whole number)

7  Find the minimum sample size n needed to estimate µ for the given values of c, s, and E.

C=0.95, s= 9.3, and E=1

Assume that a preliminary sample has at least 30 members

N= (Round up to the nearest whole number)

7.Find the minimum sample size needed to estimate u for the given values of c, s, and E.
C = 0.90, S = 9.5, E = 1

8.You are given the sample mean and sample standard deviation. Use this information to construct 90% and 95% confidence intervals for the population mean. A random sample of 40 home theater systems has a mean price of $118.00 and standard deviation is $19.50

8  You are given the sample mean and the sample standard deviation.  Use this information to construct the 90% and 95% confidence intervals for the population mean.  Interpret the results and compare the widths of the confidence intervals.  If convenient, use technology to construct the confidence intervals.

A random sample of 55 home theater system has a mean price of $135.00 and a standard deviation is $15.70.

Construct a 90% confidence interval for the population mean.

The 90% confidence interval is ( ) (Round to two decimal places as needed)

Construct a 95% confidence interval for the population mean.

The 95% confidence interval is ( ) (Round to two decimal places as needed)

Interpret the results. Choose the correct answer below.

  1.  With 90% confidence, it can be said that the population mean price lies in the first interval. With 95% confidence, it can be said that the population mean price lies in the second interval. The 95% confidence interval is wider than 90%.
    B. With 90% confidence, it can be said that the sample mean price lies in the first interval. With 95% confidence, it can be said that the sample mean price lies in the second interval. The 95% confidence interval is wider than the 90%.
    C. With 90% confidence, it can be said that the population mean price lies in the first interval. With 95%, confidence, it can be said that the population mean price lies in the second interval. The 95% confidence interval is narrower than 90%.

8  You are given the sample mean and the sample standard deviation. Use this information to construct the 90% and 95% confidence intervals for the population mean.  Interpret the results and compare the widths of the confidence intervals.  If convenient, use technology to construct the confidence intervals.

A random sample of 60 home theater system has a mean price of $115.00 and a standard deviation is $15.10.

Construct a 90% confidence interval for the population mean.

The 90% confidence interval is () (Round to two decimal places as needed)

Construct a 95% confidence interval for the population mean.

The 95% confidence interval is () (Round to two decimal places as needed)

Interpret the results. Choose the correct answer below.

  1. With 90% confidence, it can be said that the population mean price lies in the first interval. With 95% confidence, it can be said that the population mean price lies in the second interval. The 95% confidence interval is wider than 90%.
    B. With 90% confidence, it can be said that the sample mean price lies in the first interval. With 95% confidence, it can be said that the sample mean price lies in the second interval. The 95% confidence interval is wider than the 90%.
    C. With 90% confidence, it can be said that the population mean price lies in the first interval. With 95%, confidence, it can be said that the population mean price lies in the second interval. The 95% confidence interval is narrower than 90%.

9  You are given the sample mean and the sample standard deviation. Use this information to construct the 90% and 95% confidence intervals for the population mean. Which interval is wider? If convenient, use technology to construct the confidence intervals.
A random sample of 31 gas grills has a mean price of $642.90 and a standard deviation of $58.40.

The 90% confidence interval is ( ) (round to one decimal place as needed)

The 95% confidence interval is ( ) (round to one decimal place as needed)

Which interval is wider?  Choose the correct answer below.

  1.  The 90% confidence interval
  2.  The 95% confidence interval

9.You are given the sample mean and sample standard deviation. Use this information to construct 90% and 95% confidence intervals for the population mean.
A random sample of 46 gas grills has a mean price of $639.50 and standard deviation of $55.40

10  You are given the sample mean and the sample standard deviation. Use this information to construct the 90% and 95% confidence intervals for the population mean. Which interval is wider? If convenient, use technology to construct the confidence intervals.

A random sample of 33 eight-ounce servings of different juice drinks has a mean of 93.5 calories and a standard deviation of 41.5 calories.
The 90% confidence interval is ( ). (Round to 1 decimal place as needed.)

The 95% confidence interval is ( ). (Round to 1 decimal place as needed.)

Which interval is wider?

  1.  The 95% confidence interval
  2.  The 90% confidence interval

10.You are given the sample mean and sample standard deviation. Use this information to construct 90% and 95% confidence intervals for the population mean.
A random sample of 49 eight ounce servings of different drinks has a mean of 91.9 and standard deviation of 40.3

11  People were polled on how many books they read the previous year. How many subjects are needed to estimate the number of books read the previous year within one book with 90% confidence? Initial survey results indicate that σ=11.7 books

A 90% confidence level requires subjects.

(Round up to the nearest whole number as needed)

11.People were polled on how many books they read the previous year. How many subjects are needed to estimate the # of books read the previous year within 1 book with 95% confidence. O = 15.5 books

12  A doctor wants to estimate the HDL cholesterol of all 20-to 29-year-old females. How many subjects are needed to estimate the HDL cholesterol within 2 points with 99% confidence assuming σ=15.4? Suppose that the doctor would be content with 95% confidence. How does the decrease in confidence affect the sample size required?

A % confidence level requires subjects.
(Round up to the nearest whole number as needed)

A % confidence level requires subjects.

(Round up to the nearest whole number as needed)

How does the decrease in confidence affect the sample size required?

  1.  The sample size is the same for all levels of confidence
  2.  The lower the confidence level the larger the sample size
  3.  The lower the confidence level the smaller the sample size

12.A doctor wants to estimate the HDL cholesterol of all 20-29 year olds females. How many subjects are needed to estimate the HDL within 2 points with 99% confidence assuming o = 14.3? Also find out 95% confidence.

13  Construct the indicated confidence interval for the population mean µ using (a) a t-distribution. (b) if you had incorrectly used a normal distribution, which interval would be wider?
(a) The 95% confidence interval using a t-distribution is ( )
(round to one decimal place as needed.)

(b) If you had incorrectly used a normal distribution, which interval would be wider?

  1.  The t-distribution has the wider interval
  2.  The normal distribution has the wider interval

14  In the following situation, assume the random variable is normally distributed and use a normal distribution or a t-distribution to construct a 90% confidence interval for population mean. If convenient, use technology to construct the confidence interval.
(a) In a random sample of 10 adults from a nearby county, the mean waste generated per person per day was 4.65 pounds and the standard deviation was 1.48 pounds.

Repeat part (a), assuming the same statistics came from a sample size of 450. Compare the results.

(a) For the sample size of 10 adults, the 90% confidence interval is ( )
(Round to 2 decimal places as needed.)

(b) For the sample of 450 adults, the 90% confidence interval is ( )

(Round to 2 decimal places as needed.)

Choose the correct observation below

  1. The interval from part (a), which uses the normal distribution, is narrower than the interval from part (b), which uses the t-distribution.
  2. The interval from part (a), which uses the t-distribution, is wider than the interval from part (b), which uses the normal distribution.
  3.  The interval from part (a), which uses the normal distribution, is wider than the interval from part (b), which uses the t-distribution.
  4.  The interval from part (a), which uses the t-distribution, is narrower than the interval from part (b), which uses the normal distribution.

14.In a random sample of 10 adults from a nearby county, the mean waste generated per person per day was 4.58 pounds and standard deviation was 1.04 pounds. Repeat part A and assume the sample size is 450.

15  Use the given confidence interval to find the margin of error and the sample proportion.

(0.662,0.690)
E = (type an integer or a decimal.)

15.Use the given confidence interval to find the margin of error and the sample proportion.
(0.685, 0.713)

  1. In a survey of 654 males aged 18-64, 399 say they have gone to a dentist in the last year. Construct a 90 and 95% confidence interval.

16  In a survey of 633 males from 18-64, 390 say they have gone to the dentist in the past year.
Construct 90% and 95% confidence intervals for the population proportion. Interpret the results and compare the widths of the confidence intervals. If convenient, use technology to construct the confidence intervals.

The 90% confidence interval for the population proportion p is ( )

(Round to 3 decimal places as needed.)

The 95% confidence interval for the population proportion p is ( )

(Round to 3 decimal places as needed.)

Interpret your results of both confidence intervals.

  1.  With the given confidence, it can be said that the population proportion of males ages 18-64 who say they have gone to the dentist in the past year is between the endpoints of the given confidence interval.
  2.  With the given confidence, it can be said that the population proportion of males ages 18-64 who say they have gone to the dentist in the past year is not between the endpoints of the given confidence interval.
  3.  With the given confidence, it can be said that the sample proportion of males ages 18-64 who say they have gone to the dentist in the past year is between the endpoints of the given confidence interval.

Which interval is wider?

  1.  The 90% confidence interval

B,  The 95% confidence interval

17  In a survey of 6000 women, 3431 say they change their nail polish once a week. Construct a 99% confidence interval for the population proportion of women who change their nail polish once a week.

A 99% confidence interval for the population proportion is ( )

(Round to 3 decimal places as needed)

17.In a survey of 9000 women, 6431 say they change their nail polish once a week. Construct a 99% confidence.

  1. a researcher wants to estimate with 99% confidence the # of adults who have high speed internet access. Her estimate must be accurate within 5% of the true proportion.
    A) find the minimum sample size needed, using a prior study that found 46% of the respondents said they have high-speed internet access.
    B) no preliminary estimate is available. Find the minimum sample size needed.

18  A researcher wishes to estimate, with 99% confidence, the proportion of adults who have high-speedy internet access. Her estimate must be accurate within 4% of the true proportion.

  1. a) Find the minimum sample size needed, using a prior study that found that 42% of the respondents said they have a high-speedy internet access.
    b) No preliminary estimate is available. Find the minimum sample size needed.
  2. A) What is the minimum sample size needed using a prior study that found that 42% of the respondents said they have high-speed internet access?

n = (Round up to the nearest whole # as needed.)

  1. B) What is the minimum sample size needed assuming that no preliminary estimate is available?

n = (Round up to the nearest whole # as needed.)

MATH 221 Homework Week 7

 

    1. Use the given statement to represent a claim. Write it’s complement and state which is Ho and which is Ha.u > 635Find the complement of the claim.
      u < 6351 Use the given statement to represent a claim. Write it’s complement and state which is Ho and which is Ha.u > 635Find the complement of the claim.
      u < 635
    2. A null and alternative hypothesis are given. Determine whether the hypothesis test is left-tailed, right tailed, or two-tailed.
    3. What type of test is being conducted in this problem?
    1. A null and alternative hypothesis are given. Determine whether the hypothesis test is left-tailed, right tailed, or two-tailed.

What type of test is being conducted in this problem?

    1. Write the null and alternative hypotheses. Identify which is the claim.
      A light bulb manufacturer claims that the mean life of a certain type of light bulb is more than 700 hours.

Identify which is the claim.

3 Write the null and alternative hypotheses. Identify which is the claim.
A light bulb manufacturer claims that the mean life of a certain type of light bulb is more than 700 hours.  Identify which is the claim.

4 Write the null and alternative hypotheses. Identify which is the claim. The standard deviation of the base price of a certain type of car is at least $1010. Identify which is the claim.

    1. Write the null and alternative hypotheses. Identify which is the claim. The standard deviation of the base price of a certain type of car is at least $1010.Identify which is the claim.
    1. More than 11% of all homeowners have a home security alarm. Determine whether the hypothesis for this claim is left-tailed, right-tailed, or two-tailed. Explain your reasoning.
    2. A film developer claims that the mean number of pictures developed for a camera with 22 exposures is less than 17. If a hypothesis test is performed, how should interpret a decision that (a) rejects the null hypothesis and (B) fails to reject the null hypothesis?

A = There is enough evidence to support the claim that the mean number of pictures developed for a camera with 22 exposures is less than 17.
B = There is not enough evidence to support the claim that the mean number of pictures developed for a camera with 22 exposures is less than 17.

6 A film developer claims that the mean number of pictures developed for a camera with 24 exposures is less than 23. If a hypothesis test is performed, how should interpret a decision that (a) rejects the null hypothesis and (B) fails to reject the null hypothesis?

7 Find the P-value for the indicated hypothesis test with the given test statistic, z. Decide whether to reject Ho for the given level of significance a.
Two-tailed test with test statistic z = -2.08 and a = 0.04
P-Value =
Conclusion =

    1. Find the P-value for the indicated hypothesis test with the given test statistic, z. Decide whether to reject Ho for the given level of significance a.
      Two-tailed test with test statistic z = -2.08 and a = 0.04
      P-Value =
      Conclusion =
    2. Find the critical z values. Assume that the normal distribution applies.
      Right-tailed test, a =
      Z =8 Find the critical z values. Assume that the normal distribution applies.
      Right-tailed test, a =
      Z =
    3. Find the critical value(s) for a left-tailed z-test with a = 0.01. Include a graph with your answer.
      Critical Value =

Graph:

9  Find the critical value(s) for a left-tailed z-test with a = 0.01. Include a graph with your answer.
Critical Value = -2.33

Graph:

    1. Test the claim about the population mean, u, at the given level of significance using the given sample statistics.
      Claim u =, a =, sample statistics: x =, s =, n =

Standardized test statistic =
Critical Values =

10 Test the claim about the population mean, u, at the given level of significance using the given sample statistics.
Claim u = 50, a = 0.08, sample statistics: x = 49.2, s = 3.56, n = 80

    1. Test the claim about the population mean, u, at the given level of significance using the given sample statistics.
      Claim u = 5000, a = 0.05. Sample statistics x = 4800, s = 323, n = 46.Standardized test statistic =
      Critical Values =
    2. Test the claim about the population mean, u, at the given level of significance using the given sample statistics.
      Claim u = 5000, a = 0.05. Sample statistics x = 4800, s = 323, n = 46.Standardized test statistic =
      Critical Values =
      12 A random sample of 85 eight grade students’ score on a national mathematics assessment test has a mean score of 275 with a standard deviation of 33. This test result prompts a state school administrator to declare that the mean score for the state’s eighth graders on this exam is more than 270. At a = 0.03, is there enough evidence to support the administrators claim? Compare parts A – E.
    3. A random sample of 85 eight grade students’ score on a national mathematics assessment test has a mean score of 275 with a standard deviation of 33. This test result prompts a state school administrator to declare that the mean score for the state’s eighth graders on this exam is more than 270. At a = 0.03, is there enough evidence to support the administrators claim? Compare parts A – E.

Z =
Area =
P Value =

    1. A company that makes cola drinks states that the mean caffeine content per 12-ounce bottle of cola is 45 milligrams. You want to test this claim. During your tests, you find that a random sample of thirty 12-ounce bottles of the cola has a mean caffeine content of 45.5 milligrams with a standard deviation of 6.1 milligrams. At a = 0.08, can you reject the company’s claim?

The critical values are =

z =

    1. A light bulb manufacturer guarantees that the mean life of a certain type of light bulb is at least 975 hours. A random sample of 72 light bulbs has a mean life of 954 hours with a standard deviation of 85 hours. Do you have enough evidence to reject the manufacturer’s claim? Use a = 0.04.

Zo =
Z =

    1. An environmentalist estimates that the mean waste recycled by adults in the country is more than 1 pound per person per day. You want to this test claim. You find that the mean waste recycled per person per day for a random sample of 12 adults in the country is 1.4 pounds and the standard deviation is 0.3 pound. At a = 0.10, can you support the claim? Assume the population is normally distributed.

To =

T =

15 An environmentalist estimates that the mean waste recycled by adults in the country is more than 1 pound per person per day. You want to this test claim. You find that the mean waste recycled per person per day for a random sample of 12 adults in the country is 1.4 pounds and the standard deviation is 0.3 pound. At a = 0.10, can you support the claim? Assume the population is normally distributed.

16 A county is considering raising the speed limit on a road because they claim that the mean speed of vehicles is greater than 40 miles per hour. A random sample of 25 vehicles has a mean speed of 45 miles per hour and a standard deviation of 5.4 miles per hour. At a = 0.10, do you have enough evidence to support the county’s claim? Complete parts A – D.

    1. A county is considering raising the speed limit on a road because they claim that the mean speed of vehicles is greater than 40 miles per hour. A random sample of 25 vehicles has a mean speed of 45 miles per hour and a standard deviation of 5.4 miles per hour. At a = 0.10, do you have enough evidence to support the county’s claim? Complete parts A through D.T =
      P- Value =
    2. A traveled association claims that the mean daily meal cost for two adults traveling together on vacation is $100. A random sample of 20 such groups of adults has a mean daily meal cost of $95 and a standard deviation of $4.50. Is there enough evidence to reject the claim at a = 0.1? complete parts A – D.T =
      P Value =
    1. Decide whether the normal sampling distribution can be used. If it can be used, test the claim about the population proportion p at the given level of significance a using given sample statistics.
      Claim p = a = sample statistics: p = n =Can the normal sampling distribution be used?
      Answer:

The critical values are =
z =
What is the result of the test?
Answer:

18 Decide whether the normal sampling distribution can be used. If it can be used, test the claim about the population proportion p at the given level of significance a using given sample statistics.
Claim p = 0.23, a = 0.10, sample statistics: p = 0.18, n = 150.
Can the normal sampling distribution be used?

    1. (a) write the claim mathematically and identify Ho and Ha. (b) find the critical value(s) and identify the rejection region(s). find the standardized test statistic. (d) decide whether to reject or fail to reject the null hypothesis. An environmental agency recently claimed more than 25% of consumers have stopped buying a certain product because of environmental concerns. In a random sample of 1000 customers, you find 40% have stopped buying the product. At a=0.03, do you have enough evidence to support the claim?

Zo = 1.88

Z =

19 (a) write the claim mathematically and identify Ho and Ha. (b) find the critical value(s) and identify the rejection region(s). find the standardized test statistic. (d) decide whether to reject or fail to reject the null hypothesis. An environmental agency recently claimed more than 25% of consumers have stopped buying a certain product because of environmental concerns. In a random sample of 1000 customers, you find 40% have stopped buying the product. At a=0.03, do you have enough evidence to support the claim?

  1.  A humane society claims that less than 36% of U.S. households own a dog. In a random sample of 406 U.S. households, 154 say they own a dog. At a = 0.10, is there enough evidence to support the society’s claim?
    (a) write the claim mathematically and identify Ho and Ha. (b) find the critical value(s) and identify the rejection region(s). (c) find the standardized test statistic. (d) decide whether to reject or fail to reject the null hypothesis, and € interpret the decision in the context of the original claim.

Critical Values =

A =

 MATH 221Final Exam with ALL Formulas  ALL Answers are 100% Correct.

 

This exam includes formulas in Word and in Excel, which can be used if numeric data is different from the one listed below.

  1. The table below shows the number of male and female students enrolled in nursing at a university for a certain semester. A student is selected at random. Complete parts (a) through (d) (a)Find the probability that the student is male or a nursing major.

P (being male or being nursing major) =

(b) Find the probability that the student is female or not a nursing major.

P(being female or not being a nursing major) =

(c) Find the probability that the student is not female or a nursing major

P(not being female or not being a nursing major) =

(d) Are the events “being male” and “being a nursing major” mutually exclusive? Explain.

  1. An employment information service claims the mean annual pay for full-time male workers over age 25 without a high school diploma is $22,325. The annual pay for a random sample of 10 full-time male workers over age 25 without a high school diploma is listed. At a = 0.10, test the claim that the mean salary is $22,325. Assume the population is normally distributed.

20,660 – 21,134 – 22,359 – 21,398 – 22,974, – 16,919 – 19,152 – 23,193 – 24,181 – 26,281

(a) Write the claim mathematically and identify

Which of the following correctly states ?

(b) Find the critical value(s) and identify the rejection region(s).

What are the critical values?

Which of the following graphs best depicts the rejection region for this problem?

(c) Find the standardized test statistics.
t =

(d) Decide whether to reject or fail to reject the null hypothesis.
reject because the test statistics is in the rejection region.

  1. fail to reject because the test statistic is not in the rejection region.
    c. reject because the test statistic is not in the rejection region.
    d. fail to reject  because the test statistic is in the rejection region.

(e) Interpret the decision in the context of the original claim.
a. there is sufficient evidence to reject the claim that the mean salary is $22,325.
b. there is not sufficient evidence to reject the claim that the mean salary is not $22,325.
c. there is sufficient evidence to reject the claim that the mean salary is not $22,325.
d. there is not sufficient evidence to reject the claim that the mean salary is $22,325.

  1. The times per week a student uses a lab computer are normally distributed, with a mean of 6.1 hours and a standard deviation of 1.2 hours. A student is randomly selected. Find the following probabilities.
    (a) The probability that the student uses a lab computer less than 5hrs a week.
    (b) The probability that the student uses a lab computer between 6-8 hrs a week.

(c) The probability that the student uses a lab computer for more than 9 hrs a week.

(a) =

(b) =

(c) =

  1. Write the null and alternative hypotheses. Identify which is the claim.
    A study claims that the mean survival time for certain cancer patients treated immediately with chemo and radiation is 13 months.
  2. Find the indicated probability using the standard normal distribution.
    P(z>) =
  3. The Gallup Organization contacts 1323 men who are 40-60 years of age and live in the US and asks whether or not they have seen their family doctor.What is the population in the study?
    Answer:What is the sample in the study?
    Answer:
  1. The ages of 10 brides at their first marriage are given below.
    4 32.2     33.6     41.2     43.4     37.1     22.7     29.9     30.6     30.8(a) find the range of the data set.
    Range =
    (b) change 43.4 to 58.6 and find the range of the new date set.
    Range =
    (c) compare your answer to part (a) with your answer to part (b)
  1. The following appear on a physician’s intake form. Identify the level of measurement of the data.
    (a) Martial Status
    (b) Pain Level (0-10)
    (c) Year of Birth
    (d) Height(a) what is the level of measurement for marital status(b) what is the level of measurement for pain level(c) what is the level of measurement for year of birthWhat is the level of measurement for height
  1. To determine her air quality, Miranda divides up her day into 3 parts; morning, afternoon, and evening. She then measures her air quality at 3 randomly selected times during each part of the day. What type of sampling is used?
  1. Find the equation of the regression line for the given data. Then construct a scatter plot of the data and draw the regression line. Then use the regression equation to predict the value of y for each of the given x-values, if meaningful. The caloric content and the sodium content (in milligrams) for 6 beef hot dogs are shown in the table below.
  • X= 150 calories
  • X= 100 calories
  • X = 120 calories
  • X = 60 calories

Find the regression equation.
=
Choose the correct graph below.

(a) predict the value of y for x = 150.
Answer:
(b) predict the value of y for x = 100.
Answer:
(c) predict the value of y for x = 120.
Answer:
(d) predict the value of y for x = 60.
Answer:

  1.  A restaurant association says the typical household spends a mean of $4072 per year on food away from home. You are a consumer reporter for a national publication and want to test this claim. You randomly select 12 households and find out how much each spent on food away from home per year. Can you reject the restaurant association’s claim at a = 0.10? Complete parts a through d.
  • Write the claim mathematically and identify. Choose the correct the answer below.

Use technology to find the P-value.
P =
Decide whether to reject or fail the null hypothesis.

Interpret the decision in the context of the original claim. Assume the population is normally distributed. Choose the correct answer below.

  1.  The table below shows the results of a survey in which 147 families were asked if they own a computer and if they will be taking a summer vacation this year.

(a) find the probability that a randomly selected family is not taking a summer vacation year.
Probability =
(b) find the probability that a randomly selected family owns a computer
Probability =
(c) find the probability that a randomly selected family is taking a summer vacation this year and owns a computer
Probability =
(d) find the probability a randomly selected family is taking a summer vacation this year and owns a computer.
Probability =

  • Are the events of owning a computer and taking a summer vacation this year independent or dependent events?
  • 13. Assume the Poisson distribution applies. Use the given mean to find the indicated probability.
    Find P(5) when ᶙ = 4

P(5) =

  1.  In a survey of 7000 women, 4431 say they change their nail polish once a week. Construct a 99% confidence interval for the population proportion of women who change their nail polish once a week.

A 99% confidence interval for the population proportion is…

15 A random sample of 53 200-meter swims has a mean time of 3.32 minutes and the population standard deviation is 0.06 minutes. Construct a 90% confidence interval for the population mean time. Interpret the results.

The 90% confidence interval is

Interpret these results. Choose the correct answer:
Answer: With 90% confidence, it can be said that the population mean time is between the end points of the given confidence interval.

  1. Determine whether the variable is qualitative or quantitative: Weight

Quantitative
Qualitative

  1. 32% of college students say that they use credit cards because of the reward program. You randomly select 10 college students and ask each to name the reason he or she uses credit cards. Find the probability that the number of college students who say they use credit cards because of the reward program is (a) exactly two, (b), more than two, and (c), between two and five inclusive.

(a) P(2) =
(b) P(X>2) =
(c) P(2<x<5) =

  1.  A light bulb manufacturer guarantees that the mean life of a certain type of light bulb is at least 950 hours. A random sample of 74 light bulbs has a mean life of 943 hours with a standard deviation of 90 hours. Do you have enough evidence to reject the manufacturer’s claim? Use ᶏ = 0.04
  • Identify the critical value(s).(c) identify the standardized test statistic.
    z =
    (d) decide whether to reject or fail to reject the null hypothesis.A. Reject . There is sufficient evidence to reject the claim that the bulb life is at least 950 hours.
    B. Fail to reject . There is not sufficient evidence to reject the claim that the mean bulb life is at least 950 hours.
    C. Fail to reject . There is sufficient evidence to reject the claim that mean bulb life is at least 950 hours.
    D. Reject . There is not sufficient evidence to reject the claim that mean bulb life is at least 950 hours.19. Use technology to find the sample size, mean, medium, minimum data value, and maximum data value of the data. The data represents the amount (in dollars) made by several families during a community yard sale.
    25 67.25 156      134.75 98.25   149.25 124.75 109.75 117      104.75 76The sample size is
    The mean is
    The medium is
    The minimum data value is
    The maximum data value is20. A researcher wishes to estimate, with 95% confidence, the proportion of adults who have high-speed internet access. Her estimate must be accurate within 5% of the true proportion.
    (a) find the minimum sample size needed, using a prior study that found 54% of the respondents said they have high-speed internet access.
    (b) no preliminary estimate is available. Find the minimum sample size needed.(a) what is the minimum sample size needed using a prior study that found that 54% of the respondents said they have high-speed internet access?n =(b) what is the minimum sample size needed assuming that no preliminary estimate is available?n =21. You interview a random sample of 50 adults. The results of the survey show that 50% of the adults said they were more likely to buy a product where there are free samples. At ᶏ = 0.05, can you reject the claim that at least 54% of the adults are more likely to buy a product when there are free samples?State the null and alternative hypotheses. Choose the correct answer below.

Determine the critical value(s).

The critical value(s) is/are

find the z-test statistic.
z =

what is the result of the test?
A. reject . The data provide sufficient evidence to reject the claim.

  1. fail to reject . The data provide sufficient evidence to reject the claim.
    C. Reject . The data do not provide sufficient evidence to reject the claim.
    D. fail to reject . The data do not provide sufficient evidence to reject the claim.
  1.  The budget (in millions of dollars) and worldwide gross (in millions of dollars) for eight movies are shown below. Complete parts (a) through (c)
Budget X 209 203 198 198 179 176 175 168
Gross Y 254 341 453 656 721 1049 1839 1267

(a) display the data in a scatter plot. Choose the correct graph below.

(b) calculate the correlation coefficient r.
r =

(c) make a conclusion about the type of correlation.
The correlation is a …linear correlation.

  1.  A machine cuts plastic into sheets that are 30 feet (360 inches) long. Assume that the population of lengths is normally distributed. Complete parts a and b.
  • The company wants to estimate the mean length the machine is cutting the plastic within 0.125 inch. Determine the minimum sample size required to construct a 95% confidence interval for the population mean. Assume the population standard deviation is 0.25 inch.
    n =
    Repeat part (a) using an error tolerance of 0.0625 inch.
    n =

Which error tolerance requires a larger sample size? Explain.

  1.  The tolerance E = 0.0625 inch requires a larger sample size. As error size decreases, a larger sample must be taken to ensure the desired accuracy.
  2.  The tolerance E = 0.125 inch requires a larger sample size. As error size decreases, a larger sample must be taken to ensure the desired accuracy.
  3.  The tolerance E = 0.125 inch requires a larger sample size. As error size increases, a larger sample must be taken to ensure the desired accuracy.
  4.  The tolerance E = 0.0.625 inch requires a larger sample size. As error size increases, a larger sample must be taken to ensure the desired accuracy.

MATH 221 Discussions Week 1-7 All  Posts 542 Pages 2 Sets

 

MATH 221 Descriptive Statistics Discussions Week 1 All Post 75 Pages

 

If you were given a large data set such as the sales over the last year of our top 1,000 customers, what might you be able to do with this data? What might be the benefits of describing the data?…

MATH 221 Regression Discussions Week 2 All Posts 79 Pages

 

Suppose you are given data from a survey showing the IQ of each person interviewed and the IQ of his or her mother. That is all the information that you have. Your boss has asked you to put together a report showing the relationship between these two variables. What could you present and why?…

MATH 221 Statistics in the News Discussions Week 3 All Posts 78 Pages

 

Keep your eyes and ears open as you read or listen to the news this week. Find/discover an example of statistics in the news to discuss the following statement that represents one of the objectives of statistics analysis: “Statistics helps us make decisions based on data analysis.” Briefly discuss how the news item or article meets this objective. Cite your references….

MATH 221 Discrete Probability Variables Discussions Week 4 All Post 79 Pages

 

What are examples of variables that follow a binomial probability distribution? What are examples of variables that follow a Poisson distribution? When might you use a geometric probability?  Give an example of a continuous random variable and a discrete random variable. Explain your answer….

MATH 221 Interpreting Normal Distributions Discussions Week 5 All Posts 82 Pages

 

Assume that a population is normally distributed with a mean of 100 and a standard deviation of 15. Would it be unusual for the mean of a sample of 3 to be 115 or more? Why or why not? What’s a normal distribution?…

MATH 221 Confidence Interval Concepts Discussions Week 6 All Posts 72 Pages

 

Consider the formula used for any confidence interval and the elements included in that formula. What happens to the confidence interval if you (a) increase the confidence level, (b) increase the sample size, or (c) increase the margin of error? Only consider one of these changes at a time. Explain your answer with words and by referencing the formula….

MATH 221 Rejection Region Discussions Week 7 All Posts 77 Pages

 

How is the rejection region defined and how is that related to the z-score and the p value? When do you reject or fail to reject the null hypothesis? Why do you think statisticians are asked to complete hypothesis testing? Can you think of examples in courts, in medicine, or in your area?…

 

LAS 432 Full Course Technology Society and Culture Latest

 

LAS 432 Full Course Technology Society and Culture Latest

Click Link Below To Buy:

http://hwcampus.com/shop/las-432-full-course-technology-society-culture-latest/

 

  Or Visit www.hwcampus.com

 

LAS 432 Course Project Week 1-7 Recent DeVry

 

LAS 432 Proposal and Outline Week 1 DeVry

 

Topic and Thesis Proposal

This week, you will select your topic of research for the Course Project. You will need to define the chosen topic, provide a brief description of the emergent technology, and write a thesis statement. Each proposal should include the following items.

The name and a brief description of the emergent technology selected

A thesis statement (Please note that a thesis sentence presents the central idea of the paper. It must always be a complete, grammatical sentence, it must be specific and brief, and it must express the point of view you are taking on the subject. This thesis statement will be included in the introduction of your final report.)

Preview:

The purpose of this paper is to clarify questions and issues pertaining in vitro meat production, including a clear definition of what this emerging technology is all about and previous related emergent technologies that brought about in vitro meat production and other influences that helped develop this line of thinking.  This paper will also compare in vitro…

LAS 432 Course Project Bibliography Week 2 DeVry

 

Resource Review

This week, you will assemble at least five scholarly academic references that will be used to write your course research paper (refer to the tutorial on Scholarly References and Accessing Library Databases found in the Writing and Research Help tab for help on this assignment). You will need to list your references using APA format and provide a brief explanation of each resource indicating how that resource will be used. The focus should be on your specific research assignment. An approximate length for this bibliography is two to three pages.

Preview: Bibliography

Bhat, Z.F., & Bhat, H. (2011). Tissue engineered meat – Future meat. Journal of Stored Products and Postharvest Research. 2(1) 1-10. Print.

Bhat & Bhat (2011) acknowledges that conventional methods of producing meat create many problems associated with health and environmental concerns.  These issues are highly linked to infectious animal diseases, environmental…

LAS 432 Course Project Draft Week 3 DeVry

Historical Timeline and Predecessor Assessment Draft

This week, you will submit a draft of your Historical Timeline and Predecessor Assessment. This portion of the Course Project will include a historical timeline that diagrams at least three predecessors to the emergent technology and a written assessment explaining how these technologies influenced the development of the current technology (roughly two pages, APA format).

This section should include the following:

A visual historical timeline that diagrams at least three predecessors to the emergent technology

An assessment on how these three technologies influenced the development of the current technology

In-text APA-formatted citations with a reference page

The assessment should be well written and should incorporate proper grammar and no spelling errors. It should incorporate an introduction, a body, and a conclusion.

Preview:

The objective of creating synthetic meat that is viable for human consumption has already been entertained even in the early 1900s.  Various scientists have studied the possibility of growing meat out of a Petri dish with varying results.  Some became successful in the beginning, but later on found some discrepancies in their research that resulted to failed laboratory experiments.  Mainly, the…

LAS 432 Course Project Analysis of Impact draft Week 4 DeVry

Analysis of Impact Draft

This week, you will submit your Analysis of Impact draft (roughly four pages, using APA format).

This portion of the Course Project provides an analysis of the chosen technology’s influence on society considering all of the following components:

Social
How has this technology been received, accepted, or rejected? Why? Is it feared or favored? What is the attitude toward change? How are the developers trying to sell the technology to the general public? Look at attitudes, feelings (emotions), behaviors, personality, and the ways humans change as a result of this technology. What is being thought, and why? Is the human mind impacted? How? Are interactions between people changing as a result? Who is included or excluded, and why? Use Maslow’s hierarchy of needs, Piaget, or some other theorist. What psychological needs are met by the technology (e.g., cell phones once granted status and now promote a sense of belonging or connectedness) or created by the technology? Consumerism?

Look at groups and organizations that have arisen and prospered because of this technology. Are these groups supportive or antagonistic, and why? (An example is genetically modified foods [GMOs] and the backlash against the Monsanto corporation. Another is cochlear implants that allow the deaf to hear yet reduce the deaf population that calls itself a community.) How does the technology change society, or how does society change in response to the technology? What factors in society led to the development in the first place? What do class, gender roles, race, norms, and the like mean in this context? Who will benefit from the technology, and who might be harmed (this might also belong in the ethics and morals section)? For example, prosthetics enable people to participate more fully and actively in society (some people compete in triathlons and marathons), and war has brought about the need for advances in prosthetic technology as casualties with missing limbs return home to the United States. Look at the workplace, new companies, and/or jobs created, jobs lost (or save this for the economics section, perhaps). Look at roles—subgroups, people’s interpersonal and intrapersonal relationships. Consider crime, healthcare, and schools. Surveillance cameras, for example, have recently been installed in New York City, and the result has been a decrease in the amount of crime, purse-snatching, pickpocketing, and so forth. Yet some fear the big-brother effect of always being watched and tracked, as well as concerns over “who will guard the guards.”

Cultural
This is a really important section. Consider the elements that comprise the culture and subcultures. Compare the United States’ use of the technology with that of other nations around the world. What is it about Americans that brings about innovation, or has America declined in terms of technical innovation, scientific research, and development? Look at advertising for the technology, the use of celebrities or stars or heroes, the applications (e.g., sports and nanotechnology), and the values represented by the culture. What has priority, and why? An example: IBM was spelled out in xenon atoms. Why were these letters chosen instead of something else? What new words have been added to our vocabulary from this technology? Horseless carriage was used long before the term automobileWireless preceded Wi-Fi, andwebcasting preceded podcastingBroadcast was a term adapted from agriculture long before it was used for radio and television.

How do musicians and artists react to, use, or incorporate the technology in their artistic productions? For example, fiber optic lighting has been used on the stage and in parades (Disney) for costuming. The drama term in the limelight, for example, was derived from a lens and lighting system used in lighthouses. Look at literature—perhaps science fiction or fantasy stories—that predate the technology (Jules Verne, for example, wrote about submarines before they were actually invented and used—though Leonardo da Vinci had sketched the idea centuries before Verne). Are there any songs, short stories, poems, plays, TV shows, or films that directly make reference to the technology? Are there any related literary works that apply? Is the artifact in a museum or will it be? Why? How does the technology relate to concepts of beauty and novelty and human creativity? How can people express their humanity through this technology? An example: Scientists experimenting with nano made a nano guitar that actually played a tune, though it was subthreshold to human hearing.

Political
Look at government policy, government intervention, government involvement (support or lack of support, funding), both nationally and internationally. Consider Congress, the president, the Supreme Court (decisions), the rate of change, liberalism, conservatism, legislation, litigation, and so forth. What political factors are at work in the progression or regression of the technology (e.g. lobbyists, special interest groups, partisan views, vocal advocates, or spokespersons)? For example: The Americans with Disabilities Act was designed to prevent discrimination and encourage accessibility to public facilities; it impacted architects, companies, organizations, and persons with disabilities through the installation of ramps (wider doors, lower knobs and handles, larger restroom stalls), the use of assistive devices in schools and in the workplace, hiring practices, and lawsuits against employers, among other things.

Economic
Consider production, consumption, costs, variables of supply-demand, corporations, private enterprise, and impact on the nation’s economy (employment, displacement, outsourcing). Are certain industries impacted more than others? Look up financial projections—expectations for growth, startup companies, the stock exchange, and so forth—anything related to business and the United States and global economy. Who are the chief players in the business environment, and what is their role? How much has been invested in research and development? How will the price fluctuate? What economic trends are to be observed? Who will make money from the technology? Who is funding the research and development? Who controls the purse strings, and why? Look at foundations and charitable organizations, the outcomes and the nature of consumers. Be sure to use charts and tables and quantitative data in this section. Tables, figures, and data and statistics must be current, valid, and used appropriately.

And the Environmental Impact

Consider such things as dangers to humans, the depletion of resources, air and water pollution, discovery before inventions, impact on wildlife and humans (health and safety), long-term and short-term effects, waste disposal, and aesthetic considerations (how the technology changes the landscape). Look also at the positive effects (savings of raw materials or fossil fuels, low environmental impact, enhancement to the environment). For example, some thought the Alaskan Pipeline would impact the caribou population and its ability to migrate; the scientists discovered that the population actually increased and was healthier because they had “shade” from the above-the-ground pipe, fewer biting flies, and less physically stressed females.
Other negative examples: The spotted owl and deforestation in Washington State; the snail darter and the dam, endangered species and loss of habitats, extinction, over-mining, overproduction, pollution of ground water, landfills, toxic wastes, stripping the soil of nutrients, over fishing, over hunting, and over harvesting.

This section should include the following items.

All of the required sections listed above

At least two statistical graphs or visual aids that support different sections of the analysis

In-text, APA-formatted citations with a reference page

The assessment should be well written and incorporate proper grammar and no spelling errors. It should incorporate an introduction, body, and a conclusion paragraph.

Preview:

As world population continues to grow in number, it is inevitable that the world will soon experience new challenges when it comes to food supply.  Growing scientific evidence supports the presumption that continuous use of animals for agricultural purposes cannot be sustained in the future.  Negative consequences present themselves in the production of meat for human consumption in terms of the environment, culture, economy, and human health.  There is also an…

LAS 432 Research Paper Draft Week 5 DeVry

Ethical Considerations Draft

This week, you will submit your Ethical Considerations draft. This portion of the Course Project will provide an evaluation of the ethical considerations associated with the student’s chosen technology in relation to its impact on humanity (roughly two pages, APA format).

Following are the components needed for this section:

A detailed evaluation of the ethical considerations associated with the technology in relation to its impact on humanity

An illustration of at least two specific ethical theories that differentiates their varying approaches in consideration of the questions raised by the selected technology

At least one statistical graph or visual aid that supports or provides value to the section

In-text, APA-fformatted citations with a reference page

The assessment should be well written and should incorporate proper grammar and no spelling errors. It should incorporate an introduction, body, and a conclusion paragraph.

Preview:

Developments in the production of meat are happening everywhere from meat-based meat to plant-based meat.  If someone says there is a way to eat meat without harming animals, would the public be accepting of the idea?  Would people consider this option thinking that the meat will come from plants if not from animals?  What if the meat is grown in a laboratory?  This new process of growing…

LAS 432 Assignment Week 6 DeVry

Peer Evaluation Assessment and PowerPoint Presentation

For the Peer Evaluation Assessment and PowerPoint Presentation, you will read and respond to a fellow student’s paper by completing a written assessment and creating a PowerPoint presentation, with audio, that communicates a professional and considerate response.

This is a five-step process.

All students must upload a draft of the entire paper to the team area by Tuesday.

Students must download the Peer Evaluation Presentation Assessment Form.

Students must read their peer’s work and complete the Peer Evaluation Presentation Assessment Form.

Students must then create a PowerPoint presentation, with audio, to communicate their findings regarding the report (refer to this Peer Evaluation Presentation Template for help in this area). The final product will assess the communication style of the presenter and should include the following components:

A title page

An introduction slide, outlining the purpose and flow of the presentation

Format of paper evaluation

Historical Timeline and Predecessor Assessment Evaluation

Analysis of Impact Evaluation

Ethical Considerations Evaluation

Concluding Remarks

In-text citations and a references slide

Appropriate visual aids to support the presentation

Preview:  Draft, Peer Evaluation, and 31 Power Point Slides:

The paper has no introduction.  Instead, it delved straight to the historical timeline of the chosen technology.  The paper would have been more effective had there been an introduction because it would have prepared the reader in terms of what to expect in the whole research.  It is supposed to lead the reader from a general…

LAS 432 Research Papert Week 7 DeVry

The Research Paper

This week, you will submit the final draft of your research paper. The paper is expected to be professional and written following APA guidelines. An APA paper template has been provided here for students unfamiliar with these requirements.

The paper must incorporate all of the following components required for the assignment:

A title page, including the student’s name and DSI number

An abstract

A table of contents

An introduction, including a clearly defined thesis statement (roughly one page)

A historical timeline that diagrams at least three predecessors to the emergent technology that includes an assessment on how these technologies influenced the development of the current technology (roughly two pages)

An analysis of the technology’s influence on society considering all of the following components (roughly four pages)

Social

Cultural

Political

Economic

Environmental impact

An evaluation of the ethical considerations associated with the technology in relation to its impact on humanity (roughly two pages)

Concluding remarks that include predictions for the future of humanity given the technology’s emergence (roughly one page)

In-text, APA-formatted citations with a reference page

A one-page peer evaluation analysis detailing the following items:
A copy of the Peer Evaluation Grading Sheet

The edits added or subtracted from the suggestions provided by the collaboration

A description of the reasoning behind the changes

Visual aids, including appropriate graphics and statistical chartsW

Preview: 25 Pages

Meat has always been considered an important food staple.  Due to its huge popularity, livestock production cannot sustain the demand for meat.  Apart from being a favorite food item, it is also highly valued due to the nutritional worth it offers.  To keep up with the high demand for meat, the livestock production industry has been thinking of ways to increase production of meat.  One emerging technology related to meat manufacturing is called…

LAS 432 Self-Assessment Week 8 DeVry

Making good use of the writing process enables us to accomplish two things:

  1. Extend our thinking
  2. Communicate and share our ideas with readers

The goal of this exercise is that in evaluating your writing process you further develop your skills as a thoughtful reader of your own writing and thus identify areas on which to focus attention as you write and revise in the future.

First, to help you evaluate your success regarding the overall writing process, please read over the following list and consider your effectiveness in these areas.  Please then rate yourself on a scale from 1 – 10, with 1 representing an item in which you struggled and 10 meaning you had no problems at all in this area.  (4 points)

Developing a project:

__9__ Understanding the assignment

__8__ Discovering or refining a topic

__8__ Constructing a thesis

__9__ Researching the topic

__8__ Synthesizing and integrating research

__8__ Developing ideas

__8__ Supporting ideas

__9__ Organizing ideas

__9__ Clarifying ideas

Mechanical/grammatical points of writing:

__8__ Transitions (between paragraphs or sentences)

__8__ Sentence structure (run-on’s, comma splices, fragments, etc.)

__9__ Paragraph structure (unity, topic sentences, etc.)

__9__ Integrating quotations

_10__ Capitalization

__9__ Word usage (accuracy)

__9__ Verb usage (verb tense, subject-verb agreement, passive voice, etc.)

__9__ Pronoun usage (pronoun-antecedent agreement, consistent POV, etc.)

__9__ Punctuation

_10_ Spelling

Stylistic points of writing:

__9__ Voice/tone

__9__ Diction

__9__ Conciseness/wordiness

__10__ In-text citations/reference page format (APA)

Please address the following questions concerning your writing process for completing the Course Project.  Please be sure to explain your answers in detail, with at least 4-5 sentences. (6 points each)

Preview:

I think the main strength of my writing is that the whole paper “sounded” like an academic paper, that is, without any traces of personal views coming from myself. The paper was objectively written as evidenced by the references used in coming up with the entire paper.  Additionally…

LAS 432 Discussions Week 1-7 All Posts 555 Pages Recent DeVry

LAS 432 The Role of a Thesis and Science and Technology Discussions Week 1 All Posts 79 Pages DeVry

 

LAS 432 The Role of a Thesis Discussions 1 Week 1 All Posts 39 Pages DeVry

A thesis statement plays an important role in the research process. Baase states in her prologue that “Computer technology is the most significant new technology since the beginning of the Industrial Revolution.” In doing so, she had to back up this argument with solid scholarly research. To evaluate the strength of her argument, consider for a moment whether she accomplished this goal. How did she do in convincing you of her claim? What were the arguments she used to support her point within Week 1’s reading? Were they enough to convince you that she was right in stating this? Why is Baase’s thesis statement considered a good example to study in preparing for writing your own thesis statement this week?…

LAS 432 Science and Technology Discussions 2 Week 1 All Posts 40 Pages DeVry

If the scientific test of a scientific theory is accepted by the community of men and women who are called scientists, does that mean that anything is acceptable as long as enough of the right people agree with it? Does that mean there is no such thing as scientific truth? How, if at all, does science differ from politics, art, or religion? Sometimes repeated research finds conflicting results about a formerly reported scientific fact – how does this affect American trust in scientific facts? Why is it that scientists follow the steps of the scientific method – what is gained by this process?…

LAS 432 Technology and Social Change and Historical Impact Discussions Week 2 All Posts 76 Pages DeVry

 

LAS 432 Technology and Social Change Discussions 1 Week 2 All Posts 38 Pages DeVry

In what way or ways is the current knowledge revolution a child of the Industrial Revolution? Is this a new revolution or simply an extension of the 18th-century revolution? Given the history, is it perhaps more appropriate to call the current revolution a communications revolution? Many of our digital technology tools involve communication for personal and for business reasons.  Do you think that this trend will continue into the next technology revolution?…

LAS 432 Historical Impact Discussions 2 Week 2 All Posts 38 Pages DeVry

Your online lesson this week details the events of the Protestant Reformation, a historic turning point for Western civilizations. Please discuss the specific role that the Protestant Reformation played in laying the groundwork for the advancement of communication techniques and technologies within Western culture. Can you identify an historical event within our own nation which has laid the foundation for new ways of thinking and behaving involving technology?…

LAS 432 The Politics of Technology and Considering the Fourth Amendment Discussions Week 3 All Posts 84 Pages DeVry

LAS 432 The Politics of Technology Discussions 1 Week 3 All Posts 43 Pages DeVry

Freedom of speech and censorship, in light of the modern digital landscape, are important concepts to consider, especially given the dubious ways in which technology can be utilized sometimes. Superior expertise about how technologies work does not guarantee superior judgment about how they should be used, regulated, or governed. As technology becomes more sophisticated, how can citizens and political leaders judge and understand whether a given technology offers great perils or great promises? When great technological projects, such as venturing farther into the galaxy or developing new life-extending medicines, are proposed, how should government officials make decisions about how tax dollars should be spent? Can you provide some examples of what you have referred to as “sophisticated technologies”?…

LAS 432 Considering the Fourth Amendment Discussions 2 Week 3 All Posts 41 Pages DeVry

The Fourth Amendment to the U.S. Constitution secures the right of privacy. It protects American citizens from unreasonable searches and seizures. Advancements in technology have raised issues regarding this protected right. Explain the reasons for governmental surveillance of electronic communications, and the fear associated with these actions. From your review of the Fourth Amendment, do you think that legislative action is required to more fully address issues related to our digital technology? From what you read, do you think that legislation like the Electronic Communications Privacy Act is needed or not to address changes that occur over time in our technology?…

LAS 432 Technology and Art and Globalization and the Threat to the Environment Discussions Week 4 All Posts 78 Pages DeVry

LAS 432 Technology and Art Discussions 1 Week 4 All Posts 37 Pages DeVry

We normally think of the arts as very different from technologies in spite of the fact that art (with perhaps a few exceptions) is practiced with the help of technology. This practice creates interdependence between technology and art. To what extent does art respond to, or is shaped by, the technology that enables it? To what extent have advanced and accessible digital technologies, such as websites, digital photography, and YouTube, changed the relationship between art and technology? Are these technologies reshaping our attitudes toward artists? This discussion includes how art and technology can be combined to produce new genres of artistic expression.  I have posted a site below which represents just one example of how digital technology and the fine arts are being linked together.
Digital Fine Art
Please feel comfortable in sharing your own examples! When a computer generates a painting, who do you feel the artist is, the computer or the individual who created the program to do this?…

LAS 432 Globalization and the Threat to the Environment Discussions 2 Week 4 All Posts 41 Pages DeVry

Before we decide what to do about the environment globally, let’s see what we can do locally. What environmental problems are you aware of in the area where you live? What solutions do you think would be most appropriate to solve these problems? Incentives can encourage utilization of actions like recycling.  In the county where you live, do you think this idea could be seriously considered?  What is going on in your areas related to the use of solar energy?…

LAS 432 Technology Morality and Ethics and What is Reality Discussions Week 5 All Posts 72 Pages DeVry

LAS 432 Technology Morality and Ethics Discussions 1 Week 5 All Posts 36 Pages DeVry

This week, we will explore the concept of ethical thought. As your lecture points out, there are many different ethical arguments, but two large groups of thought are deontological (largely associated with the work of Immanuel Kant) and telelogical ethics (largely associated with John Stuart Mill). The first believes that we should judge our ethics based on the idea of universal understandings. For example, it is logical that all persons do not wish to be harmed, so ethically we can establish a principle based on this. So, under this line of thought, if it is ethically wrong to harm a person, then the death penalty must be ethically wrong, because it violates this principle. If you follow this ethical approach, all ethical questions must be evaluated in accordance to these universal principles. In contrast, telelogical ethics, which utilizes utilitarian thought, looks to the outcome of the action and weighs if it is good based on its impact on the majority. For example, in considering the idea of the death penalty again, one must weigh whether utilizing the death penalty benefits the majority of the population. If the majority is helped, then the action is viewed as ethically sound; if the majority is hurt, it is not. In understanding these thoughts and approaches, what do you think about cloning? Is there a universal thought it may violate? Or can it be considered as good for a majority? What are your thoughts, and what are the different questions that can be raised behind them?  Cloning technology has raised many ethical questions and debates – at the same time, therapeutic cloning is being used at some University-based hospitals in our nation – why is this?…

LAS 432 What is Reality Discussions 2 Week 5 All Posts 36 Pages DeVry

The concept of a computer obtaining consciousness is not new. It has been the inspiration for sci-fi writers for years. However, the larger question at play here is whether artificial intelligence can actually be achieved. And if so, what are the ethical implications concerning this advancement. Take a moment to explain the Turing test (discussed in Chapter 1) and its use in determining computer intelligence. In doing so, please address the philosophical idea of the singularity (discussed in Chapter 7) and assess why conscious computers may be essential to the singularity. From what you have read, what are some of the ethical issues generated by AI technology? Do you foresee intelligent robotics being used to deliver services to people?…

LAS 432 Technology and Modern Culture and Technology’s Impact Discussions Week 6 All Posts 81 Pages DeVry

LAS 432 Technology and Modern Culture Discussions 1 Week 6 All Posts 43 Pages DeVry

What are some of the ways that the ease and simplicity of our current technological devices have led us to surrogate our daily responsibilities onto these devices? How do these make us vulnerable to errors, risks, and/or failures? Please include examples, and be as specific as possible. Class, below I have posted the site for the Institute for Global Futures which describes how robotics are used to perform specific human tasks.  This is a different type of use of technology to delegate human duties to, as compared to the everyday delegation we can make to our smart phones, as one example.
SURROGATING HUMAN TASKS TO ROBOTICS Do you foresee into the future, robotics “managing” workers? While our reliance upon technology does generate dependency, from your observations, are there skills acquired from our frequent use of digital technology?…

LAS 432 Technology’s Impact Discussions 2 Week 6 All Posts 38 Pages DeVry

Cell phones have become a part of Americans’ daily lives, as well as that of other cultures around the globe. Over the past decade, reports that reflect a danger associated with this technology have emerged, although some experts say there is not enough evidence to support these claims. In considering both arguments, assess whether there is causative link between cell phones and brain cancer. Or is it just a coincidence?

Class, in this discussion, it is important to examine and discuss different facts and different perspectives related to the health issues associated with cell phones.  I encourage you to research the topic and share information sources in the discussion.
Below I have posted the link to the site ProCon.org and its review of literature on this topic, which is later accompanied by a summary list of pros and cons related to whether or not cell phones are safe.
Are Cell Phones Safe?

Do you think that product testing by the federal government should be lengthened? Studies of the possible correlation between cell phone usage and brain cancer show mixed outcomes.  But do you think that public education about potential health risks associated with cell phones might be helpful or not?…

LAS 432 Employee Monitoring and Technology and the Job Market Discussions Week 7 All Posts 85 Pages DeVry

LAS 432 Employee Monitoring Discussions 1 Week 7 All Posts 40 Pages DeVry

Consider the reasons given in Figure 6.1 that list why employers monitor employee communications. Of the examples provided, for which do you think it is appropriate to have regular, ongoing monitoring for all employees, and for which do you think an employer should access employee communications only when a problem occurs? Explain your reasoning. Workplace monitoring has increased in our nation – what factors have generated its growth? Most employers are concerned daily with the productivity of their employees.  From what you have read and observed, do you think that most American workers are aware of this perspective?…

LAS 432 Technology and the Job Market Discussions 2 Week 7 All Posts 45 Pages DeVry

Technology has had a direct and distinct impact on the job market. Many online resources exist to help you assess strengths and identify areas to develop as you prepare for your career or for your next career move. For this week, you’ll complete and reflect on one online assessment that measures your skills in: 1) reading and critical thinking, 2) writing, and 3) mathematics. This assessment is part of the DeVry University Assessment plan and helps us to demonstrate what students have learned so that we can continuously improve the curriculum and represent the achievements of our students as they near graduation. Completing the ETS Proficiency Profile is an important part of this week’s class activity.

The profile consists of a 40-minute, 36-item assessment. Follow the step-by-step instructions included in the attached. Please print and review the instructions before beginning. Once you’ve completed the assessment, share how you reacted to difficult questions. What did you learn from the process that you can take forward into your career?

In discussing the impact that technology has had and can have upon the employment of Americans, it is important to be specific about “what technology” is being considered…

 

HSM 420 Entire Course

 

HSM 420 Entire Course  

Click Link Below To Buy:

 http://hwcampus.com/shop/hsm-420-entire-course/

 

  Or Visit www.hwcampus.com

 

HSM 420 Entire Course Managed Care and Health Insurance NEW DeVry

HSM 420 Entire Course Project Week 2, 5, and 7 DeVry

 

HSM 420 Course Project Topic Selection Week 2 (50 points) DeVry

 

It is expected that you will provide a focused topic, including a statement of the key challenges or problems currently associated with the topic in America.

Preview:

For the course project, the paper will focus on fraud and abuse in managed care and how to prevent such instances.  The paper will include information on various fraudulent and abusive acts of healthcare providers, including steps the government has taken to…

HSM 420 Course Project Outline Week 5 (100 points) DeVry

 

It is expected that the outline be submitted in a formal outline format as demonstrated below. Your outline should show enough detail to demonstrate that you have begun thinking about the organization of your paper and the research required into the topic. After your outline, please submit a listing of the sources you have already identified for your paper.

Preview:

The Introduction part of the paper will provide an executive summary of the issues on fraud and abuse in managed care environments.  It has been proven that fraud and abuse cases cause economic drain on the health care system, including the country’s health care system due to the health problems of its citizens.  While it is true that…

HSM 420 Final Course Project Week 7 (170 points) Preventing Fraud and Abuse in Managed Care DeVry

 

It is expected that the final version of your Course Project will be 7–10 pages in length, with 6–8 sources identified.

Preview:

Fraud and abuse cases are among the leading reasons why a country’s health care system experiences economic drain.  Despite the vigilance of various sectors in society in ascertaining that fraud and abuse cases in health care are brought to the forefront, only about 10% of these cases have been clearly identified.  This is because many of those who are in the health care industry are involved in those cases.  Additionally, even patients are involved in deception tactics in the…

HSM 420 Webliography Week 7 DeVry

 

Over the length of the course, upload three separate URL references to articles relating to current healthcare insurance and managed healthcare issues to the dropbox.

Preview:

Title: 8 Indicted in Identity Thefts of Patients at Montefiore Medical Center

Web Link: http://www.nytimes.com/2015/06/20/nyregion/8-indicted-in-identity-thefts-of-patients-at-montefioremedical-center.html

Author/Date: Liam Stack, June 19, 2015

Description: A Montefiore employee and seven others were indicted on charges of stealing the personal information of about 12,000 hospital patients and using the…

HSM 420 Midterm Exam Managed Care and Health Insurance DeVry 100% Correct

 

(TCO 1) Describe the preferred provider organization (PPO) model of managed care. Why do you feel that this is the dominant form of managed care today?

 

In this plan, the patient uses a medical provider under contract with the insurer for an agreed-upon…

(TCO 1) How has the relationship between government and managed care evolved over the years? What factors have driven this changing relationship?

 

Over the past two decades, managed care organizations (MCOs) have emerged in the United States. The differences between types of managed care organizations are…

(TCO 2) What is the role of the credentialing committee in a managed care organization? And why is this function so crucial?

 

Credentialing refers to the review of a professional provider’s ability to meet the plan’s standards for participation, being board certified…

(TCO 2) Why do managed care organizations have a board of directors? What is the function of the board of directors?

 

Managed care has a board of directors to plan and to the shareholders in the event that the plan is for…

(TCO 3) What are the three basic categories of utilization management? Provide a brief description of each category.

 

The three primary categories of utilization management are: 1.) Prospective is for elective procedures or services prior to such services being…

(TCO 3) What are meant by “outliers” in hospital reimbursement? How do outlier cases impact reimbursement to a hospital?

 

Outlier’s cases refer to extra payment if a patient’s costs exceed certain thresholds. It is less…

(TCO 4) Discuss some key general aspects of physician practice behavior? Include implicit messages from training, and also environmental factors, in your answer.

 

As we all know, it takes a long process to be a physician. Thus, physicians are selected for medical school because of certain…

(TCO 4) What is meant by large case management (LCM) under managed care? Provide some specific examples of this type of case management.

 

Large case management (LCM) under managed care is a process of identifying plan members with special healthcare needs, developing a…

(TCO 7) What is the purpose of the declarations in managed care contracts?

 

The purpose of the declarations in managed care contracts the parties provide answers to a number of “what if” questions. This is simply…

(TCO 7) What is the purpose of hold-harmless and balance-billing clauses in managed care contracts?

 

The hold- harmless clause involves the provider agreeing to not pursue a patient for fees in excess of the allowed amount of the…

HSM 420 Quiz Week 6 DeVry 100% Correct

 

(TCO 5) What is the purpose of the Privacy Rule? How has this rule impacted healthcare organizations? (Points : 30)

The Privacy Rule went into effect on April 14, 2001, and required that all “covered entities” must be in compliance with the privacy, security, and…

(TCO 4) What happens if someone alleges that a physician has committed a criminal act such as fee splitting? What organizations would be involved in investigating such an allegation? (Points : 30)

Fee splitting occurs when one physician offers pay another physician for the referral of patients. Fee splitting has been considered…

(TCO 4) The medical record is legally owned by the  (Points : 5)

Patient

Physician

State

Lawyer

(TCO 8) All of the following vaccines and toxoids are required for children by law except (Points : 5)

Measles

Polio

Pertussis

Croup

(TCO 5) The records of all adult patients should be kept a minimum of (Points : 5)

2 years

5 years

10 years

None of the above

(TCO 5) Medicare and Medicaid records should be retained for (Points : 5)

1 year

5 years

10 years

None of the above

HSM 420 Discussions Week 1-7 All Posts 457 Pages DeVry

 

HSM 420 Indemnity Versus Managed Care and Managed Care Impacts Discussions Week 1 All Posts 60 Pages

 

HSM 420 Indemnity Versus Managed Care Discussions 1 Week 1 All Posts 33 Pages

 

Early models of health insurance in America were what we call “indemnity plans” or traditional health insurance plans. What is meant by an indemnity plan, and how is managed care different from traditional indemnity insurance?…

HSM 420 Managed Care Impacts Discussions 2 Week 1 All Posts 27 Pages

 

There can be no doubt that managed care has impacted everyone involved with healthcare delivery in America. What do you see as some of the most significant impacts of managed care for patients?…

HSM 420 Provider Networks and Legal Issues in Provider Contracting Discussions Week 2 All Posts 63 Pages

 

HSM 420 Provider Networks Discussions 1 Week 2 All Posts 31 Pages

 

Why do managed care organizations seek to establish a provider network? What are the primary reasons for contracting with providers?  Can an MCO survive without a provider network?…

HSM 420 Legal Issues in Provider Contracting Discussions 2 Week 2 All Posts 32 Pages

 

Describe and discuss the key issues associated with provider payment that should be addressed in any managed care contract.  The way that providers are reimbursed has been simplified.  Why are some providers having issues with receiving payment?…

HSM 420 Utilization Management and Case Management Versus Disease Management Discussions Week 3 All Posts 67 Pages

 

HSM 420 Utilization Management Discussions 1 Week 3 All Posts 33 Pages

 

What are the primary categories of utilization management (UM)? How does UM determine medical necessity through the use of evidence-based guidelines?  What do the categories used in utilization management mean in laymen’s terms?….

HSM 420 Case Management Versus Disease Management Discussions 2 Week 3 All Posts 34 Pages

 

What are the key differences between conventional case management and disease management? Provide some examples of diseases that seem to benefit from a disease management model of care.  What is case management?  What is disease management?  How would case management differ in an urban patient with kidney issues and a rural patient with kidney issues?….

HSM 420 Managed Care Pharmacy Benefits and Managed Behavioral Healthcare Discussions Week 4 All Posts 58 Pages

 

HSM 420 Managed Care Pharmacy Benefits Discussions 1 Week 4 All Posts 31 Pages

 

What are the most important elements of a managed care pharmacy benefit program? And how are patient prescription benefits typically different under managed care?  Pharmacy benefits is a controversial topic within managed care.  As a patient, what do you want?  How often do pharmacists recommend certain drugs to providers?  Is this recommendation for costs control or quality products?…

HSM 420 Managed Behavioral Healthcare Discussions 2 Week 4 All Posts 27 Pages

 

What factors surrounding behavioral health create special challenges and special considerations for managed care programs? How is managed behavioral healthcare different from managed acute medical or managed acute surgical care?  The need for behavioral healthcare coverage is ever-growing in this country.  What is the problem with providing adequate coverage?  Do you think that if patients stopped using the ER as a doctor’s office and used it for emergencies only that there would be adequate staff?…

HSM 420 Managed Care Accreditation and Managed Care Marketing Discussions Week 5 All Posts 64 Pages

 

HSM 420 Managed Care Accreditation Discussions 1 Week 5 All Posts 36 Pages

 

Discuss the main elements of the managed care accreditation process. For each main element, explain why it is important.  Are these steps adequate?  Should more be done?  There are so many elements that must be monitored.  If healthcare facilities were not held accountable for delivering these elements in an efficient manner, quality care would not be delivered.  For reimbursement  of Medicare claims must the facility be accredited?…

HSM 420 Managed Care Marketing Discussions 2 Week 5 All Posts 28 Pages

 

Discuss how managed care sales and marketing have evolved over recent decades, and how these may possibly evolve over the decades ahead.  Does healthcare marketing vary based on location?  With the Affordable Care Act, have the number of insured in rural areas increased?…

HSM 420 Fraud and Abuse and Managed Care Marketing Discussions Week 6 All Posts 77 Pages

 

HSM 420 Fraud and Abuse Discussions 1 Week 6 All Posts 44 Pages

 

Discuss fraud and abuse in healthcare. Provide at least three specific examples of fraudulent practices that have taken place in U.S. healthcare, and describe ways to prevent these in our modern healthcare environment….

HSM 420 Managed Care Marketing Discussions 2 Week 6 All Posts 33 Pages

 

Explain the difference between underwriting and rating. What are the key elements that typically go into rate development formulas? I agree that underwriters must remain knowledgeable of all new laws.  This role involves continuous training.  What do you think is the most stressful about this job?  Do you think that it is difficult for the underwriter to keep emotion out of his/her decision?…

HSM 420 State and Federal Regulation and Patient Protection and Affordable Care Act Discussions Week 7 All Posts 68 Pages

 

HSM 420 State and Federal Regulation Discussions 1 Week 7 All Posts 34 Pages

 

What are the most critical components of state regulation for managed care organizations? And which federal regulations also bring specific requirements for the operation of such entities? Discuss state and federal regulation of MCOs. Do you think that there are enough regulations for MCOs? …

HSM 420 Patient Protection and Affordable Care Act Discussions 2 Week 7 All Posts 34 Pages

 

Study the provisions of the Patient Protection and Affordable Care Act (PPACA) in your textbook. What will be the primary impacts of PPACA on managed care organizations. Consider both positive and negative impacts in your answer. Why was the PPACA developed?…