Math221- Lab 6

In: Other Topics

Submitted By dreamingpoet88
Words 1024
Pages 5
Statistics – Lab #6

Name:___ _______

Statistical Concepts: * Data Simulation * Discrete Probability Distribution * Confidence Intervals

Calculations for a set of variables

* Open the class survey results that were entered into the MINITAB worksheet.

* We want to calculate the mean for the 10 rolls of the die for each student in the class. Label the column next to die10 in the Worksheet with the word mean. Pull up Calc > Row Statistics and select the radio-button corresponding to Mean. For Input variables: enter all 10 rows of the die data. Go to the Store result in: and select the mean column. Click OK and the mean for each observation will show up in the Worksheet.

* We also want to calculate the median for the 10 rolls of the die. Label the next column in the Worksheet with the word median. Repeat the above steps but select the radio-button that corresponds to Median and in the Store results in: text area, place the median column.

Calculating Descriptive Statistics

* Calculate descriptive statistics for the mean and median columns that where created above. Pull up Stat > Basic Statistics > Display Descriptive Statistics and set Variables: to mean and median. The output will show up in your Session Window. Print this information.

Calculating Confidence Intervals for one Variable

* Open the class survey results that were entered into the MINITAB worksheet.

* We are interested in calculating a 95% confidence interval for the hours of sleep a student gets. Pull up Stat > Basic Statistics > 1-Sample t and set Samples in columns: to Sleep. Click the OK button and the results will appear in your Session Window.

Variable N Mean StDev SE Mean 95% CI
Sleep 20 6.950 1.572 0.352 (6.214, 7.686)

* We are also interested in the same analysis with a 99% confidence interval.…...

Similar Documents

Unit 6 Subnetting Lab 6

...Unit 6 Subnetting Lab 6 Answer the following questions listed. Using the Class B Subnetting Guide, answer the following: Given an IP address of 172.16.8.1 use the guide to get 30 hosts on each of your 2000 networks: 1. What Class is this IP address? B 2. How many bits would you borrow or take? 11 3. What subnet mask would you generate? 255.255.255.224 4. What is the first subnetwork range created? 172.16.0.1 to 172.16.0.30 5. What is the last subnetwork range created? 172.16.255.225 to 172.16.255.254 Given an IP address of 172.16.4.1 use the guide to get 62 hosts on each of your 1000 networks: 6. What Class is this IP address? B 7. How many bits would you borrow or take? 10 8. What subnet mask would you generate? 255.255.255.192 9. What is the first subnetwork range created? 172.16.0.1 to 172.16.0.62 10. What is the last subnetwork range created? 172.16.255.193 to 172.16.255.254 Given an IP address of 172.16.5.1 use the guide to get 100 hosts on each of your 500 networks: 11. What Class is this IP address? B 12. How many bits would you borrow or take? 9 13. What subnet mask would you generate? 255.255.255.128 14. What is the first subnetwork range created? 172.16.0.1 to 172.16.0.126 15. What is the last subnetwork range created? 172.16.255.129 to 172.16.255.254...

Words: 274 - Pages: 2

Lab 6

...Chapter 6 Assessment Questions 1. In terms of business continuity, a hostage situation could be considered a disaster. True 2. _____ is choosing not to engage in an activity that carries some element of risk. Risk avoidance 3. _____ is carrying on despite the risks involved in a given activity. Risk acceptance 4. _____ is the process of assigning risk to someone else. Risk transference 5. _____ combines attempts to minimize the probability and impact of risk. Risk mitigation 6. The three main threat categories are information confidentiality, _____, and availability. Integrity 7. Even non-sensitive data should be kept under some level of access control. True 8. Any system or data resource that, if it were lost, stolen, damaged, altered, or publicly divulged, would cause a significant negative impact to the organization should be considered _____. Sensitive 9. Which of the following is an access control system in which rights are assigned by the owner of the resource? Discretionary access control 10. Which of the following is an access control system in which rights are assigned based on a user's role rather than his or her identity? Role-based access control 11. Which of the following is an access control system in which rights are assigned by a central authority? Mandatory access control 12. The principle of separation of responsibility requires a minimum of how many conditions to be met before...

Words: 282 - Pages: 2

Lab 6

...3. What are three modes of SELinux? Explain their basic functionality. Enforcing: SELinux policy is enforced/SELinux denies access based on policy rules Permissive: SELinux policy is not enforced/SELinux does not deny access, but denials are logged for actions that would have been denied if running in enforcing mode. Disabled: SELinux is disabled/Only DAC (Discretionary Access Control) rules are used. 4. Consider the following firewall rule, and describe what this permits or denies. Allow http (web) traffic through SSL using SSH & allow ICMP pings, while denying all other traffic. 5. What command would you use to allow all the traffic from the loopback? iptables -A INPUT -i lo -m ACCEPT iptables -A OUTPUT -o lo -m ACCEPT 6. What command would you use to view the network port configuration for the iptables? /etc/network/interfaces 7. If a service is to allow in one place and to deny in another, what is the outcome? Allow, because deny is the file pulled first and then the allow file, so the last one pulled is to allow. 8. Is the order of the rules important? If you deny something within the IP network layer, but permit something within the TCP transport layer that uses IP network layer that you just denied, will your TCP traffic be permitted? Yes. Because the "allow/permit" is in the next layer and pulled after the Network layer where you had the "deny", it will work as this is the last information pulled and enforced. 9. If one of the files does......

Words: 355 - Pages: 2

Lab 6

...Assessment Worksheet 91 LaB #6 – aSSESSmENt WORKSHEEt Perform Business Continuity Implementation Planning Course Name and Number: Student Name: Instructor Name: lab due date: 6 Perform Business Continuity Implementation Planning Overview In this lab, you were asked to begin the business continuity planning process for an e-commerce company, Online Goodies. You reviewed the key business functions and a prioritized list of impacted IT systems, applications, and data provided by your supervisor. You also compared the components of the major documentation required by the business continuity planning process: risk analysis, business impact analysis, business continuity plan, disaster recovery plan, and the business continuity implementation plan. Lab Assessment Questions & Answers 1. What is the difference between a risk analysis (RA) and a business impact analysis (BIA)? Risk analysis is often identifying the potential threats and the associated vulnerabilities to the organizations .Risk analysis doesn’t view the organization from the mission critical Business Process point of view. BIA the organization from the impact that is going to occur for an organization if the critical business processes are interrupted or tampered 2. What is the difference between a disaster recovery plan (DRP) and a business continuity plan (BCP)? Disaster recovery plan is have a full access to recover any lost data or essentials after a disaster while the business......

Words: 681 - Pages: 3

Lab 6

...1. Why are spindle fibers important for mitosis? (5 points) Chromosomes use spindle fibers as pathways to daughter cells during mitosis. 2. State the four bases that make up DNA. (4 points) a. Adenine b. Guanine c. Thymine d. Cytosine 3. What are the two base pairs? (2 points) a. T & C b. A & G 4. Answer the following questions: a. Define the term crossing over. (3 points) During meiosis’ prophase the homologous chromatids exchange segments. b. Explain why crossing over is important in meiosis. (3 points) Parents cell use it to pass genes off to their children cells. 5. What are the two main differences between mitosis and meiosis? (4 points) a. The amount of cell divisions b. The genes that are exchanged between chromosomes 6. Answer the following questions: a. Explain the difference between mitosis and cytokinesis. (3 points) Cytokinesis is running one cell into two cells. Mitosis is a nuclear division that causes the separation of chromosomes. b. When does mitosis occur during the cell cycle? (1 point) During the prophase, metaphase, anaphase, and telophase. c. When does cytokinesis occur during the cell cycle? (1 point) The telophase 7. Explain the differences that occur during cytokinesis of plant and animal cells. (5 points) The animal cell membrane is drawn inward until the cytoplasm is divided into two equal parts. In plant cells, cytoplasm is divided by the formation of a cell plate that extends until the two daughter cells become......

Words: 821 - Pages: 4

Lab 6

...the required questions. You must retype the questions in your lab report in order to make your answers very clear. Also, you should support your answers with graphical results. In most cases, you will be instructed to view the graph either As Is or time_average, and you might want to zoom in when you feel like it is necessary. However, please do not hesitate to include addition graphs in any view of your choice any time that you feel like those graphs may support your answer. Also, you are encouraged to use your textbook, the Internet, or any other reference material that you feel will help support your answers to the questions. However, make sure that you reference any such materials at the end of your lab report. Copying a Graph to Your Lab Report After You Have Clicked Show To view your graphical data, click anywhere on that specific graph, and then hit the (alt) and (prt scr) keys on your keyboard at the same time. If you now go to your Word document and select Edit –> Paste from your tool bar (or Ctrl-V), the graph will be pasted into your Word document. Some questions will require you to import specific graphs, but you should feel free to import graphical results any time when you feel like it helps to support your answer. Also, always make sure that you clearly label your graphs. Required Lab Questions for NETW320, Codec Selection for Campus Network (This section is worth 75% of your grade for this lab.) 1. Go to the Results Browser, select Results for......

Words: 1257 - Pages: 6

Lab 6

...Category | Points | Description | Section 1Configuring OSPF Single Area: 40 Points * Task 1: Step 5 * Related Explanation or Response * Task 1: Step 6 * Related Explanation or Response * Task 1: Step 10 * Related Explanation or Response * Task 2: Step 4 * Related Explanation or Response * Summary Paragraph | 2323232320 | Paste the requested screenshot.Provide the requested answer.Paste the requested screenshot.Provide the requested answer.Paste the requested screenshot.Provide the requested answer.Paste the requested screenshot.Provide the requested answer.In your own words, summarize what you have learned about IP subnetting and configuration. | Total | 40 | | ------------------------------------------------- Name: Barry Bird Date:4/17/14 Professor: Mohammad Kasraian ------------------------------------------------- Configuring OSPF Single Area vLab (30 points) Write a paragraph (minimum five college-level sentences) below that summarizes what was accomplished in this lab, what you learned by performing it, how it relates to this week’s TCOs and other course material, and (just as important) how you feel it will benefit you in your academic and professional career. (10 points) In this Ilab we learned how to Configuring OSPF setting in a router simulated environment. We learned the commands that must be used to properly install these settings. We learned how to create a designated router and a backup......

Words: 506 - Pages: 3

Lab# 6

...Lab #6 – Assessment Worksheet Identifying and Removing Malware on a Windows System Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you used AVG AntiVirus Business Edition to identify the viruses, worms, Trojans, malware, or other malicious software found on a compromised Windows machine. You completed a scan of the entire computer, learned how to exclude folders to avoid false positives, and understood the importance of maintaining the signatures database. You discovered the difference between a full computer scan and a Resident Shield scan. Finally, you also permanently removed the malware identified by the antivirus software and scheduled the scan to run automatically. Lab Assessment Questions & Answers 1. Why is it recommended to update the antivirus software’s signature database before performing an antivirus scan on your computer? updating the antivirus software with the latest virus definitions ensures the software has the latest information to identify and quarantine threats. 2. What are typical indicators that your computer system is compromised? slow response opening, operating system not booting up correctly or no functioning normally, event logs reporting numerous unusual......

Words: 291 - Pages: 2

Lab 6

...Lab Assessment Questions & Answers 1. What is the difference between roles and features in Windows Server 2008? A server role is a set of software programs that lets a computer perform a specific function for multiple users or other computers within a network. Features are software programs that can support or increase the functionality of one or more roles, or improve the functionality of the server, regardless of which roles are installed. 2. What is installed when you choose the Windows Server Backup Feature? Windows Server Backup Microsoft Management Console (MMC) snap-in. 3. How often should servers be backed up? It is recommended to do them frequently. About every 90 days should be fine. 4. What are the different types of backup that are performed in servers? Copy Backup, Daily Backup, Differential Backup, Incremental Backup, Normal Backup. 5. What are the primary purposes of backing up a server? Recover information after it is lost. 6. Besides performing and scheduling changes, what else can you do in the Windows XP Backup and Restore program? In the Backup you can backup everything on the computer, selected files, drives, or network data, only backup the System State data. In the Restore you can only restore from a backup file. 7. Can you restore a server’s operating system image using the restore application? Yes, by using Windows Recovery Environment and a backup that you created earlier with Windows Server Backup. 8. What are the options to......

Words: 304 - Pages: 2

Lab 6

...University of West Florida Electrical and Computer Engineering Digital Logic and Computer Systems EEL 3701L Lab 6: BCD to Seven Segment Display Decoder Due: November 3, 2014 Meghan Szatkowski, Brandon Burrows, Michael Long Abstract: For this lab we were to create a circuit that displays decimal numbers from binary numbers since most humans are not capable of reading binary. Using a 7-segment display we are able to achieve that by converting the BCD value into a 7 bit output. The 7-segment display has 7 LEDs and a certain amount of voltage triggers each of the 7 segments to produce a decimal number. Procedure 1. Create a truth table for your 4 bit input and the corresponding output necessary to light the proper segments of the display. For example, if the input is represented by WXYZ and the output is identified as ABCDEFG then if the input is 0000, all outer LEDs should be lit while the middle LED should be off. Once you create the rows in a truth table for the other 9 combinations, find the function for each segment. 2. Depending on whether you are dealing with more 0s or 1s, choose NAND or AND gates to implement each segment function. 3. Wire the input DIP switches to the decoder input. Note that you have 2 3x8 decoders. You will need to use the inputs and enable lines to combine them in order to implement these 7 functions. 4. Wire the NAND or AND gates to the proper outputs of the decoders in order to implement the functions for each......

Words: 1151 - Pages: 5

Lab 6

...algae in the lake. 7.3 Based on your sampling, what do Trout in the lake eat? 1 point Trout eat the Daphnia and Bosmina. 8.1 After reading the above statement, did you miss any species in your gut content sampling? If so, which ones? 1 point The species I missed in my gut content sampling was the cyanobacteria. Exercise 2: P in the Water (8 points) 3.1 When the simulation stops, record the population size of green algae (from the graph), and the dissolved oxygen (DO) level (from the graph or from the meter at the bottom of the lake) in the first row of the data table which follows. [ 5 ] Increase PHOSPHORUS to 2x (double the starting concentration). Then click the STEP 52 WEEKS button to run the simulation for one year. [ 6 ] Click the RESET button, then increase PHOSPHORUS to 3x (triple the starting concentration). Then click the STEP 52 WEEKS button. 1 point Phosphorus Input Green Algae Population Size Dissolved Oxygen (Mg/L) 1x 201 7.2 2x 346 4.3 3x 462 1.2 6.2 Draw a line graph of your green algae population size data to show how green algae relate to phosphorus input levels. Don’t worry about being too precise; you can graph approximate values. 2 point 6.3 Does the relationship between green algae population size and phosphorus level indicate that phosphorus was a limiting nutrient for green algae in the lake? Explain. 1 point Yes, the relationship between green algae population size and phosphorus level indicates that phosphorus was a......

Words: 572 - Pages: 3

Lab 6

...Unit 6 Lab 6.1: Pseudocode Learning Objectives and Outcomes Use Boolean variables and logical operators in computer programs. Use compound logical conditions. Required Setup and Tools Standard lab setup Lab Manual Lab Demo Media and Startup Files CD Recommended Procedures Complete Lab 6.1: Pseudocode from the lab manual. Deliverables Submit the following at the end of this lab activity: The completed inputOptions() module in pseudocode in Step 1 The completed displayProvider() module with a case structure in pseudocode in Step 2 The completed and workable algorithm with nested If-Else statements using logical operators in Step 3 Unit 6 Lab 6.2: Flowcharts Learning Objectives and Outcomes Use flowcharts and pseudocode to represent Boolean conditions. Use if-then, if-then-else, and case structures in a computer program. Use Boolean variables and logical operators in computer programs. Use compound logical conditions. Required Setup and Tools Standard lab setup Lab Manual Lab Demo Media and Startup Files CD Recommended Procedures Complete Lab 6.2: Flowcharts from the lab manual. Deliverables Submit the following at the end of this lab activity: Corrected variable declarations and initializations using Visio in Step 2 Corrected module calls using Visio in Step 3 Corrected inputOptions() module using Visio in Step 4 Corrected displayProvider() module with case labels and flow lines using Visio in Step 5 Corrected displayChoices() module with......

Words: 355 - Pages: 2

70-687 Lab 6

...Lab 6 Controlling Access to local hardware and applications ------------------------------------------------- This lab contains the following exercises and activities: Exercise 6.1 | Installing Remote Server Administration Tools | Exercise 6.2 | Configuring Removable Storage Access Policies | Exercise 6.3 | Using AppLocker | Lab ChallengeLab Challenge | Creating an AppLocker Rule Based on File Hash Using Assigned Access | BEFORE YOU BEGIN The lab environment consists of student workstations connected to a local area network, along with a server that functions as the domain controller for a domain called adatum.com. The computers required for this lab are listed in Table 6-1. Table 6-1 Computers Required for Lab 6 Computer | Operating System | Computer Name | Server | Windows Server 2012 R2 | SERVERA | Client | Windows 8.1 Enterprise | CLIENTB | In addition to the computers, you will also need the software listed in Table 6-2 to complete Lab 6. Table 6-2 Software Required for Lab 6 Software | Location | Remote Server Administration Tools for Windows 8.1 (Windows8.1-KB2693643-x64.msu) | \\SERVERA\Downloads | Lab 6 student worksheet | Lab06_worksheet.docx (provided by instructor) | Working with Lab Worksheets Each lab in this manual requires that you answer questions, shoot screen shots, and perform other activities that you will document in a worksheet named for the lab, such as Lab06_worksheet.docx. You will find these......

Words: 2361 - Pages: 10

Lab 6 Working with Disks

...LAB 6 WORKING WITH DISKS This lab contains the following exercises and activities: Exercise 6.1 Creating a Basic Disk Partition Exercise 6.2 Extending a Basic Disk Partition Exercise 6.3 Creating Additional Partitions Exercise 6.4 Mounting a Volume Exercise 6.5 Working with Dynamic Disks Lab Challenge 6.1 Working with VHDs BEFORE YOU BEGIN The lab environment consists of student workstations connected to a local area network, along with a server that functions as the domain controller for a domain called contoso.com. The computers required for this lab are listed in Table 6-1. Table 6-1 Computers required for Lab 6 Computer|Operating System|Computer Name| ||| Server|Windows Server 2008|RWDC01| ||| Workstation 1|Windows 7 Enterprise|NYC-CL1| ||| 51 52 Windows 7 Configuration NOTE| In a classroom lab environment, there will be one classroom server and the students will have workstations named using consecutive numbers in place of the a and b variables. In a virtual lab environment, each student will have three virtual machines, named RWDC01, NYC-CL1, and NYC-CL2. In addition to the computers, you will also require the software listed in Table 6-2 to complete Lab 6. Table 6-2 Software required for Lab 6 Software|Location| || Windows 7 Enterprise installation files|\\rwdc01\downloads\win7ent| || Lab 6 student worksheet|Lab06_worksheet.rtf (provided...

Words: 2752 - Pages: 12

Week 6 Lab

...NT1110: Module 6 Troubleshooting and Networks Lab 6.1 Troubleshooting Networking Issues A good troubleshooter should be capable of discerning whether the problem is software or hardware related and repair all of these problems. In this lab, you will demonstrate your ability to use the six-step troubleshooting model to fix a networking issue and outline the steps toward a solution. Required Setup and Resources: A computer with access to the Internet Before starting work on Task 1, perform the following steps: 1. Open Internet Explorer. Click the Tools menu and select Internet Options. 2. Click the Connections tab. 3. Click the LAN Settings button. 4. In the Proxy Server section, select Use a proxy server for your LAN. Then, click the Advanced button. 5. In the Proxy Settings window, enter 192.168.100.1 for the HTTP proxy address and port 80 for the port. Note: Remember to reset the proxy settings to their original values when Task 1 is finished. Recommended Procedures Task 1: Network Troubleshooting When you boot your computer and open Internet Explorer, this is what you see: 1 NT1110: Module 6 Troubleshooting and Networks Lab 6.1 Troubleshooting Networking Issues Apply the six-step troubleshooting model to the problem. Document everything associated with each step of the troubleshooting model. 1. Ascertain what the problem is. 2. Write down probable causes of the problem. 3. Determine if theories are correct...

Words: 513 - Pages: 3

Doctor’s Diary | Садовые инструменты | Nhạc pop, rock...