SlideShare a Scribd company logo
Answer questions Minimum 100 words each and reference
(questions #1-2) KEEP questions WITH ANSWER
1. A key point to get out of this topic is the idea that these
errors are theoretical. You won't be sure as to whether one
occurred or not. Why are they theoretical in nature? Hint: think
about a study and knowing the "truth"
2. Pick a study of interest and identify the null and alternative
hypothesis. How does this fit in with regards to the topic of a
type I and type II error? Always keep this in mind when you are
trying to identify what a type I and type II error are.
A minimum of 75 words each question and References (IF
NEEDED)(Response #1 – 7) KEEP RESPONSE WITH
ANSWER
Make sure the Responses includes the Following: (a) an
understanding of the weekly content as supported by a scholarly
resource, (b) the provision of a probing question. (c) stay on
topic
1) According to the reading, we set the alpha which is the
largest probability for type I error. To increase the power of a
hypothesis researchers can use larger samples which provides
more information and raise the significance level which
increases the probability that the hypothesis will be rejected.
2) A Type 1 error occurs when individuals involved in research
make the decision to reject the belief of truth when in actuality
the hypothesis is true. Type 1 errors are errors in research when
the researcher makes the wrong decision to reject a true null
hypothesis. Type II errors are considered less of a problem than
Type 1 errors, but can prove to be detrimental in the field of
medicine. This type of error occurs when researchers decide to
keep a false null hypothesis, when in fact the hypothesis is true.
The method to avoid making Type 1 decisions is to test the null
hypothesis at the highest level (Alpha Level). This will lessen
the possibilities of making this type of error (Privitera, 2018).
3) According to Privitera (2018) a type 1 error is the probability
of rejecting a null hypotheses that is actually true, researchers
purposely make this error. A null hypotheses is a statement
about a population parameter that is assumed to be true, this
hypotheses is a starting point (Privitera, 2018). The type 2 error
or beta error is the probability of retaining a null hypotheses
that is actually false (Privitera, 2018). The type 1 error is
committed when a researcher decides to reject previous notions
of truth that are in fact true (Privitera, 2018). The best way to
avoid these types of errors is to be open minded and not reject
notions if there is fact to back the notions up. In my opinion a
type 1 error is something committed with bias by the researcher.
I say this because as a researcher it is their job to find all facts
or at least most all facts and apply them to their study or
research, especially if they commit a type one error knowingly.
If a researcher does this error then they are not following
through with basic research guidelines.
4) A one-tailed test is used in a hypothesis test where the
alternative hypothesis is stated as either (>) or (<). When a
researcher is interested in a specific alternative to the null
hypothesis. A two-tailed test is used when one wants to avoid
making a type III error. An error that occurs when one accepts a
null hypothesis that is incorrect because the the rejection region
of the tail was on the opposite end. SPSS can be used to
compute the calculations for each by imputing data in to a new
data chart and then using the frequencies tab to help solve for
the mean and standard deviation. From there one can use
appendix c. to solve for the two-tails. (Privitera., G. J., 2018).
5) We use the one-tailed test when we need to check or test the
claim or hypothesis which is directional in nature. This means if
the alternative hypothesis of the test includes ‘less than’ or
‘greater than’, then we use one-tailed tests. We use the two-
tailed test when we need to check or test the claim or hypothesis
which is non-directional in nature (Privitera., G. J., 2018). That
is, if the alternative hypothesis of the test includes ‘not equal
to’, then we use two-tailed tests. When we perform one-tailed
tests and two-tailed test by using SPSS, then we need to use
some setting or calculations. For most of the tests, SPSS
provides the results for the two-tailed test as a default. Most of
the times, SPSS do not provide results for one-tailed tests and
in such cases, we need to calculate the p-value from this output.
Examples of one tailed and two tailed test is given as below:
H0: µ = 10 v/s Ha: µ < 10 (One tailed /lower tailed /left tailed
/directional test)
H0: µ = 10 v/s Ha: µ > 10 (One tailed /upper tailed /right tailed
/directional test)
H0: µ = 10 v/s Ha: µ ≠ 10 (two tailed /non-directional test)
6) In the Type 1 error and Type 2 error, in this two types of
errors that exist in a hypothesis testing of Type 1 and Type 2.
In Type 1 and Type 2 that occur in when the null hypothesis is
true but is still being rejected. In being able to use the
following example from a law case, this is equivalent of
convicting an innocent man or individual. In the statistics or
research types of errors in types think that he or she has a
significant difference, when there is actually no significant
differences in the types of errors. A Type 2 error occurs when
null hypothesis is false but not rejected, which is equivalent of
acquiring a guilty man or individual. This is where the
researchers actually has a significant difference but does not
realize it. Many examples are generated in the Type 1 and Type
2 that allows the researcher to understand and generate this
hypothesis. In the law, example that is a matter of opinion and
often depends on the nature of the time and associated in the
factor that generates the punishment for the individual that
committed the crime. That is why it is important to understand
the meaning, understanding and hypothesis of this type 1 and
type 2 significant of errors. In the statistics, replication of
studies will reduce the chance that an artifact appears
significant when it is not. In one type of error is eliminated and
there is a very good chance of the other occurring. In the
chance of both types of errors cannot be eliminated. There are
many factors that allows the reseacher to come up with this type
of hypothesis that allows them too see and understand this type
1 and type 2 errors.
7) After researching and exploring this question, it is my belief
that if you can explain why you are more interested in an effect
in one direction and not the other direction, it is a good time to
use a one-tailed test. A plus is an improvement in power to
reject the null hypothesis if the null hypothesis is definitely
false. A more extensive null hypothesis with the ability to
detect unexpected results can be restricted when the null
hypothesis is not rejected. There is a higher level of trust; the
lower the level p-value the less plausible that the null
hypothesis is true. The one-tailed test is used where an
alternative hypothesis is more or less whereas a two-tailed test
is used when the researcher is attempting to avoid a type III
error. According to Privitera (2018), A basic explanation of how
SPSS is used to perform the calculations is to : go to the
analysis menu; compare means from drop down menu click one
sample t test from pop-up menu select the dependent variables
you want to test check arrow button to move variables into test
variables pain test box enter value compare to click ok etc.
imputing the data use frequencies tab will find the mean and
standard deviation. The two-tailed test can be found using
appendix c
Case Study 2: Data Breaches and Regulatory Requirements
Due Week 6 and worth 100 points
The National Institute of Standards and Technology (NIST)
provides an extensive amount of information, resources, and
guidance on IT and information security topics. The Federal
Information Security Management Act (FISMA) provides
standards and guidelines for establishing information security
within federal systems. However, there have been, and
continues to be, numerous security incidents including data
breaches within federal systems. Review the information about
FISMA at the NIST Website, located
at http://csrc.nist.gov/groups/SMA/fisma/index.html.
Additionally, review the information, located
at http://www.govtech.com/blogs/lohrmann-on-
cybersecurity/Dark-Clouds-Over-Technology-042212.html,
about the data breaches within government systems.
Select one (1) of the data breaches mentioned to conduct a case
analysis, or select another based on your research, and research
more details about that incident to complete the following
assignment requirements.
Write a three to five (3-5) page paper on your selected case in
which you:
1. Describe the data breach incident and the primary causes of
the data breach.
2. Analyze how the data breach could have been prevented with
better adherence to and compliance with regulatory
requirements and guidelines, including management controls;
include an explanation of the regulatory requirement (such as
from FISMA, HIPAA, or others).
3. Assess if there are deficiencies in the regulatory requirements
and whether they need to be changed, and how they need to be
changed, to mitigate further data breach incidents.
4. Use at least three (3) quality resources in this assignment.
Note: Wikipedia and similar Websites do not qualify as quality
resources.
Your assignment must follow these formatting requirements:
· This course requires use of new Student Writing Standards
(SWS). The format is different than other Strayer University
courses. Please take a moment to review the SWS
documentation for details.
· Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the source list are not included in the
required page length.
The specific course learning outcomes associated with this
assignment are:
· Describe legal compliance laws addressing public and private
institutions.
· Examine the principles requiring governance of information
within organizations.
· Use technology and information resources to research legal
issues in information security.
· Write clearly and concisely about information security legal
issues and topics using proper writing mechanics and technical
style conventions.
Assignment 3: Intellectual Property Laws and Security
Measures
Due Week 7 and worth 100 points
Intellectual property law is a major issue facing organizations,
and many organizations have been fined significant amounts for
violations of intellectual property law. As an information
security manager in an IT consulting company, your executive
management team is concerned about the potential intellectual
property violations in the organization. To address these
concerns, they have asked you to develop an intellectual
property policy to implement within the organization.
Develop a policy document in which you:
1. Provide an overview of intellectual property law.
2. Describe who the policy applies to.
3. Create policy, standards, and guidelines concerning:
a. Patents
b. Trademarks
c. Copyrights
d. Ownership of company material
4. Develop intellectual property violation reporting procedures.
5. Develop intellectual property infringement ramifications.
6. Use at least three quality resources in this
assignment. Note: Wikipedia and similar Websites do not
qualify as quality resources.
Your written paper must follow these formatting requirements:
This course requires use of new Student Writing Standards
(SWS). The format is different than other Strayer University
courses. Please take a moment to review the SWS
documentation for details.
(Note: You’ll be prompted to enter your Blackboard login
credentials to view these standards.)
. Your paper should include a cover page.
·
. Your paper should be of sufficient length to fully develop your
own ideas that address the items called for in the instructions,
and not be filled with “filler” information. Write clearly and
concisely.
. The paper should be double-spaced, 12-point font.
The specific course learning outcomes associated with this
assignment are:
· Analyze intellectual property laws.
· Use technology and information resources to research legal
issues in information security.
· Write clearly and concisely about information security legal
issues and topics using proper writing mechanics and technical
style conventions.
Assignment 2: Structural Modeling and Behavior Modeling
Due Week 6 and worth 120 points
Refer to the functional model you verified and validated for
ABS in the Week 4 assignment to complete this assignment.
Based on your performance, ABS management was so satisfied
that it wants you to develop both the structural and behavior
models. This way, ABS can fully understand both the
interaction that would take place between the users and the
system, and the system itself in greater detail.
Note: You may create and / or assume all necessary assumptions
needed for the completion of this assignment.
Write a four to five (4-5) page paper in which you:
1. Create Class-Responsibility-Collaboration (CRC) cards and a
class diagram based on the functional models through the use of
graphical tools in Microsoft Word or Visio, or an open source
alternative such as Dia. Note: The graphically depicted solution
is not included in the required page length.
2. Identify each use case in the functional model and create a
sequence and communication diagram for each scenario of each
use case identified through the use of graphical tools in
Microsoft Word or Visio, or an open source alternative such as
Dia. Note: The graphically depicted solution is not included in
the required page length.
3. Create a behavioral state machine for each of the complex
classes in the class diagram.
4. Perform a CRUDE analysis to show the interactivity of the
objects in the system.
5. Perform a verification and validation walk-through of
each:Revise the requirements document created in Assignment 1
with additional information found in this assignment and
document the assumptions.
1. Functional model
2. Structural model
3. Behavioral model
6.
7. Use at least three (3) quality resources in this
assignment. Note: Wikipedia and similar Websites do not
qualify as quality resources.
Your assignment must follow these formatting requirements:
· This course requires use of new Strayer Writing Standards
(SWS). The format is different from other Strayer University
courses. Please take a moment to review the SWS
documentation for details.
· Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow SWS or school-specific format. Check with your
professor for any additional instructions.
· Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
· Include charts or diagrams created in Visio or Dia. The
completed diagrams / charts must be imported into the Word
document before the paper is submitted.
The specific course learning outcomes associated with this
assignment are:
· Describe object-oriented modeling, structural modeling, and
behavioral modeling.
· Develop class diagram based on business scenarios.
· Use technology and information resources to research issues in
procuring and designing project requirements.
· Write clearly and concisely about project requirements and
design topics using proper writing mechanics and technical
style conventions.
Assignment 3: Design with UML
Due Week 7 and worth 120 points
Advanced Business Systems (ABS) is a consulting and staffing
company providing specialized staffing and consulting services
to clients in a variety of different industries. It has offices in
major U.S. metro areas and has ongoing relationships with
Fortune 500 companies. Its areas of services range from
software development and network engineering to geo-
information systems. It has fifty (50) plus regional offices in
U.S. and five (5) offices in Canada. It plans to expand to other
countries in the future.
When an ABS client company determines that it will need a
contractor or temporary professional, it issues a staffing request
against the contract it had previously negotiated with ABS. The
contract manager in ABS reviews the staff request and ensures
that the request is valid with its current contract with its client
from the database.
· If the request is not valid, the contract manager sends the
staffing request back to the client and explains the reasons and
asks for the need for starting a new contract.
· If the request is valid, the contract manager will start
recruiting requests by putting the request into its staffing
database. The staffing request is then sent to ABS placement
department.
In the placement department, the placement specialists will
check the job requirements and candidates qualifications.
· If there is a qualified candidate, the specialist will notify the
candidate and put a note in the database.
· If a qualified candidate cannot be found or not immediately
available, the specialist notifies contract managers and
recruiting department; the recruiting department starts search
outside immediately.
The recruiting department normally has thirty (30) days to find
an outside candidate and send the qualified candidates to the
placement department to review. If an internal qualified
candidate is confirmed with his / her availability, the
confirmation will be sent to the arrangement department. In the
arrangement department, the candidate works with the
specialists to further confirm the placement details, such as
starting date, location, compensation (e.g., per diem), and travel
arrangement. The final confirmation will be sent to the client
along with a billing schedule. If the client agrees with the
arrangement, he/she acknowledges the arrangement with
contract managers in the contract department. The contract
manager then puts a memo into its database and closes the
request.
Note: You may create and / or assume all necessary assumptions
needed for the completion of this assignment.
Write a three to four (3-4) page paper in which you:
1. Create a package diagram of the problem domain layer using
the communication diagrams and the CRUDE matrix through the
use of graphical tools in Microsoft Word or Visio, or an open
source alternative such as Dia. Note: The graphically depicted
solution is not included in the required page length.
2. Perform and explain the verification and validation walk-
through of the package diagram.
3. Create a set of invariants for attributes and relationships and
add them to the CRC cards for each class in the structural model
using Object Constraint Language (OCL).
4. List the classes in the structure model. Choose one (1) class
and create a contract for each method in that class. Note: Be
sure to use OCL to specify the preconditions and the post
conditions.
5. Create a method specification for each method using both
structured English and activity diagram for the algorithm
specification through the use of graphical tools in Microsoft
Word or Visio, or an open source alternative such as Dia. Note:
The graphically depicted solution is not included in the required
page length.
6. Use at least two (2) quality resources in this
assignment. Note: Wikipedia and similar Websites do not
qualify as quality resources.
Your assignment must follow these formatting requirements:
· This course requires use of new Strayer Writing Standards
(SWS). The format is different from other Strayer University
courses. Please take a moment to review the SWS
documentation for details.
· Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow SWS or school-specific format. Check with your
professor for any additional instructions.
· Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
· Include charts or diagrams created in Visio or Dia. The
completed diagrams / charts must be imported into the Word
document before the paper is submitted.
The specific course learning outcomes associated with this
assignment are:
· Determine the steps and principles of design modeling with
UML.
· Document and describe the different state of objects
throughout the life cycle.
· Use technology and information resources to research issues in
procuring and designing project requirements.
· Write clearly and concisely about project requirements and
design topics using proper writing mechanics and technical
style conventions.
Discussions (around 200 words each)
1
"Data Breach Notification" Please respond to the following:
Data breach laws have made us more aware of how our PII and
other corporate data is compromised in recent years.
Intellectual property is often the target of attacks from foreign
entities and even governments. Banks don’t like people to
know how much money is stolen annually by hackers; despite
their best efforts to prevent such theft. Discuss your thoughts
on the subjects mentioned here based on your learning from this
week.
2
"Online Contracts" Please respond to the following:
Online contracts are becoming ubiquitous these days. They’re
sometimes signed online even in face-to-face meetings between
parties. Based on your study this week, what are some pitfalls
you previously didn’t know? Describe an online contract or
end-user license agreement you signed that made you think. Do
you ever agree to things without fully reading them, even when
the signature block says, “I have read and understand”? What
do you think about this now that you have learned about online
contracts?
3
"Policies, Standards, Procedures, and Guidelines" Please
respond to the following:
This week you studied policies, standards, procedures and
guidelines. If you were the project leader at a small company
being spun off from a larger company, how would you tackle
the task of adapting your company’s policies regarding
information security? What are some of your greatest
concerns? What rules are you likely to keep and which won’t
really apply? Remember to keep a balance. You don’t want the
employees to be so locked down by rules that they can’t
efficiently do their jobs.
4
Object-Oriented Design" Please respond to the following:
· Select an organization that you are familiar with and
determine the most advantageous benefits of using object-
oriented design in this organization and state why. In addition,
explain the places within this organization that object-oriented
design is not advantageous.
5
"Data Management Layer Design" Please respond to the
following:
· Recommend one to two (1-2) methods to reduce space
consumption and increase performance for object-oriented
database. Provide a rationale for your recommendations.
6
"Cloud Computing" Please respond to the following:
· Identify the main challenges for provisioning the physical
architecture layer with cloud technologies. Additionally,
recommend methods to mitigate those challenges.
Answer questions Minimum 100 words each and reference (questions.docx

More Related Content

Similar to Answer questions Minimum 100 words each and reference (questions.docx

Hypothesis TestingThe Right HypothesisIn business, or an.docx
Hypothesis TestingThe Right HypothesisIn business, or an.docxHypothesis TestingThe Right HypothesisIn business, or an.docx
Hypothesis TestingThe Right HypothesisIn business, or an.docx
adampcarr67227
 
NORMAN, ELTON_BTM7303-12-82NORMAN, ELTON_BTM7303-12-81.docx
NORMAN, ELTON_BTM7303-12-82NORMAN, ELTON_BTM7303-12-81.docxNORMAN, ELTON_BTM7303-12-82NORMAN, ELTON_BTM7303-12-81.docx
NORMAN, ELTON_BTM7303-12-82NORMAN, ELTON_BTM7303-12-81.docx
picklesvalery
 
Samle size
Samle sizeSamle size
Samle size
Sumit Monk
 
Sample size calculation
Sample size calculationSample size calculation
Sample size calculation
Santam Chakraborty
 
WF ED 540 Hypothesis Testing - 2018
WF ED 540 Hypothesis Testing - 2018WF ED 540 Hypothesis Testing - 2018
WF ED 540 Hypothesis Testing - 2018
Penn State University
 
Page 266LEARNING OBJECTIVES· Explain how researchers use inf.docx
Page 266LEARNING OBJECTIVES· Explain how researchers use inf.docxPage 266LEARNING OBJECTIVES· Explain how researchers use inf.docx
Page 266LEARNING OBJECTIVES· Explain how researchers use inf.docx
karlhennesey
 
1.1 statistical and critical thinking
1.1 statistical and critical thinking1.1 statistical and critical thinking
1.1 statistical and critical thinking
Long Beach City College
 
How to read a paper
How to read a paperHow to read a paper
How to read a paper
faheta
 
2020040608310264546184c6.pdf
2020040608310264546184c6.pdf2020040608310264546184c6.pdf
2020040608310264546184c6.pdf
MohammadZubair874462
 
Between Black and White Population1. Comparing annual percent .docx
Between Black and White Population1. Comparing annual percent .docxBetween Black and White Population1. Comparing annual percent .docx
Between Black and White Population1. Comparing annual percent .docx
jasoninnes20
 
Data analysis powerpoint
Data analysis powerpointData analysis powerpoint
Data analysis powerpoint
jamiebrandon
 
· On the basis of what you learned in the readings, define the t
· On the basis of what you learned in the readings, define the t· On the basis of what you learned in the readings, define the t
· On the basis of what you learned in the readings, define the t
LesleyWhitesidefv
 
Essay On Juvenile Incarceration
Essay On Juvenile IncarcerationEssay On Juvenile Incarceration
Essay On Juvenile Incarceration
Lissette Hartman
 
The Data Errors we Make by Sean Taylor at Big Data Spain 2017
The Data Errors we Make by Sean Taylor at Big Data Spain 2017The Data Errors we Make by Sean Taylor at Big Data Spain 2017
The Data Errors we Make by Sean Taylor at Big Data Spain 2017
Big Data Spain
 
Mayo O&M slides (4-28-13)
Mayo O&M slides (4-28-13)Mayo O&M slides (4-28-13)
Mayo O&M slides (4-28-13)
jemille6
 
Jerait PDF.pdf
Jerait PDF.pdfJerait PDF.pdf
Jerait PDF.pdf
JeraitServices
 
2. This exercise uses the dataset WholeFoods.” (a) Use Excel to.docx
2. This exercise uses the dataset WholeFoods.” (a) Use Excel to.docx2. This exercise uses the dataset WholeFoods.” (a) Use Excel to.docx
2. This exercise uses the dataset WholeFoods.” (a) Use Excel to.docx
eugeniadean34240
 
Sample Size Estimation and Statistical Test Selection
Sample Size Estimation  and Statistical Test SelectionSample Size Estimation  and Statistical Test Selection
Sample Size Estimation and Statistical Test Selection
Vaggelis Vergoulas
 
Sample Size Determination.23.11.2021.pdf
Sample Size Determination.23.11.2021.pdfSample Size Determination.23.11.2021.pdf
Sample Size Determination.23.11.2021.pdf
statsanjal
 
CJ 316 – Research Methods in Criminal Justice Component #3.docx
CJ 316 – Research Methods in Criminal Justice Component #3.docxCJ 316 – Research Methods in Criminal Justice Component #3.docx
CJ 316 – Research Methods in Criminal Justice Component #3.docx
mccormicknadine86
 

Similar to Answer questions Minimum 100 words each and reference (questions.docx (20)

Hypothesis TestingThe Right HypothesisIn business, or an.docx
Hypothesis TestingThe Right HypothesisIn business, or an.docxHypothesis TestingThe Right HypothesisIn business, or an.docx
Hypothesis TestingThe Right HypothesisIn business, or an.docx
 
NORMAN, ELTON_BTM7303-12-82NORMAN, ELTON_BTM7303-12-81.docx
NORMAN, ELTON_BTM7303-12-82NORMAN, ELTON_BTM7303-12-81.docxNORMAN, ELTON_BTM7303-12-82NORMAN, ELTON_BTM7303-12-81.docx
NORMAN, ELTON_BTM7303-12-82NORMAN, ELTON_BTM7303-12-81.docx
 
Samle size
Samle sizeSamle size
Samle size
 
Sample size calculation
Sample size calculationSample size calculation
Sample size calculation
 
WF ED 540 Hypothesis Testing - 2018
WF ED 540 Hypothesis Testing - 2018WF ED 540 Hypothesis Testing - 2018
WF ED 540 Hypothesis Testing - 2018
 
Page 266LEARNING OBJECTIVES· Explain how researchers use inf.docx
Page 266LEARNING OBJECTIVES· Explain how researchers use inf.docxPage 266LEARNING OBJECTIVES· Explain how researchers use inf.docx
Page 266LEARNING OBJECTIVES· Explain how researchers use inf.docx
 
1.1 statistical and critical thinking
1.1 statistical and critical thinking1.1 statistical and critical thinking
1.1 statistical and critical thinking
 
How to read a paper
How to read a paperHow to read a paper
How to read a paper
 
2020040608310264546184c6.pdf
2020040608310264546184c6.pdf2020040608310264546184c6.pdf
2020040608310264546184c6.pdf
 
Between Black and White Population1. Comparing annual percent .docx
Between Black and White Population1. Comparing annual percent .docxBetween Black and White Population1. Comparing annual percent .docx
Between Black and White Population1. Comparing annual percent .docx
 
Data analysis powerpoint
Data analysis powerpointData analysis powerpoint
Data analysis powerpoint
 
· On the basis of what you learned in the readings, define the t
· On the basis of what you learned in the readings, define the t· On the basis of what you learned in the readings, define the t
· On the basis of what you learned in the readings, define the t
 
Essay On Juvenile Incarceration
Essay On Juvenile IncarcerationEssay On Juvenile Incarceration
Essay On Juvenile Incarceration
 
The Data Errors we Make by Sean Taylor at Big Data Spain 2017
The Data Errors we Make by Sean Taylor at Big Data Spain 2017The Data Errors we Make by Sean Taylor at Big Data Spain 2017
The Data Errors we Make by Sean Taylor at Big Data Spain 2017
 
Mayo O&M slides (4-28-13)
Mayo O&M slides (4-28-13)Mayo O&M slides (4-28-13)
Mayo O&M slides (4-28-13)
 
Jerait PDF.pdf
Jerait PDF.pdfJerait PDF.pdf
Jerait PDF.pdf
 
2. This exercise uses the dataset WholeFoods.” (a) Use Excel to.docx
2. This exercise uses the dataset WholeFoods.” (a) Use Excel to.docx2. This exercise uses the dataset WholeFoods.” (a) Use Excel to.docx
2. This exercise uses the dataset WholeFoods.” (a) Use Excel to.docx
 
Sample Size Estimation and Statistical Test Selection
Sample Size Estimation  and Statistical Test SelectionSample Size Estimation  and Statistical Test Selection
Sample Size Estimation and Statistical Test Selection
 
Sample Size Determination.23.11.2021.pdf
Sample Size Determination.23.11.2021.pdfSample Size Determination.23.11.2021.pdf
Sample Size Determination.23.11.2021.pdf
 
CJ 316 – Research Methods in Criminal Justice Component #3.docx
CJ 316 – Research Methods in Criminal Justice Component #3.docxCJ 316 – Research Methods in Criminal Justice Component #3.docx
CJ 316 – Research Methods in Criminal Justice Component #3.docx
 

More from amrit47

APA, The assignment require a contemporary approach addressing Race,.docx
APA, The assignment require a contemporary approach addressing Race,.docxAPA, The assignment require a contemporary approach addressing Race,.docx
APA, The assignment require a contemporary approach addressing Race,.docx
amrit47
 
APA style and all questions answered ( no min page requirements) .docx
APA style and all questions answered ( no min page requirements) .docxAPA style and all questions answered ( no min page requirements) .docx
APA style and all questions answered ( no min page requirements) .docx
amrit47
 
Apa format1-2 paragraphsreferences It is often said th.docx
Apa format1-2 paragraphsreferences It is often said th.docxApa format1-2 paragraphsreferences It is often said th.docx
Apa format1-2 paragraphsreferences It is often said th.docx
amrit47
 
APA format2-3 pages, double-spaced1. Choose a speech to review. It.docx
APA format2-3 pages, double-spaced1. Choose a speech to review. It.docxAPA format2-3 pages, double-spaced1. Choose a speech to review. It.docx
APA format2-3 pages, double-spaced1. Choose a speech to review. It.docx
amrit47
 
APA format  httpsapastyle.apa.orghttpsowl.purd.docx
APA format     httpsapastyle.apa.orghttpsowl.purd.docxAPA format     httpsapastyle.apa.orghttpsowl.purd.docx
APA format  httpsapastyle.apa.orghttpsowl.purd.docx
amrit47
 
APA format2-3 pages, double-spaced1. Choose a speech to review. .docx
APA format2-3 pages, double-spaced1. Choose a speech to review. .docxAPA format2-3 pages, double-spaced1. Choose a speech to review. .docx
APA format2-3 pages, double-spaced1. Choose a speech to review. .docx
amrit47
 
APA Formatting AssignmentUse the information below to create.docx
APA Formatting AssignmentUse the information below to create.docxAPA Formatting AssignmentUse the information below to create.docx
APA Formatting AssignmentUse the information below to create.docx
amrit47
 
APA style300 words10 maximum plagiarism  Mrs. Smith was.docx
APA style300 words10 maximum plagiarism  Mrs. Smith was.docxAPA style300 words10 maximum plagiarism  Mrs. Smith was.docx
APA style300 words10 maximum plagiarism  Mrs. Smith was.docx
amrit47
 
APA format1. What are the three most important takeawayslessons.docx
APA format1. What are the three most important takeawayslessons.docxAPA format1. What are the three most important takeawayslessons.docx
APA format1. What are the three most important takeawayslessons.docx
amrit47
 
APA General Format Summary APA (American Psychological.docx
APA General Format Summary APA (American Psychological.docxAPA General Format Summary APA (American Psychological.docx
APA General Format Summary APA (American Psychological.docx
amrit47
 
Appearance When I watched the video of myself, I felt that my b.docx
Appearance When I watched the video of myself, I felt that my b.docxAppearance When I watched the video of myself, I felt that my b.docx
Appearance When I watched the video of myself, I felt that my b.docx
amrit47
 
apa format1-2 paragraphsreferencesFor this week’s .docx
apa format1-2 paragraphsreferencesFor this week’s .docxapa format1-2 paragraphsreferencesFor this week’s .docx
apa format1-2 paragraphsreferencesFor this week’s .docx
amrit47
 
APA Format, with 2 references for each question and an assignment..docx
APA Format, with 2 references for each question and an assignment..docxAPA Format, with 2 references for each question and an assignment..docx
APA Format, with 2 references for each question and an assignment..docx
amrit47
 
APA-formatted 8-10 page research paper which examines the potential .docx
APA-formatted 8-10 page research paper which examines the potential .docxAPA-formatted 8-10 page research paper which examines the potential .docx
APA-formatted 8-10 page research paper which examines the potential .docx
amrit47
 
APA    STYLE 1.Define the terms multiple disabilities and .docx
APA    STYLE 1.Define the terms multiple disabilities and .docxAPA    STYLE 1.Define the terms multiple disabilities and .docx
APA    STYLE 1.Define the terms multiple disabilities and .docx
amrit47
 
APA STYLE  follow this textbook answer should be summarize for t.docx
APA STYLE  follow this textbook answer should be summarize for t.docxAPA STYLE  follow this textbook answer should be summarize for t.docx
APA STYLE  follow this textbook answer should be summarize for t.docx
amrit47
 
APA7Page length 3-4, including Title Page and Reference Pag.docx
APA7Page length 3-4, including Title Page and Reference Pag.docxAPA7Page length 3-4, including Title Page and Reference Pag.docx
APA7Page length 3-4, including Title Page and Reference Pag.docx
amrit47
 
APA format, 2 pagesThree general sections 1. an article s.docx
APA format, 2 pagesThree general sections 1. an article s.docxAPA format, 2 pagesThree general sections 1. an article s.docx
APA format, 2 pagesThree general sections 1. an article s.docx
amrit47
 
APA Style with minimum of 450 words, with annotations, quotation.docx
APA Style with minimum of 450 words, with annotations, quotation.docxAPA Style with minimum of 450 words, with annotations, quotation.docx
APA Style with minimum of 450 words, with annotations, quotation.docx
amrit47
 
APA FORMAT1.  What are the three most important takeawayslesson.docx
APA FORMAT1.  What are the three most important takeawayslesson.docxAPA FORMAT1.  What are the three most important takeawayslesson.docx
APA FORMAT1.  What are the three most important takeawayslesson.docx
amrit47
 

More from amrit47 (20)

APA, The assignment require a contemporary approach addressing Race,.docx
APA, The assignment require a contemporary approach addressing Race,.docxAPA, The assignment require a contemporary approach addressing Race,.docx
APA, The assignment require a contemporary approach addressing Race,.docx
 
APA style and all questions answered ( no min page requirements) .docx
APA style and all questions answered ( no min page requirements) .docxAPA style and all questions answered ( no min page requirements) .docx
APA style and all questions answered ( no min page requirements) .docx
 
Apa format1-2 paragraphsreferences It is often said th.docx
Apa format1-2 paragraphsreferences It is often said th.docxApa format1-2 paragraphsreferences It is often said th.docx
Apa format1-2 paragraphsreferences It is often said th.docx
 
APA format2-3 pages, double-spaced1. Choose a speech to review. It.docx
APA format2-3 pages, double-spaced1. Choose a speech to review. It.docxAPA format2-3 pages, double-spaced1. Choose a speech to review. It.docx
APA format2-3 pages, double-spaced1. Choose a speech to review. It.docx
 
APA format  httpsapastyle.apa.orghttpsowl.purd.docx
APA format     httpsapastyle.apa.orghttpsowl.purd.docxAPA format     httpsapastyle.apa.orghttpsowl.purd.docx
APA format  httpsapastyle.apa.orghttpsowl.purd.docx
 
APA format2-3 pages, double-spaced1. Choose a speech to review. .docx
APA format2-3 pages, double-spaced1. Choose a speech to review. .docxAPA format2-3 pages, double-spaced1. Choose a speech to review. .docx
APA format2-3 pages, double-spaced1. Choose a speech to review. .docx
 
APA Formatting AssignmentUse the information below to create.docx
APA Formatting AssignmentUse the information below to create.docxAPA Formatting AssignmentUse the information below to create.docx
APA Formatting AssignmentUse the information below to create.docx
 
APA style300 words10 maximum plagiarism  Mrs. Smith was.docx
APA style300 words10 maximum plagiarism  Mrs. Smith was.docxAPA style300 words10 maximum plagiarism  Mrs. Smith was.docx
APA style300 words10 maximum plagiarism  Mrs. Smith was.docx
 
APA format1. What are the three most important takeawayslessons.docx
APA format1. What are the three most important takeawayslessons.docxAPA format1. What are the three most important takeawayslessons.docx
APA format1. What are the three most important takeawayslessons.docx
 
APA General Format Summary APA (American Psychological.docx
APA General Format Summary APA (American Psychological.docxAPA General Format Summary APA (American Psychological.docx
APA General Format Summary APA (American Psychological.docx
 
Appearance When I watched the video of myself, I felt that my b.docx
Appearance When I watched the video of myself, I felt that my b.docxAppearance When I watched the video of myself, I felt that my b.docx
Appearance When I watched the video of myself, I felt that my b.docx
 
apa format1-2 paragraphsreferencesFor this week’s .docx
apa format1-2 paragraphsreferencesFor this week’s .docxapa format1-2 paragraphsreferencesFor this week’s .docx
apa format1-2 paragraphsreferencesFor this week’s .docx
 
APA Format, with 2 references for each question and an assignment..docx
APA Format, with 2 references for each question and an assignment..docxAPA Format, with 2 references for each question and an assignment..docx
APA Format, with 2 references for each question and an assignment..docx
 
APA-formatted 8-10 page research paper which examines the potential .docx
APA-formatted 8-10 page research paper which examines the potential .docxAPA-formatted 8-10 page research paper which examines the potential .docx
APA-formatted 8-10 page research paper which examines the potential .docx
 
APA    STYLE 1.Define the terms multiple disabilities and .docx
APA    STYLE 1.Define the terms multiple disabilities and .docxAPA    STYLE 1.Define the terms multiple disabilities and .docx
APA    STYLE 1.Define the terms multiple disabilities and .docx
 
APA STYLE  follow this textbook answer should be summarize for t.docx
APA STYLE  follow this textbook answer should be summarize for t.docxAPA STYLE  follow this textbook answer should be summarize for t.docx
APA STYLE  follow this textbook answer should be summarize for t.docx
 
APA7Page length 3-4, including Title Page and Reference Pag.docx
APA7Page length 3-4, including Title Page and Reference Pag.docxAPA7Page length 3-4, including Title Page and Reference Pag.docx
APA7Page length 3-4, including Title Page and Reference Pag.docx
 
APA format, 2 pagesThree general sections 1. an article s.docx
APA format, 2 pagesThree general sections 1. an article s.docxAPA format, 2 pagesThree general sections 1. an article s.docx
APA format, 2 pagesThree general sections 1. an article s.docx
 
APA Style with minimum of 450 words, with annotations, quotation.docx
APA Style with minimum of 450 words, with annotations, quotation.docxAPA Style with minimum of 450 words, with annotations, quotation.docx
APA Style with minimum of 450 words, with annotations, quotation.docx
 
APA FORMAT1.  What are the three most important takeawayslesson.docx
APA FORMAT1.  What are the three most important takeawayslesson.docxAPA FORMAT1.  What are the three most important takeawayslesson.docx
APA FORMAT1.  What are the three most important takeawayslesson.docx
 

Recently uploaded

Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
ssuser13ffe4
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDFLifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Vivekanand Anglo Vedic Academy
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 

Recently uploaded (20)

Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDFLifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 

Answer questions Minimum 100 words each and reference (questions.docx

  • 1. Answer questions Minimum 100 words each and reference (questions #1-2) KEEP questions WITH ANSWER 1. A key point to get out of this topic is the idea that these errors are theoretical. You won't be sure as to whether one occurred or not. Why are they theoretical in nature? Hint: think about a study and knowing the "truth" 2. Pick a study of interest and identify the null and alternative hypothesis. How does this fit in with regards to the topic of a type I and type II error? Always keep this in mind when you are trying to identify what a type I and type II error are. A minimum of 75 words each question and References (IF NEEDED)(Response #1 – 7) KEEP RESPONSE WITH ANSWER Make sure the Responses includes the Following: (a) an understanding of the weekly content as supported by a scholarly resource, (b) the provision of a probing question. (c) stay on topic 1) According to the reading, we set the alpha which is the largest probability for type I error. To increase the power of a hypothesis researchers can use larger samples which provides more information and raise the significance level which increases the probability that the hypothesis will be rejected. 2) A Type 1 error occurs when individuals involved in research make the decision to reject the belief of truth when in actuality the hypothesis is true. Type 1 errors are errors in research when the researcher makes the wrong decision to reject a true null hypothesis. Type II errors are considered less of a problem than Type 1 errors, but can prove to be detrimental in the field of medicine. This type of error occurs when researchers decide to keep a false null hypothesis, when in fact the hypothesis is true. The method to avoid making Type 1 decisions is to test the null
  • 2. hypothesis at the highest level (Alpha Level). This will lessen the possibilities of making this type of error (Privitera, 2018). 3) According to Privitera (2018) a type 1 error is the probability of rejecting a null hypotheses that is actually true, researchers purposely make this error. A null hypotheses is a statement about a population parameter that is assumed to be true, this hypotheses is a starting point (Privitera, 2018). The type 2 error or beta error is the probability of retaining a null hypotheses that is actually false (Privitera, 2018). The type 1 error is committed when a researcher decides to reject previous notions of truth that are in fact true (Privitera, 2018). The best way to avoid these types of errors is to be open minded and not reject notions if there is fact to back the notions up. In my opinion a type 1 error is something committed with bias by the researcher. I say this because as a researcher it is their job to find all facts or at least most all facts and apply them to their study or research, especially if they commit a type one error knowingly. If a researcher does this error then they are not following through with basic research guidelines. 4) A one-tailed test is used in a hypothesis test where the alternative hypothesis is stated as either (>) or (<). When a researcher is interested in a specific alternative to the null hypothesis. A two-tailed test is used when one wants to avoid making a type III error. An error that occurs when one accepts a null hypothesis that is incorrect because the the rejection region of the tail was on the opposite end. SPSS can be used to compute the calculations for each by imputing data in to a new data chart and then using the frequencies tab to help solve for the mean and standard deviation. From there one can use appendix c. to solve for the two-tails. (Privitera., G. J., 2018). 5) We use the one-tailed test when we need to check or test the claim or hypothesis which is directional in nature. This means if the alternative hypothesis of the test includes ‘less than’ or ‘greater than’, then we use one-tailed tests. We use the two- tailed test when we need to check or test the claim or hypothesis which is non-directional in nature (Privitera., G. J., 2018). That
  • 3. is, if the alternative hypothesis of the test includes ‘not equal to’, then we use two-tailed tests. When we perform one-tailed tests and two-tailed test by using SPSS, then we need to use some setting or calculations. For most of the tests, SPSS provides the results for the two-tailed test as a default. Most of the times, SPSS do not provide results for one-tailed tests and in such cases, we need to calculate the p-value from this output. Examples of one tailed and two tailed test is given as below: H0: µ = 10 v/s Ha: µ < 10 (One tailed /lower tailed /left tailed /directional test) H0: µ = 10 v/s Ha: µ > 10 (One tailed /upper tailed /right tailed /directional test) H0: µ = 10 v/s Ha: µ ≠ 10 (two tailed /non-directional test) 6) In the Type 1 error and Type 2 error, in this two types of errors that exist in a hypothesis testing of Type 1 and Type 2. In Type 1 and Type 2 that occur in when the null hypothesis is true but is still being rejected. In being able to use the following example from a law case, this is equivalent of convicting an innocent man or individual. In the statistics or research types of errors in types think that he or she has a significant difference, when there is actually no significant differences in the types of errors. A Type 2 error occurs when null hypothesis is false but not rejected, which is equivalent of acquiring a guilty man or individual. This is where the researchers actually has a significant difference but does not realize it. Many examples are generated in the Type 1 and Type 2 that allows the researcher to understand and generate this hypothesis. In the law, example that is a matter of opinion and often depends on the nature of the time and associated in the factor that generates the punishment for the individual that committed the crime. That is why it is important to understand the meaning, understanding and hypothesis of this type 1 and type 2 significant of errors. In the statistics, replication of studies will reduce the chance that an artifact appears significant when it is not. In one type of error is eliminated and
  • 4. there is a very good chance of the other occurring. In the chance of both types of errors cannot be eliminated. There are many factors that allows the reseacher to come up with this type of hypothesis that allows them too see and understand this type 1 and type 2 errors. 7) After researching and exploring this question, it is my belief that if you can explain why you are more interested in an effect in one direction and not the other direction, it is a good time to use a one-tailed test. A plus is an improvement in power to reject the null hypothesis if the null hypothesis is definitely false. A more extensive null hypothesis with the ability to detect unexpected results can be restricted when the null hypothesis is not rejected. There is a higher level of trust; the lower the level p-value the less plausible that the null hypothesis is true. The one-tailed test is used where an alternative hypothesis is more or less whereas a two-tailed test is used when the researcher is attempting to avoid a type III error. According to Privitera (2018), A basic explanation of how SPSS is used to perform the calculations is to : go to the analysis menu; compare means from drop down menu click one sample t test from pop-up menu select the dependent variables you want to test check arrow button to move variables into test variables pain test box enter value compare to click ok etc. imputing the data use frequencies tab will find the mean and standard deviation. The two-tailed test can be found using appendix c Case Study 2: Data Breaches and Regulatory Requirements Due Week 6 and worth 100 points The National Institute of Standards and Technology (NIST) provides an extensive amount of information, resources, and guidance on IT and information security topics. The Federal Information Security Management Act (FISMA) provides standards and guidelines for establishing information security within federal systems. However, there have been, and
  • 5. continues to be, numerous security incidents including data breaches within federal systems. Review the information about FISMA at the NIST Website, located at http://csrc.nist.gov/groups/SMA/fisma/index.html. Additionally, review the information, located at http://www.govtech.com/blogs/lohrmann-on- cybersecurity/Dark-Clouds-Over-Technology-042212.html, about the data breaches within government systems. Select one (1) of the data breaches mentioned to conduct a case analysis, or select another based on your research, and research more details about that incident to complete the following assignment requirements. Write a three to five (3-5) page paper on your selected case in which you: 1. Describe the data breach incident and the primary causes of the data breach. 2. Analyze how the data breach could have been prevented with better adherence to and compliance with regulatory requirements and guidelines, including management controls; include an explanation of the regulatory requirement (such as from FISMA, HIPAA, or others). 3. Assess if there are deficiencies in the regulatory requirements and whether they need to be changed, and how they need to be changed, to mitigate further data breach incidents. 4. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: · This course requires use of new Student Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details. · Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the source list are not included in the required page length.
  • 6. The specific course learning outcomes associated with this assignment are: · Describe legal compliance laws addressing public and private institutions. · Examine the principles requiring governance of information within organizations. · Use technology and information resources to research legal issues in information security. · Write clearly and concisely about information security legal issues and topics using proper writing mechanics and technical style conventions. Assignment 3: Intellectual Property Laws and Security Measures Due Week 7 and worth 100 points Intellectual property law is a major issue facing organizations, and many organizations have been fined significant amounts for violations of intellectual property law. As an information security manager in an IT consulting company, your executive management team is concerned about the potential intellectual property violations in the organization. To address these concerns, they have asked you to develop an intellectual property policy to implement within the organization. Develop a policy document in which you: 1. Provide an overview of intellectual property law. 2. Describe who the policy applies to. 3. Create policy, standards, and guidelines concerning: a. Patents b. Trademarks c. Copyrights d. Ownership of company material 4. Develop intellectual property violation reporting procedures. 5. Develop intellectual property infringement ramifications. 6. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
  • 7. Your written paper must follow these formatting requirements: This course requires use of new Student Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details. (Note: You’ll be prompted to enter your Blackboard login credentials to view these standards.) . Your paper should include a cover page. · . Your paper should be of sufficient length to fully develop your own ideas that address the items called for in the instructions, and not be filled with “filler” information. Write clearly and concisely. . The paper should be double-spaced, 12-point font. The specific course learning outcomes associated with this assignment are: · Analyze intellectual property laws. · Use technology and information resources to research legal issues in information security. · Write clearly and concisely about information security legal issues and topics using proper writing mechanics and technical style conventions. Assignment 2: Structural Modeling and Behavior Modeling Due Week 6 and worth 120 points Refer to the functional model you verified and validated for ABS in the Week 4 assignment to complete this assignment. Based on your performance, ABS management was so satisfied that it wants you to develop both the structural and behavior models. This way, ABS can fully understand both the interaction that would take place between the users and the system, and the system itself in greater detail. Note: You may create and / or assume all necessary assumptions
  • 8. needed for the completion of this assignment. Write a four to five (4-5) page paper in which you: 1. Create Class-Responsibility-Collaboration (CRC) cards and a class diagram based on the functional models through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length. 2. Identify each use case in the functional model and create a sequence and communication diagram for each scenario of each use case identified through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length. 3. Create a behavioral state machine for each of the complex classes in the class diagram. 4. Perform a CRUDE analysis to show the interactivity of the objects in the system. 5. Perform a verification and validation walk-through of each:Revise the requirements document created in Assignment 1 with additional information found in this assignment and document the assumptions. 1. Functional model 2. Structural model 3. Behavioral model 6. 7. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: · This course requires use of new Strayer Writing Standards (SWS). The format is different from other Strayer University courses. Please take a moment to review the SWS documentation for details. · Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references
  • 9. must follow SWS or school-specific format. Check with your professor for any additional instructions. · Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. · Include charts or diagrams created in Visio or Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted. The specific course learning outcomes associated with this assignment are: · Describe object-oriented modeling, structural modeling, and behavioral modeling. · Develop class diagram based on business scenarios. · Use technology and information resources to research issues in procuring and designing project requirements. · Write clearly and concisely about project requirements and design topics using proper writing mechanics and technical style conventions. Assignment 3: Design with UML Due Week 7 and worth 120 points Advanced Business Systems (ABS) is a consulting and staffing company providing specialized staffing and consulting services to clients in a variety of different industries. It has offices in major U.S. metro areas and has ongoing relationships with Fortune 500 companies. Its areas of services range from software development and network engineering to geo- information systems. It has fifty (50) plus regional offices in U.S. and five (5) offices in Canada. It plans to expand to other countries in the future. When an ABS client company determines that it will need a contractor or temporary professional, it issues a staffing request against the contract it had previously negotiated with ABS. The contract manager in ABS reviews the staff request and ensures that the request is valid with its current contract with its client
  • 10. from the database. · If the request is not valid, the contract manager sends the staffing request back to the client and explains the reasons and asks for the need for starting a new contract. · If the request is valid, the contract manager will start recruiting requests by putting the request into its staffing database. The staffing request is then sent to ABS placement department. In the placement department, the placement specialists will check the job requirements and candidates qualifications. · If there is a qualified candidate, the specialist will notify the candidate and put a note in the database. · If a qualified candidate cannot be found or not immediately available, the specialist notifies contract managers and recruiting department; the recruiting department starts search outside immediately. The recruiting department normally has thirty (30) days to find an outside candidate and send the qualified candidates to the placement department to review. If an internal qualified candidate is confirmed with his / her availability, the confirmation will be sent to the arrangement department. In the arrangement department, the candidate works with the specialists to further confirm the placement details, such as starting date, location, compensation (e.g., per diem), and travel arrangement. The final confirmation will be sent to the client along with a billing schedule. If the client agrees with the arrangement, he/she acknowledges the arrangement with contract managers in the contract department. The contract manager then puts a memo into its database and closes the request. Note: You may create and / or assume all necessary assumptions needed for the completion of this assignment. Write a three to four (3-4) page paper in which you: 1. Create a package diagram of the problem domain layer using the communication diagrams and the CRUDE matrix through the use of graphical tools in Microsoft Word or Visio, or an open
  • 11. source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length. 2. Perform and explain the verification and validation walk- through of the package diagram. 3. Create a set of invariants for attributes and relationships and add them to the CRC cards for each class in the structural model using Object Constraint Language (OCL). 4. List the classes in the structure model. Choose one (1) class and create a contract for each method in that class. Note: Be sure to use OCL to specify the preconditions and the post conditions. 5. Create a method specification for each method using both structured English and activity diagram for the algorithm specification through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length. 6. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: · This course requires use of new Strayer Writing Standards (SWS). The format is different from other Strayer University courses. Please take a moment to review the SWS documentation for details. · Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions. · Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. · Include charts or diagrams created in Visio or Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.
  • 12. The specific course learning outcomes associated with this assignment are: · Determine the steps and principles of design modeling with UML. · Document and describe the different state of objects throughout the life cycle. · Use technology and information resources to research issues in procuring and designing project requirements. · Write clearly and concisely about project requirements and design topics using proper writing mechanics and technical style conventions. Discussions (around 200 words each) 1 "Data Breach Notification" Please respond to the following: Data breach laws have made us more aware of how our PII and other corporate data is compromised in recent years. Intellectual property is often the target of attacks from foreign entities and even governments. Banks don’t like people to know how much money is stolen annually by hackers; despite their best efforts to prevent such theft. Discuss your thoughts on the subjects mentioned here based on your learning from this week. 2 "Online Contracts" Please respond to the following: Online contracts are becoming ubiquitous these days. They’re sometimes signed online even in face-to-face meetings between parties. Based on your study this week, what are some pitfalls you previously didn’t know? Describe an online contract or end-user license agreement you signed that made you think. Do you ever agree to things without fully reading them, even when the signature block says, “I have read and understand”? What do you think about this now that you have learned about online
  • 13. contracts? 3 "Policies, Standards, Procedures, and Guidelines" Please respond to the following: This week you studied policies, standards, procedures and guidelines. If you were the project leader at a small company being spun off from a larger company, how would you tackle the task of adapting your company’s policies regarding information security? What are some of your greatest concerns? What rules are you likely to keep and which won’t really apply? Remember to keep a balance. You don’t want the employees to be so locked down by rules that they can’t efficiently do their jobs. 4 Object-Oriented Design" Please respond to the following: · Select an organization that you are familiar with and determine the most advantageous benefits of using object- oriented design in this organization and state why. In addition, explain the places within this organization that object-oriented design is not advantageous. 5 "Data Management Layer Design" Please respond to the following: · Recommend one to two (1-2) methods to reduce space consumption and increase performance for object-oriented database. Provide a rationale for your recommendations. 6 "Cloud Computing" Please respond to the following: · Identify the main challenges for provisioning the physical architecture layer with cloud technologies. Additionally, recommend methods to mitigate those challenges.