Premium Essay

Worksheet 2

In: Business and Management

Submitted By barneybear
Words 947
Pages 4
The z-table
Z 0 0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08 0.09 Use this table to:
0 0.5 0.504 0.508 0.512 0.516 0.5199 0.5239 0.5279 0.5319 0.5359 a) find a z-value given a confidence level, or
0.1 0.5398 0.5438 0.5478 0.5517 0.5557 0.5596 0.5636 0.5675 0.5714 0.5753 b) find the area under a standard normal curve to the left of a given z-value.
0.2 0.5793 0.5832 0.5871 0.591 0.5948 0.5987 0.6026 0.6064 0.6103 0.6141
0.3 0.6179 0.6217 0.6255 0.6293 0.6331 0.6368 0.6406 0.6443 0.648 0.6517 a) To find a z-value for a given confidence level:
0.4 0.6554 0.6591 0.6628 0.6664 0.67 0.6736 0.6772 0.6808 0.6844 0.6879 1. Determine the cumulative probability corresponding to the confidence level
0.5 0.6915 0.695 0.6985 0.7019 0.7054 0.7088 0.7123 0.7157 0.719 0.7224 For 95% confidence, the cumulative probability is 0.975.
0.6 0.7257 0.7291 0.7324 0.7357 0.7389 0.7422 0.7454 0.7486 0.7517 0.7549 For 90% confidence, the cumulative probability is 0.95.
0.7 0.758 0.7611 0.7642 0.7673 0.7704 0.7734 0.7764 0.7794 0.7823 0.7852 For 99% confidence, the cumulative probability is 0.995.
0.8 0.7881 0.791 0.7939 0.7967 0.7995 0.8023 0.8051 0.8078 0.8106 0.8133 2. Find the cumulative probability in the table.
0.9 0.8159 0.8186 0.8212 0.8238 0.8264 0.8289 0.8315 0.834 0.8365 0.8389 3. Find the z-value by adding the z-column to the the z-row
1 0.8413 0.8438 0.8461 0.8485 0.8508 0.8531 0.8554 0.8577 0.8599 0.8621 E.g.: For 95% confidence, z = 1.9 + 0.06 = 1.96
1.1 0.8643 0.8665 0.8686 0.8708 0.8729 0.8749 0.877 0.879 0.881 0.883 Find a more detailed account of the relationship between the cumulative probability and the
1.2 0.8849 0.8869 0.8888 0.8907 0.8925 0.8944 0.8962 0.898 0.8997 0.9015 confidence interval on page 21 of the clip titled "Calculating the Confidence Interval" in
1.3 0.9032 0.9049…...

Similar Documents

Premium Essay

Lab #2 – Assessment Worksheet

...Lab #2 – Assessment Worksheet IEE 802.3 CSMA/CD & Ethernet II Networking 1. Using the Wireshark Protocol Analyzer how was you able to isolate and inspect IP and CDP packets for further analysis? Navigating to the Analyze menu interface, selecting the “Disable All” button at the bottom of the window, in the “Protocol” window scroll to “IP” and select it the same steps apply to CDP. 2. In what section of the Wireshark Protocol Analyzer interface is the details of a capture packet frame displayed? On the Frame Analysis Window 3. Draw an IEEE 802.3 frame Showing segments and bytes assigned to each segment? 4. What are the main speeds of Ethernet? 10 mbps 100 mbps (fast Ethernet) 1000 mbps (gigabit Ethernet) 10000 mbps (ten gigabit Ethernet) 5. What is the Maximum size allocated for information in an IEEE 802.3 Ethernet Frame? Maximum length Ethernet II frames (1518 bytes, with a payload of 1500 bytes) 6. What is the main difference in the layout of IEEE.802.3and Ethernet II frame? IEEE 802.3 decided to include the Type of both source and destination in the 802.2 LLC header. So they replaced the Type field (bytes 13-14) with a Length field. The length" is not the full frame size - rather, it is the 802.2 packet length - the number of bytes of the 802.2 (LLC and data) portion of the frame, excluding padding. 7. What is the maximum number of bytes assigned to the “source address” segment of an IEEE.802.3? Ethernet and IEEE 802.3 specify similar technologies...

Words: 485 - Pages: 2

Premium Essay

Is3110T Lab 2 Assessment Worksheet

...Lab #2 Assessment Worksheet Align Risks, Threats, & Vulnerabilities to COBIT P09 Risk Management Controls 1. a. Unauthorized access from public internet - HIGH b. User destroys data in application and deletes all files - LOW c. Workstation OS has a known software vulnerability – HIGH d. Communication circuit outages - MEDIUM e. User inserts CD’s and USB hard drives with personal photos, music and videos on organization owned computers - MEDIUM 2. a. PO9.3 Event Identification – Identify threats with potential negative impact on the enterprise, including business, regulatory, legal, technology, trading partner, human resources and operational aspects. b. PO9.4 Risk Assessment – Assess the likelihood and impact of risks, using qualitative and quantitative methods. c. PO9.5 Risk Response – Develop a response designed to mitigate exposure to each risk – Identify risk strategies such as avoidance, reduction, acceptance – determine associated responsibilities; and consider risk tolerance levels. 3. a. Unauthorized access from public internet - AVAILABILITY b. User destroys data in application and deletes all files - INTEGRITY c. Workstation OS has a known software vulnerability – CONFIDENTIALITY d. Communication circuit outages - AVAILABILITY e. User inserts CD’s and USB hard drives with personal photos, music and videos on organization owned computers - INTEGRITY 4. a. Unauthorized access from public internet...

Words: 934 - Pages: 4

Free Essay


...Worksheet 4 (50 points) Worksheet is due Friday, May 2 The worksheet has three parts. Part 1 (12 points) Match up the descriptions in the left column with the names of people in the right column. Every item in the Description column should be used; each name will have at least one match and some will have more than one. (Show your choice by simply typing in the letter symbol on the line after the name.) A. Minnesotan senator responsible for writing Isadore Blumenfeld _____ prohibition law B. Minnesotan leader of women’s suffrage John J. O’Connor _____ movement C. Minnesotan civil rights leader Clara Ueland _____ D. Architect of the WPA in St. Paul Floyd B. Olson _____ E. Founder of the Nonpartisan League Gordon Parks _____ F. “Al Capone of St. Paul” Roy Wilkins _____ G. Minnesotan in Baseball Hall of Fame Clarence Wigington _____ H. Gave speech in favor of civil rights over Andrew Volstead _____ states’ rights I. Suspect in the murder of Walter Liggett Arthur Charles Townley _____ J. Photographer of the WPA (FSA) Leon Gleckman _____ K. Made a “gentleman’s” agreement with Charles Bender _____ gangsters L. Farmer-Laborite governor of Minnesota Hubert Humphrey _____ Part 2 (10 points) In your own words, briefly (in two or three sentences) identify......

Words: 533 - Pages: 3

Premium Essay

Lab 2 Assessment Worksheet

...IS3340-WINDOWS SECURITY | Lab #2 | Assessment Worksheet | | [Type the author name] | 4/3/2014 | | 1. What is the Principle of Least Privilege? Providing only the necessary access required to carry out a task. 2. What does DACL stands for and what does it mean? Discretionary Access Control List is the list of access control rules (ACL’s). 3. Why would you add permissions to a group instead of the individual? Management of the permissions (add/remove) is easier to do from the Group Level, other than Individual User and is quicker. 4. Why would you allow shared access to groups instead of to everyone? By allowing access by Groups it is easier to manage – all users have to be part of a Group in order to be created. 5. List at least 3 different types of access control permissions you can enable for a file. Read, (permits viewing or accessing of the file's contents) Write (permits adding to the file) Modify (permits reading and writing of the file and allows deletion of the file) 6. Which access control permissions allow you to delete files and/or folders? Modify is the access control permission allowing the user to delete files and/or folders. 7. What is the lowest level permission needed in order to view the contents of a folder? Read 8. If you don’t remember the syntax when using iCacls.exe what command do you type in to see the options? icacls.exe (the command with no arguments) 9. What other tool......

Words: 331 - Pages: 2

Premium Essay


... Financial Environments Worksheet Michelle Ford HCS/577 June 16, 2014 Robert Adams Financial Environments Worksheet In the first section, identify three specific HEALTHCARE organizations within each of the for-profit, not-for-profit, and government financial environments. For the second and third sections of the worksheet you should focus ONLY on the three environments NOT the specific organizations. In the second section, compare the similarities of financial structures, practices and policies in healthcare organizations regardless of the financial environments. In the third section, contrast the differences of financial structures, practices and policies between the three financial environments. | |Organizations in the |Organizations in the |Organizations in the | | |For-Profit Environment |Not-for-Profit Environment |Government Environment | |Specific |1.Methodist Hospital (San Antonio) |1. St. Judes |1. Hospital(county) | |Organizations | | | | | |2.Regional Medical......

Words: 365 - Pages: 2

Premium Essay

Lab 2 Assesment Worksheet

...Lab 2 Assessment Worksheet 1. A. Denial of Service attack on organization’s email server Medium Risk B. Fire destroys primary data center High Risk C. Loss of Production Data High Risk 2. For the above identified threats and vulnerabilities, which of the following COBIT P09 Risk Management control objectives are effective? 3. A. Denial of Service attack on organization’s email server Threat to Availability B. Fire Destroys Data Center Threat to Integrity and Availability C. Loss of Production Data Threat to Integrity and Availability 4. Effectiveness, Efficiency, Compliance, and Reliability secondary. 5. A. Denial of Service Information- Information would not be able to be accessed to end users from outside the primary server control. By adding firewalls and limiting access to certain IPs, the risk can be lessened. Applications- Deny access to necessary applications needed by the organization. Can be mitigated as stated above by firewall procedures to limit IPs. Infrastructure- Access from remote terminals will be very limited. Firewalls should be installed to help limit which IPs have access. People- Will have limited access to the organization’s server. Contact their local IT manager to give them access to the server by allowing their IP through. B. Fire Destroys Data Center Information- Information will be destroyed by the fire. Back up data to an offsite server/hard drive to have a fall back plan. Applications- Applications will......

Words: 515 - Pages: 3

Premium Essay

Hcs 405 Week 2 Health Care Financial Terms Worksheet Paper

...WWW.STUDENTWHIZ.COM HCS 405 Week 2 Health Care Financial Terms Paper The theme of HCS 405 is to enable students to learn about the financial statements and other financial transactions in the hospital industry. There are various topics in HCS 405 like balance sheet, statement of revenues and expense, revenue cycle, payer mix and revenue. There will be five weeks in the course of HCS 405 in which the above topics will be covered. There will also be the study about the financial worksheet and reporting practices. It will be taught to the students that organizations must comply with the requirements of ethics and proper disclosure of the statements. In HCS 405 week 1, there will be teaching of balance sheet. Balance sheet is defined as the financial statement of hospitals that tells about the assets, liabilities and equity of shareholders at a specific point of time. In HCS 405 week 2, earning statements will be taught to the students. Statement of revenues and expense is one of the financial statements which are used to identify the revenues or losses of the hospitals for the particular period. In the course, there will be different multiple choice questions that will be provided to the students to test their understanding. After it, the solutions are also provided to check the correctness. There will be the final exam in which all the topics will be covered. The HCS 405 week 3 will include the revenue cycle of hospitals. . It is defined as the process in which the......

Words: 1024 - Pages: 5

Free Essay

Bugusa, Inc. Worksheet Law/421 Version 2

...Bugusa, Inc. Worksheet LAW/421 Version 2 1 University of Phoenix Material BUGusa, Inc., Worksheet Use the scenarios in the BUGusa, Inc., link located on the student website to answer the following questions. Scenario: WIRETIME, Inc., Advertisement Has WIRETIME, Inc., committed any torts? If so, explain. In the case of WIRETIME, Inc., tort has been committed. Per the reading, “a tort is when one party has acted, or in some cases failed to act, and that action or inaction triggered a loss to be grieved by another party” (Melvin, 2011). WIRETIME, Inc., made a defamatory statement about Bugusa, Inc.’s reputation. WIRETIME, Inc., also enlisted an ad in a well-known magazine that enclosed a statement alleging BUGusa for having bad merchandise. BUGusa doubtfully will undergo reputation or loss of clients due to the negative hoarding that WIRETIME, Inc., bashed. Scenario: WIRETIME, Inc. (Janet) Has WIRETIME, Inc. committed any torts? If so, explain. Scenario: WIRETIME, Inc. (Steve and Walter) Discuss any liability BUGusa, Inc., may have for Walter’s actions. In this case, the liability BUGusa, Inc., may encounter for Walter’s actions is that he committed a tort when locking Steve inside a soundproof room and threatened him with physical harm. Keeping Steve in a soundproof room can be defined as false imprisonment. False imprisonment prohibits wrongful restraining, confining or detaining a person without that person’s consent (Penal Code 236). Criminal threatening sometimes......

Words: 1004 - Pages: 5

Premium Essay

Bio 2 18.1 Worksheet

...18.1 Bio 2 Bacteria 1. Bacteria are what cell type? Prokaryotic 2. TRUE FALSE Bacteria are the most numerous organisms on earth. 3. TRUE FALSE All bacteria are harmful to humans. 4. Describe the “old” and “new” means of classifying bacteria. Old is by shape. - Monera Second is by size, color, and chemical composition. - archaea and bacteria are new eu bacteria is the new kingdom 5. What is the structural difference between eubacteria and archaebacteria? The general cell structure of archaea and bacteria are the same but composition and organization of some structures differ in archaea. Similar to bacteria archaea do not have interior membranes but both have cell wall and use flagella to swim. Archaea differ in the fact that their cell wall does not contain peptidoglycan and cell membrane uses ether linked lipids as opposed to ester linked lipids in bacteria. 6. Describe the habitats of the two above mentioned groups. Eubacteria are the commonly encountered bacteria in soil, water, and living on or in larger organisms. Archaebacteria grow in unusual environments such as salt brines, hot springs and in the ocean depts. 7. Archaebacteria are divided into three major groups. List all three and describe. 1. Methane producers - live without oxygen 2. Extreme Halophiles - live in areas with high salt concentration 3. Extreme Thermophiles - live in hot, acidic waters such as those found in sulfur springs. 8. Define the following: nucleoid, capsule,...

Words: 554 - Pages: 3

Premium Essay

Health Care Terms Worksheet Week 2

...University of Phoenix Material Week 2 Health Care Terms Worksheet Understanding health care terms is a prerequisite for both academic and professional success. This assignment is intended to ensure you understand some of the basic terms used in this course. Complete the worksheet according to the following guidelines: • In the space provided, write each term’s definition. You must define the term in your own words. • In the space provided after each term’s definition, use the term in a sentence as it applies to the health care industry. You may wish to consider the following: o How has it influenced heath care? o What role has the term played as health care developed over the years? Save the completed worksheet as a Microsoft® Word document with your name in the file name. Submit the file to your facilitator. Submitted by: Term Definition Use the term in a sentence as it applies to the health care industry. Health Promotion It allows for people to take more control over their well being Patients should be taught about health promotion to encourage them to living healthier happy lives. Disease Prevention Actions that are put into place to prevent the onset of a disease by early detection Hand washing is the number one disease prevention that can be done to avoid spreading it to other people. Diagnosis Identifying the cause of a disease The blood work came back this morning and it confirmed the patient’s diagnosis. Rehabilitation A place......

Words: 532 - Pages: 3

Premium Essay

Worksheet #2 Module Review SID#: Worksheet #2: Pollution Control (Aka Study Guide for Exam 2) Approximate Exam format: 25 multiple choice (60% of grade) & 4 short answer (40% of grade) Instructions: * Add notes to each of the study questions or prompts below. Limit your responses to a total of eight (8) typewritten pages [Encouraging you to write more in-depth answers]. Make sure your name and SID# is on every page and staple the pages together. * You may discuss answers with your team-members; however, each student must submit an individual assignment. Plagiarism or submitting the same answers is not permitted. * This worksheet is due at the end of the period on Thurs, October 30, 2014. * Late worksheets will not be accepted. 1. Explain the relationship (and differences) between emissions, ambient concentration, and exposure. Emissions refer to the quantity of a pollutant directly released into the environment, while ambient concentration refers to the concentration of those pollutants in the atmosphere. Exposure is the number of people exposed to these pollutants. 2. Explain the difference between primary and secondary pollutants Primary pollutants are pollutants released directly from a source, while secondary pollutants form in the atmosphere or environment through chemical reactions with primary pollutants. 3. Explain the difference between point source and non-point pollution. Give an example of each. What makes one more difficult...

Words: 1375 - Pages: 6

Premium Essay

Bshs 485 Week 2 Capstone Worksheet

...The | |alignment of the residents with these resources worked to solve the community’s problems. Eichler’s strategy was successful because it | |organized Mon Valley’s residents, and instead of fighting with frustration; they fought back with a plan they helped to develop with the | |financial backing of several local and non-local resources. | | | | | |Strategic principle 2: Pragmatic leadership is present in communities, though not always recognized. | |As a consensus organizer it is important to look for those individuals in the community that are trusted, respected and able to take on the | |responsibility of improving the community. In the Mon Valley Case study that person is Robert Pease who was the director of the Allegheny | |Conference. Robert Pease came up with the idea to hire Mike Eichler who would help with building new community organizations in Mon Valley. | |Because Robert Pease was a trusted individual in the community it would be more likely that others in the community would listen to him and | |be agreeable to his suggestions. Robert Pease was......

Words: 1209 - Pages: 5

Premium Essay

Week 2 Worksheet

...University of Phoenix Material Week 2 Review Worksheet The Process of Memory In the spaces provided beneath the flowchart, list the term that corresponds with the definition in each box. [pic] 1. Store____________________ 2. Encoding_________________ 3. Short term memory________ 4. Consolidation______________ 5. Declarative Memory________ 6. Chunking_________________ 7. Segmentation________ 8. Rehearsal Computing IQ Essay Consider the following scenario: Kara is 10 years old. She has been given an intelligence test. Her mental age is 13. According to Sternberg, what is Kara’s IQ? Conduct research and interpret her score. Choose two theories of intelligence. Write a 150- to 200-word discussion on the components of each theory, and how they differ in relation to Spearman’s g factor. According to Sternberg, Kara’s IQ is 90 because at ages 10,11,12,13 the level of IQ is more than ages above 17 because of initiation to adulthood. Kara’s scores will be high because children with elevated levels of intelligence are more likely to learn in the school setting comparatively to their peers with lower scores. This gives evidence to the relationship between IQ scores and school performance. The triarchic theory of intelligence was created by Sternberg while he was piloting research on human intelligence. The triarchic theory is made up of three components. The first component addresses the relationship between intelligence and......

Words: 886 - Pages: 4

Free Essay

Gen 200 Team Worksheet Week 2

...University of Phoenix Material Team Building Worksheet Complete the Team Building Worksheet by answering the following questions in 200 to 300 words each. 1. Describe team members’ results on the Discovery Wheel and develop your multiple intelligences exercises. What similarities and differences exist within the team? A similarity Team Delta shares would definitely be that we are each use to using our critical thinking skills, managing time and have been exposed to a very diverse group just by serving in the military. Most of us scored about a three or four in each category of the discovery wheel. This makes sense considering the fact that it has been years since any of us have gone to school. Our note taking and reading and comprehension skills will be put to the test while we transition to college life. Our differences have to do with what the ultimate score in these areas were. Some were a little stronger and weaker in specific fields. By doing the discovery wheel I found that my two weakest areas are test taking and memory. My two strongest are health and diversity. Money was a very strong one also because the military is taking care of me while I go to school. Some of my other strong ...

Words: 1238 - Pages: 5

Premium Essay


...Associate Level Material Appendix B Piaget Worksheet Directions: Review Module 26 of Psychology and Your Life. Complete the matrix below and answer the questions that follow. |Cognitive Stage |Age Range |Major Characteristics | |Sensorimotor |Birth to 2 years old |Development of motor skills from experiences | | | |and physical interactions with the use of | | | |language. | |Preoperational |2 to 7 years old |Development the use of symbols, language memory| | | |and imagination skills | |Concrete Operational Mastery |7 to 12 years old |Development the use of intelligence by using | | | |logical thinking with a few limitation | |Formal Operational |12 years old to adulthood |Development to see the larger picture,......

Words: 260 - Pages: 2