Get help from the best in academic writing.

# stats hw help

stats hw help.

Hi there, I need help on these 4 problems. Number 12 is an excel problem, and I uploaded the excel onto this thread, please work on what I gave you. Then when you are done copy the excel and put it onto a word document with the rest of the problems please. No hand writing, just typed out and made into a pdf form.8. A trucking company continuously monitors the tread remaining on its fleet of truck tires. The firm knows that standard deviation is 0.1 cm. Suppose a sample of 80 tires were obtained, and the mean tread was 2.2 cm. Construct a 99% confidence interval. The company’s operations manager knows that flat tires occur more often when the tread is below 1.0 cm. At what sample mean (and higher) should the company reasonably expect minimal flat tires, based on a 95% confidence interval?10. Monthly expenses for an advertising agency were obtained for the previous year. The sample of 12 expenses showed a mean of \$196,000, with a standard deviation of \$45,000. The office manager is budgeting for monthly expenses, and would like to know if it is reasonable to expect expenses to be below \$250,000. Construct a 95% confidence interval to justify if \$250,000 is reasonable.12. An online business consulting firm provides its service on a hourly basis. In the previous 15 months, the business had the following number of hours billed for its services.Hours billed212389457505740678987573761812933691558575872a. What is the point estimate of the population mean?b. Construct a 90% confidence interval.14. As the operator of an e-commerce web site, you are interested in monitoring the average time spent on the site. How large of a sample of usage times should be obtained, provided your allowable error is 30 seconds. Based on a long history, you know the standard deviation of usage times is 5 minutes. Assume a 90% level of confidence.
stats hw help

## PJM 440 CSUGC W3 Quality Management and Small Cell Infrastructure Design Report

PJM 440 CSUGC W3 Quality Management and Small Cell Infrastructure Design Report.

I’m working on a management case study and need support to help me understand better.

PJM 440 CSUGC W3 Quality Management and Small Cell Infrastructure Design Report

## Ethics, Law and Cybersecurity

programming assignment help Ethics, Law and Cybersecurity. I need an explanation for this Computer Science question to help me study.

Instructions: There are four (4) topic areas listed below that are designed to measure your knowledge level specific to the social issues of equity and access relative to class, race and gender. You must respond to #2 and select any other two of these topic areas providing appropriate responses in essay form. In most cases the topic area has several components. Each must be addressed to properly satisfy requirements.
State-wide and in most professional industries, there has been a mandate that college students be more proficient in their writing. While this is not a writing class, all writing assignments will be graded for grammar, syntax and typographical correctness to help address this mandate.
Pay attention to what you are being asked to do (see Grading Rubric below). For example, to describe does not mean to list, but to tell about or illustrate in more than two or three sentences, providing appropriate arguments for your responses using theories discussed in our text. Be sure to address all parts of the topic question as most have multiple parts. A verifiable current event (less than 4 years old) relevant to at least one of the topics you respond to is a fundamental component of your quiz as well. You cannot use information from the text book or any book/article by the author of the text book as a current event. Make sure that your reference has a date of publication. For each chapter quiz and final quiz you are required to find and include at least one reference and reference citation to a current event less than 4 years old (a reference with no date (n.d.) is not acceptable) in answer to at least one question. This requires a reference citation in the text of your answer and a reference at the end of the question to which the reference applies. You must include some information obtained from the reference in your answer. The references must be found on the internet and you must include a URL in your reference so that the reference can be verified.
You should type your responses directly under the appropriate question. Be sure to include your name on your quiz. Only the first three (3) questions with answers will be graded. Include your name in the document filename. Your completed quiz must be placed in the appropriate eCollege Dropbox, no later than 11:59pm on the due date. Do well.

(a) Do we, as a society, have a special obligation to disabled persons to ensure that they have full Internet access? (b) Is the argument that by providing improved access and services for disabled persons, non-disabled users will benefit as well, a reasonable argument? Consider that it can be dangerous to reason along this line; for example, suppose that non-disabled persons did not benefit from software applications designed for the disabled. (c) Would that be a reason for not investing in software for disabled people? Defend your answer. Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)
Theismeyer described racist/hate Web sites in this chapter. (a) Should Web sites that promote racist speech be allowed to thrive on the Internet? (b) Has the proliferation of these sites increased the incidence of racism on a global scale? Or is the Internet, as some have suggested, a force that can help to reduce racism? Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)
The increased use of expert systems (ES) technology in many professional fields has generated some ethical and social concerns. Some ethical controversies surrounding ESs have to do with critical decisions, including life and death decisions; for example, (a) should “expert doctors” be allowed to make decisions that could directly result in the death of, or cause serious harm to a patient? If so, (b) who is ultimately responsible for the ES’s decision? (c) Is the hospital that owns the particular ES responsible? (d) Should the knowledge engineer who designed the ES be held responsible? Or is the ES itself responsible? In answering these questions, you may want to take a look back in chapter 4, specifically the case involving Therac-25. Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)
(a) What obligations does the United States have, as a democratic nation concerned with guaranteeing equal opportunities for all its citizens, to ensure that all its citizens have full access to the Internet? (b) Does the United States also have obligations to developing countries to ensure that they have global access to the Internet? If so, (c) What is the extent of those obligations? If not, (d) Why? For example, (e) Should engineers working in the United States and other developed countries design applications to ensure that people living in remote areas with low connectivity and poor bandwidth have reasonable Internet access? If so, (f) Who should pay for the development of these software applications? If not, (g) Why? Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)

Ethics, Law and Cybersecurity

## Rasmussen College Conditions of Women During the Gestation Period Discussion

Rasmussen College Conditions of Women During the Gestation Period Discussion.

I’m working on a nursing discussion question and need support to help me learn.

Initial Post:Choose one of the research questions listed below.Does telelmonitoring blood pressure in urban African Americans with hypertension improve blood pressure control within the six months of initiation of the medication?How pregnant women newly diagnosed with diabetes (I) experience reporting their blood sugar levels to their healthcare providers?How effective is acupuncture in improving mobility in elderly male stroke patients in comparison to standard stroke therapy?Design a strategy for a review of the literature.Describe the type of articles you want to locate to examine what is known and not known about this research topicSearch for the types of articles you identified relevant to the research question you chose.Save the search history you created and attach to the initial postDescribe at least one strategy you learned during this query process including how this new knowledge will help you with future searches of the literatureSelect one article from your query you believe is most relevant to the research question you selected.Summarize why you believe this article is relevant to the PICOSummarize why this research article is credible and attach the critical appraisal worksheet to this post
Rasmussen College Conditions of Women During the Gestation Period Discussion

## Florida State University Cyber Intelligence and Contemporary World Thesis Paper

Florida State University Cyber Intelligence and Contemporary World Thesis Paper.

Phase 1- Identification and Preparation: This is the initial phase of the proposed forensic process and its purpose is to understand how the SCADA/ICS operates. Phase 2- Identifying data sources: This phase is one of the most important phases of the process because it deals with identifying controllers of the system, the type of data can be collected, and where the data can be collected. Data sources need to be identified when any type of attack performed to the system. Needless to say, documentation of the actions taken during this phase is critical and essential for a forensically sound investigation.Phase 3- Preservation, Prioritizing, and Collection: In this phase, the identified data is collected from the known locations, and it is preserved and prioritized for the purpose of repeatability and presentation. In this phase, it is also critical to collect volatile data as it might be destroyed easily. For instance, data can be collected from databases, computer workstation(s), PLC, etc.3 pages APA format
Florida State University Cyber Intelligence and Contemporary World Thesis Paper