Mat 275 Lab 1-6

In: Business and Management

Submitted By Laynevine12
Words 541
Pages 3
MAT 300 Assignment 1: Bottling Company Case Study
Click Link Below To Buy: http://hwcampus.com/shop/mat-300-assignment-1-bottling-company-case-study/ Due Week 10 and worth 140 points
Imagine you are a manager at a major bottling company. Customers have begun to complain that the bottles of the brand of soda produced in your company contain less than the advertised sixteen (16) ounces of product. Your boss wants to solve the problem at hand and has asked you to investigate. You have your employees pull thirty (30) bottles off the line at random from all the shifts at the bottling plant. You ask your employees to measure the amount of soda there is in each bottle. Note: Use the data set provided by your instructor to complete this assignment.

Bottle Number
Ounces
Bottle Number
Ounces
Bottle Number
Ounces

1
14.5
11
15
21
14.1

2
14.6
12
15.1
22
14.2

3
14.7
13
15
23
14

4
14.8
14
14.4
24
14.9

5
14.9
15
15.8
25
14.7

6
15.3
16
14
26
14.5

7
14.9
17
16
27
14.6

8
15.5
18
16.1
28
14.8

9
14.8
19
15.8
29
14.8

10
15.2
20
14.5
30
14.6

Write a two to three (2-3) page report in which you:
1. Calculate the mean, median, and standard deviation for ounces in the bottles.
2. Construct a 95% Confidence Interval for the ounces in the bottles.
3. Conduct a hypothesis test to verify if the claim that a bottle contains less than sixteen (16) ounces is supported. Clearly state the logic of your test, the calculations, and the conclusion of your test.
4. Provide the following discussion based on the conclusion of your test:
a. If you conclude that there are less than sixteen (16) ounces in a bottle of soda, speculate on three (3) possible causes. Next, suggest the strategies to avoid the deficit in the future.
Or
b. If you conclude that…...

Similar Documents

Lab 6

...Chapter 6 Assessment Questions 1. In terms of business continuity, a hostage situation could be considered a disaster. True 2. _____ is choosing not to engage in an activity that carries some element of risk. Risk avoidance 3. _____ is carrying on despite the risks involved in a given activity. Risk acceptance 4. _____ is the process of assigning risk to someone else. Risk transference 5. _____ combines attempts to minimize the probability and impact of risk. Risk mitigation 6. The three main threat categories are information confidentiality, _____, and availability. Integrity 7. Even non-sensitive data should be kept under some level of access control. True 8. Any system or data resource that, if it were lost, stolen, damaged, altered, or publicly divulged, would cause a significant negative impact to the organization should be considered _____. Sensitive 9. Which of the following is an access control system in which rights are assigned by the owner of the resource? Discretionary access control 10. Which of the following is an access control system in which rights are assigned based on a user's role rather than his or her identity? Role-based access control 11. Which of the following is an access control system in which rights are assigned by a central authority? Mandatory access control 12. The principle of separation of responsibility requires a minimum of how many conditions to be met before...

Words: 282 - Pages: 2

Lab 6

...1. Suppose the domain hackers.com is denied for all services in the hosts.deny and the hosts.allow file has the rule ALL: ALL. Will TCPWrappers allow hackers.com access? Yes 2. How do you enable SELinux? In the /etc/selinux/config check to see of the SELinux is enabled in the status. If in the disabled status, enter command rpm -qa | grep selinux 3. What are three modes of SELinux? Explain their basic functionality. Enforcing: SELinux policy is enforced/SELinux denies access based on policy rules Permissive: SELinux policy is not enforced/SELinux does not deny access, but denials are logged for actions that would have been denied if running in enforcing mode. Disabled: SELinux is disabled/Only DAC (Discretionary Access Control) rules are used. 4. Consider the following firewall rule, and describe what this permits or denies. Allow http (web) traffic through SSL using SSH & allow ICMP pings, while denying all other traffic. 5. What command would you use to allow all the traffic from the loopback? iptables -A INPUT -i lo -m ACCEPT iptables -A OUTPUT -o lo -m ACCEPT 6. What command would you use to view the network port configuration for the iptables? /etc/network/interfaces 7. If a service is to allow in one place and to deny in another, what is the outcome? Allow, because deny is the file pulled first and then the allow file, so the last one pulled is to allow. 8. Is the order of the rules important? If you deny something within the IP......

Words: 355 - Pages: 2

Lab 6

...Assessment Worksheet 91 LaB #6 – aSSESSmENt WORKSHEEt Perform Business Continuity Implementation Planning Course Name and Number: Student Name: Instructor Name: lab due date: 6 Perform Business Continuity Implementation Planning Overview In this lab, you were asked to begin the business continuity planning process for an e-commerce company, Online Goodies. You reviewed the key business functions and a prioritized list of impacted IT systems, applications, and data provided by your supervisor. You also compared the components of the major documentation required by the business continuity planning process: risk analysis, business impact analysis, business continuity plan, disaster recovery plan, and the business continuity implementation plan. Lab Assessment Questions & Answers 1. What is the difference between a risk analysis (RA) and a business impact analysis (BIA)? Risk analysis is often identifying the potential threats and the associated vulnerabilities to the organizations .Risk analysis doesn’t view the organization from the mission critical Business Process point of view. BIA the organization from the impact that is going to occur for an organization if the critical business processes are interrupted or tampered 2. What is the difference between a disaster recovery plan (DRP) and a business continuity plan (BCP)? Disaster recovery plan is have a full access to recover any lost data or essentials after a disaster while the business......

Words: 681 - Pages: 3

Lab 6

...1. Why are spindle fibers important for mitosis? (5 points) Chromosomes use spindle fibers as pathways to daughter cells during mitosis. 2. State the four bases that make up DNA. (4 points) a. Adenine b. Guanine c. Thymine d. Cytosine 3. What are the two base pairs? (2 points) a. T & C b. A & G 4. Answer the following questions: a. Define the term crossing over. (3 points) During meiosis’ prophase the homologous chromatids exchange segments. b. Explain why crossing over is important in meiosis. (3 points) Parents cell use it to pass genes off to their children cells. 5. What are the two main differences between mitosis and meiosis? (4 points) a. The amount of cell divisions b. The genes that are exchanged between chromosomes 6. Answer the following questions: a. Explain the difference between mitosis and cytokinesis. (3 points) Cytokinesis is running one cell into two cells. Mitosis is a nuclear division that causes the separation of chromosomes. b. When does mitosis occur during the cell cycle? (1 point) During the prophase, metaphase, anaphase, and telophase. c. When does cytokinesis occur during the cell cycle? (1 point) The telophase 7. Explain the differences that occur during cytokinesis of plant and animal cells. (5 points) The animal cell membrane is drawn inward until the cytoplasm is divided into two equal parts. In plant cells, cytoplasm is divided by the formation of a cell plate that extends until the two daughter cells become......

Words: 821 - Pages: 4

Lab 6

...required questions. You must retype the questions in your lab report in order to make your answers very clear. Also, you should support your answers with graphical results. In most cases, you will be instructed to view the graph either As Is or time_average, and you might want to zoom in when you feel like it is necessary. However, please do not hesitate to include addition graphs in any view of your choice any time that you feel like those graphs may support your answer. Also, you are encouraged to use your textbook, the Internet, or any other reference material that you feel will help support your answers to the questions. However, make sure that you reference any such materials at the end of your lab report. Copying a Graph to Your Lab Report After You Have Clicked Show To view your graphical data, click anywhere on that specific graph, and then hit the (alt) and (prt scr) keys on your keyboard at the same time. If you now go to your Word document and select Edit –> Paste from your tool bar (or Ctrl-V), the graph will be pasted into your Word document. Some questions will require you to import specific graphs, but you should feel free to import graphical results any time when you feel like it helps to support your answer. Also, always make sure that you clearly label your graphs. Required Lab Questions for NETW320, Codec Selection for Campus Network (This section is worth 75% of your grade for this lab.) 1. Go to the Results Browser, select Results for......

Words: 1257 - Pages: 6

Lab 6

...Category | Points | Description | Section 1Configuring OSPF Single Area: 40 Points * Task 1: Step 5 * Related Explanation or Response * Task 1: Step 6 * Related Explanation or Response * Task 1: Step 10 * Related Explanation or Response * Task 2: Step 4 * Related Explanation or Response * Summary Paragraph | 2323232320 | Paste the requested screenshot.Provide the requested answer.Paste the requested screenshot.Provide the requested answer.Paste the requested screenshot.Provide the requested answer.Paste the requested screenshot.Provide the requested answer.In your own words, summarize what you have learned about IP subnetting and configuration. | Total | 40 | | ------------------------------------------------- Name: Barry Bird Date:4/17/14 Professor: Mohammad Kasraian ------------------------------------------------- Configuring OSPF Single Area vLab (30 points) Write a paragraph (minimum five college-level sentences) below that summarizes what was accomplished in this lab, what you learned by performing it, how it relates to this week’s TCOs and other course material, and (just as important) how you feel it will benefit you in your academic and professional career. (10 points) In this Ilab we learned how to Configuring OSPF setting in a router simulated environment. We learned the commands that must be used to properly install these settings. We learned how to create a designated router and a backup......

Words: 506 - Pages: 3

Lab# 6

...Lab #6 – Assessment Worksheet Identifying and Removing Malware on a Windows System Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you used AVG AntiVirus Business Edition to identify the viruses, worms, Trojans, malware, or other malicious software found on a compromised Windows machine. You completed a scan of the entire computer, learned how to exclude folders to avoid false positives, and understood the importance of maintaining the signatures database. You discovered the difference between a full computer scan and a Resident Shield scan. Finally, you also permanently removed the malware identified by the antivirus software and scheduled the scan to run automatically. Lab Assessment Questions & Answers 1. Why is it recommended to update the antivirus software’s signature database before performing an antivirus scan on your computer? updating the antivirus software with the latest virus definitions ensures the software has the latest information to identify and quarantine threats. 2. What are typical indicators that your computer system is compromised? slow response opening, operating system not booting up correctly or no functioning normally, event logs reporting numerous unusual......

Words: 291 - Pages: 2

Nt1210 Lab 6. 1-4

...Lab 6.1 Review 1. It uses a beacon like transmission to find other devices on IBSS mode and on the same SSID to connect and share. 2. It has a very very short range and is unable to penetrate walls and other objects. 3. It is able to maintain connection anywhere in the house it is setup in without the need of trailing a connection cable like wired connections so you get a tradeoff of speed vs versatility Lab 6.2 Review 1. The biggest problem would be collision if multiple routers are using the same channel a common example of this is Comcast routers are set to use a channel close to the signal for the ps3 so you get a depredation of signal and loss of data packets as the connection goes on. 2. If a previously stated standard is not compatible with your adapter you could have issues with your connection not connecting Lab 6.3 Review 1. Um well I could write a book but simply a guest having access to your network could result in any imaginable results on your network to name a few rootkits,Trojan droppers, Remote Access Terminals, Keyloggers, Viruse’s. 2. Setting a MAC filter is a good way to filter who has access to your network its simply like saying Fred has access to the building with his fingerprint being scanned by a biometric scanner. Although this can be spoofed by spoofing your mac but you would still have to find out which macs are allowed and have to make sure the mac your spoofing is not connected so that you do not receive a duplicate error. Lab Review 6...

Words: 393 - Pages: 2

Lab 6

...Lab Assessment Questions & Answers 1. What is the difference between roles and features in Windows Server 2008? A server role is a set of software programs that lets a computer perform a specific function for multiple users or other computers within a network. Features are software programs that can support or increase the functionality of one or more roles, or improve the functionality of the server, regardless of which roles are installed. 2. What is installed when you choose the Windows Server Backup Feature? Windows Server Backup Microsoft Management Console (MMC) snap-in. 3. How often should servers be backed up? It is recommended to do them frequently. About every 90 days should be fine. 4. What are the different types of backup that are performed in servers? Copy Backup, Daily Backup, Differential Backup, Incremental Backup, Normal Backup. 5. What are the primary purposes of backing up a server? Recover information after it is lost. 6. Besides performing and scheduling changes, what else can you do in the Windows XP Backup and Restore program? In the Backup you can backup everything on the computer, selected files, drives, or network data, only backup the System State data. In the Restore you can only restore from a backup file. 7. Can you restore a server’s operating system image using the restore application? Yes, by using Windows Recovery Environment and a backup that you created earlier with Windows Server Backup. 8. What are the options to......

Words: 304 - Pages: 2

Lab 6

...University of West Florida Electrical and Computer Engineering Digital Logic and Computer Systems EEL 3701L Lab 6: BCD to Seven Segment Display Decoder Due: November 3, 2014 Meghan Szatkowski, Brandon Burrows, Michael Long Abstract: For this lab we were to create a circuit that displays decimal numbers from binary numbers since most humans are not capable of reading binary. Using a 7-segment display we are able to achieve that by converting the BCD value into a 7 bit output. The 7-segment display has 7 LEDs and a certain amount of voltage triggers each of the 7 segments to produce a decimal number. Procedure 1. Create a truth table for your 4 bit input and the corresponding output necessary to light the proper segments of the display. For example, if the input is represented by WXYZ and the output is identified as ABCDEFG then if the input is 0000, all outer LEDs should be lit while the middle LED should be off. Once you create the rows in a truth table for the other 9 combinations, find the function for each segment. 2. Depending on whether you are dealing with more 0s or 1s, choose NAND or AND gates to implement each segment function. 3. Wire the input DIP switches to the decoder input. Note that you have 2 3x8 decoders. You will need to use the inputs and enable lines to combine them in order to implement these 7 functions. 4. Wire the NAND or AND gates to the proper outputs of the decoders in order to implement the functions for each......

Words: 1151 - Pages: 5

Lab 6

...Exercise 1: Starting Up (8 points) 4.1 Which species in the simulation is capable of nitrogen fixation? 1 point The species that is capable of nitrogen fixation is Cyanobacteria. 4.2 Members of which species in the simulation are commonly known as “water fleas”? 1 point Daphnia’s are known as “water fleas”. 5.1 Briefly describe what happens in the simulation when phytoplanktons die. (Hint: They change color.) 2 point When phytoplankton die they change color and fall to the bottom. 7.1 Based on your sampling, what do Bosmina in the lake eat? 1 point Bosmina eat the green algae in the lake. 7.2 Based on your sampling, what do Daphnia in the lake eat? 1 point Daphnia eat the green algae in the lake. 7.3 Based on your sampling, what do Trout in the lake eat? 1 point Trout eat the Daphnia and Bosmina. 8.1 After reading the above statement, did you miss any species in your gut content sampling? If so, which ones? 1 point The species I missed in my gut content sampling was the cyanobacteria. Exercise 2: P in the Water (8 points) 3.1 When the simulation stops, record the population size of green algae (from the graph), and the dissolved oxygen (DO) level (from the graph or from the meter at the bottom of the lake) in the first row of the data table which follows. [ 5 ] Increase PHOSPHORUS to 2x (double the starting concentration). Then click the STEP 52 WEEKS button to run the simulation for one year. [ 6 ] Click the RESET button, then......

Words: 572 - Pages: 3

Lab 6

...Unit 6 Lab 6.1: Pseudocode Learning Objectives and Outcomes Use Boolean variables and logical operators in computer programs. Use compound logical conditions. Required Setup and Tools Standard lab setup Lab Manual Lab Demo Media and Startup Files CD Recommended Procedures Complete Lab 6.1: Pseudocode from the lab manual. Deliverables Submit the following at the end of this lab activity: The completed inputOptions() module in pseudocode in Step 1 The completed displayProvider() module with a case structure in pseudocode in Step 2 The completed and workable algorithm with nested If-Else statements using logical operators in Step 3 Unit 6 Lab 6.2: Flowcharts Learning Objectives and Outcomes Use flowcharts and pseudocode to represent Boolean conditions. Use if-then, if-then-else, and case structures in a computer program. Use Boolean variables and logical operators in computer programs. Use compound logical conditions. Required Setup and Tools Standard lab setup Lab Manual Lab Demo Media and Startup Files CD Recommended Procedures Complete Lab 6.2: Flowcharts from the lab manual. Deliverables Submit the following at the end of this lab activity: Corrected variable declarations and initializations using Visio in Step 2 Corrected module calls using Visio in Step 3 Corrected inputOptions() module using Visio in Step 4 Corrected displayProvider() module with case labels and flow lines using Visio in Step 5 Corrected displayChoices() module with......

Words: 355 - Pages: 2

Mat 540 Week 6 Discussion Mat 540 Week 6 Discussion

...MAT 540 Complete Course MAT540 Complete Course Click Link for the Answer: http://workbank247.com/q/mat-540-complete-course-mat540-complete-course/22085 http://workbank247.com/q/mat-540-complete-course-mat540-complete-course/22085 MAT 540 Week 1 Discussion "Class Introductions"  Please respond to the following: * Please introduce yourself, including your educational and career goals, as well as some personal information about yourself. In your introduction, please draw from your own experience (or use a search engine) to give an example of how probability is used in your chosen profession. If you get your information from an online or other resource, be sure to cite the source of the information. MAT 540 Week 1 Homework Chapter 1 1. The Retread Tire Company recaps tires. The fixed annual cost of the recapping operation is $65,000. The variable cost of recapping a tire is $7.5. The company charges$25 to recap a tire. a. For an annual volume of 15, 000 tire, determine the total cost, total revenue, and profit. b. Determine the annual break-even volume for the Retread Tire Company operation. 2. Evergreen Fertilizer Company produces fertilizer. The company’s fixed monthly cost is $25,000, and its variable cost per pound of fertilizer is $0.20. Evergreen sells the fertilizer for $0.45 per pound. Determine the monthly break-even volume for the company. 3. If Evergreen Fertilizer Company in problem 2 changes the price of its fertilizer from $0.45 per pound to $0.55 per pound,......

Words: 15000 - Pages: 60

Mat 510 Week 6 Mat510 Week 6

...MAT 510 Complete Course MAT510 Complete Course Click Link for the Answer: http://workbank247.com/q/mat-510-complete-course-mat510-complete-course/20549 http://workbank247.com/q/mat-510-complete-course-mat510-complete-course/20549 MAT 510 Week 1 Discussion "Business Improvement" Please respond to the following: Note: Online students, please select one of the two subjects to discuss. Select one (1) project from the working or educational environment of your choice and specify the main work process (e.g., suppliers and customers involved, work flow, etc.) of the project that you have selected. Next, suggest at least two (2) actions that a manager can take in order to improve the work process of the project in question. Provide a rationale for your response. Use the Internet or Strayer Library to research a global business or an organization of your choice. Next, analyze the overall effect of global competition on the business or the organization that you researched. Suggest one (1) strategy that the business leader can use in order to improve business competition and efficiency. Provide a rationale for your response. MAT 510 Week 1 Homework Assignment Due in Week 1 and worth 30 points Describe a work task, a hobby, or another activity that you regularly do, and sequentially list the various actions you take in order to complete this activity. Consider the complexity of your list and the amount of steps required to complete the activity. Answer the following questions in the...

Words: 7074 - Pages: 29

It1115 Lab 6-1

...Task 1 Step 1 – Ascertain Problem. “No OS found” is error message. After booting the system we find out that BIOS loads properly, the system POSTs without other problems and there was no other windows splash screen. This means that hardware is ok and BIOS/POST is running properly. This means that the error is more than likely a configuration error. Step 2 – Write down causes. The 3 most probable reasons for this error are: The BIOS has been reconfigured in a way that disables the boot drive, the boot drive has failed or the boot drive has been wiped clean. Step 3 – Determine if theories are correct through testing. To test BIOS reconfiguration we enter the BIOS. Press F2 and enter the BIOS password. We then want to find out Boot priority. Hard disk drive isn’t listed so our theory has been proven. Step 4 – Create and implement a resolution plan. We want to modify the BIOS boot order. We need to add the hard disk as the first priority, followed by the CD-ROM and Network PXE. Step 5 – Verify problems are fixed. Save settings to BIOS and restart computer. Windows boots correctly. Do another graceful shutdown and restart again. Windows boots again. Problem has been rectified. Step 6 – All steps were documented throughout the process. Task 2 Question 1 – How do you access Advanced Boot Options Menu? To access this menu, press the F8 key immediately after the computer starts Question 2 – What does the Last Known Good Configuration utility do? This utility starts the......

Words: 382 - Pages: 2