Develop a 99 percent confidence interval for the average yield (cups per pound) for the new German coffee brewer.

Practical Application Scenario 1

To complete this scenario, use the Confidence Interval Calculator and the Area Gas Prices document.

The Star Tribune newspaper has decided to write an article about gasoline prices in the Twin Cities area (Minneapolis and St. Paul, Minnesota). The Star Tribune has designed a survey and taken a simple random sample of regular unleaded gas prices at 70 area stations. The results are in the Area Gas Prices file (in Updates and Handouts). The Star Tribune‘s policy is that no data will be reported unless they are 95 percent confident that the numbers are correct. As the new manager of the data verification unit at the Star Tribune, you need to develop a 95 percent confidence interval for the average price of regular unleaded gasoline in the Twin Cities metro area.

You already know how to compute sample parameters like the sample mean and sample standard deviation; this scenario simply asks you to complete a confidence interval for the data provided above and communicate the results to the Star Tribune‘s business manager.

Practical Application Scenario 2

To complete this scenario, use the Sample Size Estimator file provided in Resources.

The third shift at the Microsoft’s Windows security unit in Redmond, Washington is considering replacing its coffee brewing units with new German-made brewers. As the newest member of this elite Microsoft team, you have been assigned to investigate this proposal. Develop a 99 percent confidence interval for the average yield (cups per pound) for the new German coffee brewer. The margin of error should be no bigger than .3 (three tenths of a cup). Based on experience with the current coffee makers, your best guess for the population standard deviation, sigma, is 1.2 cups. How big of a sample do you need? Calculate the estimated sample size needed for the above scenario and communicate your findings to the business manager.

Assignment Submission

Complete the two practical application scenario answers in one Word file (please submit a .docx file) and copy the Excel output into that document. Highlight your numerical answers for both practical applications scenarios in yellow, and then right after that numerical solution, be sure to summarize your findings in a three- to five-sentence paragraph to the scenario manager.

Calculate the mode for the number of bathrooms. (You can cut and paste the answers from the Analysis ToolPak, or you can use Row 88 Column D for this parameter

For this practical application assignment, make believe that you are a real estate agent living and working in southern Florida. The senior real estate partner of your firm e-mails you a document containing Florida pool home data, which you’ve retrieved from the Updates and Handouts section of this unit, and asks you to find ways describe the most important aspects of the home sale data. This technique is called descriptive statistics. The file contains data for 80 properties, including home prices, home sizes, number of bathrooms, niceness ratings, and whether or not there’s a pool. This file is used as an example on pages 142–143 of Business Statistics in Practice. Be sure that you have read Appendix 2.1, on pages 80–87, in your textbook, which provides instruction on how to construct a frequency distribution, histogram, and scatter plot in Excel. Compute the following data parameters:

  1. Calculate the mean, median, range, and standard deviation of home price and size. For the assignment document you will submit, you can cut and paste the answers from the Analysis ToolPak, or you can place your results in the same Excel sheet as the data, below the existing table. Be sure to label each of your data cells. (For example: Row 84 Column B should contain the calculated Mean of Home Selling Prices; Column A already contains the title, mean; Column C the Mean of Home Size in Square Feet; Row 85 Column B should contain the Home Median price, and so on. Highlight all your results in yellow.) Then cut and paste that spreadsheet into a Word document. Be sure to verbally summarize your data findings in four or five sentences that will help a home buyer make a purchasing decision in the Florida real estate market.
  2. Calculate the mode for the number of bathrooms. (You can cut and paste the answers from the Analysis ToolPak, or you can use Row 88 Column D for this parameter. Do not forget to title Column A Row 88–Mode, and highlight your results in yellow.) Then verbally summarize this data in order to help a buyer make a purchasing decision in the Florida real estate market.
  3. Produce a histogram that shows the number of houses by price range, in increments of $50,000 (for example, $0–$50,000, $50,001–$100,000, and so on). Use a separate Excel sheet to do this and label that sheet “Home Price Range Histogram.” Then verbally summarize how this histogram will help a buyer make a purchasing decision in the Florida real estate market.
  4. Produce a scatter plot showing the relationship between price and home size. In a cell under your scatterplot, indicate whether the relationship is positive or negative and whether the results are what you expect. Use a separate Excel sheet to do this and label the sheet “Scatterplot.” Then verbally summarize how this scatter plot output will help a buyer make a purchasing decision in the Florida real estate market.

Assignment Submission

Compile all of your answers in a single Microsoft Word file (please submit a .docx file), pasting in the tables and graphics you created to demonstrate your work. Be sure to clearly title your tables and graphics, including each row and column. For example, for the table in question 1, you might use the following labeling: Row 1, Column B contains the “Mean of Home Selling Prices,” Row 1, Column C contains the “Mean of Home Size in Square Feet,” and so on. Highlight the results of your data calculations within each table

What is the percentage of bullying carried out through conventional means as opposed to cyberbullying where homophobia is apparent?

 

 

Research Mini Prospectus: Conversational bullying and Cyberbullying

Purpose statement

Bullying has been depicted as a behavior or an act that is done by an individual or group frequently and over a certain period of time; this is done to a victim who can’t defend herself or himself easily. If this problem is left unresolved, it will produce negative consequences to the affected groups. The psychological and physical harm caused to the victims makes it a problem that needs to be studied. A study is then required for instance; outlining the variety of the detrimental effects that bullying has regarding students, also including the impacts on school environment, student learning, student engagement, and school safety.

For example, there is the issue of bullying in schools; any form, level, and type of bullying is not acceptable, and every occurrence is supposed to be taken very seriously for instance by the students’ families, school administrators, the school staff that include the teachers, and the students themselves. According to Patchin and Hinduja, communication technologies advances have enabled the prospective bullies to broaden their reach (Patchin & Hinduja, 2012).

Cyberbullying has become an important concern among adults and adolescents alike. Consequently, the youths, parents, law enforcement, and school professional, are searching for assistance. A number of good practices have developed in the past few years, regarding bullying. The article by Justine and Sameer, looks at strategies of prevention that seem fruitful in dropping the seriousness and prevalence of the problem.

Literature Review

What is the percentage of bullying carried out through conventional means as opposed to cyberbullying where homophobia is apparent?

According to Sameer Hinduja and Justin W. Patchin, the cyberbullying is viewed by many as being more damaging and cruel that the traditional bullying that is face to face. This is because of power imbalance, anonymity, and public humiliation. The harm that is inflicted by the cyberbullying may be more emotional and psychological, contrasted to the direct bullying that is face to face. The face to face bullying might be additionally based on popularity or physical intimidation (Patchin & Hinduja, 2011).

There are a number of types of bullying depending on the nature and the strength of the brutal behavior. For instance, there is physical harassment that including becoming physically overbearing; pushing, among others. Also, there is oral bullying. This includes calling individuals names that are offensive, intimidation, among others.

Also, there is indirect bullying. This includes social manipulation that comprises using others, instead of straightforwardly attacking the victim. For instance, gossip that is offensive and annoying, among others. The verbal bullying and physical bullying may be considered as types of straight bullying. This is because they entail a relationship that is face to face among victims and bullies.

The cyberbullying definition that is widely agreed is; an act that is aggressive and intentional that is executed by an individual or a group by use of electronic forms for contact. This is frequently done over a period of time to a victim who can’t shield herself or himself without difficulty. Cyberbullying is capable of acting anonymously, and can also spread offences all over the web in order to reach an audience that is potentially unlimited.

There are a number of differences that exist between the cyberbullying and the traditional bullying. The cyberbullying displays some elements of connection with the traditional bullying, but at the same time displays specific and innovative elements. A large amount of bystanders, which more often are not familiar with the victim; an aggression modality that is not done face to face. This implies that the bully is not able to the consequences of his antagonism on the victim. Due to this, the bully is not able to trigger mechanisms that are empathic, that may put a limit to the attacks; a likelihood for the anonymous actions of antagonism of the bully.

Additionally, the repetition element in time of antagonism actions that the bully perpetrates should be revised in consideration to the characteristics of the communication in virtual setting. For instance, one incident that is revealed by many bystanders may cause probable damage to the victim. This is possible even with no recurrence over time.  A post or video on a blog is all the time available, and can be viewed by a lot of people at different periods.

The other existing difference between cyberbullying and traditional bullying is the power imbalance between the victim and the bully. For instance, the digital media doesn’t require a power that is arbitrated by a physical strength. Even a single person in their room’s privacy without specialized physical skills, can carry out actions of bullying on a number of victims that is not limited. This can be done with minimum transaction.

The study is necessary in order to put into consideration the intentionality aspect that is linked to the aggressive acts. If it is easy to comprehend the intentionality regarding the episodes of conventional bullying; in cyberbullying accountability may be shared and extended to the individuals who with ease view a video and make a decision of sending it to others.

In the United States of America, nineteen point six percent of the students in high schools have reported to have been bullied within school. Fourteen point eight percent reported to have been while online. This is according to the “Center for disease control, 2014”. It is reported that; sixty four percent of the school children didn’t report the bullying. Only thirty six percent of the school children actually came out to report the harassment. According to the “National Center for Educational Statistics, 2013”; almost one in three students, constituting of about twenty seven point eight percent, has reported being harassed in the course of the school period. The programs that are school based which are intended to prevent bullying reduce bullying by twenty five percent.

Research and Design Methods

In order to carry out the research, the grounded theory method will be used. This is an efficient methodology regarding social sciences that concerns theory construction through data analysis. This is more appropriate because; unlike the positivist research, grounded theory is possible through the gathering of qualitative data.

Analysis Stages

1. Theorizing and coding text: concepts that are useful will be figured out, and the main expressions recognized. The ideas will also be given names. This process is known as open coding, or initial coding. This concerns the steady comparative method, and is proceeds on all through the grounding process, until the creation of theories that are complete.

2. Theorizing and Memoing: this is done by running notes for every concept being recognized and kept. This refers to the center step amid coding and initial plan of the study that is completed.

3. Combining, modification, and writing theories: after the coding categories have emerged, the next stage is connecting the together in models that are theoretical, within a central category which puts everything together.

The advantages of the grounded theory methodology are that, one; it gives guidelines that are sequential and explicit, for carrying out a research that is qualitative. Two; it gives particular approaches with regards to managing logical inquiry stages. Three; the theory integrates as well as streamlines the analysis and data collection. Four; it justifies the qualitative research as an inquiry that is scientific.

Data collection

The process undergone by the researcher in collecting the information that is needed in order to give an answer to the research problem is referred to as data collection. The data collection can be done through direct interaction with the persons on a conversation basis. Also, the collection of data can be done through direct interaction with persons in a group environment. Since the methods of data collection can be time consuming, the data can be collected in smaller samples than it is the case with other approaches. This makes the research that is qualitative more expensive. The qualitative approach benefits are that; information is detailed, and contains deeper insight regarding the study phenomenon. The major methods that can be used to collect qualitative data include; performing individual interviews, focusing on groups, conducting observations, and action research (Ryan, 2010).

In conclusion, the major strength of a research which is qualitative is the ability of studying the phenomenon which is merely not available when the researcher needs to set up correlations among variables. Educators, parents, and law enforcement need to take care regarding watching over children and youth. This is for the purpose of preventing cyberbullying. If all the parties come together including the parents, educators, and law enforcement, cyberbullying may be stopped. If all the parties work together, cyberbullying may cease to affect children while they use the internet.

You are going to create an advertisement using the Flyer Template that I have attached that makes a healthy snack look exciting.

It is really important to make children aware of healthy choices to make when it comes to food. There are many delicious snacks and meals for young children that can give them the nutrients necessary for their growth and development. There are many advertisements that portray not so healthy snacks to be wonderful for children. It is important that healthier snacks are advertised as well. This Assignment will give you two opportunities to encourage children to make these healthy choices.

 

1) You are going to create an advertisement using the Flyer Template that I have attached that makes a healthy snack look exciting. Please make sure to include a fun and healthy snack, not just one that it is easy to purchase. For example, ants on a log.

*Please feel free to be as creative as possible, but make sure to cite your sources. If you use clip art, using the pictures from Microsoft Word is the best choice

 

**If you click on the circles on the top of the flyer, you can add clip art to make the flyer more attractive.

 

2) You will complete a five day menu for the age group of your choice. Your menu will include alternative choices for children with wheat (gluten), nut allergies, or other allergies, and vegetarian children. Your menu will be created by filling out the form provided that I have attached and submitting the form by the end of Unit 6.

 

In the introductory paragraph before your menu, describe at least four appropriate food safety guidelines. For example: Proper food handling procedures and precautions for breast milk, formula and solids; proper food preparation to include common food choking hazards; precautions and alternative food choices addressing common allergies including nuts, wheat, and milk.

 

You  may want to  visit these sites for help:

USDA Resource List:

http://www.fns.usda.gov/tn/Resources/menu_magic.pd

Source: USDA. Menu Magic for Children. Retrieved from

http://www.fns.usda.gov/tn/Resources/menu_magic.pd

Food allergies:

http://www.foodallergy.org

Source: The Food Allergy & Anaphylaxis Network. Retrieved from http://www.foodallergy.org