Free Essay

# Bus 311 Ip 1

Submitted By ummzaqi11
Words 567
Pages 3
The two sections of date that I picked for this assignment is gender for the qualitative data and intrinsic for quantitative data. The data selected will be discussed and analysis until a conclusion is made.

For qualitative data I picked gender. I put gender because I felt that is was the best option of the two. The gender I picked was female. I picked female because I’m female. The quantitative data I picked was Intrinsic. I picked intrinsic because Of what the definition said it was which was belonging naturally.

A qualitative variable is a variable without a sense of order. A qualitative variable is measured on a nominal scale. A nominal scale is a scale with no order but has some numeric values are nominal. An example nominal scale would be the data showed on the excel sheet for this assignment where male and female are showed as, 1-male and 2-female. Quantitative variables are numerical. An example of quantitative variables would be the number of people in a town which is a measurable attribute. Population is a quantitative variable. An easy way to remember the two variables is when you think of qualitative variables think or something being categorical and when you think of quantitative think of numerical.
Qualitative variable The data above use qualitative variable. As stated before a qualitative variable is measured on a nominal scale. A nominal scale is a scale with no order but has some numeric values. An example nominal scale would be the data showed on the excel sheet for this assignment where male and female are showed as, 1-male and 2-female. As you can see everything listed on the above chart is in no specific order but is number so that you know what’s what. Now that I know the how everything is listed I can look at the other chart and understand which is the information for the women and which is for the men. I also know that I can use this way to showing information in future assignments or surveys etc.
Quantitative variables
Quantitative variables are numerical. An example of quantitative variables would be the number of people in a town which is a measurable attribute. These statistics represent gender 2 which is females. It also represent age, department, position, tenure, job satisfaction, intrinsic extrinsic and benefits of the female as well. In doing the quantitative variables I’ve learned that the women have more people in the 50-65 age range. The men have more people in the administration.

The pie chart above shows the qualitative variable. It shows that the number one that is shown on the excel sheet is male and the number two is female. I

This chart shows the number of female only. It also shows the female in different age groups and departments there in.

Using the charts, in this assignment helped show the data in a more understandable way. Looking at the chat on excel sheet it just looks like a lot of numbers. When looking at it to long it looks very confusing. After putting the information in the chart I can clearly see the difference between the male and female data. I see myself using chart to help me with my school work from this point on.
.

References

### Similar Documents

Free Essay

#### Substations Ehv

...EVKET WLI-90 EVTT3F EVTS BHVSD HVTEB HVS2C ALPHABETICAL INDEX Type Page Type Page Type Page 21 ............................................................ 32 22 ............................................................ 31 AFGS ...................................................... 73 BHVSD ................................................... 57 BHVSF.................................................... 56 CCL-EHV .................................................. 6 CCLS-EHV................................................ 7 EVBCF.................................................... 45 EVBETSH ............................................... 54 EVDCH ................................................... 41 EVDCS.................................................... 39 EVEDST.................................................. 63 EVEDST-90 ............................................. 65 EVEF-D................................................... 84 EVETF .................................................... 15 EVETS .................................................... 49 EVHS ...................................................... 82 EVIS........................................................ 53 EVKES.................................................... 48 EVKET .................................................... 14 EVLCF ...................................................... 4 EVPC ...................................................... 81 EVS2C ......................

Words: 35414 - Pages: 142

Free Essay

#### Chapter 11 Ccna

...Chapter 11 True/False Indicate whether the statement is true or false. ____ 1. Asynchronous serial connections are typically used with analog modems. ____ 2. The benefit of multilink is that you can combine the bandwidth of two separate devices over one logical connection. ____ 3. Compared with PAP, CHAP provides a much more simple authentication process. ____ 4. Using authentication with PPP connections is mandatory. ____ 5. The Frame Relay map can be built automatically or statically depending on the Frame Relay topology. Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 6. PPP is an Internet standard protocol defined in RFCs 2153 and ____. a.|1551|c.|2234| b.|1661|d.|2532| ____ 7. The ____ is used at the Data Link layer to establish, configure, and test the connection. a.|NCP|c.|IPCP| b.|ATCP|d.|LCP| ____ 8. In a production environment, you can use the ____ command from interface configuration mode, which will automatically shut down that interface when looping is detected. a.|off-looped-interface|c.|down-when-looped| b.|looped off|d.|off-when-lopped| ____ 9. ____ checks the reliability of the link by monitoring the number of errors, latency between requests, connection retries, and connection failures on the PPP link. a.|LQM|c.|CHAP| b.|PAP|d.|LCDI| ____ 10. Once you have completed configuring your PPP interface, you can verify the changes using the ____......

Words: 2989 - Pages: 12

Free Essay

#### Test

...Chapter 1: Introduction to Computer Networks and Data Communications TRUE/FALSE 1. Data is information that has been translated into a form that is more conducive to storage, transmission, and calculation. ANS: T 2. ANS: F PTS: 1 Some people call computer terminals thick-client workstations. PTS: 1 3. A type of microcomputer-to-local area network connection that is growing in popularity is the wireless connection. ANS: T PTS: 1 4. To communicate with the Internet using a dial-up modem, a user’s computer must connect to another computer that is already communicating with the Internet. ANS: T PTS: 1 5. It is not possible to connect two local area networks so that they can share peripherals as well as software. ANS: F PTS: 1 6. Metropolitan area networks can transfer data at fast, LAN speeds but over smaller geographic regions than typically associated with a local area network. ANS: F 7. ANS: T 8. networks. ANS: T 9. ANS: F PTS: 1 The Internet is not a single network but a collection of thousands of networks. PTS: 1 One of the most explosive areas of growth in recent years has been cellular phone PTS: 1 By the 1970s, telephone systems carried more computer data than voice. PTS: 1 10. Network architectures are cohesive layers of protocols defining a set of communication services. ANS: T PTS: 1 11. The OSI model tells us what kind of wire or what kind of connector to use to connect the pieces of a network...

Words: 46505 - Pages: 187

#### Research

...Composition: PreMediaGlobal Cover Credit: © Masterfile Royalty Free Manufacturing Coordinator: Julio Esperas © 2013 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means—graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act—without the prior written permission of the publisher. For product information and technology assistance, contact us at Cengage Learning Customer & Sales Support, 1-800-354-9706. For permission to use material from this text or product, submit all requests online at cengage.com/permissions. Further permissions questions can be e-mailed to permissionrequest@cengage.com. Some of the product names and company names used in this book have been used for identification purposes only and may be...

Words: 234459 - Pages: 938

Free Essay

#### Etude de Faisabilite Technique Et Financiere D’un Projet de Transport En Commun Dans La Ville de Kigali Denomme « Rwiza Transportation Service, Rts » Periode : 2008-2014

...UNIVERSITE LIBRE DE KIGALI (ULK) FACULTE DES SCIENCES ECONOMIQUES ET GESTION DEPARTEMENT DE GESTION B.P 2280 Kigali ETUDE DE FAISABILITE TECHNIQUE ET FINANCIERE D’UN PROJET DE TRANSPORT EN COMMUN DANS LA VILLE DE KIGALI DENOMME « RWIZA TRANSPORTATION SERVICE, RTS  » PERIODE : 2008-2014 Mémoire présenté et défendu en vue de l’obtention du grade de Licencié en Gestion Par  MUNYANEZA Faustin Directeur : CCA NDABATEZE Abraham Kigali, avril 2008 DEDICACE A notre regretté père; A notre chère mère ; A nos frères et sœurs. REMERCIEMENTS Que le Dieu de gloire et de louange trouve ici notre profonde reconnaissance pour sa bienveillance et ses merveilles prouvées au cours de notre travail. Nos sincères remerciements s’adressent aux autorités et au corps professoral de l’ULK, pour leur éducation tant morale que scientifique. Nos remerciements s’adressent aussi au CCA NDABATEZE Abraham qui nous a guidé tout au long de notre travail. Nos sentiments de profonde gratitude s’adressent au Fonds National d’Assistance aux les Rescapés du Génocide (FARG), pour son soutien financier au cours de notre formation. Enfin, nous tenons à témoigner notre gratitude envers tous ceux qui, d’une manière ou d’une autre, ont......

Words: 14821 - Pages: 60

Free Essay

#### Paper 1

...should be sent to the publishers at the undermentioned address: ISTE Ltd 6 Fitzroy Square London W1T 5DX UK ISTE USA 4308 Patrice Road Newport Beach, CA 92663 USA www.iste.co.uk © ISTE Ltd, 2006 The rights of Christophe Prévé to be identified as the author of this work have been asserted by him in accordance with the Copyright, Designs and Patents Act 1988. Library of Congress Cataloging-in-Publication Data Prévé, Christophe, 1964Protection of electrical networks / Christophe Prévé. p. cm. Includes index. ISBN-13: 978-1-905209-06-4 ISBN-10: 1-905209-06-1 1. Electric networks--Protection. I. Title. TK454.2.P76 2006 621.319'2--dc22 2006008664 British Library Cataloguing-in-Publication Data A CIP record for this book is available from the British Library ISBN 10: 1-905209-06-1 ISBN 13: 978-1-905209-06-4 Printed and bound in Great Britain by Antony Rowe Ltd, Chippenham, Wiltshire. Table of Contents Chapter 1. Network Structures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1. General structure of the private distribution network . . . . . . . . . . . . 1.2. The supply source . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.3. HV consumer substations . . . . . ....

Words: 31240 - Pages: 125

Free Essay

#### Computer 200 Management

...using math and other analyzed methods to help make better decisions in business. Field includes- decision analysis, probability, and math modeling. • Management Science body of knowledge – uses quantitative approaches to decision making and is referred to as management science, operations research, and decisions science. • What do processors do: o A processor interprets computer program instructions and processes data. • Moore’s Law- Moore’s Law state that processor speeds will double every 18 months • The different kinds of storage memory are: kilobyte, megabyte, gugabyte, terabyte, petabyte, exabyte, and zeltabyte • The difference between a bit and a byte are: o A bit is a single numeric value either a 0 or 1. A byte is a sequence of bits, usually 8 bit=1 byte. For example 00110101 • What are the components of an information system? • An information system is a group of interdependent elements that transform data into information • Data, people, hardware,...

Words: 6356 - Pages: 26

Free Essay

#### A Study of Training and Development

...(A GOVERNMENT OF TAMILNADU UNDERTAKING) MANUAL UNDER RIGHT TO INFORMATION ACT – 2005 INDEX Sl. No. Details of Information Page Number 1. 2. Introduction Designation of Public Information Officer/ Assistant Public Information Officer/ Appellate Authority. Procedure and fee structure. Organisation details and departments. Officers /Branches with Phone number Details General information on area of operation, different types of routes. Student concession tickets, Monthly season tickets, Travel as you please ticket. Chartered trip, hiring of buses and luggage fare. Classification of routes. Details of Night services. Issue of Free passes to Physically Handicapped, Mentally Retarded, Blind, Freedom Fighters. Public Complaints, Lost property details. Buses to private parties on hire basis. Free passes to students up to 12th Standard. Accident Branch details 1 2 3. 4. 5. 6. 7. 8. 9. 10. 11. 3 4 7 11 12 13 15 56 57 12. 13 14 15 59 60 61 62 INTRODUCTION In order to promote transparency and accountability in the working of every Public Authority and to empower the citizens to secure access to information under the control of each public authority, the Government of India have enacted “The Right to Information Act 2005”, (RTI ACT) which came into force on 15.06.2005. In accordance with the provisions of section 4(1) (b) of this Act, the Metropolitan Transport Corporation (Chennai) Limited has brought out this Manual for information and guidance of the......

Words: 11775 - Pages: 48

#### Security Analyst

...Contents 1. Introduction 2. Assessment Test 3. Chapter 1: Getting Started with Ethical Hacking 1. Hacking: A Short History 2. What Is an Ethical Hacker? 3. Summary 4. Exam Essentials 5. Review Questions 4. Chapter 2: System Fundamentals 1. Exploring Network Topologies 2. Working with the Open Systems Interconnection Model 3. Dissecting the TCP/IP Suite 4. IP Subnetting 5. Hexadecimal vs. Binary 6. Exploring TCP/IP Ports 7. Understanding Network Devices 8. Working with MAC Addresses 9. Intrusion Prevention and Intrusion Detection Systems 10. Network Security 11. Knowing Operating Systems 12. Backups and Archiving 13. Summary 14. Exam Essentials 15. Review Questions 5. Chapter 3: Cryptography 2 1. Cryptography: Early Applications and Examples 2. Cryptography in Action 3. Understanding Hashing 4. Issues with Cryptography 5. Applications of Cryptography 6. Summary 7. Exam Essentials 8. Review Questions 6. Chapter 4: Footprinting and Reconnaissance 1. Understanding the Steps of Ethical Hacking 2. What Is Footprinting? 3. Terminology in Footprinting 4. Threats Introduced by Footprinting 5. The Footprinting Process 6. Summary 7. Exam Essentials 8. Review Questions 7. Chapter 5: Scanning Networks 1. What Is Network Scanning? 2. Checking for Live Systems 3. Checking for Open Ports 4. Types of Scans 5. OS Fingerprinting 6. Banner Grabbing 7. Countermeasures 8. Vulnerability Scanning 9. Drawing Network Diagrams 10. Using Proxies 11. Summary 12. Exam Essentials 13. Review......

Words: 71242 - Pages: 285

#### Monicah

Words: 139691 - Pages: 559

#### Server 2008 for Dummies

Words: 139691 - Pages: 559

Free Essay

#### Arhitekturi

...1.Комуникациски систем 11. Општиот модел на комуникациски систем се состои од ���� * Извор ���� * Предавател ���� * Систем за пренос ���� * Одредиште ���� * Медиум за пренос 12. Кои се основни задачи на еден комуникациски систем ���� * Синхронизација � ���* Адресирање 13. Кои од следните искази се точни за компјутерските мрежи ���� * Компјутерска мрежа е колекција од меѓусебно поврзани компјутери ������ Основен модел на компјутерска мрежа е клиент-клиент моделот ������ Денес компјутерските мрежи повеќе се применуваат заради поделба на информации и ресурси меѓу компјутерите ���� * Денес компјутерските мрежи повеќе се применуваат заради поделба на информации и ресурси меѓу луѓето ������ Основна поделба на комуникациски мрежи е на SAN и MAN 14. Кои од следните се популарни облици на е-трговија ���� * B2B ���� * C2C ���� * P2P ������ G2B ������ B2G 15. Кои од следниве искази не се точни за широко распространетите мрежи (WAN) ������ Покриваат голема географска област ���� * Јазлите во мрежата зависат од содржината на податокот кој го пренесуваат ���� * Најголема WAN е Интранет ������ Главна цел е да овозможи доверлив, брз и сигурен пренос на податоци ���� * Најчест пример на WAN која е иплементирана со преклопување на кола е комуникацијата терминал � компјутер 16. Брзината на пренос на податоци кај WAN e од ���� * 64Kbps кај WAN со пакетен пренос ���� * 2Мbps кај WAN со пренос на рамки ���� * 10Мbps кај WAN со асинхрон пренос ������ 64Kbps кај WAN со пренос на рамки ������......

Words: 34344 - Pages: 138

#### Nothing

Words: 115682 - Pages: 463

#### Voice, Video, Network

...and then “Obtaining Permissions.” Explicit permission from Academic Press is not required to reproduce a maximum of two ﬁgures or tables from an Academic Press chapter in another scientiﬁc or research publication provided that the material has not been credited to another source and that full credit to the Academic Press chapter is given. Academic Press An imprint of Elsevier Science 525 B Street, Suite 1900, San Diego, California 92101-4495, USA http://www.academicpress.com Academic Press 84 Theobald’s Road, London WC1X 8RR, UK http://www.academicpress.com Library of Congress Cataloging-in-Publication Data Ellis, Juanita. Convergence of voice, video, and data networks / Juanita Ellis, Charles Pursell, Joy Rahman. p. cm. ISBN 0-12-236542-9 1. Convergence (Telecommunication) I. Pursell, Charles. II. Rahman, Joy. III. Title. TK5101.E48 2003 384.3¢3—dc21 International Standard Book Number: 0-12-236542-9 PRINTED IN...

Words: 125371 - Pages: 502