Premium Essay

Data Analysis Notes

In:

Submitted By luccin
Words 4467
Pages 18
Lecture 7. Sampling Distributions.
Statistical Inference: Using statistics calculated from samples to estimate the values of population parameters. Select Random Sample Sample for (statistic) Calculate to estimate Becomes Population Parameter.
BASIC Example: Soft Drink Bottler μ=600, σ=10. Normal Distribution. What is P(X>598)? p(x<598) .
Sampling Dist.of the Mean – Distribution of all Possible Sample Means if you select a sample of a certain size. μX= μ. μ = i=1NXiN (formula for mean) . σ = i=1N(Xi-μ)2N Although you do not know how close the sample mean of any particular sample selected comes to the pop mean, you know that the mean of all possible sample means that could have been selected = the pop mean.
Standard error is calculating the probability of a certain amount of error. EXAMPLE:
Standard error is .
As n increases decreases.

CENTRAL LIMIT THEOREM: Regardless of shape of individual values in distribution; as long as sample size is large enough the sampling distribution of the mean will be approximately normally distributed with μX= μ and σX= σ . For most population distributions n ≥ 30 will be large enough. For symmetric population distributions, n ≥ 5 is sufficient. For normal population distributions, the sampling distribution of the mean is always normally distributed
EXAMPLE:

SAMPLING DISTRIBUTION OF THE PROPORTION. π is the proportion of items in the population with a characteristic of interest. p is the sample proportion and provides an estimate of π.

Underlying Sample distribution is binomial and can be approximated by normal if: nπ ≥ 5 and n(1- π) ≥ 5.
With resulting mean equal to μp=π and standard error equal to σp=π(1-π)n Therefore:

WEEK 8 CONFIDENCE INTERVALS:
CONFIDENCE INTERVAL FOR μ (σ Known): Assume standard deviation is known, population is normally distributed. If not

Similar Documents

Premium Essay

Sip Format

...SKETCH OF SPECIALIZATION REPORT & EVALUATION FORMATS - 2014 S.No Content Page No. 1 Sketch of Report on Specialization Project 2-3 2 Comprehensive comparative table (Review of Literature) - Annexure -I 4 3 Sequence of the Report- Annexure-II 5 4 Evaluation weightage-Annexure -III 5 5 EVALUATION FORMAT- SP-2014 - At the end of 1st Week 6-7 6 EVALUATION FORMAT - SP-2014 - At the end of 2nd Week 7-8 7 EVALUATION FORMAT - SP-2014 - At the end of 3rd Week 8-9 8 EVALUATION FORMAT - SP -2014 - At the end of 4th Week 9-10 Sketch of Report on Specialization Project Objective The objective of Specialization Project is to provide of in depth learning in the area of specialization. This project is more focused on the students chosen area as a specialization and wants to have career. It should facilitate the student to have a deeper understanding in his/her specialization. Details of Specialization Project The Specialization project should be done by every student as a part of their course which carries 100 marks and will be included in the marks sheet. This project provides an opportunity to get more insights on the topic chosen by the student. In the process, the student will get a chance to (a) evaluate the applicability of the textbook theories in real time situations and (b) to analyze the performance of entities and markets using statistical and analytical methods...

Words: 2237 - Pages: 9

Free Essay

Constant Comparison

...education Use of constant comparative analysis in qualitative research Hewitt-Taylor J (2001) Use of constant comparative analysis in qualitative research. Nursing Standard. 15, 42, 39-42. Date of acceptance: March 19 2001. Summary This article describes the application of constant comparative analysis, which is one method that can be used to analyse qualitative data. The need for data analysis to be congruent with the overall research design is highlighted. T HE AIM OF qualitative research is to portray the reality of the area under investigation, and to enhance understanding of the situation and the meanings and values attributed to this by individuals; it does not involve the quantification of facts (Rose 1994). Qualitative methods emphasise the value of individual experiences and views, as encountered in real-life situations. This type of investigation is often useful in nursing, as many issues concern the quality of the lived experience of individuals, which cannot be reduced to numerical values using statistical analysis. Sometimes a mixed methodology might be adopted, with elements of qualitative and quantitative enquiry being included in a study. The nature of qualitative enquiry means that volumes of ‘rich’, ‘deep’ data are produced, often from a variety of sources. While not seeking to reduce data to statistical evidence, qualitative data nevertheless requires systematic analysis. Given the volume of data produced, the practicalities of analysing...

Words: 3428 - Pages: 14

Premium Essay

Quantitive Research

...9 Data Collection 10 Demographic Details 11 Data Analysis 11 Conclusion 13 Recommendation 14 References 15 Appendices 17 APPENDIX 1: Ethics Form 17 APPENDIX 2: Preliminary Data Analysis 17 Interview Questions 17 APPENDIX 3: Thematic Data Analysis 17 Interview Questions 17 Abstract This study attempted to qualitatively investigate Australian student’s perception of the impact of excessive consumption of fast food on their health, studying in Flinders University. The sample consisted of University students with a diversity of demographic details, including sex, age, and the level of education. The researcher, a 27-year old student, used a purposeful sampling strategy to select respondents for the study. Four participants were convenient in making the results of the study dependable. He used four qualitative interviews as a method of data collection. While carrying out the interviews, the researcher used both open and closed ended questions. In order to ascertain that all the data was recorded, notes taking and audio recordings were used at every stage of the interview. Preliminary data analysis and thematic data analysis were used to analyze the overall recorded information. The purpose of the study is to offer viable recommendations that would assist in alleviating the underlying problem of fast foods among Australian students studying in Flinders University. Key Words: demographic details, Preliminary data analysis, thematic data analysis, viable...

Words: 3691 - Pages: 15

Premium Essay

Critical Analysis

...A CRITICAL REVIEW OF AN ANOREXIA NERVOSA RESEARCH Institution: Name: Tutor: Date: TABLE OF CONTENTS INTRODUCTION AND LITERATURE REVIEW 3 PURPOSE STATEMENT REVIEW 5 RESEARCH METHOD REVIEW 6 RESULTS ANALYSIS 7 DISCUSSION ANALYSIS 8 SUMMARY REVIEW 8 REFERENCE 10 INTRODUCTION AND LITERATURE REVIEW Factoring that AN is fast rising disease that cannot be treated by common medicine, there is a great need for further information on what it entails. According to the research, the project seeks to further understand what fosters the development of Anorexia Nervosa. This disease is a behavioral disease, meaning that it can be treated and stopped and the research is proving that significant steps can be made towards eradication or maybe just simply minimized. It is terribly sad that this is a disease suffered by women and it is proving very hard to deal with due to the exaltation of the human being physical and thus making people with little self esteem grow up knowing that. This research will prove instrumental as it seeks to create an alternative approach to the said disease. The literature review was not very thorough and comprehensive factoring the number books, references made in the entire book. Some may be of the opinion that a lot of literature material was used in the research, but the fact one uses the same types of book and material doesn’t make them to be thorough but rather biased (Halawi, 2005). The researchers and the literature review were thus biased as the books used...

Words: 1949 - Pages: 8

Premium Essay

Cisco Case Study

...Cisco IT Case Study – August 2013 Big Data Analytics How Cisco IT Built Big Data Platform to Transform Data Management EXECUTIVE SUMMARY CHALLENGE ● Unlock the business value of large data sets, including structured and unstructured information ● Provide service-level agreements (SLAs) for internal customers using big data analytics services ● Support multiple internal users on same platform SOLUTION ● Implemented enterprise Hadoop platform on Cisco UCS CPA for Big Data - a complete infrastructure solution including compute, storage, connectivity and unified management ● Automated job scheduling and process orchestration using Cisco Tidal Enterprise Scheduler as alternative to Oozie RESULTS ● Analyzed service sales opportunities in one-tenth the time, at one-tenth the cost ● $40 million in incremental service bookings in the current fiscal year as a result of this initiative ● Implemented a multi-tenant enterprise platform while delivering immediate business value LESSONS LEARNED ● Cisco UCS can reduce complexity, improves agility, and radically improves cost of ownership for Hadoop based applications ● Library of Hive and Pig user-defined functions (UDF) increases developer productivity. ● Cisco TES simplifies job scheduling and process orchestration ● Build internal Hadoop skills ● Educate internal users about opportunities to use big data analytics to improve data processing and decision making NEXT STEPS ● Enable NoSQL Database and advanced...

Words: 3053 - Pages: 13

Premium Essay

Dbms Research Proposal Paper

...researcher and participant, and to the integrity of the research project. The confidentiality agreement is done with the 20 Database administrators from 20 different organizations. With the due course of the interview time with various DBA’s, each of them have common and different points with the other DBA’s. The information is saved and kept confidential with the respective DBA’s of the organization. Very good care is taken to maintain the confidentiality to the information they provided. A safety locker in the bank is taken to keep the documents. They are accessed only by the researcher. Documents will be destroyed after 3 years. Data Collection The data was collected from 20 Database Administrators from 20 different data warehousing organizations whose age would be 28-36 years. This group was selected because the data warehouse details and the data which is present in it of all the clients across the globe is very confidential and it has to be handled with utmost care. Hence effective and experienced persons are chosen for this role of Database Administrators. In this qualitative research the time taken was a long period of 30 days since each DBA has to be interviewed with one on one questions, each DBA was asked about 10 open ended questions and was asked to express their opinion and thoughts in details. There are different culture people, different language speaking people, and different sex. There were 15 males, 5 females, among the 15 males there were 7 Asians, 3...

Words: 982 - Pages: 4

Premium Essay

On the Development of Comprehensive Information Security Policies for Organizations

...Annotated Bibliography Assignment 1 Gary L. Williams Information Assurance Research Literature RSC 830 January 20, 2015 Dr. Emily Darraj Annotated Bibliography Assignment 1 The purpose of this assignment is to examine the topic cybersecurity via an annotated bibliographic review of multiple dissertations. This assignment will work toward the identification of a future dissertation topic within this field and also towards the identification of research material in support of the final dissertation. The annotated bibliographic reviews contained within this paper will work to provide information that will support my future research and provide experience in garnering and explaining the salient tenants of research material. NOTE: This paper will not include proper APA formatting as citations have been bolded to ensure the professor can discern where citations begin and end. Curtis, S. K. (2012). Commitment to cybersecurity and information technology governance: A case study and leadership model. (Doctoral dissertation). Retrieved from the ProQuest dissertation and thesis database. (UMI No. 3569139) The problem as described by the author in this quantitative study is senior managers are not using web analytic technology (WAT) and there is a lack of literature describing why this is the case. The purpose of this study is to “examine how management consultants perceive WAT” (p. 22). This study has seven hypotheses. Unified theory of acceptance use of technology...

Words: 3359 - Pages: 14

Premium Essay

Mark1012

...Assignment B Zoe Suet Yee Wan, Jason Lau, Yaoyu Su OutThere Pty Ltd Z3416862 Zoe Suet Yee Wan Z3416733 Jason Lau Z3353653 Yaoyu Su Tutorial: Friday 9-11am Tutor: Jason Simpson Date Submitted: 12/10/2012 Word Count (excluding appendix and overview) : 3113 Word Count for Overview: 301 1 Assignment B Zoe Suet Yee Wan, Jason Lau, Yaoyu Su Executive Summary This following report focuses on providing recommendations and appropriate suggestions to OutThere Pty Ltd regarding the success for FillUp and QuickStop brands. Although FillUp has been growing steadily for the past five years, constant evaluation of efficiency and productivity is necessary for its continual success. On the other hand, standalone QuickStop shops has not been as successful as compared to FillUp as most newly established stores are located in remote areas which may be a contributing factor as to why new tools and strategies are essential to sustain profitability in the long run. Regarding the Chief Information Officer’s priorities to improve purchasing power and distribution efficiency, store layout and product mix, detect fraudulent activities and offer personalised promotion, different types of Business Intelligence Tools will be recommended specifically with the aim to achieve these priorities. 2 Assignment B Zoe Suet Yee Wan, Jason Lau, Yaoyu Su Table of Contents Executive Summary ...........................................................................................

Words: 4553 - Pages: 19

Premium Essay

Quantitative Research Methods in Educational Planning

...Quantitative research methods in educational planning Series editor: Kenneth N.Ross Module John Izard 7 Trial testing and item analysis in test construction UNESCO International Institute for Educational Planning Quantitative research methods in educational planning These modules were prepared by IIEP staff and consultants to be used in training workshops presented for the National Research Coordinators who are responsible for the educational policy research programme conducted by the Southern and Eastern Africa Consortium for Monitoring Educational Quality (SACMEQ). The publication is available from the following two Internet Websites: http://www.sacmeq.org and http://www.unesco.org/iiep. International Institute for Educational Planning/UNESCO 7-9 rue Eugène-Delacroix, 75116 Paris, France Tel: (33 1) 45 03 77 00 Fax: (33 1 ) 40 72 83 66 e-mail: information@iiep.unesco.org IIEP web site: http://www.unesco.org/iiep September 2005 © UNESCO The designations employed and the presentation of material throughout the publication do not imply the expression of any opinion whatsoever on the part of UNESCO concerning the legal status of any country, territory, city or area or of its authorities, or concerning its frontiers or boundaries. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means: electronic, magnetic tape, mechanical, photocopying, recording or otherwise, without...

Words: 14672 - Pages: 59

Premium Essay

Mis 301

...impacted organizational structure, culture, politics, decision making, and society as a whole. IT is transforming how physical products are designed, how services are bundled with products, and how individuals interact with businesses and with other individuals. A silent transformation is occurring as more and more physical products use embedded IT to improve customer experience and product performance. The pervasiveness of IT is expanding global trade and changing how and where work is performed. It is vital that future managers—in every area of business—have a working knowledge of modern IT, practical experience in its use, and management perspective on how IT is used in organizations. MIS 301 will focus on three broad issues: (a) data and enterprise systems; (b) IT and competitive strategies; and (c) emerging technologies. While there is some introduction to the practical business use of hands-on technology, the real value that McCombs majors...

Words: 3229 - Pages: 13

Premium Essay

Homosexuality

...CHAPTER 3 RESEARCH DESIGN 3.1 INTRODUCTION In this chapter the researcher describes the plan on how the study will be carried out in order to obtain the required data. This chapter looks at the nature and design of the study concentrating on the various categories of the study design. The chapter will look at research procedure, data collection technique, sampling, population and the location of the study, limitations of the study as well as ethical considerations. Data analysis and presentation will also be included in this chapter. 3.2 NATURE OF THE STUDY The study will be qualitative in nature. According to Babbie (1998), qualitative research refers to non-numerical examination and the presentation of observations for the purpose of discovering underlying meanings and patterns of relationships. Bless et al (2006), also maintain the same line of thinking noting that qualitative research is a research which is conducted using a number of methods which use qualifying words and descriptions to record and investigate aspects of social reality. Given these definitions of qualitative research this study will be best carried out using qualitative study given the fact that it is meant to investigate aspects of social reality. Moreover the study will be investigating people’s opinions and feelings which can be best revealed in words and symbols. 3.3 RESEARCH DESIGN (STRATEGY) Research design refers to a plan of how one intends to carry out the research. Basically it focuses...

Words: 2096 - Pages: 9

Premium Essay

Whwifhwie

...A Handbook of Statistical Analyses using SAS SECOND EDITION Geoff Der Statistician MRC Social and Public Health Sciences Unit University of Glasgow Glasgow, Scotland and Brian S. Everitt Professor of Statistics in Behavioural Science Institute of Psychiatry University of London London, U.K. CHAPMAN & HALL/CRC Boca Raton London New York Washington, D.C. Library of Congress Cataloging-in-Publication Data Catalog record is available from the Library of Congress This book contains information obtained from authentic and highly regarded sources. Reprinted material is quoted with permission, and sources are indicated. A wide variety of references are listed. Reasonable efforts have been made to publish reliable data and information, but the author and the publisher cannot assume responsibility for the validity of all materials or for the consequences of their use. Neither this book nor any part may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, microfilming, and recording, or by any information storage or retrieval system, without prior permission in writing from the publisher. The consent of CRC Press LLC does not extend to copying for general distribution, for promotion, for creating new works, or for resale. Specific permission must be obtained in writing from CRC Press LLC for such copying. Direct all inquiries to CRC Press LLC, 2000 N.W. Corporate Blvd., Boca Raton, Florida 33431. Trademark Notice:...

Words: 38316 - Pages: 154

Premium Essay

Gatau

... except by a reviewer who may quote brief passages in a review. ACL 9 August 2006 ACL Services Ltd. 1550 Alberni Street Vancouver, BC Canada V6G 1A5 Telephone: +1-604-669-4225 E-mail: info@acl.com Web: www.acl.com Printed in Canada ACL, the ACL logo, the ACL logo with the text, "ACL Data you can trust. Results you can see." and Audit Command Language are trademarks or registered trademarks of ACL Services Ltd. Microsoft, Windows and Windows Server are trademarks or registered trademarks of Microsoft Corporation. AIX, OS/390, OS/400 and z/OS are registered trademarks of IBM Corporation. Linux is a registered trademark of Linus Torvalds. SAP, R/2 and R/3 are trademarks or registered trademarks of SAP AG. Crystal Reports is a trademark or registered trademark of Business Objects SA. All other trademarks are the property of their respective owners. 200607031748 C ONTENTS Chapter 1: Take your first look at ACL . . . . . . . . . . . . . . . . . . . . . 1 Making effective business decisions ................................................ 2 What can I use ACL for? ................................................................... 3 How does ACL read data? ................................................................ 4 How do I apply ACL to my project? ................................................ 5 Organizing your project items ......................................................... 6 Viewing and modifying your tables .......................

Words: 14019 - Pages: 57

Free Essay

Information Technology Management

...module School of Computing This tutorial letter contains the model answers to assignment 1 & 2, and the Oct/Nov 2013 examination and Jan/Feb 2014 supplementary examination preparation notes. Bar code CONTENTS 1 TUTORIAL MATTER THAT YOU SHOULD HAVE RECEIVED TO DATE .................................. 3 Plagiarism ................................................................................................................................... 3 2 THE MODEL ANSWERS TO ASSIGNMENT 1 ........................................................................... 3 3 THE MODEL ANSWERS TO ASSIGNMENT 2 ........................................................................... 6 4 THE OCT/NOV 2013 EXAMINATION AND JAN/FEB 2014 SUPPLEMENTARY EXAMINATION PREPARATION NOTES ............................................................................................................12 2 INT401I/202 1 TUTORIAL MATTER THAT YOU SHOULD HAVE RECEIVED TO DATE Title Description TUTORIAL LETTER 101/0/2013 Tutorial letter 101 contains important information about your module. VERY important information. TUTORIAL LETTER 201/0/2013 TUTORIAL LETTER 202/0/2013 Tutorial letter 202 contains the model answers to assignment 1 & 2, and the Oct/Nov 2013 examination and Jan/Feb 2014 supplementary examination preparation notes (this tutorial letter). Plagiarism NB: Plagiarism is the act of taking words, ideas and thoughts of others and passing them off as your own. It is a form of theft which involves a...

Words: 4310 - Pages: 18

Premium Essay

English for Business Administration

...Evaluation • SUSTAINABILITY • Module 4 Monitoring and Evaluation and Management Information Systems (MIS) 2/ MIS, Monitoring & Evaluation Introduction Monitoring and Evaluation Process points: Types and levels of monitoring and evaluation activities Some monitoring and evaluation definitions What are indicators? Methods and tools for monitoring and evaluation Steps in planning and conducting monitoring and evaluation ❐ Tools and techniques: How to write your evaluation report Tips for improving monitoring and evaluation of your project Management Information Systems (MIS) ❐ What is on MIS? ❐ Why is an MIS important? Sources for decision making, monitoring, and evaluation ❐ Targets Designing an MIS Using data to inform your MIS: conducting a baseline study Performance information Key questions in designing an MIS Institutionalizing an MIS in an organization MIS: step-by-step Using MIS outputs for decision-making How is information used in the organization? ❐ How does information flow in your organization? A word about reporting ❐ Tips and Tools: Report preparation checklist A final word about evaluation ❐ Process evaluation ❐ Output evaluation ❐ Effects evaluation ❐ Short-term impact evaluation Summary 1 2 4 5 5 7 8 9 10 1 1 1 1 13 1 2 1 3 1 5 16 1 7 19 20 2 1 22 25 26 27 Figures, Tables, and Exercises Figure 1: Exercise A: Table 1: Exercise B: Figure 2: Figure 3: Exercise C: Figure...

Words: 9061 - Pages: 37