Free Essay

Quantitative Methods and Analysis Unit 5 Ip

In: Business and Management

Submitted By Abbott
Words 910
Pages 4
Unit 5 – Regression Analysis
American InterContinental University

Abstract
In this scenario, Microsoft Excel has been utilized in order to perform a regression analysis therefore; each one has a chart in order to show the correlations in the data. However, satisfaction: overall, intrinsic, and extrinsic had been used.

Introduction An analysis has been given to employees for the benefits satisfaction and compared to three different job types such intrinsic, extrinsic, as well as the over all. However, the regression analysis that was performed had been done in excel as well as there were charts made up.
Benefits and Intrinsic Job Satisfaction
Regression output from Excel Regression Statistics
Multiple R 0.022301
R Square 0.000497
Adjusted R Square -0.0093
Standard Error 0.656922
Observations 104 ANOVA df SS MS F Significance F
Regression 1 0.021902 0.021902 0.050753 0.822209
Residual 102 44.01771 0.431546
Total 103 44.03962 Coefficients Standard Error t Stat P-value Lower 95% Upper 95% Lower 95.0% Upper 95.0%
Intercept 5.270871 0.348709 15.11541 8.66E-28 4.579209 5.962532 4.579209 5.962532
X Variable 1 0.017947 0.079664 0.225284 0.822209 -0.14007 0.175959 -0.14007 0.175959 It did not want to add my 2 to the answer of 5.962532 or did it add the 9 to the answer of 0.175959
Graph

Benefits and Extrinsic Job Satisfaction
Regression output from Excel
Regression Statistics
Multiple R 0.026829
R Square 0.00072
Adjusted R Square -0.00908
Standard Error 0.467616
Observations 104 ANOVA df SS MS F Significance F
Regression 1 0.016065 0.016065 0.073469 0.786899
Residual 102 22.30384 0.218665
Total 103 22.3199 Coefficients Standard Error t Stat P-value Lower 95% Upper 95% Lower 95.0% Upper 95.0%
Intercept 5.207915 0.248221 20.98096 8.66E-39 4.71557 5.700261 4.71557 5.700261
X Variable 1 0.015371 0.056707 0.271052 0.786899 -0.09711 0.127849 -0.09711 0.127849
Again the last numbers did not want to show up the first one is 1 for the answer of 5.700261 and the other number that did not show was the 9 for answer of 0.127849.
Graph

Benefits and Overall Job Satisfaction
Regression output from Excel Regression Statistics
Multiple R 0.099659
R Square 0.009932
Adjusted R Square 0.000225
Standard Error 0.627644
Observations 104 ANOVA df SS MS F Significance F
Regression 1 0.40308 0.40308 1.023209 0.314153
Residual 102 40.18154 0.393937
Total 103 40.58462 Coefficients Standard Error t Stat P-value Lower 95% Upper 95% Lower 95.0% Upper 95.0%
Intercept 4.491866 0.333167 13.48232 2.13E-24 3.831031 5.152701 3.831031 5.152701
X Variable 1 0.076991 0.076113 1.011538 0.314153 -0.07398 0.227962 -0.07398 0.227962
The number of 1did not show for the upper last numbers and it should be 5.157701 and then for the bottom upper 95.0% number of the answer is 2 which should read 0.227962
Graph

Key components of the regression analysis Complete the following chart to identify key components of each regression output.
Dependent Variable Slope Y-intercept Equation r^2
Intrinsic
0.0179 5.2709 Y=0.0179x+5.2709 0.0005
Extrinsic
0.0154 5.2709 Y=0.0154x+5.2079 0.0007
Overall
0.077 4.4919 Y=0.077x+4.4919 0.0099

Similarities and Differences
One of the similarity’s is that all three intrinsic, extrinsic, and overall job satisfaction each had a positive correlation. All three of the x variables are all different.
Correlation coefficients The overall job satisfaction would be the strongest correlation since it has a great r² at 0.009932 while the benefits of extrinsic was only 0.0072 it was the lowest of them all and then you have intrinsic with an r² of 0.000497. Therefore since the job satisfaction is the biggest of all three of them and since the data has the most linear of the three (Schmidt, 2000). Perhaps the manager is able to infer an increase into the benefits that the benefits are going to have a more direct increase in the extrinsic job satisfaction as well as it can craft employees benefits packages (Inc., 2010).
Conclusion
When researchers use the correlation statistics as well as the regression they are able to disclose whether there is a connection between each set of data (Malek., S., 2013). Every now and then, the relationships might be causal as well as occasionally or even just coincidence. Utilizing a regression analysis would be helpful in determining how strong as well as what way the relationship exists. In the scenario of the data that was performed here, it seems as the strongest relationship might be that as associates have indicated that they are pretty much content with their benefits, The employees are basically content with their job. Therefore, this might be an useful tool for a manager to utilizing motivated associates and for then figuring out how many on the benefit packages in order to help improve associates morale.

References
Malek., S., (2013) Retrieved August 24, 2013 from AIU Online learning lab
Schmidt, S. R. (2000). Research methods for the digitally inclined. [general format]. Retrieved August 24, 2013 from http://www.webster.edu/~woolflm/statmethods.html

Similar Documents

Premium Essay

Macpherson Refrigeration Limited

...Page 3 2. Problem Statement Page 3 3. Performance Measures and Trade-Offs Page 4 4. Assumptions Page 5 5. Iterative Plan Page 5 5.1. Integer Programming Model Page 5 5.2. Integer Programming Model Considering Overtime Page 6 5.3. Integer Programming Model Considering Hiring/Firing Page 7 6. Conclusion Page 9 1. Introduction In this case study, production planning of MacPherson Refrigeration Limited (MRL) for the next year is conducted. In order to provide some background information about the company and the related production plant; there are some points to be mentioned. First of all MRL is relatively large company with a sales of about $28.5 million and for the last ten years they are in the business of producing consumer refrigeration. Secondly, the production plant which this production planning is related has an increased efficiency in the last years through process design and assembly technologies. In this report, process and results of this case study is presented. In this first part, problem which is going to be studied is presented. Following that, decision criteria and performance measures are given in order to evaluate results. Then, assumptions are made considering the business environment and an iterative process of combining quantitative and qualitative measures is conducted. Finally, conclusion about the report is submitted as the past part of the report. 2.......

Words: 2144 - Pages: 9

Premium Essay

Information System

...Forces c. Strategic Information Systems d. None of the above 5. Using IT to help a company make radical changes or improvements in their business processes is part of: a. Leveraging Investment in IT b. Agile Company c. Value Chain d. Business Process Reengineering e. Creating Switching Costs 6. The main processing component of a computer is called: a. Primary Storage b. Magnetic Disks c. Central Processing Unit d. Semiconductor Memory 7. Which of the following is a quantitative model typically used by a DSS: a. Sensitivity analysis b. What-if analysis c. Goal-seeking analysis d. All of the above 8. Information can be saved in many ways with a computer, the main memory is called: a. Central Processing Unit b. Primary Storage c. Secondary Storage d. Optical Disks 9. A large capacity disk typically found in computers for storage is known as: a. Optical Disk b. Floppy Disk c. Hard Disk d. Central Processing Unit 10. What is the ultimate goal of AI: a. Perform basic transactional processing b. Mimic human intelligence c. Create other systems to replace human input d. All of the above 11. When each position of stored data can be accessed in approximately the same time: a. Primary Storage b. ROM c. Sequential Access d. Direct Access 12. Ethical computer use policy contains general principles to guide computer user behavior: True or False 13. The smallest unit of data storage, bit, is a contraction of: a. Binary......

Words: 1842 - Pages: 8

Free Essay

Bus311

...--------------------------------------------------------------------------- BUSN 311 Unit 3 Individual Project - Possible / Earned Points --------------------------------------------------------------------------- Entertainment Survey or Poll- from Newsstand- Proquest --------------------------------------------------------------------------- Description of Survey 5/5**** Sample Size Analysis 5/5**** Business Application 5/5 **** --------------------------------------------------------------------------- Political Survey or Poll- from Pew Research or Gallup --------------------------------------------------------------------------- Description of Survey 5/5**** Sample Size Analysis 5/5**** Business Application 5/5 **** --------------------------------------------------------------------------- General Opinion Survey or Poll- from Pew Research or Gallup --------------------------------------------------------------------------- Description of Survey 5/5**** Sample Size Analysis 5/5**** Business Application 5/5 **** --------------------------------------------------------------------------- Overview of Survey Research: Text Research required 10/10**** --------------------------------------------------------------------------- This section of the paper will be 2-3 pages in length. 30% deductions for not using specified required research. 6 points will be deducted for each survey that is not taken from the required......

Words: 1421 - Pages: 6

Free Essay

Software

...HYDERABAD MASTER OF TECHNOLOGY (REAL TIME SYSTEMS) I SEMESTER ADVANCED COMPUTER ARCHITECTURE UNIT I Concept of instruction format and instruction set of a computer, types of operands and operations; addressing modes; processor organization, register organization and stack organization; instruction cycle; basic details of Pentium processor and power PC processor, RISC and CISC instruction set. UNIT II Memory devices; Semiconductor and ferrite core memory, main memory, cache memory, associative memory organization; concept of virtual memory; memory organization and mapping; partitioning, demand paging, segmentation; magnetic disk organization, introduction to magnetic tape and CDROM. UNIT III IO Devices, Programmed IO, interrupt driver IO, DMA IO modules, IO addressing; IO channel, IO Processor, DOT matrix printer, ink jet printer, laser printer. Advanced concepts; Horizontal and vertical instruction format, microprogramming, microinstruction sequencing and control; instruction pipeline; parallel processing; problems in parallel processing; data hazard, control hazard. UNIT IV ILP software approach-complier techniques-static branch protection-VLIW approach-H.W support for more ILP at compile time-H.W verses S.W solutions Multiprocessors and thread level parallelism-symmetric shared memory architectures-distributed shared memory-Synchronization-multi threading. UNIT V Storage System-Types-Buses-RAID-errors and failures-bench marking a storage device designing......

Words: 3183 - Pages: 13

Premium Essay

Business Law.Types of Companies

...graphic images, which may be provided by video displays, audio responses, paper products and multimedia.  Storing: Storage is the basic system component of information system. Storage is the information system activity in which data and information are retained in an organized manner for later use. This facilitates their later use in processing or retrieval as outputs when needed by users of a system.  Controlling: An important information system activity is the control of system performance. An information system should produce feedback about its input, processing, output, and storage activities. The feedback must be monitored and evaluated to determine if the system is meeting established performance standards. System Concepts: UNIT 3: Computer Hardware: What is a Computer System: Computer hardware is composed of CPU, Input/Output devices, Primary & Secondary storage & Communication devices. The input devices accept data and instructions and convert them into a format that the computer can understand. The CPU manipulates the data and controls the task done by other components. The primary storage temporarily stores data and programs instructions during processing. It also stores intermediate results of the processing. The secondary storage stores data and programs for future use. Finally the communication devices provide for the flow of data from external computer networks to the CPU and vise versa. Evolution of Computer Hardware: Computer hardware has......

Words: 13881 - Pages: 56

Premium Essay

It255

...Technical Basic Courses CNS Prerequisites 1 Date: 10/25/2010 Introduction to Information Systems Security Syllabus Course Summary Major Instructional Areas 1. Information Systems Security fundamentals 2. Seven domains of a typical Information Technology (IT) infrastructure 3. Risks, threats, and vulnerabilities found in a typical IT infrastructure 4. Security countermeasures for combating risks, threats, and vulnerabilities commonly found in an IT infrastructure 5. (ISC)2 Systems Security Certified Practitioner (SSCP®) Common Body of Knowledge – SSCP® domains 6. Six domains of the CompTIA Security+ certification Course Objectives 1. Explain the concepts of information systems security as applied to an IT infrastructure. 2. Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure. 3. Explain the role of access controls in implementing a security policy. 4. Explain the role of operations and administration in effective implementation of security policy. 5. Explain the importance of security audits, testing, and monitoring to effective security policy. 6. Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems. 7. Explain how businesses apply cryptography in maintaining information security. 8. Analyze the importance of network principles and architecture to security operations. 9. Explain the means attackers use to compromise systems and networks and defenses......

Words: 4114 - Pages: 17

Premium Essay

Seeking Help

...Prerequisites ©ITT Educational Services, Inc. Date: 10/25/2010 Introduction to Information Systems Security Syllabus Course Summary Major Instructional Areas 1. Information Systems Security fundamentals 2. Seven domains of a typical Information Technology (IT) infrastructure 3. Risks, threats, and vulnerabilities found in a typical IT infrastructure 4. Security countermeasures for combating risks, threats, and vulnerabilities commonly found in an IT infrastructure 5. (ISC)2 Systems Security Certified Practitioner (SSCP®) Common Body of Knowledge – SSCP® domains 6. Six domains of the CompTIA Security+ certification Course Objectives 1. Explain the concepts of information systems security as applied to an IT infrastructure. 2. Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure. 3. Explain the role of access controls in implementing a security policy. 4. Explain the role of operations and administration in effective implementation of security policy. 5. Explain the importance of security audits, testing, and monitoring to effective security policy. 6. Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems. 7. Explain how businesses apply cryptography in maintaining information security. 8. Analyze the importance of network principles and architecture to security operations. 9. Explain the means attackers use to compromise systems and networks and defenses......

Words: 4296 - Pages: 18

Free Essay

Dsfsd

...network. This system provides an easy way to retrieve any file which is stored over the network. The IP address of any system which is connected to the network can be found out just by selecting the name of the system. Therefore the range of IP address where the search has to be done can be found by that. The required file can be searched easily when this IP address range is known. The name of the file to be searched is given as input. If possible the file format is also given along with it. The IP address range where the search has to be performed is also selected. If there is any particular system outside that particular range they also can be selected for search operation to be performed. The search is done in each working and connected system in the shared drive and the search results are displayed in the grid view which is the output. The file can be accessed just by clicking the result that appears. Thus this provides a easy way to search a file over a number of systems connected to a network simultaneously. Thus it is very effective since the search is done in a number of systems simultaneously. CHAPTER 2 LITERATURE REVIEW 2. LITERATURE REVIEW 2.1 Existing System: When a particular file has to be searched which is stored in another system connected over network, the IP address of the system should be given in the run after clicking start in the taskbar. After that......

Words: 4829 - Pages: 20

Premium Essay

Normas

...guide for users in properly performing such an RBI assessment. The information in this RP does not constitute and should not be construed as a code of rules, regulations, or minimum safe practices. The practices described in this publication are not intended to supplant other practices that have proven satisfactory, nor is this publication intended to discourage innovation and originality in the inspection of hydrocarbon and chemical facilities. Users of this RP are reminded that no book or manual is a substitute for the judgment of a responsible, qualified inspector or engineer. Nothing contained in any API publication is to be construed as granting any right, by implication or otherwise, for the manufacture, sale, or use of any method, apparatus, or product covered by letters patent. Neither should anything contained in the publication be construed as insuring anyone against liability for infringement of letters patent. This document was produced under API standardization procedures that ensure appropriate notification and participation in the developmental process and is designated as an API standard. Questions concerning the interpretation of the content of this publication or comments and questions concerning the procedures under which this publication was developed should be directed in writing to the Director of Standards, American Petroleum Institute, 1220 L Street, NW, Washington, DC 20005. Requests for permission to reproduce or translate all or any......

Words: 21683 - Pages: 87

Free Essay

Operating Reserve Reliability Evaluation

...Saskatoon, Sask.  This paper appears in: Generation, Transmission and Distribution, IEE Proceedings C Issue Date: Mar 1990 Volume: 137 Issue:2 On page(s): 159 - 167 ISSN: 0143-7046 INSPEC Accession Number: 3606872 Date of Current Version: 06 八月 2002 Abstract The authors present a technique which includes interruptible loads in the probabilistic assessment of the operating reserve in isolated and interconnected generating systems. This technique is then used to evaluate the magnitude and corresponding maximum allowable time delay of load interruption required to reduce the unit commitment risk in the absence of other capacity adjustments. They also present a probabilistic technique which can be used to evaluate the inherent interruptible load carrying capability of an isolated and interconnected generating system which exists without having to commit any extra units other than those required to carry the firm load. The study provides an insight into load interruption and its effect on the system risk. The techniques developed are illustrated by numerical examples. These techniques can be used in short and medium term operational planning Electric Power Systems Research Volume 18, Issue 2, March 1990, Pages 99–103 Microprocessor based on-line assessment of the operational reliability of a longitudinal power supply system * A. Chakrabarti, * A.K. Mukhopadhyay * Electrical Machines and Power System, Department of Applied Physics,......

Words: 4873 - Pages: 20

Premium Essay

Syllabus of Mba 3rd Trim(Gitam, Hbs)

...Participation | 5. | HMPRBA 305 | Marketing Research | 6. | HMPRBA 306 | Financial Management | 7. | HMPRBA 307 | Operations & Supply Chain Management | 8. | HMPRBA 308 | Innovation Management | 9. | HMPRBA 309 | Current Business Affairs & Soft Skills | 10. | HMPRBA 310 | Minor Project (8 weeks) & Viva - Voce | HMPRBA-301: Strategic Management The objective of this course is to acquaint students with the concepts, methods and tools of strategic management and their application in industry. UNIT I: Strategic Management-Basic process of strategic management; Benefits and limitations of strategic management; Goals and objectives, Business Vision, Mission and Objectives. UNIT II: Environment and Resources Analysis: Environmental Analysis, Industry and Competitive Analysis, the External Factor Evaluation (EFE) Matrix, Competitive Profile Matrix (CPM), Internal Analysis; Internal Factor Evaluation (IFE) Matrix, Porter’s Five Forces Model, SWOT Analysis and VRIO framework. UNIT III: Strategy Formulation: Porters Value chain - Generic competitive strategies - Portfolio Analysis and its limitation - BCG matrix and GE matrix - Building competitive - advantage for a firm - Strategy versus tactics and making a Strategic Choice - ‘Blue Ocean Strategy’. UNIT IV: Strategy Implementation and Control: Corporate Strategy - Business Strategy - Functional Strategy and Global Strategy - Issues in Strategy Implementation and Balanced Score Card.......

Words: 2945 - Pages: 12

Premium Essay

Security Management Plan

...IT 454 Security Management Plan Marshall Miller December 20, 2015 Table of Contents Section 1: Information Security Management 4 Intro to Organization 4 People 4 Physical Security 4 Training of Security 4 Information Technology Training 4 Technology 5 Project Manager Roles 5 Section 2: Security Program 6 Data Classification 6 Management Support 7 Hierarchy Reporting Structure 8 8 Section 3: Security Policies 10 Acceptable Use Policy 10 1. Overview 10 2. Purpose 10 3. Scope 11 4. Policy 11 5. Enforcement 13 6. Definitions 13 7. Implementation Date 13 Section 4: Security Policies 14 Risk Assessment 14 Quantitative Risk Analysis 14 Quantitative Risk Analysis 14 Methodologies 15 1. Transfer 15 2. Avoid 15 3. Reduce 15 4. Accept 16 Summary 16 Section 5: Controlling Risk 17 Administrative 17 Human Resources 17 Organizational Structure 17 Security Policies 18 Technical 18 Access Control 18 System Architecture 18 System Configuration 18 Physical 19 Heating and Air Conditioning 19 Fire 19 Flood 19 Summary 19 Bibliography 20 Section 1: Information Security Management Intro to Organization My organization is about a federally recognized business called JPPSO (Joint Personnel Property Shipment Office). JPPSO specializes in the shipping of military personnel goods. JPPSO works hand in hand with the United States Air Force to enforce the safe shipping of military household......

Words: 2755 - Pages: 12

Premium Essay

Sscp Study Notes

...SSCP Study Notes 1. Access Controls 2. Administration 3. Audit and Monitoring 4. Risk, Response, and Recovery 5. Cryptography 6. Data Communications 7. Malicious Code Modified version of original study guide by Vijayanand Banahatti (SSCP) Table of Content 1.0 ACCESS CONTROLS…………………………………………………………...... 03 2.0 ADMINISTRATION ……………………………………………………………... 07 3.0 AUDIT AND MONITORING…………………………………………………...... 13 4.0 RISK, RESPONSE, AND RECOVERY………………………………………....... 18 5.0 CRYPTOGRAPHY……………………………………………………………....... 21 6.0 DATA COMMUNICATIONS…………………………………………………...... 25 7.0 MALICIOUS CODE……………………………………………………………..... 31 REFERENCES………………………………………………………………………........ 33 1.0 ACCESS CONTROLS Access control objects: Any objects that need controlled access can be considered an access control object. Access control subjects: Any users, programs, and processes that request permission to objects are access control subjects. It is these access control subjects that must be identified, authenticated and authorized. Access control systems: Interface between access control objects and access control subjects. 1.1 Identification, Authentication, Authorization, Accounting 1.1.1 Identification and Authentication Techniques Identification works with authentication, and is defined as a process through which the identity of an object is ascertained. Identification takes place by using some form of authentication. Authentication Types Example Something you know...

Words: 17808 - Pages: 72

Free Essay

Benefits of Using Ipv6 in Distributed Virtual Private Networks (Vpns)

... The many advantages of improving and corporation's network, particularly its Virtual personal Networks (VPNs) from IPv4 to IPv6 create the expenses related to the move recoverable from increased network steadiness, auto-configuration, security, mobility, increase and quality-of-service and multicast capability (Cisco 2007). First, in phrases of quantitative, address varies for an IPv6-based network is 128-bits, providing the company lots higher security, likewise (Fink, 1999). Secondly, the safety concerns with regards to utilizing DHCP to assign information science addresses victimization IPv4 these days will be mitigated with the homeless reconfiguration capability of IPv6 (Lehtovirta, J 2006). With several of the systems throughout the company administered remotely exploitation IPsec-based VPNs, the opportunity to maneuver to more secure VPNs attributable to IPsec-mandated end-to-end security exploitation IPv6 also adds in greater levels of security moreover. The increasing use of wireless connections by members among the IT employees to observe and maintain IT systems also can currently be potential exploitation Mobile IP with Direct Routing (Cisco 2007). The redoubled support for protocols specifically for multicast routing are also supported in IPv6, that may build marketing’s’ several webinars and on-line initiatives additional expeditiously delivered, moreover. Most vital concerning the upgrade from IPv4 to IPv6, the requirement also exists to update the many......

Words: 3876 - Pages: 16

Premium Essay

Dynamic Resource Provisioning in Cloud Computing: a Randomized Auction Approach

...4xlarge CPU 2 EC2 Compute Units 8 EC2 Compute Units 5 EC2 Compute Units 20 EC2 Compute Units 6.5 EC2 Compute Units 35 EC2 Compute Units Memory 3.75 GB 15 GB 1.7 GB 7 GB 17.1 GB 60.5 GB Storage 410 GB 1680 GB 350 GB 1680 GB 420 GB 2048 GB The underlying reason for such VM heterogeneity is that a cloud user’s job often requires cooperation among multiple VM instances, each with its own focus and forte. For example, social games [3] and enterprise applications [4] are often composed of a front-end web server tier, a load balancing tier and a back-end data storage tier, each suited for execution This work is supported in part by the Natural Sciences and Engineering Research Council of Canada (NSERC), and grants from Hong Kong RGC under the contracts HKU 717812 and HKU 718513. 978-1-4799-3360-0/14/$31.00 ©2014 IEEE on a VM that is abundant in a particular type of resource: bandwidth, CPU, or storage. Unfortunately, existing allocation mechanisms in cloud markets either are based on fixed pricing, which is economically inefficient, or resort to simple, static auctions that treat VMs as type-oblivious commodities. More specifically, it is usually assumed that either a single type of VMs exists in the cloud market, or VMs are substitutes in that a high-end VM is equivalent to a number of low-end VMs, e.g., a Type II (2 × Core, 2 GB RAM, 40 GB Disk) VM equals two Type I (1 × Core, 1 GB RAM, 20 GB Disk) VMs [5], [6]. Such type-oblivious......

Words: 8201 - Pages: 33