Description
Select a very large complex system of system example and explain how the engineering systems approach could provide useful solutions that would have wide acceptance across many communities?
Like hospital or hotel
No copy paste ! Original work
Own words please
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Just what I needed. Studypool is a lifesaver!
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
SNHU Week 8 Technology Financial & Energy Sectors ETFs Discussion
8-2 Jupyter Notebook (Discussion Prep)External Learning ToolThis activity will take you to the Jupyter Notebook contain ...
SNHU Week 8 Technology Financial & Energy Sectors ETFs Discussion
8-2 Jupyter Notebook (Discussion Prep)External Learning ToolThis activity will take you to the Jupyter Notebook containing the Python scripts for your Module Eight discussion. It is highly recommended that you read through the discussion prompt before completing your work in this notebook. When you are finished completing and running the Python scripts, begin work on your initial discussion post.Note: This task is not graded, but you will be required to attach your completed Jupyter notebook to your discussion post in the next activity.
8-3 Discussion: One-Way ANOVADiscussion Topic Starts Jun 12, 2021 8:59 PMUse the link in the Jupyter Notebook activity to access your Python script. Once you have made your calculations, complete this discussion. The script will output answers to the questions given below. You must attach your Python script output as an HTML file and respond to the questions below.In this discussion, you will apply the statistical concepts and techniques covered in this week's reading about one-way analysis of variance (ANOVA). An investment analyst is evaluating the 10-year mean return on investment for industry-specific exchange-traded funds (ETFs) for three sectors: financial, energy, and technology. The analyst obtains a random sample of 30 ETFs for each sector and calculates the 10-year return of each ETF. The analyst has provided you with this data set. Run Step 1 in the Python script to upload the data file.Using the sample data, perform one-way analysis of variance (ANOVA). Evaluate whether the average return of at least one of the industry-specific ETFs is significantly different. Use a 5% level of significance.In your initial post, address the following items:
Define the null and alternative hypothesis in mathematical terms and in words.
Report the level of significance.
Include the t3st statistic and the P-value. See Step 2 in the Python script.
Provide your conclusion and interpretation of the t3st. Should the null hypothesis be rejected? Why or why not?
Does a side-by-side boxplot of the 10-year returns of ETFs from the three sectors confirm your conclusion of the hypothesis test? Why or why not? See Step 3 in the Python script.
In your follow-up posts to other students, review your peers' results and provide some analysis and interpretation:
What does a post-hoc t3st (like Tukey's HSD t3st) contribute after one-way ANOVA is performed?
Comment on your peers' results and compare them with your own.
Remember to attach your Python output and respond to all questions in your initial and follow-up posts. Be sure to clearly communicate your ideas using appropriate terminology.
Reply to Student
John Latulippe posted Jun 21, 2021 3:57 PM
Subscribe
Ho: u1 = u2 = … = uk
Ha: ui ? uj, for some i ? j
Level of significance = 0.05 or 5%
Test statistic, F = 55.07
P-value = 0.0
Yes. The null hypothesis, Ho should be rejected since the p-value of 0.0 is less than the significant level of 0.05 sufficient evidence exists to reject the null hypothesis, Ho for the alternative hypothesis, Ha.
5. Yes. The one-way ANOVA compares the means of three or more groups of one predictor variable. There are at least two groups with unequal means. If you examine the box plot you can see that the energy ETF and technology ETF mean are unequal to the financial ETF mean. Both ETF's have a higher mean than the financial ETF.
IT 415 Southern New Hampshire University GasBuddy Case Study
For the HBR course pack I choose the GasBuddy Study case: GasBuddy: Fueling Its Digital Platform for Agility and Growth Ga ...
IT 415 Southern New Hampshire University GasBuddy Case Study
For the HBR course pack I choose the GasBuddy Study case: GasBuddy: Fueling Its Digital Platform for Agility and Growth GasBuddy is an established app-led company in the travel app industry. They are facing competitive pressure that has led a new management team to make changes across areas of culture, digital platform, and product line; these changes are tested during the events of Hurricanes Harvey and IrmaUsing the HBR coursepack case study you selected in Module One, you will develop three deliverables for your final submission. Milestone One, the executive proposal, is the first deliverable. In Milestone Two, your project plan and system design will be submitted together. These deliverables will be used to direct the implementation effort in your next course, IT 420. If the scope of your planned project is not fully implementable due to constraints on time and resources, you will need to prepare to deliver at the end of the next course a prototype, simulation of the information system vision, or a detailed projection of what the fully implemented system would look like. This projection of a fully implemented system is expected to be much more detailed than a system design.Specifically, the following critical elements must be addressed:I. Project Proposal. The project proposal should contain enough detail so that relevant stakeholders (who will vary depending on your selected case study) can determine if the proposed solution is feasible and will address the needs or gaps in the current operating environment. The following sections should be included:Problem Statement: Craft a clear, accurate problem statement that highlights the information technology-related aspects of the challenges you are facing.Significance: Analyze the significance of this problem and what a solution could mean to you, the company or group, and the discipline or area of interest within information technology. In other words, describe the significance that this project has to your discipline or area of interest within information technology and your development as a practitioner. This will be your chance to sell this project idea so that it is exciting for your imaginary stakeholder audience, and also for your real-world instructor, peers, and potential employers.Objectives: Describe the scope, goals, and objectives of your project. If you are addressing only a part of the overarching problem, state this in this section. Make sure that your objectives are reasonable (i.e., could be accomplished without exorbitant resource usage, an irrational timeline, etc.).Deliverables: Propose your overall solution, highlighting the key deliverables that you will create to solve the problem or challenge the statement.Methodology: Establish the methodology and techniques that you intend to use throughout the design phase of your project, with support as to how each is appropriate for the situation.Risks: Analyze the problem and your own solution proposal to highlight any risks that may prevent successful completion of your solution design. Include risks that result from the project not fulfilling the objective to solve the information technology problem. In other words, what risks are present and how would they impact the potential for a successful information technology solution?
Large Scale Hacks or Violations of Internet Security Essay
Research and identify three (3) large scale hacks or violations of Internet security that have occurred over the past five ...
Large Scale Hacks or Violations of Internet Security Essay
Research and identify three (3) large scale hacks or violations of Internet security that have occurred over the past five years. For each of the hacks, identify the suspected hacker or hacker group, what the hack consisted of, what the hackers wanted, and how the hacked entity was able to fend off the attack, or how the entity resolved the hack if it was successful.
Compare and contrast each of these and write a proposal for an information security review for The New York Times newspaper. This review should include the potential threats, ease of access to reporters and staff accounts, and so on. You should also identify the top three threats to the newspaper in your review.
1 page
Recommendation Letter
Mr. (Student’s Surname) is a bonified student of (University Name) registered under the faculty of Engineering and Techn ...
Recommendation Letter
Mr. (Student’s Surname) is a bonified student of (University Name) registered under the faculty of Engineering and Technology, Department of ...
Similar Content
Cuyamaca College Simple Curve and Standard Compass Exam
I will upload the exam in the file. send me the solution in order of the questions. ...
A Key Concept in Information Systems
Use the Internet or the Strayer
Library to research one (1) concept in information systems that you have
studied in this c...
DLSM Exercise of The First Law of Thermodynamics for A Closed System Worksheet
hi need someone to write me this picture in word ...
CC Aerospace Engineering Capabilities of The New Technique Summary
Pressure PIV measurement technique.
You are required to choose any one of these two options, and submit a concise su...
A transportion Homework
i need help with Chapter 3 problems : 3-3 , 3-5, 3-6, 3-11, 3-15, and also I need a list of 3 traffic control devices that...
JNTU Mechanical Engineering Worksheet
ME 216
CFD PROJECT I
Fall 2022
Due on Thursday by 11:59 PM on 11/3/2022.
10 Points of Total Course Grade.
Instruction: ...
202103240038575
...
Annotated Bibliography
1. Bennett, B. T. (2018). Understanding, assessing, and responding to terrorism: National infrastructure refers to the iss...
Adder And Magnitude Comparator
1. To complete the design, build, and test a 4-bit binary to Excess-3 code converter. 2. To complete the design of a signe...
Related Tags
Book Guides
Cat on a Hot Tin Roof
by Tennessee Williams
The Girl With The Dragon Tattoo
by Stieg Larsson
12 Rules for Life
by Jordan Peterson
The Grapes of Wrath
by John Steinbeck
The Turn of the Screw
by Henry James
Treasure Island
by Robert Louis
The Jade Peony
by Wayson Choy
Hidden Figures
by Margot Lee Shetterly
The Remains Of The Day
by Kazuo Ishiguro
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
SNHU Week 8 Technology Financial & Energy Sectors ETFs Discussion
8-2 Jupyter Notebook (Discussion Prep)External Learning ToolThis activity will take you to the Jupyter Notebook contain ...
SNHU Week 8 Technology Financial & Energy Sectors ETFs Discussion
8-2 Jupyter Notebook (Discussion Prep)External Learning ToolThis activity will take you to the Jupyter Notebook containing the Python scripts for your Module Eight discussion. It is highly recommended that you read through the discussion prompt before completing your work in this notebook. When you are finished completing and running the Python scripts, begin work on your initial discussion post.Note: This task is not graded, but you will be required to attach your completed Jupyter notebook to your discussion post in the next activity.
8-3 Discussion: One-Way ANOVADiscussion Topic Starts Jun 12, 2021 8:59 PMUse the link in the Jupyter Notebook activity to access your Python script. Once you have made your calculations, complete this discussion. The script will output answers to the questions given below. You must attach your Python script output as an HTML file and respond to the questions below.In this discussion, you will apply the statistical concepts and techniques covered in this week's reading about one-way analysis of variance (ANOVA). An investment analyst is evaluating the 10-year mean return on investment for industry-specific exchange-traded funds (ETFs) for three sectors: financial, energy, and technology. The analyst obtains a random sample of 30 ETFs for each sector and calculates the 10-year return of each ETF. The analyst has provided you with this data set. Run Step 1 in the Python script to upload the data file.Using the sample data, perform one-way analysis of variance (ANOVA). Evaluate whether the average return of at least one of the industry-specific ETFs is significantly different. Use a 5% level of significance.In your initial post, address the following items:
Define the null and alternative hypothesis in mathematical terms and in words.
Report the level of significance.
Include the t3st statistic and the P-value. See Step 2 in the Python script.
Provide your conclusion and interpretation of the t3st. Should the null hypothesis be rejected? Why or why not?
Does a side-by-side boxplot of the 10-year returns of ETFs from the three sectors confirm your conclusion of the hypothesis test? Why or why not? See Step 3 in the Python script.
In your follow-up posts to other students, review your peers' results and provide some analysis and interpretation:
What does a post-hoc t3st (like Tukey's HSD t3st) contribute after one-way ANOVA is performed?
Comment on your peers' results and compare them with your own.
Remember to attach your Python output and respond to all questions in your initial and follow-up posts. Be sure to clearly communicate your ideas using appropriate terminology.
Reply to Student
John Latulippe posted Jun 21, 2021 3:57 PM
Subscribe
Ho: u1 = u2 = … = uk
Ha: ui ? uj, for some i ? j
Level of significance = 0.05 or 5%
Test statistic, F = 55.07
P-value = 0.0
Yes. The null hypothesis, Ho should be rejected since the p-value of 0.0 is less than the significant level of 0.05 sufficient evidence exists to reject the null hypothesis, Ho for the alternative hypothesis, Ha.
5. Yes. The one-way ANOVA compares the means of three or more groups of one predictor variable. There are at least two groups with unequal means. If you examine the box plot you can see that the energy ETF and technology ETF mean are unequal to the financial ETF mean. Both ETF's have a higher mean than the financial ETF.
IT 415 Southern New Hampshire University GasBuddy Case Study
For the HBR course pack I choose the GasBuddy Study case: GasBuddy: Fueling Its Digital Platform for Agility and Growth Ga ...
IT 415 Southern New Hampshire University GasBuddy Case Study
For the HBR course pack I choose the GasBuddy Study case: GasBuddy: Fueling Its Digital Platform for Agility and Growth GasBuddy is an established app-led company in the travel app industry. They are facing competitive pressure that has led a new management team to make changes across areas of culture, digital platform, and product line; these changes are tested during the events of Hurricanes Harvey and IrmaUsing the HBR coursepack case study you selected in Module One, you will develop three deliverables for your final submission. Milestone One, the executive proposal, is the first deliverable. In Milestone Two, your project plan and system design will be submitted together. These deliverables will be used to direct the implementation effort in your next course, IT 420. If the scope of your planned project is not fully implementable due to constraints on time and resources, you will need to prepare to deliver at the end of the next course a prototype, simulation of the information system vision, or a detailed projection of what the fully implemented system would look like. This projection of a fully implemented system is expected to be much more detailed than a system design.Specifically, the following critical elements must be addressed:I. Project Proposal. The project proposal should contain enough detail so that relevant stakeholders (who will vary depending on your selected case study) can determine if the proposed solution is feasible and will address the needs or gaps in the current operating environment. The following sections should be included:Problem Statement: Craft a clear, accurate problem statement that highlights the information technology-related aspects of the challenges you are facing.Significance: Analyze the significance of this problem and what a solution could mean to you, the company or group, and the discipline or area of interest within information technology. In other words, describe the significance that this project has to your discipline or area of interest within information technology and your development as a practitioner. This will be your chance to sell this project idea so that it is exciting for your imaginary stakeholder audience, and also for your real-world instructor, peers, and potential employers.Objectives: Describe the scope, goals, and objectives of your project. If you are addressing only a part of the overarching problem, state this in this section. Make sure that your objectives are reasonable (i.e., could be accomplished without exorbitant resource usage, an irrational timeline, etc.).Deliverables: Propose your overall solution, highlighting the key deliverables that you will create to solve the problem or challenge the statement.Methodology: Establish the methodology and techniques that you intend to use throughout the design phase of your project, with support as to how each is appropriate for the situation.Risks: Analyze the problem and your own solution proposal to highlight any risks that may prevent successful completion of your solution design. Include risks that result from the project not fulfilling the objective to solve the information technology problem. In other words, what risks are present and how would they impact the potential for a successful information technology solution?
Large Scale Hacks or Violations of Internet Security Essay
Research and identify three (3) large scale hacks or violations of Internet security that have occurred over the past five ...
Large Scale Hacks or Violations of Internet Security Essay
Research and identify three (3) large scale hacks or violations of Internet security that have occurred over the past five years. For each of the hacks, identify the suspected hacker or hacker group, what the hack consisted of, what the hackers wanted, and how the hacked entity was able to fend off the attack, or how the entity resolved the hack if it was successful.
Compare and contrast each of these and write a proposal for an information security review for The New York Times newspaper. This review should include the potential threats, ease of access to reporters and staff accounts, and so on. You should also identify the top three threats to the newspaper in your review.
1 page
Recommendation Letter
Mr. (Student’s Surname) is a bonified student of (University Name) registered under the faculty of Engineering and Techn ...
Recommendation Letter
Mr. (Student’s Surname) is a bonified student of (University Name) registered under the faculty of Engineering and Technology, Department of ...
Earn money selling
your Study Documents