Description
please look and read the attached file for operating systems
Unformatted Attachment Preview
CS 431: Introduction to Operating Systems
Spring 2019 - HW 4
Due date: 4 April 2019 (Thursday) 11:59 PM
Submission guidelines:
• You are required to answer questions 1 through 4 for full credit (30 points).
• Please submit your answers in the form of a word document or a pdf on Canvas on or before the
due date.
1. Using the banker’s algorithm, determine whether the following state is unsafe based on
the snapshot of the system below. If the state is safe, provide a safe sequence of
execution. Otherwise explain why it is unsafe. Show your calculations for full credit.
[10 points]
P0
P1
P2
P3
P4
Allocation
A B C D
3 0 1 4
2 2 1 0
3 1 2 1
0 5 1 0
4 2 1 2
Max (Demand)
A B C
D
5 1 1
7
3 2 1
1
3 3 2
1
4 6 1
2
6 3 2
5
Available = (1, 0, 0, 2)
2. Given the memory partitions A (600 KB), B (800 KB), C (200 KB), D (700 KB) [in order],
how would the following algorithms place processes P1 (150 KB), P2 (300 KB), P3 (600
KB) [in order]?
a. First-fit
b. Worst-fit
[10 points]
3. What is the role of memory management unit in memory management?
[5 points]
4. Explain the purpose of the base and limit registers in a multiprogramming OS.
[5 points]
Purchase answer to see full attachment
Purchase answer to see full attachment

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer

Hey am through. All the correct answers in the attached file. I also made an extra pdf file containing all the answers
CS 431: Introduction to Operating Systems
Spring 2019 - HW 4
Due date: 4 April 2019 (Thursday) 11:59 PM
Submission guidelin...

Completion Status:
100%
Review
Review

Anonymous
I was having a hard time with this subject, and this was a great help.

Studypool
4.7

Trustpilot
4.5

Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content

New England College of Business and Finance Artificial Neural Networks Project
Chapter 5 –discussion question #1-4 & exercise 6 & internet exercise #7 (go to neuroshell.com click on the examp ...
New England College of Business and Finance Artificial Neural Networks Project
Chapter 5 –discussion question #1-4 & exercise 6 & internet exercise #7 (go to neuroshell.com click on the examples and look at the current examples listed, the Gee Whiz example is no longer on the page).
1.What is an artificial neural network and for what types of problems can it be used?
2. Compare artificial and biological neural networks. What aspects of biological networks are not mimicked by artificial ones? What aspects are similar?
3. What are the most common ANN architectures? For what types of problems can they be used?
4. ANN can be used for both supervised and unsupervised learning. Explain how they learn in a supervised mode and in an unsupervised mode
Need elobrated answers
6.
Go to Google Scholar (scholar.google.com). Conduct a search to find two papers written in the last five years that compare and contrast multiple machine-learning methods for a given problem domain. Observe commonalities and differences among their findings and prepare a report to summarize your understanding
Need 1 page
7.
Go to neuroshell.com. Look at Gee Whiz examples. Comment on the feasibility of achieving the results claimed by the developers of this neural network model

SU W 4 Business Requirements Description for XYZ Corporation Paper
This assignment consists of two (2) sections: a business requirements document and a Gantt chart or project plan. You must ...
SU W 4 Business Requirements Description for XYZ Corporation Paper
This assignment consists of two (2) sections: a business requirements document and a Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment for which it is written. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment. Procuring quality business requirements is an important step toward the design of quality information systems. Completion of a quality requirements document allows user needs and expectations to be captured so that infrastructure and information systems can be designed properly. Using the requirements document provided in the course shell, you are to speculate on the needs of the company. You must consider current and future requirements; however, assumptions should be realistic and carefully considered. Section 1: Business Requirements Document 1. Write an eight to ten (8-10) page original business requirements document for the project plan using the template provided. Note: The template can be found in the Student Center of the online course shell. a. Describe the project including the following: i. Describe the scope and analyze how to control the scope. ii. Identify possible risks, constraints, and assumptions. iii. Describe the integration with other systems and infrastructure. Note: Database and interface design, security, and networking should be considered. iv. Define relevant terms that will be used throughout project. b. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: This course requires use of Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. Section 2: Revised Gantt Chart / Project Plan Use Microsoft Project or an open source alternative, such as Open Project, to: 2. Update the Gantt chart or project plan (summary and detail) template, from Project Deliverable 1: Project Plan Inception, with all the project tasks. The specific course learning outcomes associated with this assignment are: Apply integrative information technology solutions with project management tools to solve business problems. Use technology and information resources to research issues in information technology. Write clearly and concisely about strategic issues and practices in the information technology domain using proper writing mechanics and technical style conventions.

CS 340 SNHU Database indexing & Authentication in Austin Animal Center Worksheet
OverviewIn this milestone you will import the Austin Animal Center (AAC) CSV file that you will be using for Project One i ...
CS 340 SNHU Database indexing & Authentication in Austin Animal Center Worksheet
OverviewIn this milestone you will import the Austin Animal Center (AAC) CSV file that you will be using for Project One into MongoDB. You will then formulate both a single and a compound index that will optimize the queries for the scenario. Recall that you can use the explain function to verify the use of indexes in your queries. Finally, you will be asked to create an admin and a user account in Mongo to address security needs.Note: Be sure to begin working on your milestone early in the week. One natural stopping point would be after the completion of Part I.PromptPart I: Importing and Indexing a Data SetYou have been asked to import a file for the Grazioso Salvare project. In order to do so, you must complete the following steps:In Apporto, open the terminal window to access the Linux shell. Upload the Austin Animal Center (AAC) Outcomes data set into MongoDB by importing a CSV file using the appropriate MongoDB import tool. Use the database name “AAC” and collection name “animals”. Complete the import using the mongoimport tool and take screenshots of both the import command and its execution.Tip: How to import a CSV file is covered in the mongoimport documentation in the Module Three Resources. The Austin Animal Center (AAC) Outcomes data set has already been uploaded into Apporto in the /usr/local/datasets/ directory. The filename is “aac_shelter_outcomes.csv”.After importing your data set, start up the mongo shell. Create a simple index on the key “breed”. Show an example query that will use this index and verify that the index will be used with the explain function. Take screenshots of your example query.Create a compound index that will improve the performance of queries looking for breeds that have an “outcome_type” of “Transfer”. Show an example query that will use this compound index and confirm the index will be used with the explain function. Take screenshots of your example query.Part II: User AuthenticationTo comply with your client’s security needs, you have been asked to ensure user authentication to the database by setting up both administrator and user accounts. To achieve this, follow the steps below.Create an administrator account in the mongo shell by following steps #2–3 of the MongoDB Manual Enable Access Control tutorial. Then exit the mongo shell.IMPORTANT: Write down the password for the admin account and keep it somewhere safe. You will need to use this account later in the course.Enable user authentication for the database by typing the following commands exactly into the Linux shell in Apporto:sudo /bin/cp /etc/mongod_withauth.conf /etc/mongod.conf
sudo /bin/systemctl restart mongod.service
You can verify that you have enabled user authentication by accessing MongoDB with your new username/password. Type the following command into the Linux shell to start mongo:mongo --port 27017 --authenticationDatabase "admin" -u "admin" -p
This will prompt you to enter your password. Then use the command to show databases to verify that you have set up authentication correctly. If you are not logged in with your admin account, no databases will be viewable.Note: These commands have been customized for the Apporto environment. If you are accessing MongoDB on your own machine, refer to the MongoDB Manual Enable Access Control tutorial.If you accidentally messed up user authentication, or if you forgot your password, you can disable user authentication with this set of commands:sudo /bin/cp /etc/mongod_noauth.conf /etc/mongod.conf
sudo /bin/systemctl restart mongod.service
Create a new user account called “aacuser” for the database AAC in the mongo shell. Refer to steps #6–7 of the MongoDB Manual Enable Access Control tutorial, linked above, to help you with this task. You will need to modify the commands so that the account name is “aacuser”.IMPORTANT: Write down the password for the aacuser account and keep it somewhere safe. You will need to use this account later in the course.Take a screenshot of your login process to MongoDB using the mongo shell. Be sure you can access MongoDB and list the databases using both the admin and aacuser accounts, as this will verify that your accounts are working. You should be able to include the login commands for both accounts in one screenshot, but if you can not, include two screenshots to show both login commands.Guidelines for SubmissionSubmit a Word document containing all of your screenshots. Use a screenshot tool, such as the Snipping Tool, for your screenshots and be sure to enlarge the images in the Word document before submitting. This will help make sure that your screenshots are an appropriate size for your instructor to be able to read them. Refer to this Use Snipping Tool to Capture Screenshots guide for help with taking screenshots.

SJSU Juvenile Delinquency Frequency Table Question
1. A social psychologist hypothesized that a factor in juvenile delinquency was the presence or absence of a strong father ...
SJSU Juvenile Delinquency Frequency Table Question
1. A social psychologist hypothesized that a factor in juvenile delinquency was the presence or absence of a strong father-figure in the home. He examined the folders of 100 inmates in the federal reformatory and found that only 50 of these young men grew up with a strong father-figure in the home. He also examined the records of 100 randomly selected male college students and found that 70 of them had strong father-figures in their boyhood homes. Use the chi square method to test the psychologist’s hypothesis.2. A labor official predicted that the following percentages of makes of cars would be seen passing a picket line at an automobile plant where a strike was in progress.General MotorsFordChryslerForeign Brand38%28%24%10%The following numbers of cars were counted. Analyze the data and write a conclusion about the official’s prediction.General MotorsFordChryslerForeign Brand1147275413. On a test of independence between alcoholism and early toilet training, a clinical researcher found a2 = 6.48. With df = 1 and = .05, write a conclusion about the relationship between the two variables.4. A mathematical learning theory predicted the percentages of nine different outcomes. The data were gathered, producing a 2 = 6.79 was found. Interpret the results in terms of the adequacy of the theory.5. A 6 x 8 test of independence produced a chi square of 10.42. Write a conclusion about the inde- pendence of the two variables under consideration.6. In an activity wheel, experimental animals were either isolated or put together and maintained on a restricted feeding schedule. After 25 days, the animals were either alive with stabilized weights or they were dead. Test for the independence of these two conditions with a 2 test. Use an = .01.Isolated TogetherAlive98Dead1127. In a 3 x 5 test of independence, a 2 = 10.61 was calculated. Write a conclusion.8. A theoretical model predicted the percentage of responses among six categories of response. On a test each person was counted in one of the six possible categories. A 2 = 12.10 was calculated. Write a conclusion about the theory.9. At a busy street corner in a large city, right at the morning rush hour, a psychologist counted the number of people waiting for the light to change. A confederate dressed as a homeless man crossed the street against the light. The psychologist counted the number of people who followed him. When the next group collected to wait for the light to change, another confederate, dressed as a well-to-do businessman, crossed the street against the light, and the psychologist counted the number of people who followed him. Analyze the data.Followed Did Not FollowHomeless Man315Businessman87What can the psychologist say about the influence of appearance on whether or not a person takes risks?10. a. Children were asked if they brushed their teeth regularly and, if so, with what brand of toothpaste. Children with dental caries (cavities) were identified. A statistician collected the records of children who brushed regularly and divided them into four categories of toothpaste. Brand A-185 records; Brand B – 210; Brand C – 150; and all others, 105. Each of these four sets was then divided into children who had caries and those who did not. The results were: A, 38 with caries, 147 without; B, 45 with caries, 165 without; C, 32 with caries, 118 without; others, 30 with caries, 75 without. Analyze the data and write a conclusion.b. Suppose that of the 325 children who reported they didn’t brush regularly, 40% had caries. Use this fact and the data in 10a to determine if brushing is related to dental health.

Week 8 assignment
Open this item from the Assignments menu to view the rubric and download the attached detailed assignment description.The ...
Week 8 assignment
Open this item from the Assignments menu to view the rubric and download the attached detailed assignment description.The required template for the Incident Report is provided on the last page of the assignment description file.After submitting your file to Turn It In for originality checking, attach it here and submit for grading.

Monroe College Four Case Studies on Corporate Social Responsibility Essay
Choose one of the organizations described in the “Four Case Studies on
Corporate Social Responsibility” article, anal ...
Monroe College Four Case Studies on Corporate Social Responsibility Essay
Choose one of the organizations described in the “Four Case Studies on
Corporate Social Responsibility” article, analyze the information about the
organization, and write a 6-page case study (4 pages of content) paper.
Include in-text citations from at least 2 peer reviewed sources.
The case study paper should include the following sections:
A. Introduction
B. Description of the organization’s original corporate social
responsibility (CSR) policies and reporting
C. Description of the conflicts
D. Description of resultant changes in the CSR policies and reporting
E. Conclusion
Similar Content
IT infrastructure assignment TCP/IP
Assignment: IT InfrastructureQ1. About IPv4a. How long is IPv4?b. What is the challenge with IPv4?c. What is the range of ...
American College of California Shape Your Editorial Discussion
Discussion Topic: As noted by Kirk (2016), angle, framing, and focus are useful perspectives that help to shape your edito...
SOCY 423 Week 5 Structural Racism and the COVID19 Pandemic Discussion
Throughout our course so far, we have examined multiple aspects of race, racism, structural discrimination, and ethnocentr...
Liberty University Appliance Warehouse Managing Systems Implementation Case Study
SIM will soon be ready for deployment! Carlie Davis wants you outline SIM’s testing plan, changeover strategy, and train...
IT117 PUG Website Development & Desktop Adminstration Discussion
IT117: Website Development INSTRUCTIONS:Be clear about which message you are responding to. Refer to specific passages or...
Discus challenges and strategies related to Data Analytics in R.
Discus challenges and strategies related to Data Analytics in R....
Data Encryption.edited
Information theft is one of the main issues of concern as far as organizational data is concerned. Many firms have reporte...
Answer To Bachman Diagrams
A Bachman diagram is a certain sort of information structure chart and is utilized to outline the information with a syste...
Exercise1
Item 2: What Book Code(s) have a Publisher Code of BB and a Publisher City of New York, or a book price greater than or eq...
Related Tags
Book Guides
The Color Purple
by Alice Walker
The Splendid and The Vile
by Erik Larson
The House of the Seven Gables
by Nathaniel Hawthorne
The Picture of Dorian Gray
by Oscar Wilde
Cry the Beloved Country
by Alan Paton
We Were Eight Years in Power
by Ta-Nehisi Coates
The Grapes of Wrath
by John Steinbeck
The Two Towers
by J. R. R. Tolkien
Hiroshima
by John Hersey

Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content

New England College of Business and Finance Artificial Neural Networks Project
Chapter 5 –discussion question #1-4 & exercise 6 & internet exercise #7 (go to neuroshell.com click on the examp ...
New England College of Business and Finance Artificial Neural Networks Project
Chapter 5 –discussion question #1-4 & exercise 6 & internet exercise #7 (go to neuroshell.com click on the examples and look at the current examples listed, the Gee Whiz example is no longer on the page).
1.What is an artificial neural network and for what types of problems can it be used?
2. Compare artificial and biological neural networks. What aspects of biological networks are not mimicked by artificial ones? What aspects are similar?
3. What are the most common ANN architectures? For what types of problems can they be used?
4. ANN can be used for both supervised and unsupervised learning. Explain how they learn in a supervised mode and in an unsupervised mode
Need elobrated answers
6.
Go to Google Scholar (scholar.google.com). Conduct a search to find two papers written in the last five years that compare and contrast multiple machine-learning methods for a given problem domain. Observe commonalities and differences among their findings and prepare a report to summarize your understanding
Need 1 page
7.
Go to neuroshell.com. Look at Gee Whiz examples. Comment on the feasibility of achieving the results claimed by the developers of this neural network model

SU W 4 Business Requirements Description for XYZ Corporation Paper
This assignment consists of two (2) sections: a business requirements document and a Gantt chart or project plan. You must ...
SU W 4 Business Requirements Description for XYZ Corporation Paper
This assignment consists of two (2) sections: a business requirements document and a Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment for which it is written. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment. Procuring quality business requirements is an important step toward the design of quality information systems. Completion of a quality requirements document allows user needs and expectations to be captured so that infrastructure and information systems can be designed properly. Using the requirements document provided in the course shell, you are to speculate on the needs of the company. You must consider current and future requirements; however, assumptions should be realistic and carefully considered. Section 1: Business Requirements Document 1. Write an eight to ten (8-10) page original business requirements document for the project plan using the template provided. Note: The template can be found in the Student Center of the online course shell. a. Describe the project including the following: i. Describe the scope and analyze how to control the scope. ii. Identify possible risks, constraints, and assumptions. iii. Describe the integration with other systems and infrastructure. Note: Database and interface design, security, and networking should be considered. iv. Define relevant terms that will be used throughout project. b. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: This course requires use of Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. Section 2: Revised Gantt Chart / Project Plan Use Microsoft Project or an open source alternative, such as Open Project, to: 2. Update the Gantt chart or project plan (summary and detail) template, from Project Deliverable 1: Project Plan Inception, with all the project tasks. The specific course learning outcomes associated with this assignment are: Apply integrative information technology solutions with project management tools to solve business problems. Use technology and information resources to research issues in information technology. Write clearly and concisely about strategic issues and practices in the information technology domain using proper writing mechanics and technical style conventions.

CS 340 SNHU Database indexing & Authentication in Austin Animal Center Worksheet
OverviewIn this milestone you will import the Austin Animal Center (AAC) CSV file that you will be using for Project One i ...
CS 340 SNHU Database indexing & Authentication in Austin Animal Center Worksheet
OverviewIn this milestone you will import the Austin Animal Center (AAC) CSV file that you will be using for Project One into MongoDB. You will then formulate both a single and a compound index that will optimize the queries for the scenario. Recall that you can use the explain function to verify the use of indexes in your queries. Finally, you will be asked to create an admin and a user account in Mongo to address security needs.Note: Be sure to begin working on your milestone early in the week. One natural stopping point would be after the completion of Part I.PromptPart I: Importing and Indexing a Data SetYou have been asked to import a file for the Grazioso Salvare project. In order to do so, you must complete the following steps:In Apporto, open the terminal window to access the Linux shell. Upload the Austin Animal Center (AAC) Outcomes data set into MongoDB by importing a CSV file using the appropriate MongoDB import tool. Use the database name “AAC” and collection name “animals”. Complete the import using the mongoimport tool and take screenshots of both the import command and its execution.Tip: How to import a CSV file is covered in the mongoimport documentation in the Module Three Resources. The Austin Animal Center (AAC) Outcomes data set has already been uploaded into Apporto in the /usr/local/datasets/ directory. The filename is “aac_shelter_outcomes.csv”.After importing your data set, start up the mongo shell. Create a simple index on the key “breed”. Show an example query that will use this index and verify that the index will be used with the explain function. Take screenshots of your example query.Create a compound index that will improve the performance of queries looking for breeds that have an “outcome_type” of “Transfer”. Show an example query that will use this compound index and confirm the index will be used with the explain function. Take screenshots of your example query.Part II: User AuthenticationTo comply with your client’s security needs, you have been asked to ensure user authentication to the database by setting up both administrator and user accounts. To achieve this, follow the steps below.Create an administrator account in the mongo shell by following steps #2–3 of the MongoDB Manual Enable Access Control tutorial. Then exit the mongo shell.IMPORTANT: Write down the password for the admin account and keep it somewhere safe. You will need to use this account later in the course.Enable user authentication for the database by typing the following commands exactly into the Linux shell in Apporto:sudo /bin/cp /etc/mongod_withauth.conf /etc/mongod.conf
sudo /bin/systemctl restart mongod.service
You can verify that you have enabled user authentication by accessing MongoDB with your new username/password. Type the following command into the Linux shell to start mongo:mongo --port 27017 --authenticationDatabase "admin" -u "admin" -p
This will prompt you to enter your password. Then use the command to show databases to verify that you have set up authentication correctly. If you are not logged in with your admin account, no databases will be viewable.Note: These commands have been customized for the Apporto environment. If you are accessing MongoDB on your own machine, refer to the MongoDB Manual Enable Access Control tutorial.If you accidentally messed up user authentication, or if you forgot your password, you can disable user authentication with this set of commands:sudo /bin/cp /etc/mongod_noauth.conf /etc/mongod.conf
sudo /bin/systemctl restart mongod.service
Create a new user account called “aacuser” for the database AAC in the mongo shell. Refer to steps #6–7 of the MongoDB Manual Enable Access Control tutorial, linked above, to help you with this task. You will need to modify the commands so that the account name is “aacuser”.IMPORTANT: Write down the password for the aacuser account and keep it somewhere safe. You will need to use this account later in the course.Take a screenshot of your login process to MongoDB using the mongo shell. Be sure you can access MongoDB and list the databases using both the admin and aacuser accounts, as this will verify that your accounts are working. You should be able to include the login commands for both accounts in one screenshot, but if you can not, include two screenshots to show both login commands.Guidelines for SubmissionSubmit a Word document containing all of your screenshots. Use a screenshot tool, such as the Snipping Tool, for your screenshots and be sure to enlarge the images in the Word document before submitting. This will help make sure that your screenshots are an appropriate size for your instructor to be able to read them. Refer to this Use Snipping Tool to Capture Screenshots guide for help with taking screenshots.

SJSU Juvenile Delinquency Frequency Table Question
1. A social psychologist hypothesized that a factor in juvenile delinquency was the presence or absence of a strong father ...
SJSU Juvenile Delinquency Frequency Table Question
1. A social psychologist hypothesized that a factor in juvenile delinquency was the presence or absence of a strong father-figure in the home. He examined the folders of 100 inmates in the federal reformatory and found that only 50 of these young men grew up with a strong father-figure in the home. He also examined the records of 100 randomly selected male college students and found that 70 of them had strong father-figures in their boyhood homes. Use the chi square method to test the psychologist’s hypothesis.2. A labor official predicted that the following percentages of makes of cars would be seen passing a picket line at an automobile plant where a strike was in progress.General MotorsFordChryslerForeign Brand38%28%24%10%The following numbers of cars were counted. Analyze the data and write a conclusion about the official’s prediction.General MotorsFordChryslerForeign Brand1147275413. On a test of independence between alcoholism and early toilet training, a clinical researcher found a2 = 6.48. With df = 1 and = .05, write a conclusion about the relationship between the two variables.4. A mathematical learning theory predicted the percentages of nine different outcomes. The data were gathered, producing a 2 = 6.79 was found. Interpret the results in terms of the adequacy of the theory.5. A 6 x 8 test of independence produced a chi square of 10.42. Write a conclusion about the inde- pendence of the two variables under consideration.6. In an activity wheel, experimental animals were either isolated or put together and maintained on a restricted feeding schedule. After 25 days, the animals were either alive with stabilized weights or they were dead. Test for the independence of these two conditions with a 2 test. Use an = .01.Isolated TogetherAlive98Dead1127. In a 3 x 5 test of independence, a 2 = 10.61 was calculated. Write a conclusion.8. A theoretical model predicted the percentage of responses among six categories of response. On a test each person was counted in one of the six possible categories. A 2 = 12.10 was calculated. Write a conclusion about the theory.9. At a busy street corner in a large city, right at the morning rush hour, a psychologist counted the number of people waiting for the light to change. A confederate dressed as a homeless man crossed the street against the light. The psychologist counted the number of people who followed him. When the next group collected to wait for the light to change, another confederate, dressed as a well-to-do businessman, crossed the street against the light, and the psychologist counted the number of people who followed him. Analyze the data.Followed Did Not FollowHomeless Man315Businessman87What can the psychologist say about the influence of appearance on whether or not a person takes risks?10. a. Children were asked if they brushed their teeth regularly and, if so, with what brand of toothpaste. Children with dental caries (cavities) were identified. A statistician collected the records of children who brushed regularly and divided them into four categories of toothpaste. Brand A-185 records; Brand B – 210; Brand C – 150; and all others, 105. Each of these four sets was then divided into children who had caries and those who did not. The results were: A, 38 with caries, 147 without; B, 45 with caries, 165 without; C, 32 with caries, 118 without; others, 30 with caries, 75 without. Analyze the data and write a conclusion.b. Suppose that of the 325 children who reported they didn’t brush regularly, 40% had caries. Use this fact and the data in 10a to determine if brushing is related to dental health.

Week 8 assignment
Open this item from the Assignments menu to view the rubric and download the attached detailed assignment description.The ...
Week 8 assignment
Open this item from the Assignments menu to view the rubric and download the attached detailed assignment description.The required template for the Incident Report is provided on the last page of the assignment description file.After submitting your file to Turn It In for originality checking, attach it here and submit for grading.

Monroe College Four Case Studies on Corporate Social Responsibility Essay
Choose one of the organizations described in the “Four Case Studies on
Corporate Social Responsibility” article, anal ...
Monroe College Four Case Studies on Corporate Social Responsibility Essay
Choose one of the organizations described in the “Four Case Studies on
Corporate Social Responsibility” article, analyze the information about the
organization, and write a 6-page case study (4 pages of content) paper.
Include in-text citations from at least 2 peer reviewed sources.
The case study paper should include the following sections:
A. Introduction
B. Description of the organization’s original corporate social
responsibility (CSR) policies and reporting
C. Description of the conflicts
D. Description of resultant changes in the CSR policies and reporting
E. Conclusion
Earn money selling
your Study Documents