Conduct a chi-square test using r''s chisq.test command

Assignment Help Basic Computer Science
Reference no: EM131430561

Two students went to a local supermarket and collected data on cereals; they classified cereals by their target consumer (children versus adults) and the placement of the cereal on the shelf (bottom, middle, and top). The data are given in Cereals.

(a) Create a table to summarize the relationship between age of target consumer and shelf location.

(b) Conduct a chi-square test using R's chisq.test command.

(c) R returns a warning message. Compute the expected counts for each cell to see why.

(d) Conduct a permutation test for independence, adapting the code

Reference no: EM131430561

Questions Cloud

Compare the theoretical model with the empirical data : For the Philadelphia Phillies data (Phillies2009), consider the number of doubles hit per game. Model this using a Poisson distribution, and perform a goodness-of-fit test to compare the theoretical model with the empirical data.
Is vulnerability necessary for us to grow as individuals : Think about what she said about the power of vulnerability. Do you believe that what makes you vulnerable also makes you beautiful? Is vulnerability necessary for us to grow as individuals? If anything else comes up from the video, you can incl..
Write a paper about ethical decision making in business : Assignment: Business Communication- Write a paper about Ethical Decision Making in Business.
Determine the degrees of freedom : Determining the degrees of freedom. Refer to given Exercise. For each situation, give the following:- Degrees of freedom for the model, for error, and for the total.
Conduct a chi-square test using r''s chisq.test command : Two students went to a local supermarket and collected data on cereals; they classified cereals by their target consumer (children versus adults) and the placement of the cereal on the shelf (bottom, middle, and top). The data are given in Cereals..
What is the company or product winning aspiration : What is the company/product's winning aspiration? Provide a summary of the company/company and product sufficient that if the reader did not know anything about company/product that the reader had the proper context to understand the remainder of t..
Describe the anova model : Describing the ANOVA model. For each of the following situations, identify the response variable and the populations to be compared, and give I, the ni, and N.
Define the term heteronormativity : Define ‘heteronormativity' and provide an example of how the Royal Wedding supported this concept.Explain the ‘heteronormative hierarchy' and provide two different hierarchical examples of it. In terms of ‘gendered heterosexualities,' what is one re..
Create at least two queries one focused on customers : MGMT 4013- Create at least two queries, one focused on customers and one focused on rentals. Use information in the Data Modeling Assignment scenario to review what the Low Budget Rentals manager needs.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Determine for which values of n your algorithm is efficient

Design an algorithm for the p-processor BSP and/or LogP models for the segmented prefix function. Given the parameters of the models, determine for which values of n your algorithm is efficient.

  Describe turing machine that generates the binary strings

Describe a Turing machine that generates the binary strings in lexicographical order. The first few strings in this ordering are 0, 1, 00, 01, 10, 11, 000, 001, ....

  Which of these is a repository of security-related

Which of these is a repository of security-related documentation and also sponsors a number of security research projects? A) F-Secure B) Computer Emergency Response Team C) Microsoft Security Advisor D) SANS Institute.

  Impact on business and society

Emerging Technologies and their impact on business and society

  Task in artifial intellegince technique

Task in Artifial Intellegince technique - Emplyee Ant colony optimization for classifying KDD99 data set into its classes

  Research a writing guide for forensics organization

Your manager has asked you to research and recommend a writing guide that examiners in your computer forensics organization will use for all official written reports.

  How the grinch can do the job in o(n log n) time

He seeks to divide the players as unfairly as possible, so as to create the biggest possible talent imbalance between team A and team B. Show how the Grinch can do the job in O(n log n) time.

  Design a payroll class

Write the appropriate accessor and mutator methods and a constructor that accepts the employee's name and ID number as arguments.

  Compare b-mac, z-mac and s-mac for wireless sensor networks

Compare B-MAC, Z-MAC and S-MAC for wireless sensor networks.

  Quantity theory of money

QUESTION 1: According to the quantity theory of money, the quantity of money determines the

  Who are the stakeholders

Probe into resulting consequence between stakeholders and management as a result of security incidents. Who are the stakeholders?

  Display a sentence giving the amount to be paid

Request the amount pledged per mile from an input dialog box, and assign it to the variable pledge.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd