Create a histogram and a dot plot of the data

Assignment Help Basic Computer Science
Reference no: EM13757542

Instructions: For this homework, you will need to copy and paste the information provided in the output area of Minitab, paste graphs, and possibly provide screen shots into one Microsoft word file.

Create a random set of data equal to 25 samples with the random number generator. For the X column, use the Normal distribution with a mean of 100 and standard deviation of 20. For the Y column, use the Poisson distribution with a mean of 25. For the Y column, use the Gamma distribution with a shape parameter of 15 and scale parameter of 5. Copy the data you generated and place into the word document as a table.

Using the data you generated, calculate the basic statistics for the data in the X column. Copy and paste the output into the word document.
Calculate the statistics for the Y column using the "Column Statistics" option within Minitab. Copy and paste the output into the word document.

Create a Histogram and a Dot Plot of the data in the X column. Copy and paste the graphs into the word document.

Create a Scatterplot of the data in the Z column. Copy and paste the graph into the word document.

Create Box Plots for all of the columns for comparison. Copy and paste the graph into the word document.

Using the data in the Z column, create x ¯ and R chart. Copy and paste the graph into the word document.

Standardize the data in the Y column, and place the results into the C4 column. Copy and paste the results into the word document as a table.

Reference no: EM13757542

Questions Cloud

Increase the chances of reaching a performance goal : Hoping to increase the chances of reaching a performance goal, the director of a research project has assigned three separate research teams the same task. The director estimates that the team probabilities are 0.9, 0.8, and 0.7 for successfully comp..
Quantified information : In 1948 Claude Shannon quantified information as: “The information in a message is inversely proportional to its probability. The more surprising a message, the more information it contains.” What is Mr. Shannon telling us with this description? Does..
Define the scope of an it compliance audit : Define the scope of an IT compliance audit that would verify whether or not this organization is in compliance with the laws you identified
Identify and describe key issues affecting changes to work : Identify and describe key issues affecting changes to work. Contrast and compare theory, themes and issues related to changes in employment.
Create a histogram and a dot plot of the data : Create a random set of data equal to 25 samples with the random number generator. For the X column, use the Normal distribution with a mean of 100 and standard deviation of 20. For the Y column, use the Poisson distribution with a mean of 25. F..
Assume lot-for-lot ordering : Heather Adams, production manager for a Colorado exercise equipment manufacturer, needs to schedule an order for 50 Ultima Steppers, which are to be shipped in week 8. Subscripts indicate quantity required for each parent.
Describe business continuity planning : "Disaster Recovery (DR), Business Continuity Planning (BCP), and Software as a Service (SaaS) Options", Explain in your own words the difference between disaster recovery and business continuity planning efforts and whether or not you believe these..
Explain how technology contributes to change in culture : Explain how technology contributes to change in culture, specifically organizational culture. Give specific examples.
Amount invested : Mr. Thomas invested an amount of Rs. 13,900 divided in two different schemes A and B at the simple interest rate of 14% p.a. and 11% p.a. respectively. If the total amount of simple interest earned in 2 years be Rs. 3508, what was the amount invested..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Searches for items that are not in the list

How many searches for items that are not in the list would you have to do to make sorting and using binary search a better strategy than using linear search?

  Consider a scenario where the contingency planning

consider a scenario where the contingency planning management team cpmt of your organization has designated you as the

  Write a java program recursively and iteratively

write a java program recursively and iteratively that reads an integer of up to five digits. Write it out individually in both forward and backward order.

  Asks a user to enter the radius of a circle

Write a program that asks a user to enter the radius of a circle, and calcualtes the area and the circumference. The program should be written using the following methods.

  Storing and compiling a large amount of data

Because information systems are able to store and compile a large amount of data, many people worry that, their private data will end up in the wrong hands. Explain your position.

  Designing the most secure network possible,

Term paper involves putting together the various concepts learned throughout this course. You are tasked with designing the most secure network possible, keeping in mind your goal of supporting three (3) IT services: email, file transfer (centralized..

  An organization when data is compromised or lost

An organization when data is compromised or lost.

  Print a header line with appropriate labels for each column

Print a header line with appropriate labels for each column. Format each data line to vertically align each column right-justified.

  Changing conditions significant influence on way health

What changing conditions do you think have the most significant influence on way the health information is managed today? Why?

  Supplier and the number of products they supply

Show the name of each supplier and the number of products they supply. Order by supplier name.Show the name of each category and the number of products in each category. Only show categories that have more than three products. Order by category ..

  Write the definition of a class clock

Write the definition of a class Clock . The class has no constructors and three instance variables. One is of type int called hours , initialized to 12 , another is of type boolean called isTicking , initialized to true , and the last one is of ty..

  Discuss the role of incident containment in an incident

Discuss the role of incident containment in an incident response strategy and how a lack of planning for containment is a potential pitfall for any response strategy.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd