Estimate the average number of students in a course

Assignment Help Basic Computer Science
Reference no: EM131215028

Suppose we have a stream of tuples with the schema

336_30c283d0-f233-41d9-bc0c-bab131e16eb0.png

Assume universities are unique, but a course ID is unique only within a university (i.e., different universities may have different courses with the same ID, e.g., "CS101") and likewise, student ID's are unique only within a university (different universities may assign the same ID to different students). Suppose we want to answer certain queries approximately from a 1/20th sample of the data. For each of the queries below, indicate how you would construct the sample. That is, tell what the key attributes should be.

(a) For each university, estimate the average number of students in a course.

(b) Estimate the fraction of students who have a GPA of 3.5 or more.

(c) Estimate the fraction of courses where at least half the students got "A."

Reference no: EM131215028

Questions Cloud

Recognise the importance of bloom taxonomy : By the end of this topic you should be able to.. Describe difference between educational aims & learning  outcomes and Explain the importance of learning outcomes
How many times each word has occurred in the text file : The values in this dictionary should be a count of how many times each word has occurred in the text file. Second, add the word into a data structure that is keeping track of word information for the completion process.
Swapping the processes : What are conditions on which deadlock can occur while swapping the processes?
Accomplish my goals sincerely : 1. Overview of the companies you learned about 2. Profile of your selections and the reasons you chose them 3. Summary of why you believe this will help me accomplish my goals Sincerely,Harrison Kirby
Estimate the average number of students in a course : For each university, estimate the average number of students in a course.
Data of the current instruction : What holds the data of the current instruction then copies it to the IR. I think its connected to data bus's?
Determine the best predictors of the emotional intelligence : Describe the statistical analyses used and the multiple regression that is best suited for this type of measurement. Determine the best predictors of the emotional intelligence (EI) test scores. Identify other external variables that could influence ..
Motives for e-attacks on information networks : What are some of the motives for e-attacks on information networks? Have attackers and their motives changed over time? If so, what have been the implications of these changes in terms of outcomes,
Create a mind-map with your life at its centre : CVE80010: Principles of Sustainability - identify a few diverse aspects of your life from which you can start tracing to environmental impacts from. Maybe it's your house or apartment; maybe your choices at the supermarket; or maybe it's flying h..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Construct a signal-flow graph representation of the td

The TD(0) algorithm has a mathematical composition similar to that of the LMS algorithm described in Chapter 3. Discuss the similarities and differences between these two algorithms.

  Event viewer console for warnings and errors

Check the Event Viewer console for warnings and errors. You must start an in-place upgrade from within the existing operating system, so you cannot count on Windows Server 2012 R2 to correct any problems that prevent the computer from starting or ..

  Screen message-hard drive not found

Scenario: Owen has just turned on his computer. He goes to get a glass of water while it is booting. Upon returning, he sees the screen message, Hard Drive Not Found. What should he do first?

  Analyzing the scenario and addressing the entire checklist

After reviewing the podcast, write an essay analyzing the scenario and addressing the entire checklist items below in a minimum of 2 pages [500 words] plus title and reference page using APA format and citation style. Indicate the issues with the ..

  An overview of wireless lan security

Write a term paper on the topic "An overview of wireless LAN Security" with the help of below references. This paper must contain citations and must be 2000-4000 words long.

  List two weaknesses and two strengths of each type of policy

Keep in mind what you have learned so far in terms of what you will need to protect in your organization and develop a clear set of policies for your organization.

  Displays a suffix of the specified length

suffix_of_length(length) : Displays a suffix of the specified length from the current string. If the length is

  Is it beneficial to give young children with computers

After reading information under heading Statuses, explain and provide the example of each of the following as each applies to you and your life.

  Sequence diagram for field officer

Draw a sequence diagram for the following use case. Draw only the first five messages sent. The FieldOfficer activates the "Report Emergency" function of her terminal. The system responds by presenting a form to the officer.

  The mft data block allocation algorithm

Write a program that implements the MFT data block allocation algorithm

  What are the differences between tls and ssl

Is TLS compatible with SSL connections? Is one protocol more secure than the other? How does the fact that SSL requires a designated secure port affect implementation choices?

  Proposal for implementing education

As a consultant for MacArthur and Associates, it is your job to create a 200 word proposal for implementing education and technology into the workplace. Be sure to follow up your proposal with facts from outside resources.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd