Statistical analysis approaches

Assignment Help Basic Computer Science
Reference no: EM131074865

The Portfolio Project, due at the end of Week 8, is a statistical analysis using one or more of the statistical analysis approaches presented in Modules 4 and 5. These various approaches are designed to produce business intelligence to resolve problems and enable management to make informed business decisions.

You will be conducting these analyses based on your evaluation and preparation of the data in Module 6 using the IBM SPSS statistical analysis software. This week's lecture contains the information you need for downloading and using the SPSS software. Having completed your analysis for the Week 6 Critical Thinking Assignment, you will refine and present your findings in the Portfolio Project and associate them to business knowledge that can be used to enhance the decision-making abilities of the organization.

Your Portfolio Project submission should include the following sections:

  1. Introduction: Introduce the organization, the business problem that you defined in the Week 6 Critical Thinking Assignment, and the data that was presented to you.
  2. Data Preparation: Discuss the data and any quality and accuracy concerns that you discovered. Describe your approach to processing the data to improve the chances of discovering new knowledge from the existing data.
  3. Analysis Approach: Describe your chosen analysis approach. Include your assessment of how effective the method was in discovering new relevant knowledge within the data.
  4. Findings: Present and discuss your findings as the result of your analysis. Include any supporting data, graphics, tables, charts, etc., along with your analysis of the findings. Discuss any correlations, associations or patterns that you identified in the data.
  5. Application: Briefly discuss your findings as they pertain to the business problem. How might the organization use this new knowledge to make informed business decisions to resolve the business problem?
  6. Discussion: Discuss the limitations of your data mining process in discovering useful business intelligence. Additionally, discuss other research or analysis methods. What methods might another data mining expert consider using should the organization need further analysis on this data and business problem?

Your well-written findings should be 6-8 pages in length and formatted according to the CSU-Global Guide to Writing and APA Requirements. Include at least five credible outside references, and one or more citations from the course textbook, to support your analysis process. The outside references may include credible sources in print, or from the Internet, screenshots, images, etc. (Be sure to refine your graphics.) The CSU-Global library is a great place to find sources!

Reference no: EM131074865

Questions Cloud

Increase to federal minimum wage is widely debated topic : An increase to the federal minimum wage is a widely debated topic and a prominent concern of employees. This issue must be addressed by policy makers and compensation professionals. Support your argument by referencing a law that applies to minimum w..
Problem regarding the enumeration techniques : Enhance and elaborate on the port scanning and/or enumeration techniques (attacks) Share any additional thoughts you may have on them and explain how they can be detected and/or prevented.
Bounties to regulate negative externalities : Describe the advantages and disadvantages of using taxes and bounties to regulate negative externalities. Describe the advantages and disadvantages of allowing individuals to sue to regulate negative externalities.
What happens when x'' (1) and y'' (0) are both the zero vector : What happens when x' (1) and y' (0) are both the zero vector?
Statistical analysis approaches : The Portfolio Project, due at the end of Week 8, is a statistical analysis using one or more of the statistical analysis approaches presented in Modules 4 and 5. These various approaches are designed to produce business intelligence to resolve pro..
The future general inflation rate : A man is planning to retire in 20 years. He can deposit money for his retirement at 6% compounded monthly. It is estimated that the future general inflation rate will be 4% compounded annually. What deposit must be made each month until the man retir..
Introduce students to the workings of counters : The purpose of this lab is to introduce students to the workings of counters. This lab is setup so that the students create counters from flip-flops using their knowledge gained from class lecture to understand how counters work internally before ..
Network management guide : Throughout this course, you will be working on several aspects of networking that will result in a complete Network Management Guide document for a scenario organization of your choosing. You will work extensively with the concepts of good network..
What happens when x'' (1) and y'' (0) are both the zero vector : What happens when x' (1) and y' (0) are both the zero vector?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Computer will ever be developed which can think like human

Do you think a computer will ever be developed which can think like human? Write down the ethical implications of creating such a computer?

  Determine at least five advantages and five disadvantages o

1. Determine at least five advantages and five disadvantages of a smart card compared to Radio Frequency Identification (RFID) tags. 2. Assume that you are a supervisor for your organization's IT security team. You want to install biometric devices o..

  Write a program that displays a 10-by-10 square matri

Write a program that displays a 10-by-10 square matrix

  After create an object in one program

If a text value in a Word document is automatically updated after a corresponding text value is updated in an Excel® source document, you can infer that the text value in Word is __________ the source document.

  Calculate the yield to maturity

a. Calculate the yield to maturity (YTM) on this bond. b. Explain the relationship that exists between the coupon interest rate and yield to maturity and the par value and market value of a bond.

  What is ldap and what are its security vulnerabilities

Why do you think an organization would continue to use directory services that have known security flaws?

  Presentation on telecommunications technology

Need a 10 slides power point that is RELEVANT to Telecommunications technology

  Cryptographic and network security

Using the two keys (memory words) cryptographic and network security, encrypt the following message: "Be at the third pillar from the left outside the lyceum theatre tonight at seven. If you are distrustful bring two friends."

  Computing chips

Computing Chips

  How can the eer model be further enhanced to support it

How can the EER model be further enhanced to support it?

  Write same program in same language without using structs

Write the same program in the same language without using structs. Your program should input three elements into the array.Write the same program in the same language without using structs. Your program should input three elements into the array.

  Can be done with primary keys

Explain what can be done with primary keys to eliminate key ripple effects as a database evolves.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd