SlideShare a Scribd company logo
Answer questions Minimum 100 words each and reference
(questions #1-2) KEEP questions WITH ANSWER
1. A key point to get out of this topic is the idea that these
errors are theoretical. You won't be sure as to whether one
occurred or not. Why are they theoretical in nature? Hint: think
about a study and knowing the "truth"
2. Pick a study of interest and identify the null and alternative
hypothesis. How does this fit in with regards to the topic of a
type I and type II error? Always keep this in mind when you are
trying to identify what a type I and type II error are.
A minimum of 75 words each question and References (IF
NEEDED)(Response #1 – 7) KEEP RESPONSE WITH
ANSWER
Make sure the Responses includes the Following: (a) an
understanding of the weekly content as supported by a scholarly
resource, (b) the provision of a probing question. (c) stay on
topic
1) According to the reading, we set the alpha which is the
largest probability for type I error. To increase the power of a
hypothesis researchers can use larger samples which provides
more information and raise the significance level which
increases the probability that the hypothesis will be rejected.
2) A Type 1 error occurs when individuals involved in research
make the decision to reject the belief of truth when in actuality
the hypothesis is true. Type 1 errors are errors in research when
the researcher makes the wrong decision to reject a true null
hypothesis. Type II errors are considered less of a problem than
Type 1 errors, but can prove to be detrimental in the field of
medicine. This type of error occurs when researchers decide to
keep a false null hypothesis, when in fact the hypothesis is true.
The method to avoid making Type 1 decisions is to test the null
hypothesis at the highest level (Alpha Level). This will lessen
the possibilities of making this type of error (Privitera, 2018).
3) According to Privitera (2018) a type 1 error is the probability
of rejecting a null hypotheses that is actually true, researchers
purposely make this error. A null hypotheses is a statement
about a population parameter that is assumed to be true, this
hypotheses is a starting point (Privitera, 2018). The type 2 error
or beta error is the probability of retaining a null hypotheses
that is actually false (Privitera, 2018). The type 1 error is
committed when a researcher decides to reject previous notions
of truth that are in fact true (Privitera, 2018). The best way to
avoid these types of errors is to be open minded and not reject
notions if there is fact to back the notions up. In my opinion a
type 1 error is something committed with bias by the researcher.
I say this because as a researcher it is their job to find all facts
or at least most all facts and apply them to their study or
research, especially if they commit a type one error knowingly.
If a researcher does this error then they are not following
through with basic research guidelines.
4) A one-tailed test is used in a hypothesis test where the
alternative hypothesis is stated as either (>) or (<). When a
researcher is interested in a specific alternative to the null
hypothesis. A two-tailed test is used when one wants to avoid
making a type III error. An error that occurs when one accepts a
null hypothesis that is incorrect because the the rejection region
of the tail was on the opposite end. SPSS can be used to
compute the calculations for each by imputing data in to a new
data chart and then using the frequencies tab to help solve for
the mean and standard deviation. From there one can use
appendix c. to solve for the two-tails. (Privitera., G. J., 2018).
5) We use the one-tailed test when we need to check or test the
claim or hypothesis which is directional in nature. This means if
the alternative hypothesis of the test includes ‘less than’ or
‘greater than’, then we use one-tailed tests. We use the two-
tailed test when we need to check or test the claim or hypothesis
which is non-directional in nature (Privitera., G. J., 2018). That
is, if the alternative hypothesis of the test includes ‘not equal
to’, then we use two-tailed tests. When we perform one-tailed
tests and two-tailed test by using SPSS, then we need to use
some setting or calculations. For most of the tests, SPSS
provides the results for the two-tailed test as a default. Most of
the times, SPSS do not provide results for one-tailed tests and
in such cases, we need to calculate the p-value from this output.
Examples of one tailed and two tailed test is given as below:
H0: µ = 10 v/s Ha: µ < 10 (One tailed /lower tailed /left tailed
/directional test)
H0: µ = 10 v/s Ha: µ > 10 (One tailed /upper tailed /right tailed
/directional test)
H0: µ = 10 v/s Ha: µ ≠ 10 (two tailed /non-directional test)
6) In the Type 1 error and Type 2 error, in this two types of
errors that exist in a hypothesis testing of Type 1 and Type 2.
In Type 1 and Type 2 that occur in when the null hypothesis is
true but is still being rejected. In being able to use the
following example from a law case, this is equivalent of
convicting an innocent man or individual. In the statistics or
research types of errors in types think that he or she has a
significant difference, when there is actually no significant
differences in the types of errors. A Type 2 error occurs when
null hypothesis is false but not rejected, which is equivalent of
acquiring a guilty man or individual. This is where the
researchers actually has a significant difference but does not
realize it. Many examples are generated in the Type 1 and Type
2 that allows the researcher to understand and generate this
hypothesis. In the law, example that is a matter of opinion and
often depends on the nature of the time and associated in the
factor that generates the punishment for the individual that
committed the crime. That is why it is important to understand
the meaning, understanding and hypothesis of this type 1 and
type 2 significant of errors. In the statistics, replication of
studies will reduce the chance that an artifact appears
significant when it is not. In one type of error is eliminated and
there is a very good chance of the other occurring. In the
chance of both types of errors cannot be eliminated. There are
many factors that allows the reseacher to come up with this type
of hypothesis that allows them too see and understand this type
1 and type 2 errors.
7) After researching and exploring this question, it is my belief
that if you can explain why you are more interested in an effect
in one direction and not the other direction, it is a good time to
use a one-tailed test. A plus is an improvement in power to
reject the null hypothesis if the null hypothesis is definitely
false. A more extensive null hypothesis with the ability to
detect unexpected results can be restricted when the null
hypothesis is not rejected. There is a higher level of trust; the
lower the level p-value the less plausible that the null
hypothesis is true. The one-tailed test is used where an
alternative hypothesis is more or less whereas a two-tailed test
is used when the researcher is attempting to avoid a type III
error. According to Privitera (2018), A basic explanation of how
SPSS is used to perform the calculations is to : go to the
analysis menu; compare means from drop down menu click one
sample t test from pop-up menu select the dependent variables
you want to test check arrow button to move variables into test
variables pain test box enter value compare to click ok etc.
imputing the data use frequencies tab will find the mean and
standard deviation. The two-tailed test can be found using
appendix c
Case Study 2: Data Breaches and Regulatory Requirements
Due Week 6 and worth 100 points
The National Institute of Standards and Technology (NIST)
provides an extensive amount of information, resources, and
guidance on IT and information security topics. The Federal
Information Security Management Act (FISMA) provides
standards and guidelines for establishing information security
within federal systems. However, there have been, and
continues to be, numerous security incidents including data
breaches within federal systems. Review the information about
FISMA at the NIST Website, located
at http://csrc.nist.gov/groups/SMA/fisma/index.html.
Additionally, review the information, located
at http://www.govtech.com/blogs/lohrmann-on-
cybersecurity/Dark-Clouds-Over-Technology-042212.html,
about the data breaches within government systems.
Select one (1) of the data breaches mentioned to conduct a case
analysis, or select another based on your research, and research
more details about that incident to complete the following
assignment requirements.
Write a three to five (3-5) page paper on your selected case in
which you:
1. Describe the data breach incident and the primary causes of
the data breach.
2. Analyze how the data breach could have been prevented with
better adherence to and compliance with regulatory
requirements and guidelines, including management controls;
include an explanation of the regulatory requirement (such as
from FISMA, HIPAA, or others).
3. Assess if there are deficiencies in the regulatory requirements
and whether they need to be changed, and how they need to be
changed, to mitigate further data breach incidents.
4. Use at least three (3) quality resources in this assignment.
Note: Wikipedia and similar Websites do not qualify as quality
resources.
Your assignment must follow these formatting requirements:
· This course requires use of new Student Writing Standards
(SWS). The format is different than other Strayer University
courses. Please take a moment to review the SWS
documentation for details.
· Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the source list are not included in the
required page length.
The specific course learning outcomes associated with this
assignment are:
· Describe legal compliance laws addressing public and private
institutions.
· Examine the principles requiring governance of information
within organizations.
· Use technology and information resources to research legal
issues in information security.
· Write clearly and concisely about information security legal
issues and topics using proper writing mechanics and technical
style conventions.
Assignment 3: Intellectual Property Laws and Security
Measures
Due Week 7 and worth 100 points
Intellectual property law is a major issue facing organizations,
and many organizations have been fined significant amounts for
violations of intellectual property law. As an information
security manager in an IT consulting company, your executive
management team is concerned about the potential intellectual
property violations in the organization. To address these
concerns, they have asked you to develop an intellectual
property policy to implement within the organization.
Develop a policy document in which you:
1. Provide an overview of intellectual property law.
2. Describe who the policy applies to.
3. Create policy, standards, and guidelines concerning:
a. Patents
b. Trademarks
c. Copyrights
d. Ownership of company material
4. Develop intellectual property violation reporting procedures.
5. Develop intellectual property infringement ramifications.
6. Use at least three quality resources in this
assignment. Note: Wikipedia and similar Websites do not
qualify as quality resources.
Your written paper must follow these formatting requirements:
This course requires use of new Student Writing Standards
(SWS). The format is different than other Strayer University
courses. Please take a moment to review the SWS
documentation for details.
(Note: You’ll be prompted to enter your Blackboard login
credentials to view these standards.)
. Your paper should include a cover page.
·
. Your paper should be of sufficient length to fully develop your
own ideas that address the items called for in the instructions,
and not be filled with “filler” information. Write clearly and
concisely.
. The paper should be double-spaced, 12-point font.
The specific course learning outcomes associated with this
assignment are:
· Analyze intellectual property laws.
· Use technology and information resources to research legal
issues in information security.
· Write clearly and concisely about information security legal
issues and topics using proper writing mechanics and technical
style conventions.
Assignment 2: Structural Modeling and Behavior Modeling
Due Week 6 and worth 120 points
Refer to the functional model you verified and validated for
ABS in the Week 4 assignment to complete this assignment.
Based on your performance, ABS management was so satisfied
that it wants you to develop both the structural and behavior
models. This way, ABS can fully understand both the
interaction that would take place between the users and the
system, and the system itself in greater detail.
Note: You may create and / or assume all necessary assumptions
needed for the completion of this assignment.
Write a four to five (4-5) page paper in which you:
1. Create Class-Responsibility-Collaboration (CRC) cards and a
class diagram based on the functional models through the use of
graphical tools in Microsoft Word or Visio, or an open source
alternative such as Dia. Note: The graphically depicted solution
is not included in the required page length.
2. Identify each use case in the functional model and create a
sequence and communication diagram for each scenario of each
use case identified through the use of graphical tools in
Microsoft Word or Visio, or an open source alternative such as
Dia. Note: The graphically depicted solution is not included in
the required page length.
3. Create a behavioral state machine for each of the complex
classes in the class diagram.
4. Perform a CRUDE analysis to show the interactivity of the
objects in the system.
5. Perform a verification and validation walk-through of
each:Revise the requirements document created in Assignment 1
with additional information found in this assignment and
document the assumptions.
1. Functional model
2. Structural model
3. Behavioral model
6.
7. Use at least three (3) quality resources in this
assignment. Note: Wikipedia and similar Websites do not
qualify as quality resources.
Your assignment must follow these formatting requirements:
· This course requires use of new Strayer Writing Standards
(SWS). The format is different from other Strayer University
courses. Please take a moment to review the SWS
documentation for details.
· Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow SWS or school-specific format. Check with your
professor for any additional instructions.
· Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
· Include charts or diagrams created in Visio or Dia. The
completed diagrams / charts must be imported into the Word
document before the paper is submitted.
The specific course learning outcomes associated with this
assignment are:
· Describe object-oriented modeling, structural modeling, and
behavioral modeling.
· Develop class diagram based on business scenarios.
· Use technology and information resources to research issues in
procuring and designing project requirements.
· Write clearly and concisely about project requirements and
design topics using proper writing mechanics and technical
style conventions.
Assignment 3: Design with UML
Due Week 7 and worth 120 points
Advanced Business Systems (ABS) is a consulting and staffing
company providing specialized staffing and consulting services
to clients in a variety of different industries. It has offices in
major U.S. metro areas and has ongoing relationships with
Fortune 500 companies. Its areas of services range from
software development and network engineering to geo-
information systems. It has fifty (50) plus regional offices in
U.S. and five (5) offices in Canada. It plans to expand to other
countries in the future.
When an ABS client company determines that it will need a
contractor or temporary professional, it issues a staffing request
against the contract it had previously negotiated with ABS. The
contract manager in ABS reviews the staff request and ensures
that the request is valid with its current contract with its client
from the database.
· If the request is not valid, the contract manager sends the
staffing request back to the client and explains the reasons and
asks for the need for starting a new contract.
· If the request is valid, the contract manager will start
recruiting requests by putting the request into its staffing
database. The staffing request is then sent to ABS placement
department.
In the placement department, the placement specialists will
check the job requirements and candidates qualifications.
· If there is a qualified candidate, the specialist will notify the
candidate and put a note in the database.
· If a qualified candidate cannot be found or not immediately
available, the specialist notifies contract managers and
recruiting department; the recruiting department starts search
outside immediately.
The recruiting department normally has thirty (30) days to find
an outside candidate and send the qualified candidates to the
placement department to review. If an internal qualified
candidate is confirmed with his / her availability, the
confirmation will be sent to the arrangement department. In the
arrangement department, the candidate works with the
specialists to further confirm the placement details, such as
starting date, location, compensation (e.g., per diem), and travel
arrangement. The final confirmation will be sent to the client
along with a billing schedule. If the client agrees with the
arrangement, he/she acknowledges the arrangement with
contract managers in the contract department. The contract
manager then puts a memo into its database and closes the
request.
Note: You may create and / or assume all necessary assumptions
needed for the completion of this assignment.
Write a three to four (3-4) page paper in which you:
1. Create a package diagram of the problem domain layer using
the communication diagrams and the CRUDE matrix through the
use of graphical tools in Microsoft Word or Visio, or an open
source alternative such as Dia. Note: The graphically depicted
solution is not included in the required page length.
2. Perform and explain the verification and validation walk-
through of the package diagram.
3. Create a set of invariants for attributes and relationships and
add them to the CRC cards for each class in the structural model
using Object Constraint Language (OCL).
4. List the classes in the structure model. Choose one (1) class
and create a contract for each method in that class. Note: Be
sure to use OCL to specify the preconditions and the post
conditions.
5. Create a method specification for each method using both
structured English and activity diagram for the algorithm
specification through the use of graphical tools in Microsoft
Word or Visio, or an open source alternative such as Dia. Note:
The graphically depicted solution is not included in the required
page length.
6. Use at least two (2) quality resources in this
assignment. Note: Wikipedia and similar Websites do not
qualify as quality resources.
Your assignment must follow these formatting requirements:
· This course requires use of new Strayer Writing Standards
(SWS). The format is different from other Strayer University
courses. Please take a moment to review the SWS
documentation for details.
· Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow SWS or school-specific format. Check with your
professor for any additional instructions.
· Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
· Include charts or diagrams created in Visio or Dia. The
completed diagrams / charts must be imported into the Word
document before the paper is submitted.
The specific course learning outcomes associated with this
assignment are:
· Determine the steps and principles of design modeling with
UML.
· Document and describe the different state of objects
throughout the life cycle.
· Use technology and information resources to research issues in
procuring and designing project requirements.
· Write clearly and concisely about project requirements and
design topics using proper writing mechanics and technical
style conventions.
Discussions (around 200 words each)
1
"Data Breach Notification" Please respond to the following:
Data breach laws have made us more aware of how our PII and
other corporate data is compromised in recent years.
Intellectual property is often the target of attacks from foreign
entities and even governments. Banks don’t like people to
know how much money is stolen annually by hackers; despite
their best efforts to prevent such theft. Discuss your thoughts
on the subjects mentioned here based on your learning from this
week.
2
"Online Contracts" Please respond to the following:
Online contracts are becoming ubiquitous these days. They’re
sometimes signed online even in face-to-face meetings between
parties. Based on your study this week, what are some pitfalls
you previously didn’t know? Describe an online contract or
end-user license agreement you signed that made you think. Do
you ever agree to things without fully reading them, even when
the signature block says, “I have read and understand”? What
do you think about this now that you have learned about online
contracts?
3
"Policies, Standards, Procedures, and Guidelines" Please
respond to the following:
This week you studied policies, standards, procedures and
guidelines. If you were the project leader at a small company
being spun off from a larger company, how would you tackle
the task of adapting your company’s policies regarding
information security? What are some of your greatest
concerns? What rules are you likely to keep and which won’t
really apply? Remember to keep a balance. You don’t want the
employees to be so locked down by rules that they can’t
efficiently do their jobs.
4
Object-Oriented Design" Please respond to the following:
· Select an organization that you are familiar with and
determine the most advantageous benefits of using object-
oriented design in this organization and state why. In addition,
explain the places within this organization that object-oriented
design is not advantageous.
5
"Data Management Layer Design" Please respond to the
following:
· Recommend one to two (1-2) methods to reduce space
consumption and increase performance for object-oriented
database. Provide a rationale for your recommendations.
6
"Cloud Computing" Please respond to the following:
· Identify the main challenges for provisioning the physical
architecture layer with cloud technologies. Additionally,
recommend methods to mitigate those challenges.
Answer questions Minimum 100 words each and reference (questions.docx

More Related Content

PDF
09 ch ken black solution
PPTX
pratik meshram-Unit 4 contemporary marketing research full notes pune univers...
PPTX
UNIT 4 PPT.pptx
PPTX
Hypothesis testing
DOCX
Hypothesis Testing Definitions A statistical hypothesi.docx
PPTX
educ201.pptx
DOCX
Hypothesis testing
PPTX
Introduction-to-Hypothesis-Testing Explained in detail
09 ch ken black solution
pratik meshram-Unit 4 contemporary marketing research full notes pune univers...
UNIT 4 PPT.pptx
Hypothesis testing
Hypothesis Testing Definitions A statistical hypothesi.docx
educ201.pptx
Hypothesis testing
Introduction-to-Hypothesis-Testing Explained in detail

Similar to Answer questions Minimum 100 words each and reference (questions.docx (20)

DOCX
Hypothesis TestingThe Right HypothesisIn business, or an.docx
PPTX
TEST-OF-HYPOTHESIS for practical research 2 for grade 11 stem
DOCX
NORMAN, ELTON_BTM7303-12-82NORMAN, ELTON_BTM7303-12-81.docx
PDF
Samle size
PDF
Types of Research in research methodology.pdf
PDF
Solution Manual for Abnormal Psychology Ninth Edition by Ronald J. Comer
PPTX
Sample size calculation
PPTX
WF ED 540 Hypothesis Testing - 2018
DOCX
Page 266LEARNING OBJECTIVES· Explain how researchers use inf.docx
PDF
Solution Manual for Abnormal Psychology Ninth Edition by Ronald J. Comer
PPTX
1.1 statistical and critical thinking
PPTX
PPT.4.pptx..............................
PPT
How to read a paper
PDF
Solution Manual for Abnormal Psychology Ninth Edition by Ronald J. Comer
PDF
2020040608310264546184c6.pdf
DOCX
Between Black and White Population1. Comparing annual percent .docx
PPTX
Data analysis powerpoint
DOCX
· On the basis of what you learned in the readings, define the t
PDF
Solution Manual for Abnormal Psychology Ninth Edition by Ronald J. Comer
PDF
Essay On Juvenile Incarceration
Hypothesis TestingThe Right HypothesisIn business, or an.docx
TEST-OF-HYPOTHESIS for practical research 2 for grade 11 stem
NORMAN, ELTON_BTM7303-12-82NORMAN, ELTON_BTM7303-12-81.docx
Samle size
Types of Research in research methodology.pdf
Solution Manual for Abnormal Psychology Ninth Edition by Ronald J. Comer
Sample size calculation
WF ED 540 Hypothesis Testing - 2018
Page 266LEARNING OBJECTIVES· Explain how researchers use inf.docx
Solution Manual for Abnormal Psychology Ninth Edition by Ronald J. Comer
1.1 statistical and critical thinking
PPT.4.pptx..............................
How to read a paper
Solution Manual for Abnormal Psychology Ninth Edition by Ronald J. Comer
2020040608310264546184c6.pdf
Between Black and White Population1. Comparing annual percent .docx
Data analysis powerpoint
· On the basis of what you learned in the readings, define the t
Solution Manual for Abnormal Psychology Ninth Edition by Ronald J. Comer
Essay On Juvenile Incarceration
Ad

More from amrit47 (20)

DOCX
APA, The assignment require a contemporary approach addressing Race,.docx
DOCX
APA style and all questions answered ( no min page requirements) .docx
DOCX
Apa format1-2 paragraphsreferences It is often said th.docx
DOCX
APA format2-3 pages, double-spaced1. Choose a speech to review. It.docx
DOCX
APA format  httpsapastyle.apa.orghttpsowl.purd.docx
DOCX
APA format2-3 pages, double-spaced1. Choose a speech to review. .docx
DOCX
APA Formatting AssignmentUse the information below to create.docx
DOCX
APA style300 words10 maximum plagiarism  Mrs. Smith was.docx
DOCX
APA format1. What are the three most important takeawayslessons.docx
DOCX
APA General Format Summary APA (American Psychological.docx
DOCX
Appearance When I watched the video of myself, I felt that my b.docx
DOCX
apa format1-2 paragraphsreferencesFor this week’s .docx
DOCX
APA Format, with 2 references for each question and an assignment..docx
DOCX
APA-formatted 8-10 page research paper which examines the potential .docx
DOCX
APA    STYLE 1.Define the terms multiple disabilities and .docx
DOCX
APA STYLE  follow this textbook answer should be summarize for t.docx
DOCX
APA7Page length 3-4, including Title Page and Reference Pag.docx
DOCX
APA format, 2 pagesThree general sections 1. an article s.docx
DOCX
APA Style with minimum of 450 words, with annotations, quotation.docx
DOCX
APA FORMAT1.  What are the three most important takeawayslesson.docx
APA, The assignment require a contemporary approach addressing Race,.docx
APA style and all questions answered ( no min page requirements) .docx
Apa format1-2 paragraphsreferences It is often said th.docx
APA format2-3 pages, double-spaced1. Choose a speech to review. It.docx
APA format  httpsapastyle.apa.orghttpsowl.purd.docx
APA format2-3 pages, double-spaced1. Choose a speech to review. .docx
APA Formatting AssignmentUse the information below to create.docx
APA style300 words10 maximum plagiarism  Mrs. Smith was.docx
APA format1. What are the three most important takeawayslessons.docx
APA General Format Summary APA (American Psychological.docx
Appearance When I watched the video of myself, I felt that my b.docx
apa format1-2 paragraphsreferencesFor this week’s .docx
APA Format, with 2 references for each question and an assignment..docx
APA-formatted 8-10 page research paper which examines the potential .docx
APA    STYLE 1.Define the terms multiple disabilities and .docx
APA STYLE  follow this textbook answer should be summarize for t.docx
APA7Page length 3-4, including Title Page and Reference Pag.docx
APA format, 2 pagesThree general sections 1. an article s.docx
APA Style with minimum of 450 words, with annotations, quotation.docx
APA FORMAT1.  What are the three most important takeawayslesson.docx
Ad

Recently uploaded (20)

PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
Classroom Observation Tools for Teachers
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
Indian roads congress 037 - 2012 Flexible pavement
PPTX
Introduction to Building Materials
PPTX
Lesson notes of climatology university.
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
1_English_Language_Set_2.pdf probationary
PDF
Trump Administration's workforce development strategy
LDMMIA Reiki Yoga Finals Review Spring Summer
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Supply Chain Operations Speaking Notes -ICLT Program
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Classroom Observation Tools for Teachers
Final Presentation General Medicine 03-08-2024.pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
Weekly quiz Compilation Jan -July 25.pdf
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Indian roads congress 037 - 2012 Flexible pavement
Introduction to Building Materials
Lesson notes of climatology university.
Paper A Mock Exam 9_ Attempt review.pdf.
A powerpoint presentation on the Revised K-10 Science Shaping Paper
1_English_Language_Set_2.pdf probationary
Trump Administration's workforce development strategy

Answer questions Minimum 100 words each and reference (questions.docx

  • 1. Answer questions Minimum 100 words each and reference (questions #1-2) KEEP questions WITH ANSWER 1. A key point to get out of this topic is the idea that these errors are theoretical. You won't be sure as to whether one occurred or not. Why are they theoretical in nature? Hint: think about a study and knowing the "truth" 2. Pick a study of interest and identify the null and alternative hypothesis. How does this fit in with regards to the topic of a type I and type II error? Always keep this in mind when you are trying to identify what a type I and type II error are. A minimum of 75 words each question and References (IF NEEDED)(Response #1 – 7) KEEP RESPONSE WITH ANSWER Make sure the Responses includes the Following: (a) an understanding of the weekly content as supported by a scholarly resource, (b) the provision of a probing question. (c) stay on topic 1) According to the reading, we set the alpha which is the largest probability for type I error. To increase the power of a hypothesis researchers can use larger samples which provides more information and raise the significance level which increases the probability that the hypothesis will be rejected. 2) A Type 1 error occurs when individuals involved in research make the decision to reject the belief of truth when in actuality the hypothesis is true. Type 1 errors are errors in research when the researcher makes the wrong decision to reject a true null hypothesis. Type II errors are considered less of a problem than Type 1 errors, but can prove to be detrimental in the field of medicine. This type of error occurs when researchers decide to keep a false null hypothesis, when in fact the hypothesis is true. The method to avoid making Type 1 decisions is to test the null
  • 2. hypothesis at the highest level (Alpha Level). This will lessen the possibilities of making this type of error (Privitera, 2018). 3) According to Privitera (2018) a type 1 error is the probability of rejecting a null hypotheses that is actually true, researchers purposely make this error. A null hypotheses is a statement about a population parameter that is assumed to be true, this hypotheses is a starting point (Privitera, 2018). The type 2 error or beta error is the probability of retaining a null hypotheses that is actually false (Privitera, 2018). The type 1 error is committed when a researcher decides to reject previous notions of truth that are in fact true (Privitera, 2018). The best way to avoid these types of errors is to be open minded and not reject notions if there is fact to back the notions up. In my opinion a type 1 error is something committed with bias by the researcher. I say this because as a researcher it is their job to find all facts or at least most all facts and apply them to their study or research, especially if they commit a type one error knowingly. If a researcher does this error then they are not following through with basic research guidelines. 4) A one-tailed test is used in a hypothesis test where the alternative hypothesis is stated as either (>) or (<). When a researcher is interested in a specific alternative to the null hypothesis. A two-tailed test is used when one wants to avoid making a type III error. An error that occurs when one accepts a null hypothesis that is incorrect because the the rejection region of the tail was on the opposite end. SPSS can be used to compute the calculations for each by imputing data in to a new data chart and then using the frequencies tab to help solve for the mean and standard deviation. From there one can use appendix c. to solve for the two-tails. (Privitera., G. J., 2018). 5) We use the one-tailed test when we need to check or test the claim or hypothesis which is directional in nature. This means if the alternative hypothesis of the test includes ‘less than’ or ‘greater than’, then we use one-tailed tests. We use the two- tailed test when we need to check or test the claim or hypothesis which is non-directional in nature (Privitera., G. J., 2018). That
  • 3. is, if the alternative hypothesis of the test includes ‘not equal to’, then we use two-tailed tests. When we perform one-tailed tests and two-tailed test by using SPSS, then we need to use some setting or calculations. For most of the tests, SPSS provides the results for the two-tailed test as a default. Most of the times, SPSS do not provide results for one-tailed tests and in such cases, we need to calculate the p-value from this output. Examples of one tailed and two tailed test is given as below: H0: µ = 10 v/s Ha: µ < 10 (One tailed /lower tailed /left tailed /directional test) H0: µ = 10 v/s Ha: µ > 10 (One tailed /upper tailed /right tailed /directional test) H0: µ = 10 v/s Ha: µ ≠ 10 (two tailed /non-directional test) 6) In the Type 1 error and Type 2 error, in this two types of errors that exist in a hypothesis testing of Type 1 and Type 2. In Type 1 and Type 2 that occur in when the null hypothesis is true but is still being rejected. In being able to use the following example from a law case, this is equivalent of convicting an innocent man or individual. In the statistics or research types of errors in types think that he or she has a significant difference, when there is actually no significant differences in the types of errors. A Type 2 error occurs when null hypothesis is false but not rejected, which is equivalent of acquiring a guilty man or individual. This is where the researchers actually has a significant difference but does not realize it. Many examples are generated in the Type 1 and Type 2 that allows the researcher to understand and generate this hypothesis. In the law, example that is a matter of opinion and often depends on the nature of the time and associated in the factor that generates the punishment for the individual that committed the crime. That is why it is important to understand the meaning, understanding and hypothesis of this type 1 and type 2 significant of errors. In the statistics, replication of studies will reduce the chance that an artifact appears significant when it is not. In one type of error is eliminated and
  • 4. there is a very good chance of the other occurring. In the chance of both types of errors cannot be eliminated. There are many factors that allows the reseacher to come up with this type of hypothesis that allows them too see and understand this type 1 and type 2 errors. 7) After researching and exploring this question, it is my belief that if you can explain why you are more interested in an effect in one direction and not the other direction, it is a good time to use a one-tailed test. A plus is an improvement in power to reject the null hypothesis if the null hypothesis is definitely false. A more extensive null hypothesis with the ability to detect unexpected results can be restricted when the null hypothesis is not rejected. There is a higher level of trust; the lower the level p-value the less plausible that the null hypothesis is true. The one-tailed test is used where an alternative hypothesis is more or less whereas a two-tailed test is used when the researcher is attempting to avoid a type III error. According to Privitera (2018), A basic explanation of how SPSS is used to perform the calculations is to : go to the analysis menu; compare means from drop down menu click one sample t test from pop-up menu select the dependent variables you want to test check arrow button to move variables into test variables pain test box enter value compare to click ok etc. imputing the data use frequencies tab will find the mean and standard deviation. The two-tailed test can be found using appendix c Case Study 2: Data Breaches and Regulatory Requirements Due Week 6 and worth 100 points The National Institute of Standards and Technology (NIST) provides an extensive amount of information, resources, and guidance on IT and information security topics. The Federal Information Security Management Act (FISMA) provides standards and guidelines for establishing information security within federal systems. However, there have been, and
  • 5. continues to be, numerous security incidents including data breaches within federal systems. Review the information about FISMA at the NIST Website, located at http://csrc.nist.gov/groups/SMA/fisma/index.html. Additionally, review the information, located at http://www.govtech.com/blogs/lohrmann-on- cybersecurity/Dark-Clouds-Over-Technology-042212.html, about the data breaches within government systems. Select one (1) of the data breaches mentioned to conduct a case analysis, or select another based on your research, and research more details about that incident to complete the following assignment requirements. Write a three to five (3-5) page paper on your selected case in which you: 1. Describe the data breach incident and the primary causes of the data breach. 2. Analyze how the data breach could have been prevented with better adherence to and compliance with regulatory requirements and guidelines, including management controls; include an explanation of the regulatory requirement (such as from FISMA, HIPAA, or others). 3. Assess if there are deficiencies in the regulatory requirements and whether they need to be changed, and how they need to be changed, to mitigate further data breach incidents. 4. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: · This course requires use of new Student Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details. · Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the source list are not included in the required page length.
  • 6. The specific course learning outcomes associated with this assignment are: · Describe legal compliance laws addressing public and private institutions. · Examine the principles requiring governance of information within organizations. · Use technology and information resources to research legal issues in information security. · Write clearly and concisely about information security legal issues and topics using proper writing mechanics and technical style conventions. Assignment 3: Intellectual Property Laws and Security Measures Due Week 7 and worth 100 points Intellectual property law is a major issue facing organizations, and many organizations have been fined significant amounts for violations of intellectual property law. As an information security manager in an IT consulting company, your executive management team is concerned about the potential intellectual property violations in the organization. To address these concerns, they have asked you to develop an intellectual property policy to implement within the organization. Develop a policy document in which you: 1. Provide an overview of intellectual property law. 2. Describe who the policy applies to. 3. Create policy, standards, and guidelines concerning: a. Patents b. Trademarks c. Copyrights d. Ownership of company material 4. Develop intellectual property violation reporting procedures. 5. Develop intellectual property infringement ramifications. 6. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
  • 7. Your written paper must follow these formatting requirements: This course requires use of new Student Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details. (Note: You’ll be prompted to enter your Blackboard login credentials to view these standards.) . Your paper should include a cover page. · . Your paper should be of sufficient length to fully develop your own ideas that address the items called for in the instructions, and not be filled with “filler” information. Write clearly and concisely. . The paper should be double-spaced, 12-point font. The specific course learning outcomes associated with this assignment are: · Analyze intellectual property laws. · Use technology and information resources to research legal issues in information security. · Write clearly and concisely about information security legal issues and topics using proper writing mechanics and technical style conventions. Assignment 2: Structural Modeling and Behavior Modeling Due Week 6 and worth 120 points Refer to the functional model you verified and validated for ABS in the Week 4 assignment to complete this assignment. Based on your performance, ABS management was so satisfied that it wants you to develop both the structural and behavior models. This way, ABS can fully understand both the interaction that would take place between the users and the system, and the system itself in greater detail. Note: You may create and / or assume all necessary assumptions
  • 8. needed for the completion of this assignment. Write a four to five (4-5) page paper in which you: 1. Create Class-Responsibility-Collaboration (CRC) cards and a class diagram based on the functional models through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length. 2. Identify each use case in the functional model and create a sequence and communication diagram for each scenario of each use case identified through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length. 3. Create a behavioral state machine for each of the complex classes in the class diagram. 4. Perform a CRUDE analysis to show the interactivity of the objects in the system. 5. Perform a verification and validation walk-through of each:Revise the requirements document created in Assignment 1 with additional information found in this assignment and document the assumptions. 1. Functional model 2. Structural model 3. Behavioral model 6. 7. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: · This course requires use of new Strayer Writing Standards (SWS). The format is different from other Strayer University courses. Please take a moment to review the SWS documentation for details. · Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references
  • 9. must follow SWS or school-specific format. Check with your professor for any additional instructions. · Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. · Include charts or diagrams created in Visio or Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted. The specific course learning outcomes associated with this assignment are: · Describe object-oriented modeling, structural modeling, and behavioral modeling. · Develop class diagram based on business scenarios. · Use technology and information resources to research issues in procuring and designing project requirements. · Write clearly and concisely about project requirements and design topics using proper writing mechanics and technical style conventions. Assignment 3: Design with UML Due Week 7 and worth 120 points Advanced Business Systems (ABS) is a consulting and staffing company providing specialized staffing and consulting services to clients in a variety of different industries. It has offices in major U.S. metro areas and has ongoing relationships with Fortune 500 companies. Its areas of services range from software development and network engineering to geo- information systems. It has fifty (50) plus regional offices in U.S. and five (5) offices in Canada. It plans to expand to other countries in the future. When an ABS client company determines that it will need a contractor or temporary professional, it issues a staffing request against the contract it had previously negotiated with ABS. The contract manager in ABS reviews the staff request and ensures that the request is valid with its current contract with its client
  • 10. from the database. · If the request is not valid, the contract manager sends the staffing request back to the client and explains the reasons and asks for the need for starting a new contract. · If the request is valid, the contract manager will start recruiting requests by putting the request into its staffing database. The staffing request is then sent to ABS placement department. In the placement department, the placement specialists will check the job requirements and candidates qualifications. · If there is a qualified candidate, the specialist will notify the candidate and put a note in the database. · If a qualified candidate cannot be found or not immediately available, the specialist notifies contract managers and recruiting department; the recruiting department starts search outside immediately. The recruiting department normally has thirty (30) days to find an outside candidate and send the qualified candidates to the placement department to review. If an internal qualified candidate is confirmed with his / her availability, the confirmation will be sent to the arrangement department. In the arrangement department, the candidate works with the specialists to further confirm the placement details, such as starting date, location, compensation (e.g., per diem), and travel arrangement. The final confirmation will be sent to the client along with a billing schedule. If the client agrees with the arrangement, he/she acknowledges the arrangement with contract managers in the contract department. The contract manager then puts a memo into its database and closes the request. Note: You may create and / or assume all necessary assumptions needed for the completion of this assignment. Write a three to four (3-4) page paper in which you: 1. Create a package diagram of the problem domain layer using the communication diagrams and the CRUDE matrix through the use of graphical tools in Microsoft Word or Visio, or an open
  • 11. source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length. 2. Perform and explain the verification and validation walk- through of the package diagram. 3. Create a set of invariants for attributes and relationships and add them to the CRC cards for each class in the structural model using Object Constraint Language (OCL). 4. List the classes in the structure model. Choose one (1) class and create a contract for each method in that class. Note: Be sure to use OCL to specify the preconditions and the post conditions. 5. Create a method specification for each method using both structured English and activity diagram for the algorithm specification through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length. 6. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: · This course requires use of new Strayer Writing Standards (SWS). The format is different from other Strayer University courses. Please take a moment to review the SWS documentation for details. · Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions. · Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. · Include charts or diagrams created in Visio or Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.
  • 12. The specific course learning outcomes associated with this assignment are: · Determine the steps and principles of design modeling with UML. · Document and describe the different state of objects throughout the life cycle. · Use technology and information resources to research issues in procuring and designing project requirements. · Write clearly and concisely about project requirements and design topics using proper writing mechanics and technical style conventions. Discussions (around 200 words each) 1 "Data Breach Notification" Please respond to the following: Data breach laws have made us more aware of how our PII and other corporate data is compromised in recent years. Intellectual property is often the target of attacks from foreign entities and even governments. Banks don’t like people to know how much money is stolen annually by hackers; despite their best efforts to prevent such theft. Discuss your thoughts on the subjects mentioned here based on your learning from this week. 2 "Online Contracts" Please respond to the following: Online contracts are becoming ubiquitous these days. They’re sometimes signed online even in face-to-face meetings between parties. Based on your study this week, what are some pitfalls you previously didn’t know? Describe an online contract or end-user license agreement you signed that made you think. Do you ever agree to things without fully reading them, even when the signature block says, “I have read and understand”? What do you think about this now that you have learned about online
  • 13. contracts? 3 "Policies, Standards, Procedures, and Guidelines" Please respond to the following: This week you studied policies, standards, procedures and guidelines. If you were the project leader at a small company being spun off from a larger company, how would you tackle the task of adapting your company’s policies regarding information security? What are some of your greatest concerns? What rules are you likely to keep and which won’t really apply? Remember to keep a balance. You don’t want the employees to be so locked down by rules that they can’t efficiently do their jobs. 4 Object-Oriented Design" Please respond to the following: · Select an organization that you are familiar with and determine the most advantageous benefits of using object- oriented design in this organization and state why. In addition, explain the places within this organization that object-oriented design is not advantageous. 5 "Data Management Layer Design" Please respond to the following: · Recommend one to two (1-2) methods to reduce space consumption and increase performance for object-oriented database. Provide a rationale for your recommendations. 6 "Cloud Computing" Please respond to the following: · Identify the main challenges for provisioning the physical architecture layer with cloud technologies. Additionally, recommend methods to mitigate those challenges.