Free Essay

Mm250 Unit 3

In: Other Topics

Submitted By Jkov
Words 810
Pages 4
Unit 3: Probability and Counting Rules - Assignment

Total points for Assignment: 35 points.

Assignments must be submitted as a Microsoft Word document and uploaded to the Dropbox for Unit 3.
All Assignments are due by Tuesday at 11:59 PM ET of the assigned Unit.
NOTE: Assignment problems should not be posted to the Discussion threads. Questions on the Assignment problems should be addressed to the instructor by sending an email or by attending office hours.
You must show your work on all problems. If a problem is worth 2 points and you only show the answer, then you will receive only 1 point credit. If you use a calculator or online website, give the source and tell me exactly what you provided as input. For example, if you used Excel to compute 16 * 16, tell me “I typed =16*16 into Excel and got 256. You may type your answer right into this document.

Part I. Basic Computations
1. A restauraunt offers the following limited lunch menu:
|Main Course |Vegetables |Beverages |Desserts |
|Ham |Potatoes |Coffee |Cake |
|Chicken |Peas |Tea |Pie |
|Fish |Salad |Milk |Ice Cream |
|Veggie Burger | |Soda | |

a. (2 points) If one item is selected from each of the four groups, how many different meals can you order? Answer: Explanation: b. (2 point) If you don’t order a dessert, how does your answer change? Answer: Explanation:

2. According to the American FactFinder website[1] there were 197.8 million adults over the age of 25 in the United States in 2007. The table below shows the educational attainment for these adults. Use the data in the table, expressed in millions, to solve the following problems.
| |Less than |Some High School |H.S. |
| |9th grade | |Graduate |
|Kelly |Female |Specialist |Married |
|Andrea |Female |Attorney |Single |
|Ashley |Female |Associate |Single |
|Bruce |Male |Attorney-Partner |Single |
|Serge |Male |Specialist |Married |
|Karen |Female |Paralegal |Single |
|Amy |Female |Specialist |Married |
|Marion |Female |Attorney |Single |
|James |Male |Attorney-Partner |Married |
|Janice |Female |Specialist |Married |
|Lori |Female |Associate |Single |
|Timothy |Male |Associate |Married |
|Robert |Male |Attorney-Partner |Single |
|Mary |Female |Paralegal |Married |
|Eric |Male |Attorney-Partner |Single |
|Stephanie |Female |Attorney-Partner |Single |
|Dana |Female |Associate |Married |
|Joseph |Male |Associate |Married |
|Kathleen |Female |Attorney |Single |
|Carissa |Female |Associate |Single |
|Don |Male |Specialist |Married |
|Michael |Male |Attorney-Partner |Married |
|Anne |Female |Specialist |Single |
|Scott |Male |Attorney-Partner |Single |
|William |Male |Associate |Married |
|John |Male |Attorney |Married |
|Penny |Female |Associate |Single |
|Elaine |Female |Specialist |Single |
|Daniel |Male |Associate |Married |
|Justin |Male |Attorney |Married |

Task #1: In your first meeting with the writers, they show you the list of the character sketches for the employees that work at the law practice.

The writers think that the male embezzler should be one of the partners of the law firm, indicated in this list by “Attorney-Partner”. For the female embezzler, they have chosen someone who is listed as a “Specialist”. Specialists are employees of the firm who offer subject-matter expertise in specific areas such as real estate or accounting.

a. (4 points) How many different choices do we have for the male/female team of embezzlers?
[Remember: both members of the team are married.]

Answer:
Explanation:

b. (4 points) How would this answer be different if the 2 members of the male/female team don’t have to be married? In other words, they could be either single or married.

Answer:
Explanation:

Task #2: (4 points) The writers want to include an accomplice in the story – that would be someone else in the firm who knew that the pair were stealing from the company.

If the accomplice is selected at random from the remaining employees, what is the probability that the accomplice is female?

Answer:
Explanation:

Task #3 (8 points) – Who should be the “whistle-blower”?

The writers of the show have asked you to think of a “plot-twist” that can be solved using probability. For example, let’s say that someone claims that there’s a 50% chance that the “Attorney-Partner” embezzler is male but that would only be the case if there were an equal number of males and females.

Using the evidence from above and what you have learned about probability, in a well-structured essay, present a problem and its solution. Be creative!!

Answer:

Requirements - Write your essay in this document – do not save it in a separate file. - You must clearly state your position in 2-3 well-structured paragraphs using proper grammar, spelling, and sentence structure. - This is not an “opinion” question – you must offer evidence from the data or your knowledge of probability. - Don’t forget to explain how the problem can be solved with probability. (Remember, the script writers haven’t taken this class yet).
-----------------------
[1] American FactFinder - 2006-2008 American Community Survey 3-Year Estimates. (2010). Retrieved September 22, 2010 from U.S. Census Bureau, United States - Educational Attainment: http://factfinder.census.gov.…...

Similar Documents

Free Essay

Unit 3

...NT 1430 UNIT 3 Bash Scripts: * Script –commands written to a file. * Bash- a command processor a Unix shell Bash History: It was written by a man called Brian Fox. It was part of the GNU Project. The first release was 1989. It was a improvement and replacement to something called the Borne shell The Borne Shell: The creator was Stephen Borne. His employer was AT&T Labs. It was a Unix Shell he developed for Unix 7. Like everything it was replacing a older program called Thompson shell. The Borne Again Shell: Bash Borne Again Shell A free replacement to Borne shell Commands in Linux Mkdir- Make Directory rmdir- remove directory cd- Change directory Mv- Change name move directory Pwd – print working directory chmode-Change file access Permissions Commands are what tell Linux what to do. Chapter 7: 1. It waits for the process to be finished. You can give it multiple commands it will execute them in order. 3.Process Identification Number, The numbers tell you what commands are running in the background. Type ps 4. a. $ls section* b. $ls section[1-3] $ ls section? c. $ls I* d.$ls *[13] 8. a. $ grep \$ID < * .c > id_list b. $ grep –I suzi < addresses c. $ grep –il memo *.txt > memoranda_files D. $ file /usr/bin*|grep “Again shell script” | sort –r Chapter 9 1. You get permission denied, Not executable search though path 2. With ...

Words: 363 - Pages: 2

Premium Essay

Unit 3

...UNIT 3 INDIVIDUAL PROJECT MKTG205 – Principles of Marketing by Kendra M Hutchins AIU Online October 21 2012 Going into business is good only if you sell your product. In order to sell your product, you have to make your product available to consumers. With making your product available, you need a distribution plan established. There are different channel levels and organizations. You also have to analyze your target market's needs and decide which channel members you will use. There are many characteristics you will have to look at before you choose a channel organization. Either choice will be good, as long as management decides on what is best for the company. First, our coffee company has to set up its distribution channels. Management has to look at direct versus and indirect distribution. Direct distribution is defined as a, “model used by organizations to move products from production to buyer without the use of wholesalers and retailers. By eliminating the number of parties involved in the distribution process, significant savings can be realized. An organization using direct distribution must sell and distribute that product using their own warehouses and sales staff.” ( www.businessdictionary.com) Direct is a good option for our new coffee company because we can lower or cost of distribution. We will need to keep our cost under our budget. Indirect distribution on the other hand is when, “a chain of intermediaries through which a product......

Words: 931 - Pages: 4

Free Essay

Unit 3

...David Sahler 7/18/2013 Unit 3. Exercise 1 specifications definitions Application- a system, the transmission method of which is supported by telecommunications cabling, such as 100Base-TX Ethernet, or digital voice. Unshielded Twisted-Pair - (UTP) a popular type of cable that consists of two unshielded wires twisted around each other. Shielded Twisted-Pair- Twisted pair cabling is a type of wiring in which two conductors (the forward and return conductors of a single circuit) are twisted Fiber-Optic Cable- a cable made of optical fibers that can transmit large amounts of information at the speed of light. Dark Fiber- Dark fiber or unlit fiber (or fiber) is unused optical fibers, available for use in fiber-optic communications Coaxial Cable- a transmission line for high-frequency signals Plenum- A space completely filled with matter Riser- a space for indoor cables that allow cables to pass between floors, normally a vertical shaft or space Ripcord- a length of string built into optical fiber cables that is pulled to split the outer jacket of the cable without using a blade. Core- the central part of a single optical fiber in which the light signal is transmitted. Attenuation- A general term indicating a decrease in power from one point to another Noise- In a cable or circuit, any extraneous signal that interferes with the desired signal normally present in or passing through the system Headroom- the number of decibels by which a system exceeds the minimum......

Words: 370 - Pages: 2

Premium Essay

Mm250 Kaplan Unit 3

...Unit 3: Probability and Counting Rules - Assignment Total points for Assignment: 35 points. Assignments must be submitted as a Microsoft Word document and uploaded to the Dropbox for Unit 3. All Assignments are due by Tuesday at 11:59 PM ET of the assigned Unit. NOTE: Assignment problems should not be posted to the Discussion threads. Questions on the Assignment problems should be addressed to the instructor by sending an email or by attending office hours. You must show your work on all problems. If a problem is worth 2 points and you only show the answer, then you will receive only 1 point credit. If you use a calculator or online website, give the source and tell me exactly what you provided as input. For example, if you used Excel to compute 16 * 16, tell me “I typed =16*16 into Excel and got 256. You may type your answer right into this document. Part I. Basic Computations 1. A restauraunt offers the following limited lunch menu: |Main Course |Vegetables |Beverages |Desserts | |Ham |Potatoes |Coffee |Cake | |Chicken |Peas |Tea |Pie | |Fish |Salad |Milk ...

Words: 1564 - Pages: 7

Premium Essay

Unit 3

...Kaplan University Tammy Landry Unit 3 Assignment Zelma M. Mitchell v. Lovington Good Samaritan Center, Inc. 555 P.2d 696 New Mexico Supreme Court (1976) CASE NAME: Zelma M. Mitchell v. Lovington Good Samaritan Center, Inc., 555 P.2d 696 New Mexico Supreme Court (1976) FACTS: Mrs. Zelma Mitchell started working at the Lovington Good Samaritan Center, Inc. as a nurse’s aide in 1972. Approximately one year on the job Mitchell began serving as a relief medications nurse two (2) days a week. Mitchell was terminated for misconduct. Mitchell’s testimony stated that she punctually arrived to work at 3:00 p.m. She stated that the Director of the Center questioned as to why she had filled out her time card. Mitchell responded that she would be working eight (8) hours for the day as long as she did not “break a leg or die.” The Director responded “Well, I’m not so sure about that.” Mitchell became defensive and made comments where the Director of Nursing overheard. This causing words to be exchanged between the three (3) parties in an open area where others could hear. The issue was taken for further discussion behind closed doors. The Director of the Center had to resolve the issue by putting Mitchell on two (2) week probation on the grounds that Mitchell had used the phrase to describe her employers “a birdbrain against another birdbrain” and stating “she can’t work with us”. Immediately, Mitchell......

Words: 687 - Pages: 3

Premium Essay

Unit 3

...Ruby Blanco AC503 Kaplan University Unit 3: Homework Assignment 5-29 1. Valuation or Allocation 2. Rights and Obligations 3. Completeness 4. Presentation and Disclosures 5. Rights and Obligations 6. Valuation or Allocation 7. Completeness 8. Rights and Obligations 9. Valuation or Allocation 10. Valuation or Allocation 11. Rights and Obligations 6-21 A. Inquiry oral evidence is the weakest form of evidence and if given by the client should typically be followed up and verified by better evidence. Inquiry of outside parties can be more convincing. Evidence from inquiry should be based on how knowledgeable the parties are about the business and procedure. Often the client will tell you what they think is happening but they might not have verified it lately and may be relying on what someone else has told them. So, the best inquiry is from the person actually doing the activity, not someone who thinks it should be done. Inquiry has very low validity and is a good starting place to decide what to test and perhaps the areas for attention but is not persuasive. B. An audit may include computation of various balance sheet and operating ratios for comparison to prior years and industry averages. Discuss the validity and limitations of ratio analysis in an audit. Ratio analysis and analytical review is helpful to get the big picture and find areas that do not meet expectations and therefore are higher risk. The......

Words: 1320 - Pages: 6

Premium Essay

Unit 3 Lab 3

...Unit 3 Lab 3 In order to find your IP address, press your window key and R key to bring up the search box. Type CMD to bring up command prompt, then type ipconfig to get your IP address, Subnet mask and default gateway. For this computer I got, • IP Address : 10.61.108.40 • Subnet Mask : 255.255.252.0 • Default Gateway : 10.61.110.1 Everyone is assigned an IP address, it’s like you house address you need it in order to surf the web your IP address is tied to you and to be able to create a routing table ,that enables faster communication. When you open a web browser and type in a domain, it’s going to take you to that domain. Once again a domain name is like your house address but using words to get there. There are 2 ways you can put in a domain name, you can type www.whatever.com or whatever.com. In the 90’s when internet was introduced to the public, you had to type www in order to get to a website now you don’t have to use www it will automatically fill it in when you press the enter key. When you use the address bar you will see http (Hyper Text Transfer Protocol) or https, the “S” stands for secure socket layer, a secured page mainly for payments online or credit card information. Open Application is the process of accessing the physical layer to tell the OS to start the application. It’s one of many hidden system folders containing important files and documents that help Windows operating systems to run. This will establish a......

Words: 290 - Pages: 2

Free Essay

Unit 3

...Class NT2580 Introduction to Information Security Unit 3 Discussion 1 1. For this company I would say that the 12 computers that they have should have passwords on all the computers. The reason why I say this is because they only people who should have access to these computers are they people who have the password or know the password. That is why this is the best protection for this construction company. This construction company will have a role-based access controls. This means with the uses that they have on site will have special groups based on the access they require for the company. 2. For this company since they all contact one another with smart phones and have 12 computers each and every one of these users should have an identification number as in a pin for each and every one of them that way they can all be able to be identified. On this company they are required to have a rule-based access controls. The reason why I require this for this company is cause each user is going to have access to a phone and computer which requires each and every one of them to have a pin in order for them to access their devices. That is why this access control is so important on these devices cause if they don’t know there pin then they will not be able to gain access. 3. For this company I would recommend that they use fingerprint technology for all these servers and employes. The reason why I say this is because for one thing there is too many employees to keep......

Words: 624 - Pages: 3

Free Essay

Mm250 Unit 7

...Unit 7: Trees - Assignment Part I. Basic Computations 1. Using the following tree, name two vertices that are considered the following. Explain in your own words how you know: (a) parent-child (2 points). Answer: 202 - 401 Explanation: the parent of a vertex is the vertex connected to it on the path to the root, 202 is the parent and 401 is the child (b) sibling nodes (2 points): Answer: 301, 302, 303 Explanation: If two vertices are children of the same parent, then these two vertices are called siblings, 301, 302, 303 have the same parent that is 201 (c) leaf nodes (2 points) Answer: 301, 302, 303, 401 Explanation: the leaves are all terminal vertices 2. Determine if each of the following graphs is considered a tree. Explain why or why not, using what you learned in this unit. a. (2 points) Answer: not a tree Explanation: A tree is a connected graph with no cycles, and there is cycles in this graph b. (2 points) Answer: yes Explanation: A tree is a connected graph with no cycles, and there is no cycles in this graph c. (1 point) Answer: no Explanation: A tree is a connected graph with no cycles, and there a cycle in this graph 3. Determine and sketch two different spanning trees for this graph: a. (1 point) b. (1 point) 4. Consider this graph: a. Determine the total weight for this graph. Show your work. (1 point) Answer: 122 Explanation: 5 + 10 +5 +10 +17 +15 + 5......

Words: 717 - Pages: 3

Premium Essay

Unit 3

... • What search terms and search limiters in relation to your topic will yield a reasonable amount of results in the library? Do you plan to use the Library’s main all-in-one search or will you choose a specific specialized database? Here is a list of the databases available at KU Library : Databases A - Z The research terms that I think will yield a more results are abuse plans or identifying abuse. To research my topic I plan on using the KU library and the health sources, pubmed source. • Whom would you conduct an interview with about your topic and why would you choose this person? Try to select a person you may actually be able to contact in person, on the phone, or via the Internet. You will be conducting an actual interview in Unit 4, so it helps to start preparing now. I am going to contact a midwife from a local women’s clinic about my topic, why I feel like this person would be the one to contact is because she is the one that sees the women first before the doctors and asks the question about abuse. She would know firsthand if the questions are effective or out dated. She can also give me her medical opinion on whether these questions to her are good questions. • What listening strategies, as discussed in the Julian Treasure video, would you need to invoke when acquiring research by way of an interview, video, or audio recording? How might you need to alter your listening strategies for each type of source? In the video Mr. Treasure talks about responding......

Words: 439 - Pages: 2

Free Essay

Unit 1 Mm250

...Unit 1: Base System Conversions - Assignment Total points for Assignment: 35 points. Assignments must be submitted as a Microsoft Word document and uploaded to the Dropbox for Unit 1. All Assignments are due by Tuesday at 11:59 PM ET of the assigned Unit. NOTE: Assignment problems should not be posted to the Discussion threads. Questions on the Assignment problems should be addressed to the instructor by sending an email or by attending office hours. You must show your work on all problems. If a problem is worth 2 points and you only show the answer, then you will receive only 1 point credit. If you use a calculator or online website, give the source and tell me exactly what you provided as input. For example, if you used Excel to compute 16 * 16, tell me “I typed =16*16 into Excel and got 256. You may type your answer right into this document. Part I. Basic Computations 1. (3 points) Convert the binary form (base 2) to decimal form (base 10): 01110111 base 2 |128 | |115/2 | | |Decimal | |M |77 | |u |117 | |s |115 | |i |105 | |c |99 | |Capitol M | |77/2 | |Lowercase u | | | |117/2 ...

Words: 601 - Pages: 3

Premium Essay

Unit 3

...UNIT 3 P1- Identify the difference between start-up and operating costs, variable and fixed costs. Introduction I have started this unit talking amongst my classmates discussing the differences between theses costs start-up, operating, variable and fixed costs. In this unit I will be explaining the differences between them. Define start-up costs, operating costs, fixed costs and variable costs Start-up costs- it means if the start-up costs are incurred before a business can start to operate, such as the deposit on rented property, and the purchase of equipment and initial stock. Operating costs- refers to the money that is spent when the business is running, it is the everyday costs. Fixed costs- costs that will not charge regardless of how much the business sells. Fixed costs are costs that do not vary depending on production or sales levels. Variable costs- these costs are linked to the number of items sold. A cost that is directly proportional to the volume of output produced. When production is zero, the variable cost is equal to zero. Explain the difference start-up and operating costs provide examples of each Start up costs are the things you are going to need to get the business going i.e. premises, furniture, IT, registration with local authorities, stock / materials etc. These are mainly one off payments that do not reoccur. Operation costs are the day to day costs of running the business usually calculated in terms of monthly or......

Words: 381 - Pages: 2

Free Essay

Unit 3

...Thomas Whittemore Unit 3 Post University 1. How can Unions secure economic gains? Explain the ramifications Unions help economic growth, and they do not hinder them. Unions are out fighting for workers and getting them high pay and better pension benefits. This all translates into money that can be spent into a market economy. The more people buy products, the stronger and more powerful the economy becomes for everybody. To clarify - real unions are as important just as police, teachers, doctors etc. are necessary. Unfortunately in the US very few or none exist. Working men and woman who have fought and sacrificed for this country are the ones that have purchased true freedom and deserve to have voice 2. Briefly explain why organized labor was opposed to NAFTA. There has been significant opposition to NAFTA from organized labor. Unionists say NAFTA harms workers both here and in Mexico by taking U.S. jobs away and intensifying the exploitation of Mexican workers. Nearly half a million Mexicans already work in "maquiladoras" where over 1,500 mostly U.S.-owned assembly plants operate free of taxes and tariffs. Only about 10 percent are organized, compared to 25 percent of Mexican workers overall. Average pay runs from 50 cents to a dollar an hour. NAFTA will only intensify this exploitation as it lures corporations to set up runaway shops. Yet much of the opposition to NAFTA has been drawn on narrow lines and lets the capitalist system off the......

Words: 1521 - Pages: 7

Premium Essay

Unit 3

...Unit 2. Lab 1 - Cloud Computing Research Unit 2. Lab 1: Cloud Computing Research With Amazon, you get anywhere between 5GB and 1TB depending upon how much you’d like to pay for the privilege. Amazon passes on to you the financial benefits of Amazon’s scale. You pay a very low rate for the compute capacity you actually consume. To use Amazon EC2, you simply: * Select a pre-configured, templated Amazon Machine Image (AMI) to get up and running immediately. Or create an AMI containing your applications, libraries, data, and associated configuration settings. * Configure security and network access on your Amazon EC2 instance. * Choose which instance type(s) you want, then start, terminate, and monitor as many instances of your AMI as needed, using the web service APIs or the variety of management tools provided. * Determine whether you want to run in multiple locations, utilize static IP endpoints, or attach persistent block storage to your instances. * Pay only for the resources that you actually consume, like instance-hours or data transfer. With Google, it’s a little more complicated. There didn't used to be a single locker but now the Big G has taken care of that one with the launch of the Google Drive. You get 5GB of space plus 1GB of Picasa storage for free along with any space in your Docs and Gmail section. There's an apparent maximum storage space on the Google Drive itself up to 100GB but you can rent more space from Google if you have a Google......

Words: 476 - Pages: 2

Premium Essay

Unit 3

... The information is necessary for legal reasons. * The information is necessary in order to protect the individual. * The information is necessary for the legitimate interests of the organisation (e.g. a school). The individual has the right to object to giving their personal information. The policy that would follow this is Security of premises, possessions and individuals as the personal information needs to be guarded otherwise harm could occur (physical and psychological if the information is regarding health). The protection of the personal information of individuals is important as it could be exploited if it were to be released. It could also cause harm to certain individuals in certain settings (e.g. psychiatric units) as people may take advantage of them using their knowledge of their conditions. This piece of legislation also provides individuals with a sense of security as their information cannot be released or exploited by organisations or individuals. Manual Handling regulations Manual handling provides risks for staff and service users – staff could easily injure themselves and also the service users as they do not provide much support on their own. This piece of legislation states that you should not life anything heavy on your own but could use a variety of equipment to help you, such as, slide sheets, turning equipment, hoists, trolleys, and wheelchairs. Manual Handling regulations provide principles to use as guidelines......

Words: 5025 - Pages: 21

Thám Tử Lừng Danh Conan chap 442 | Akzeptiert Preisvorschläge | Rick and Morty