Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Credit scorecards are used by banks and financial institutions to determine whether applicants will receive loans. The scorecard is the product of a statistical technique that converts questions about income, residence, and other variables into a score. The higher the score, the higher the probability is that the applicant will repay.

A small bank that heretofore did not use a scorecard wanted to determine whether a score-card would be advantageous. The bank manager took a random sample of 300 loans that were granted and scored each on a scorecard borrowed from a similar bank. This scorecard is based on the responses supplied by the applicants to questions such as age, marital status, and household income. The scores of those who repaid and the scores of those who defaulted were recorded. 

a. Use EXCEL to calculate the lower confidence limit (LCL) and upper confidence limit (UCL) at 95% confidence for the mean score of those who repaid.

b. Use EXCEL to calculate the lower confidence limit (LCL) and upper confidence limit (UCL) at 95% confidence for the mean score of those who defaulted.

Notes:

1. Use AVERAGE function to find means.  For example, you may use the following statement to find mean for part (a)

= AVERAGE (A2:A221)

2. Use STDEV function to find standard deviations. You may use the following statement to find standard deviation for part (a)

= STDEV (A2:A221)

3. Use NORMSINV function to find ZA:

= NORMSINV (1-A)

  You will need these to find confidence limits.

4.  Computer projects are individual efforts, and not team projects.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9740791
  • Price:- $20

Priced at Now at $20, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Suppose that you have a database of three-dimensional

Suppose that you have a database of three-dimensional galaxy coordinates x; y; z that covered a large volume of, say, 3 Gpc 3 Gpc 3 Gpc. Using your skill and judgement, suggest how you might use the data to test whether ...

A software has x bugs a team finds 19 bugs in it another

A software has x bugs. A team finds 19 bugs in it. Another team finds 11 bugs in it. Of these, 3 bugs were common to both teams. What is the value of x, assuming that the all the bugs (found and remaining) have the same ...

A magazine provided results from a poll of 1500 adults who

A magazine provided results from a poll of 1500 adults who were asked to identify their favorite pie. Among the 1500 ?respondents, 14?% chose chocolate? pie, and the margin of error was given as plus or minus ±3 percenta ...

Can someone please help me with this pleasetaskthe purpose

Can Someone please help me with this please: Task: The purpose of this assignment is to empirically measure attributes for binary search trees. Steps: Create a program that will build a binary search tree (BST) by adding ...

Penetration testing is a technique used to identify

Penetration testing is a technique used to identify security weaknesses in your network. Discuss a type of penetration testing and the different methods utilized to recognize vulnerabilities in your network.

What are some skills individuals who work in the field of

What are some skills individuals who work in the field of cyber security need to prevent hacks in to a company's computers?

Explain how financial leverage at investment banks differed

Explain how financial leverage at investment banks differed from financial leverage at more traditional commercial banks. What is the benefits of this leverage? What are the primary risks associated with financial levera ...

Question 1 explain the various types of green architecture

Question: 1. Explain the various types of Green architecture within the enterprise, such as information architecture and solutions architecture. 2. Explain how a Green systems architecture evolves from a basic to a linea ...

Are search algorithms tied to data structures being

Are search algorithms tied to data structures being searched, or can they be utilized in other scenarios?

What is the lithium by mass in a sample of pure lithium

What is the % lithium by mass in a sample of pure lithium carbonate that has a sample size of 10.0g?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As