Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

You are required to produce the attached Excel spreadsheet as identically as possible although the graph/charts may be different shapes and the number of data points may be different. Please download the Excel file called "MC4 Data" from the module Moodle web page and save it under a suitable name, i.e. your ID number followed by your surname, e.g. 12345678_Smith.xlsx. You must provide your answers in the cells indicated using appropriate Excel formulae where necessary. For Question 3, you only need to type the answers after reading off the Ogives.

Please name the data range as RawData. You MUST comment on the histogram. You must also do the following on your Excel worksheet:

1) Calculate the lower and the upper quartiles for the data. Hence, calculate the inner and outer fences to draw a box and whisker plot.

2) By looking at your whisker and box plot, are the data skewed? If so, how? Given the box-and-whisker plot, do you think the mean and standard deviation are appropriate summary statistics? (You should explain your answer briefly).

3) Draw appropriate Ogives to answer the following:

a) What percentage of sales is above £40?
b) How many transactions (sales) are there between £20 and £40?
c) What percentage of transactions (sales) falls between £30 and £50?

4. Answer Question 3, this time using appropriate Excel formulae.

Attachment:- Assignment.rar

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91603123
  • Price:- $25

Priced at Now at $25, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Systems analysis projectpersonal trainer inc owns and

Systems analysis project Personal Trainer, Inc. owns and operates fitness centers in a dozen Midwestern cities. The centers have done well, and the company is planning an international expansion by opening a new "superce ...

Subject digital securityprovide an fidm authentication

Subject : Digital Security Provide an FIdM authentication system that you have used (being subjet to). Tell the name of the organizations acted as the IdP (Identity Provider) and SP (Service Provider)?

A study was conducted of long beach school district schools

A study was conducted of Long Beach School District schools regarding how many require school uniforms. In 2006, of the 296 schools questioned, 184 said they required s school uniforms. (Gentile & Imberman, 2009) Find th ...

Question a small computer on a smart card has four page

Question : A small computer on a smart card has four page frames. At the first clock tick, the R bits are 0111 (page 0 is 0, the rest 1). At subsequent clock ticks, the values are 1011, 1010, 0101, 1010, 0010, 1100, and ...

How do you make a java program that reads two diagonal

How do you make a Java program that reads two diagonal points, say p1 and p2, of an up-right rectangle and finds both the smallest circle containing the rectangle and the largest circle that can be contained in the recta ...

Q1 state whether the following is true or false and why1

Q1. State whether the following is true or false and why: (1) Monopolists can charge whatever price they want and maximize profit since they are price makers.  T/F: Why? (2) A firm that has a monopoly on a certain good m ...

With respect to the needham-schroeder 0v0ap authentication

With respect to the Needham-Schroeder (0V0AP) authentication protocol, assume that a client (point A in the 0V0AP description) is holding the wrong key Describe in PRECISE terms (in terms of the contents of the packets t ...

Design a combinational circuit with three inputs a b and c

Design a combinational circuit with three inputs: A, B, and C, D and the output W. The output should be 1 only when the values of A, B interpreted as an unsigned integer (AB) is equal to the values of C, D interpreted as ...

We have seen that a block cipher such as aes is insecure if

We have seen that a Block cipher such as AES is insecure if an attacker can have a very large number of chosen plain-text messages (e.g.2 50 messages) for which he gets the corresponding cypher-text. Suppose that we cons ...

Suppose a record has the following fields in this order a

Suppose a record has the following fields in this order: A character string of length 15, an integer of 2 bytes, a SQL date, and a SQL time (no decimal point). How many bytes does the record take if: Fields can start at ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As