Team Project Proposal

Your team will have to find a problem to solve that deals with an organizational issue that will be solved through the use of data mining.  There must be data mining calculations and graphics in the final deliverable. The team should meet prior to the residency weekend and agree on a problem they will solve using data mining techniques.Mention (No banking or fraud topics)The problem to solve.How data mining will solve the problem.Potential functions or concepts that will be used from the course.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

Kareem has 216 role playing game cards his goal is to collect all 15 sets of cards there are 72…

Kareem has 216 role playing game cards his goal is to collect all 15 sets of cards there are 72 cards in a set how many more cards does kareem need to reach his goal i need help drawing a bar and writing the equation

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

I will do your homework

If anyone wants to pay me to do their homework I will!

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

Network and internet technology

COMP1609(2022/23)Network and Internet Technologyand DesignFaculty Header ID:11562Contribution:100% of thecourseCourse Leader:Jason ParkeNetSim CourseworkDeadline Date:Monday 04/12/2022This coursework should take an average student who is up to date with tutorial workapproximately 50 hours Feedback and grades are normally made available within 15 working days of the coursework deadlineLearning Outcomes:A. Demonstrate knowledge of network communication, OSI and TCP/IP model.B. Demonstrate a critical understanding of the top network model with related key protocols, services, and applications.C. Evaluate common network problems (malfunction, poor performance), and adopt a systematic approach to troubleshooting and resolving the problem.D. Be competent in the use of tools designed to analyse and simulate network functionality.Plagiarism is presenting somebody else’s work as your own. It includes copying information directly from the Web or books without referencing the material; submitting joint coursework as an individual effort; copying another student’s coursework; stealing coursework from another student and submitting it as your work. Suspected plagiarism will be investigated and, if found to have occurred, will be dealt withaccording to the university’s procedures. Please see yourstudent handbook for further details of what is/isn’t plagiarism.All material copied or amended from any source (e.g., internet, books) must be referenced correctly accordingto the reference style you are using.Your work will be submitted for plagiarism checking. Anyattempt to bypass our plagiarism detection systems will be treated as a severe Assessment Offence.Thecourseworkdetailedspecification:Thisisanindividualassessment.Yourinvestigationshouldnotbesharedamongotherstudents.The objective of the coursework is to simulate a client-server model communication over an IP network and to investigatean application and network performance in multiple providedscenarios.Thisassessmentrequiresto useNetSimsimulator.The network architecture overview:The company’s headquarters are in Greenwich (UK). They have recently opened regional offices in New York (USA), and Dubai (Dubai). The main service provided by the New York and Dubai offices will be gathered and distributed monthly and annual reports describing sales managed by theheadquarters in Greenwich, UK. The company has decided to perform a simulation in case they will expand with anadditional call centre.Greenwich HQ LAN:The network is undefined and needs to be designed by the student with justifications,this implies justification of several nodes, users, andapplications.New York office LAN:It consists of 35 users connected to a core switch, Local printer, and email. They are connected to the Internet via a backbone link. Some applications run by users including printers and databases are local and others like web browsing and MS OneDrive are supported including remote desktops, in Greenwich, UK. Additionally, 8 users work from home using MS Teams & Zoom with all supportedservices.Dubai Office LAN:It consists of 25 users connected to a core switch, Local printer, and email. They are connected to the Internet via a backbone link. Some applications run by users including printers and databases are local and others like web browsing and MS OneDrive are supported remotely, in Greenwich, UK. Additionally, 8 users work from home using MS teams & Zoom for voice and video calls.Network Operations Centre (NOC): It would consist of 15 users connected to a core switch, Local printer, and email. They are connected to the Internet via a backbone link. Some applications run by users including printers and databases are local and others like web browsing and MS OneDrive aresupported remotely, in Greenwich, UK. All users run MS Teams & Zoom conferencing applications with Dubai Office.The tasks:The objective is to perform group literature research, individually build a NetSim simulation model based on the network architecture given and evaluate the behaviour of network parameters gained by simulating the use cases. The design, implementation and simulation discussion imply theinclusion of graphs and justification of made decisions or the results achieved through the simulation.The tasks:1. The objective is to performgroupliterature research.Perform literature research on the technologies that are used in a modern network. CHOOSE 3 from thefollowing list of network technologies: -i. 5G and WiFi 6 technologyii. Artificial Intelligence (AI) and Machine Learning(ML)iii. Augmented reality and virtual realityiv. Cloud computingv. DevOpsvi. Digital transformationvii. Intent-based networking (IBN)viii. Internet of Things (IoT)ix. Data Securityx. SD-WANThere are multiple providers of such services, someexamples, are Amazon AWS, CrowdStrike and CISCO (BUT NOT LIMITED TO). Critically discuss these technologies concerning the scalability and transparency of communication, providing examples. Identify two or more commercial risks arising due to the failure of such cloud services. The discussion should be documented and should be approximately 700 words. The group should consist of two roles:Riskassessor:The risk assessor evaluates the potential threats.Upgrade engineer:The upgrade engineer must review the technologies from a benefit point of view.[GROUPTASK]10%2. Design, implement and simulate your model in the NETSIM simulator guided by the given network architecture overview. The design requires detailed documentation on the application and performance settings in the NETSIM simulator for each user and these settings justifications. Following the implementation, you are required to simulate yourscenario. [INDIVIDUAL TASK] 20%3. The documentation must contain subnetting schemes for each LAN/WAN/MAN.Note: Youshould configureNetSimto use these subnets.You must provide the following: Network Address, Broadcast Address, Usable Addresses, and IP Address assignments to hosts. You must use at least two classes from the PrivateAddress Space. [INDIVIDUAL TASK] 20%4. Investigate the behaviour of the network performance in a variety of cases. The analysis must be done regarding your expectations. Discuss the scenario and hypothesize on the possible outcomes of provided use cases followed by theanalysis of the resultsthat werereceived from the simulation.[INDIVIDUALTASK]20%5. You must review the following[INDIVIDUALTASK]20%:i. Utilization of the backbone link.ii. Cloud Storage (OneDrive) average file download timeiii. Web Server page response time.iv. The behaviour of MS Teams/Zoom applicationsv. Ethernet delay on the network (bottlenecks)vi. Simulate the following use case: The new NOC will communicate with New York and Dubai offices. It is planned that 10 users will communicate with the Dubai office and 5 users will communicate with the New York office. All offices willcommunicate via MS Teams or Zoom. Investigate the behaviour of the MS Teams vs Zoom in the given scenario.vii. Evaluate the network performance in a use-case, where you would introduce at least one of the improvements that you have identified.6. Provide a critical reflection on the tasks you carried out.[INDIVIDUALTASK]5%7. The document must include your concluding comments.[INDIVIDUALTASK]5%Note:Perform the analysis of the results starting from the first minute. This should be done, to reducethe noise from the data caused by the initialization of network devices such as routers andswitcheswhichmayhaveanimpactonyourinvestigation.Thegroupassessmentshouldbecompletedinpairsand mustincludethefollowing:-1. You must provide the names of all participants who contributed to the group work.2. Your submission must include exact copies of the groupwork.Deliverables (No more than 3000 words):A good structure report must include the following:• A literature review on the technologies used in a provided network architecture and the benefits ofusing cloud services. Refer to Task 1.• Description of the designed and implemented scenarios, including the justifications for the design and choice ofperformance parameters. Refer to Task 2.• Documentation on the investigation of required features and use cases, including graphs and analysis of the results of the simulation. Refer to Tasks 3, 4, and 5 and the subcategories.• Based on the results; recommend your choice of consideration to improve the network model.• A critical reflection that is both evaluative and reflective.Refer to Task 6.• Concluding comments. Refer to Task 7.Assessment Criteria:1. Review of technologies and cloud services discussion.(Task 1)10%2. Justified design and simulation of the network architecture and applicationmodels.(Task 2)20%3. Investigation and analysis of the results.(Task 3 + Task 4 + Task 5)55%4. Recommendation of your choice for improvement of network architecture.(Task 5 vii)5%5. Critical reflection(Task 6)5%6. Conclusion(Task 7)5%>80%ExcellentEvidence of in-depth understanding, detailed investigation and analytical explanation of the results, critical and evaluative conclusion. The analysis must include a graphical representation of the results and any relevant network diagrams and identification of trends in the data. All sections were completed to an excellent standard.GoodEvidence of clear understanding, good analysis of the results and some critical and justified evaluation in the conclusion. The analysis must include a graphical representation of the results and any relevant network diagrams and identification of trends in the data. All sections are completed to a consistently good standard.AverageEvidence of an understanding of the networking fundamentals, some results attained and presented. Correct but not incredibly detailed analysis, limited evaluation (but there must be some), all sections attempted and provided.PassLimited data samples and results, shallow analysis, or evaluation. Some essential elements may be missing. The provided documentation must be correct. Conclusions must be included and must be justifiable.PoorA poorly written report without structure. The essential elements are missing, insufficient data samples. Little or no evidence of having devised or conducted research and experiments. Little evidence of understanding, poor orincorrect analysis or the conclusion.Criteria forAssessment90-100Exceptional80-89Excellent70-79Very Good60-69Good50-59Satisfactory30-49Fail0-29FailAssessmentdomain 1(Knowledge)Demonstrate acriticalunderstanding ofthe technicalchallenges posedby current mobile systems and wirelesscommunications.Demonstrates anexceptionalsystematicunderstanding of Network and InternetTechnology and Design and theirtechnicalchallenges. Themotivation and rationale of a chosenarea isunderpinned by an exceptionalunderstanding of relevant theory and best practices andengagement with the literature.Demonstrates an excellentsystematicunderstanding of Network and InternetTechnology and Design and theirtechnicalchallenges. Themotivation and rationale of a chosen area areunderpinned by an excellentunderstanding of relevant theory and best practices andengagement with the literature.Demonstrates a very goodunderstanding of Network and InternetTechnology and Design and theirtechnicalchallenges. There is evidence thatrelevant theory and best practices have been appliedeffectively in the choice of area, and there is theengagement with the literature.Demonstratesoverall a goodunderstanding of Network and InternetTechnology and Design and theirtechnicalchallenges. There is some evidence that relevanttheory and best practices have been appliedeffectively in the choice of area, and there is someengagement with the literature.There issatisfactoryevidencethat at least someNetwork and InternetTechnologyand Designand practiceshave beenapplied andsupported by theliterature.There is a lack ofunderstanding of Networkand InternetTechnologyand Designand theirtechnicalchallenges.The choice of the researchproblem lacksjustificationsand is notsupported bythe literature.There is hardly any engagementwith relevanttechnologies,technicalchallenges,and best practices.The choice ofthe researchproblem is not based onengagementwith theliterature.Assessment domain 2(Research)Be able tounderstand andevaluate the key security threats that relate todifferentThe assignmentprovidesexceptionallystrong andconsistentevidence ofcritical evaluationwhenconsideringthe securityThe assignmentprovidesexcellentevidence ofcritical evaluationwhen consideringthe securityvulnerabilityorvulnerabilitiesofThe assignmentprovides verygood evidence ofcritical evaluationwhen consideringthe securityvulnerability orvulnerabilitiesofthe chosenThe assignmentprovides some good evidence ofcritical evaluationwhen consideringthe securityvulnerability orvulnerabilitiesofthe chosenThere is someevidence thatat least someof the securityaspects of the chosenconfigurationhave beenconsidered.There is a lack ofunderstanding of thesecurityaspects of the chosenconfiguration.No evidenceThere is hardly any engagementwithunderstandingthe securityaspects of thechosenconfiguration.No evidenceofNetwork andInternetTechnology andDesign, as well as appropriatecountermeasures.vulnerability orvulnerabilities of the chosenconfiguration and the appropriatecountermeasures. Theunderstanding is supported byextensiveliterature.the chosenconfiguration and the appropriatecountermeasures. Theunderstanding is supported byextensiveliterature.configuration and the appropriatecountermeasures. Theunderstanding is supported by the appropriateliterature.configuration and the appropriatecountermeasures. Theunderstanding is supported bysome literature.Theunderstanding is supported by someliterature.of supportingliterature.supportingliterature.Assessmentdomain 3(Evaluation)Understand andcommunicate theperformance,costs, overheadsand trade-offs ofdifferent wireless and mobilecommunicationtechnologies.The assignmentprovidesexceptionallystrong andconsistentevidence ofcritical evaluation when considering the adequatelychosenperformancemetrics, cost,overhead andtrade-offs of theusedtechnologies. The results of the analysis have beenclearlypresented inaccordancewithThe assignmentprovidesexcellentevidence ofcritical evaluation when considering the adequatelychosenperformancemetrics, cost,overhead andtrade-offs of theusedtechnologies. The results of the analysis have been clearlypresented inaccordance withthe providedguideline.The assignmentprovides verygood evidence of critical evaluation when considering the chosenperformancemetrics, cost,overhead andtrade-offs of theusedtechnologies. The results of the analysis have beenpresented in accordance with the providedguideline.The assignmentprovides somegood evidence of critical evaluation when considering the chosenperformancemetrics, cost,overhead andtrade-offs of theusedtechnologies. The results of the analysis have been presentedmostly inaccordance withthe providedguideline.There is someevidence ofevaluationwith respect toperformancemetrics, cost,overhead andtrade-offs ofthe usedtechnologies.The analysis is not veryconclusive.Satisfactorypresentationofthe results.Theassignmentprovides littleevidence ofevaluationwith respecttoperformancemetrics, cost,overhead and trade-offs of the usedtechnologies. Notsatisfactorypresentationofthe results.The assignmentlacks evidenceof evaluationwith respect toperformancemetrics, cost,overhead andtrade-offs of the usedtechnologies. No results havebeen provided.the providedguideline.Assessmentdomain 4(Communication) Be able tocommunicateavailabletechnologies forthe design andimplementationof mobile andwireless networksaccording to userrequirements.Communicates an exceptionalsystematicunderstanding of Network andInternetTechnology andDesign processes based on userrequirements.Theunderstanding is supported by extensiveliterature.Communicates an excellentand systematicunderstanding of Network andInternetTechnology andDesign processes based on userrequirements.Theunderstanding is supported by extensiveliterature.Communicates a very goodunderstanding of Network and InternetTechnology and Design processesbased on userrequirements.Theunderstanding is supported by theappropriateliterature.Communicatesoverall a goodunderstanding of Network and InternetTechnology and Design processesbased on the userrequirements.Theunderstanding is supported by someliterature.There issatisfactoryevidence thatat least someuserrequirementshave beenCommunicate d in Network and InternetTechnologyand Designprocesses and is supported bysomeliterature.There is a lack ofunderstanding of Networkand InternetTechnologyand Designprocessesbased on userrequirements.No evidenceof supportingliterature.There is hardlyany engagementwith anunderstandingof Network andInternetTechnology and Designprocesses based on userrequirements.No evidence of supportingliterature.Assessmentdomain 5(Referencing)Determiningappropriateresources.Sources used areacknowledgedin the text andreference listusing correctacademic citationEvidence ofdetermining anextensive list of outstandingresources. Allsources used areacknowledged.Evidence ofdeterminingexcellentresources. Allsources used areacknowledged.Evidence ofdetermining very good resources. All sources usedareacknowledged.Good evidence of determiningappropriateresources. Allsources used areacknowledged.Some evidence of determiningappropriateresources.Most sourcesused areacknowledgedPoor evidence ofdeterminingappropriateresources.Most sourcesused are notacknowledgedNo evidence ofdeterminingappropriateresources.Sources usedare notacknowledgedAssessmentdomain 6(Employability)Developingtransferable skills suchinterpersonalskills and human relations withinteamwork,organisation, andcommunication.Also, timemanagement and commitment to meeting goals, both short-term andlong-term.Ability to reflect on these skills.Outstanding and effective groupdynamics.Outstandingeffort tocommunicate,motivate andinspire membersfrom the CWgroup.Outstandingevidence ofability toreflect on group work.Outstanding timemanagement and meeting goals ahead of the planned time.Excellentparticipationwithin groupwork.Excellenteffort tocommunicate,motivate andcollaborate withmembers from theCW group.Excellentevidence ofability to reflect on group work.Excellent good group dynamics.Excellent timemanagement.Very goodparticipationwithin groupwork. Very good effort tocommunicate andcollaborate withmembers from the CWgroup.Very goodevidence ofability to reflect on group work.Very good groupdynamics. Very good timemanagementwith noissues incommitting to meetinggoals.Goodparticipationwithin groupwork.   Goodeffort tocommunicate andcollaborate withmembers from theCW group. Goodevidence ofability to reflect on group work. Good groupdynamics with minorissues.Good timemanagementwith minor issues in committing to meetinggoals.Someparticipationwithin groupwork.Limitedeffort tocommunicateandcollaboratewith membersfrom theCW group.Some evidence of ability toreflect ongroup work.Groupdynamicshaving areas of concern. Ok timemanagementwith someissues incommittingto

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

Cloud Computing technologies

For this project, Select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper should include the following sections each called out with a header.• Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization.• Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.• Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short?• Conclusion:  Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.Requirements:The paper must adhere to APA guidelines including Title and Reference pages.  There should be at least three scholarly sources listed on the reference page.  Each source should be cited in the body of the paper to give credit where due. The body of the paper should be 3 pages in length.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

Math Quiz 7

1. (5 pts) Which of these graphs represent a one-to-one function? Answer(s): ____________(no explanation required.)  (There may be more than one graph that qualifies.)(A)(B)(C)(D)2. (5 pts)  Convert to a logarithmic equation: 7x = 2401.      (no explanation required)      2. ______A.B.C.D.3. (10 pts) Based on data about the growth of a variety of ornamental cherry trees, the following logarithmic model about these trees was determined:h(t) = 6.47 ln(t) + 2.83,  where  t = age of tree in years and h (t) = height of tree, in feet.(Note that “ln” refers to the natural log function)  (explanation optional)Using the model,(a) At age 3 years, how tall is this type of ornamental cherry tree, to the nearest tenth of a foot?(b) At age 12 years, how tall is this type of ornamental cherry tree, to the nearest tenth of a foot?4. (5 pts) Solve the equation. Check all proposed solutions. Show work in solving and in checking, and state your final conclusion.5. (10 pts)(a)       _______  (fill in the blank)(b)   Let   State the exponential form of the equation.(c)    Determine the numerical value of , in simplest form. Work optional.6.  (10 pts)  Let  f (x) = 2×2 – x – 10 and  g(x) = 3x + 1(a) Find the composite function  and simplify the results. Show work.(b) Find . Show work.7. (15 pts)  Let(a)  Find f  – 1 , the inverse function of f.  Show work.(b) What is the domain of f ? What is the domain of the inverse function?(c) What is f (2) ?           f (2) = ______                                   work/explanation optional(d) What is f  – 1( ____ ), where the number in the blank is your answer from part (c)?    work/explanation optional8. (15 pts) Let f(x) = e x – 1  + 4.Answers can be stated without additional work/explanation.(a) Which describes how the graph of f can be obtained from the graph of y = ex ?    Choice: ________A.     Shift the graph of  y = ex  to the left by 1 unit and up by 4 units.B.     Shift the graph of  y = ex  to the right by 1 unit and up by 4 units.C.     Reflect the graph of  y = ex  across the x-axis and shift up by 4 units.D.     Reflect the graph of  y = ex  across the y-axis and shift up by 4 units.(b) What is the domain of f ?(c) What is the range of f ?(d) What is the horizontal asymptote?(e) What is the y-intercept?  State the approximation to 2 decimal places (i.e., the nearest hundredth).(f) Which is the graph of f ?GRAPH A                                  GRAPH B                            GRAPH C                             GRAPH DNONLINEAR MODELS – For the latter part of the quiz, we will explore some nonlinear models.9. (15  pts)   QUADRATIC REGRESSIONData: On a particular summer day, the outdoor temperature was recorded at 8 times of the day, and the following table was compiled. A scatterplot was produced and the parabola of best fit was determined.t = Time of day (hour)y = OutdoorTemperature (degrees F.)752967117313761478177920762361Quadratic Polynomial of Best Fit:y = -0.3476t2 + 10.948t – 6.0778  where t = Time of day (hour) and y = Temperature (in degrees)REMARKS: The times are the hours since midnight. For instance, 7 means 7 am, and 13 means 1 pm.(a) Using algebraic techniques we have learned, find themaximum temperaturepredicted by the quadratic model and find thetime when it occurred. Report the time to the nearest quarter hour (i.e., __:00 or __:15 or __:30 or __:45). (For instance, a time of 18.25 hours is reported as 6:15 pm.) Report the maximum temperature to the nearest tenth of a degree. Show algebraic work.(b) Use the quadratic polynomial to estimate the outdoor temperature at 7:30 am, to the nearest tenth of a degree. (work optional)(c)Use the quadratic polynomial y = -0.3476t2 + 10.948t – 6.0778  together with algebra toestimate the time(s) of day when the outdoor temperature  y was 75 degrees.That is, solve the quadratic equation 75 = -0.3476t2 + 10.948t – 6.0778  .Show algebraic work in solving. State your results clearly; report the time(s) to the nearest quarter hour.10. (10 pts)    EXPONENTIAL REGRESSIONData:A cup of hot coffee was placed in a room maintained at a constant temperature of 69 degrees, and the coffee temperature was recorded periodically, in Table 1.t = Time Elapsed(minutes)C = CoffeeTemperature (degrees F.)0166.010140.520125.230110.340104.55098.46093.9TABLE 1REMARKS:Common sense tells us that the coffee will be cooling off and its temperature will decrease and approach the ambient temperature of the room, 69 degrees.So, the temperature difference between the coffee temperature and the room temperature will decrease to 0.We will fit the temperature difference data (Table 2) to an exponential curve of the form y=Ae-bt.Notice that as tgets large, ywill get closer and closer to 0, which is what the temperature difference will do.So, we want to analyze the data wheret= time elapsed andy=C – 69, the temperature difference between the coffee temperature and the room temperature.TABLE 2t  = Time Elapsed (minutes)y= C – 69 TemperatureDifference(degrees F.)097.01071.52056.23041.34035.55029.46024.9Exponential Function of Best Fit (using the data in Table 2):y = 89.976 e – 0.023t  where t = Time Elapsed (minutes) and y = Temperature Difference (in degrees)(a) Use the exponential function to estimate the temperature difference y when 25 minutes have elapsed. Report your estimated temperature difference to the nearest tenth of a degree.  (explanation/work optional)(b) Sincey=C- 69, we have coffee temperatureC=y+ 69. Take your difference estimate from part (a)  and add 69 degrees. Interpret the result by filling in the blank:When 25 minutes have elapsed, the estimated coffee temperature is  ________   degrees.(c)Suppose the coffee temperature C is 100 degrees.Theny=C- 69 = ____ degrees is the temperature difference between the coffee and room temperatures.(d) Consider  the equation   _____ =  89.976 e – 0.023t  where the ____ is filled in with your answer from part (c).

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

Accounting Discussion 1

Needs to be done by 9pm tonight 3/7/2018.   Please over assignment and bid accordingly. Do not bid and than change your price.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

Quantitative Literacy | MAT106

Need assistance with the following homework attached as word document and spread sheet please help.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

reflection paper

Complete the following by writing a response tothreeof the four following questions. For each question, your response should be 2 or more paragraphs. Make it clear which question you are answering and use correct grammar throughout. If you answer all four questions, only the first three provided will be graded.Your responses are to be based on your own experiences and insights.  Do not use materials and examples from other sources, including the Internet.  Students have used examples from outside sources in the past and have failed this final assessment and in some cases, failed the course due to evidence of plagiarism.Describe how you could usehypothesis testingto help make a decision in your current job, a past job, or a life situation. Include a description of the decision, what would be the null and alternative hypotheses, and how data could ideally be collected to test the hypotheses.Describe how you could useconfidence intervalsto help make a decision in your current job, a past job, or life situation. Include a description of the decision, how the interval would impact the decision, and how data could ideally be collected to determine the interval.Describe how you could useregression analysisto help make a decision in your current job, a past job, or a life situation. Include a description of the decision, what would be the independent and dependent variables, and how data could ideally be collected to calculate the regression equation.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

revenue project

By using the last 12 months data,derive the price response functionfor each segment in order tocalculate the optimal price permonth (5%).2.2.2 Compare the optimal price foreach segment with the latest ratescharged by your hotel andcomment on your findings (5%). there is only one segment for me so i just need to find the price foction and optimal price for each month

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"