Free Essay

Quantitative Methods and Analysis Unit 5 Ip

In:

Submitted By Abbott
Words 910
Pages 4
Unit 5 – Regression Analysis
American InterContinental University

Abstract
In this scenario, Microsoft Excel has been utilized in order to perform a regression analysis therefore; each one has a chart in order to show the correlations in the data. However, satisfaction: overall, intrinsic, and extrinsic had been used.

Introduction An analysis has been given to employees for the benefits satisfaction and compared to three different job types such intrinsic, extrinsic, as well as the over all. However, the regression analysis that was performed had been done in excel as well as there were charts made up.
Benefits and Intrinsic Job Satisfaction
Regression output from Excel Regression Statistics
Multiple R 0.022301
R Square 0.000497
Adjusted R Square -0.0093
Standard Error 0.656922
Observations 104 ANOVA df SS MS F Significance F
Regression 1 0.021902 0.021902 0.050753 0.822209
Residual 102 44.01771 0.431546
Total 103 44.03962 Coefficients Standard Error t Stat P-value Lower 95% Upper 95% Lower 95.0% Upper 95.0%
Intercept 5.270871 0.348709 15.11541 8.66E-28 4.579209 5.962532 4.579209 5.962532
X Variable 1 0.017947 0.079664 0.225284 0.822209 -0.14007 0.175959 -0.14007 0.175959 It did not want to add my 2 to the answer of 5.962532 or did it add the 9 to the answer of 0.175959
Graph

Benefits and Extrinsic Job Satisfaction
Regression output from Excel
Regression Statistics
Multiple R 0.026829
R Square 0.00072
Adjusted R Square -0.00908
Standard Error 0.467616
Observations 104 ANOVA df SS MS F Significance F
Regression 1 0.016065 0.016065 0.073469 0.786899
Residual 102 22.30384 0.218665
Total 103 22.3199 Coefficients Standard Error t Stat P-value Lower 95% Upper 95% Lower 95.0% Upper 95.0%
Intercept 5.207915 0.248221 20.98096 8.66E-39 4.71557 5.700261 4.71557 5.700261
X Variable 1 0.015371 0.056707 0.271052 0.786899 -0.09711 0.127849 -0.09711 0.127849
Again the last numbers did not want to show up the first one is 1 for the answer of 5.700261 and the other number that did not show was the 9 for answer of 0.127849.
Graph

Benefits and Overall Job Satisfaction
Regression output from Excel Regression Statistics
Multiple R 0.099659
R Square 0.009932
Adjusted R Square 0.000225
Standard Error 0.627644
Observations 104 ANOVA df SS MS F Significance F
Regression 1 0.40308 0.40308 1.023209 0.314153
Residual 102 40.18154 0.393937
Total 103 40.58462 Coefficients Standard Error t Stat P-value Lower 95% Upper 95% Lower 95.0% Upper 95.0%
Intercept 4.491866 0.333167 13.48232 2.13E-24 3.831031 5.152701 3.831031 5.152701
X Variable 1 0.076991 0.076113 1.011538 0.314153 -0.07398 0.227962 -0.07398 0.227962
The number of 1did not show for the upper last numbers and it should be 5.157701 and then for the bottom upper 95.0% number of the answer is 2 which should read 0.227962
Graph

Key components of the regression analysis Complete the following chart to identify key components of each regression output.
Dependent Variable Slope Y-intercept Equation r^2
Intrinsic
0.0179 5.2709 Y=0.0179x+5.2709 0.0005
Extrinsic
0.0154 5.2709 Y=0.0154x+5.2079 0.0007
Overall
0.077 4.4919 Y=0.077x+4.4919 0.0099

Similarities and Differences
One of the similarity’s is that all three intrinsic, extrinsic, and overall job satisfaction each had a positive correlation. All three of the x variables are all different.
Correlation coefficients The overall job satisfaction would be the strongest correlation since it has a great r² at 0.009932 while the benefits of extrinsic was only 0.0072 it was the lowest of them all and then you have intrinsic with an r² of 0.000497. Therefore since the job satisfaction is the biggest of all three of them and since the data has the most linear of the three (Schmidt, 2000). Perhaps the manager is able to infer an increase into the benefits that the benefits are going to have a more direct increase in the extrinsic job satisfaction as well as it can craft employees benefits packages (Inc., 2010).
Conclusion
When researchers use the correlation statistics as well as the regression they are able to disclose whether there is a connection between each set of data (Malek., S., 2013). Every now and then, the relationships might be causal as well as occasionally or even just coincidence. Utilizing a regression analysis would be helpful in determining how strong as well as what way the relationship exists. In the scenario of the data that was performed here, it seems as the strongest relationship might be that as associates have indicated that they are pretty much content with their benefits, The employees are basically content with their job. Therefore, this might be an useful tool for a manager to utilizing motivated associates and for then figuring out how many on the benefit packages in order to help improve associates morale.

References
Malek., S., (2013) Retrieved August 24, 2013 from AIU Online learning lab
Schmidt, S. R. (2000). Research methods for the digitally inclined. [general format]. Retrieved August 24, 2013 from http://www.webster.edu/~woolflm/statmethods.html

Similar Documents

Premium Essay

Macpherson Refrigeration Limited

...Page 3 2. Problem Statement Page 3 3. Performance Measures and Trade-Offs Page 4 4. Assumptions Page 5 5. Iterative Plan Page 5 5.1. Integer Programming Model Page 5 5.2. Integer Programming Model Considering Overtime Page 6 5.3. Integer Programming Model Considering Hiring/Firing Page 7 6. Conclusion Page 9 1. Introduction In this case study, production planning of MacPherson Refrigeration Limited (MRL) for the next year is conducted. In order to provide some background information about the company and the related production plant; there are some points to be mentioned. First of all MRL is relatively large company with a sales of about $28.5 million and for the last ten years they are in the business of producing consumer refrigeration. Secondly, the production plant which this production planning is related has an increased efficiency in the last years through process design and assembly technologies. In this report, process and results of this case study is presented. In this first part, problem which is going to be studied is presented. Following that, decision criteria and performance measures are given in order to evaluate results. Then, assumptions are made considering the business environment and an iterative process of combining quantitative and qualitative measures is conducted. Finally, conclusion about the report is submitted as the past part of the report. 2. Problem Statement ...

Words: 2144 - Pages: 9

Free Essay

Software

...Programming Languages Lab 0 3 2 Seminar - - 2 Total Credits (6 Theory + 1 Lab.) 22 JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD MASTER OF TECHNOLOGY (REAL TIME SYSTEMS) I SEMESTER ADVANCED COMPUTER ARCHITECTURE UNIT I Concept of instruction format and instruction set of a computer, types of operands and operations; addressing modes; processor organization, register organization and stack organization; instruction cycle; basic details of Pentium processor and power PC processor, RISC and CISC instruction set. UNIT II Memory devices; Semiconductor and ferrite core memory, main memory, cache memory, associative memory organization; concept of virtual memory; memory organization and mapping; partitioning, demand paging, segmentation; magnetic disk organization, introduction to magnetic tape and CDROM. UNIT III IO Devices, Programmed IO, interrupt driver IO, DMA IO modules, IO addressing; IO channel, IO Processor, DOT matrix printer, ink jet printer, laser printer. Advanced concepts; Horizontal and vertical instruction format, microprogramming, microinstruction sequencing and control; instruction pipeline; parallel processing; problems in parallel processing; data hazard, control hazard. UNIT IV ILP software approach-complier techniques-static branch protection-VLIW approach-H.W...

Words: 3183 - Pages: 13

Premium Essay

Information System

...competitive advantage d. All of the above e. None of the above 4. The barriers a Business must deal with, such as competitors, substitutes, customers, supplier, etc are often referred to as: a. Competitive Strategies b. Competitive Forces c. Strategic Information Systems d. None of the above 5. Using IT to help a company make radical changes or improvements in their business processes is part of: a. Leveraging Investment in IT b. Agile Company c. Value Chain d. Business Process Reengineering e. Creating Switching Costs 6. The main processing component of a computer is called: a. Primary Storage b. Magnetic Disks c. Central Processing Unit d. Semiconductor Memory 7. Which of the following is a quantitative model typically used by a DSS: a. Sensitivity analysis b. What-if analysis c. Goal-seeking analysis d. All of the above 8. Information can be saved in many ways with a computer, the main memory is called: a. Central Processing Unit b. Primary Storage c. Secondary Storage d. Optical Disks 9. A large capacity disk typically found in computers for storage is known as: a. Optical Disk b. Floppy Disk c. Hard Disk d. Central Processing Unit 10. What is the ultimate goal of AI: a. Perform basic transactional processing b. Mimic human intelligence c. Create other systems to replace human...

Words: 1842 - Pages: 8

Free Essay

Bus311

...--------------------------------------------------------------------------- BUSN 311 Unit 3 Individual Project - Possible / Earned Points --------------------------------------------------------------------------- Entertainment Survey or Poll- from Newsstand- Proquest --------------------------------------------------------------------------- Description of Survey 5/5**** Sample Size Analysis 5/5**** Business Application 5/5 **** --------------------------------------------------------------------------- Political Survey or Poll- from Pew Research or Gallup --------------------------------------------------------------------------- Description of Survey 5/5**** Sample Size Analysis 5/5**** Business Application 5/5 **** --------------------------------------------------------------------------- General Opinion Survey or Poll- from Pew Research or Gallup --------------------------------------------------------------------------- Description of Survey 5/5**** Sample Size Analysis 5/5**** Business Application 5/5 **** --------------------------------------------------------------------------- Overview of Survey Research: Text Research required 10/10**** --------------------------------------------------------------------------- This section of the paper will be 2-3 pages in length. 30% deductions for not using specified required research. 6 points will be deducted for each survey that is not taken from the required resource. ---------------------------------------------------------------------------...

Words: 1421 - Pages: 6

Premium Essay

It255

...ITT Technical Institute IT255 Introduction to Information Systems Security Onsite Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications ...

Words: 4114 - Pages: 17

Free Essay

Dsfsd

...network. This system provides an easy way to retrieve any file which is stored over the network. The IP address of any system which is connected to the network can be found out just by selecting the name of the system. Therefore the range of IP address where the search has to be done can be found by that. The required file can be searched easily when this IP address range is known. The name of the file to be searched is given as input. If possible the file format is also given along with it. The IP address range where the search has to be performed is also selected. If there is any particular system outside that particular range they also can be selected for search operation to be performed. The search is done in each working and connected system in the shared drive and the search results are displayed in the grid view which is the output. The file can be accessed just by clicking the result that appears. Thus this provides a easy way to search a file over a number of systems connected to a network simultaneously. Thus it is very effective since the search is done in a number of systems simultaneously. CHAPTER 2 LITERATURE REVIEW 2. LITERATURE REVIEW 2.1 Existing System: When a particular file has to be searched which is stored in another system connected over network, the IP address of the system should be given in the run after clicking start in the taskbar. After that the...

Words: 4829 - Pages: 20

Premium Essay

Security Management Plan

...IT 454 Security Management Plan Marshall Miller December 20, 2015 Table of Contents Section 1: Information Security Management 4 Intro to Organization 4 People 4 Physical Security 4 Training of Security 4 Information Technology Training 4 Technology 5 Project Manager Roles 5 Section 2: Security Program 6 Data Classification 6 Management Support 7 Hierarchy Reporting Structure 8 8 Section 3: Security Policies 10 Acceptable Use Policy 10 1. Overview 10 2. Purpose 10 3. Scope 11 4. Policy 11 5. Enforcement 13 6. Definitions 13 7. Implementation Date 13 Section 4: Security Policies 14 Risk Assessment 14 Quantitative Risk Analysis 14 Quantitative Risk Analysis 14 Methodologies 15 1. Transfer 15 2. Avoid 15 3. Reduce 15 4. Accept 16 Summary 16 Section 5: Controlling Risk 17 Administrative 17 Human Resources 17 Organizational Structure 17 Security Policies 18 Technical 18 Access Control 18 System Architecture 18 System Configuration 18 Physical 19 Heating and Air Conditioning 19 Fire 19 Flood 19 Summary 19 Bibliography 20 Section 1: Information Security Management Intro to Organization My organization is about a federally recognized business called JPPSO (Joint Personnel Property Shipment Office). JPPSO specializes in the shipping of military personnel goods. JPPSO works hand in hand with the United States Air Force to enforce the safe shipping of military household goods...

Words: 2755 - Pages: 12

Free Essay

Operating Reserve Reliability Evaluation

...Saskatoon, Sask.  This paper appears in: Generation, Transmission and Distribution, IEE Proceedings C Issue Date: Mar 1990 Volume: 137 Issue:2 On page(s): 159 - 167 ISSN: 0143-7046 INSPEC Accession Number: 3606872 Date of Current Version: 06 八月 2002 Abstract The authors present a technique which includes interruptible loads in the probabilistic assessment of the operating reserve in isolated and interconnected generating systems. This technique is then used to evaluate the magnitude and corresponding maximum allowable time delay of load interruption required to reduce the unit commitment risk in the absence of other capacity adjustments. They also present a probabilistic technique which can be used to evaluate the inherent interruptible load carrying capability of an isolated and interconnected generating system which exists without having to commit any extra units other than those required to carry the firm load. The study provides an insight into load interruption and its effect on the system risk. The techniques developed are illustrated by numerical examples. These techniques can be used in short and medium term operational planning Electric Power Systems Research Volume 18, Issue 2, March 1990, Pages 99–103 Microprocessor based on-line assessment of the operational reliability of a longitudinal power supply system * A. Chakrabarti, * A.K. Mukhopadhyay * Electrical Machines and Power System, Department of Applied Physics, Faculty of...

Words: 4873 - Pages: 20

Premium Essay

Seeking Help

...IT255 Introduction to Information Systems Security [Onsite] Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems ...

Words: 4296 - Pages: 18

Premium Essay

Normas

...Risk-Based Inspection API RECOMMENDED PRACTICE 580 SECOND EDITION, NOVEMBER 2009 --``,,,,,``,,`,``,``,`````````,,-`-`,,`,,`,`,,`--- --``,,,,,``,,`,``,``,`````````,,-`-`,,`,,`,`,,`--- Risk-Based Inspection Downstream Segment --``,,,,,``,,`,``,``,`````````,,-`-`,,`,,`,`,,`--- API RECOMMENDED PRACTICE 580 SECOND EDITION, NOVEMBER 2009 Special Notes API publications necessarily address problems of a general nature. With respect to particular circumstances, local, state, and federal laws and regulations should be reviewed. API is not undertaking to meet the duties of employers, manufacturers, or suppliers to warn and properly train and equip their employees, and others exposed, concerning health and safety risks and precautions, nor undertaking their obligations under local, state, or federal laws. Information concerning safety and health risks and proper precautions with respect to particular materials and conditions should be obtained from the employer, the manufacturer or supplier of that material, or the material safety datasheet. Neither API nor any of API’s employees, subcontractors, consultants, or other assigns make any warranty or representation, either express or implied, with respect to the accuracy, completeness, or utility of the information contained herein, or assume any liability or responsibility for any use, or the results of such use, of any information or process disclosed in this publication, or represent that its used would...

Words: 21683 - Pages: 87

Premium Essay

Business Law.Types of Companies

...Definition: An information system can be any organized combination of people, hardware, software, computer networks and data resources that stores and retrieves, transforms, and disseminates information in an organization. Roles of IS in Business: There are three fundamental reasons for all business applications of information technology. They are found in the three vital roles that information system can perform for a business enterprise.  Support of its business processes and operations.  Support of decision making by its employees and managers.  Support of its strategies for competitive advantage. Trends in IS: The business applications of information systems have expanded significantly over the years.  Data Processing (1950s – 1960s): Electronic data processing systems which includes transaction processing, record keeping, and traditional accounting applications.  Management Reporting (1960s – 1970s): Management information systems that include preparation of management reports of pre specified information to support decision making.  Decision Support (1970s – 1980s): Decision support systems include interactive ad hoc support of managerial decision making process.  Strategic and End User Support (1980s – 1990s): o End user computing systems: Direct computing support for end user productivity and work group collaboration. o Executive information systems: Critical information for top management. o Expert Systems: Knowledge based expert advice for...

Words: 13881 - Pages: 56

Free Essay

Benefits of Using Ipv6 in Distributed Virtual Private Networks (Vpns)

... The many advantages of improving and corporation's network, particularly its Virtual personal Networks (VPNs) from IPv4 to IPv6 create the expenses related to the move recoverable from increased network steadiness, auto-configuration, security, mobility, increase and quality-of-service and multicast capability (Cisco 2007). First, in phrases of quantitative, address varies for an IPv6-based network is 128-bits, providing the company lots higher security, likewise (Fink, 1999). Secondly, the safety concerns with regards to utilizing DHCP to assign information science addresses victimization IPv4 these days will be mitigated with the homeless reconfiguration capability of IPv6 (Lehtovirta, J 2006). With several of the systems throughout the company administered remotely exploitation IPsec-based VPNs, the opportunity to maneuver to more secure VPNs attributable to IPsec-mandated end-to-end security exploitation IPv6 also adds in greater levels of security moreover. The increasing use of wireless connections by members among the IT employees to observe and maintain IT systems also can currently be potential exploitation Mobile IP with Direct Routing (Cisco 2007). The redoubled support for protocols specifically for multicast routing are also supported in IPv6, that may build marketing’s’ several webinars and on-line initiatives additional expeditiously delivered, moreover. Most vital concerning the upgrade from IPv4 to IPv6, the requirement also exists to update the many network-based...

Words: 3876 - Pages: 16

Premium Essay

Sscp Study Notes

...SSCP Study Notes 1. Access Controls 2. Administration 3. Audit and Monitoring 4. Risk, Response, and Recovery 5. Cryptography 6. Data Communications 7. Malicious Code Modified version of original study guide by Vijayanand Banahatti (SSCP) Table of Content 1.0 ACCESS CONTROLS…………………………………………………………...... 03 2.0 ADMINISTRATION ……………………………………………………………... 07 3.0 AUDIT AND MONITORING…………………………………………………...... 13 4.0 RISK, RESPONSE, AND RECOVERY………………………………………....... 18 5.0 CRYPTOGRAPHY……………………………………………………………....... 21 6.0 DATA COMMUNICATIONS…………………………………………………...... 25 7.0 MALICIOUS CODE……………………………………………………………..... 31 REFERENCES………………………………………………………………………........ 33 1.0 ACCESS CONTROLS Access control objects: Any objects that need controlled access can be considered an access control object. Access control subjects: Any users, programs, and processes that request permission to objects are access control subjects. It is these access control subjects that must be identified, authenticated and authorized. Access control systems: Interface between access control objects and access control subjects. 1.1 Identification, Authentication, Authorization, Accounting 1.1.1 Identification and Authentication Techniques Identification works with authentication, and is defined as a process through which the identity of an object is ascertained. Identification takes place by using some form of authentication. Authentication Types Example Something you know...

Words: 17808 - Pages: 72

Premium Essay

Syllabus of Mba 3rd Trim(Gitam, Hbs)

...Participation | 5. | HMPRBA 305 | Marketing Research | 6. | HMPRBA 306 | Financial Management | 7. | HMPRBA 307 | Operations & Supply Chain Management | 8. | HMPRBA 308 | Innovation Management | 9. | HMPRBA 309 | Current Business Affairs & Soft Skills | 10. | HMPRBA 310 | Minor Project (8 weeks) & Viva - Voce | HMPRBA-301: Strategic Management The objective of this course is to acquaint students with the concepts, methods and tools of strategic management and their application in industry. UNIT I: Strategic Management-Basic process of strategic management; Benefits and limitations of strategic management; Goals and objectives, Business Vision, Mission and Objectives. UNIT II: Environment and Resources Analysis: Environmental Analysis, Industry and Competitive Analysis, the External Factor Evaluation (EFE) Matrix, Competitive Profile Matrix (CPM), Internal Analysis; Internal Factor Evaluation (IFE) Matrix, Porter’s Five Forces Model, SWOT Analysis and VRIO framework. UNIT III: Strategy Formulation: Porters Value chain - Generic competitive strategies - Portfolio Analysis and its limitation - BCG matrix and GE matrix - Building competitive - advantage for a firm - Strategy versus tactics and making a Strategic Choice - ‘Blue Ocean Strategy’. UNIT IV: Strategy Implementation and Control: Corporate Strategy - Business Strategy - Functional Strategy and Global Strategy - Issues in Strategy Implementation and Balanced Score Card. UNIT V: Corporate...

Words: 2945 - Pages: 12

Premium Essay

Pcm Guideline

...in the OSCE A Manual for Programme and Project Managers Organization for Security and Co-operation in Europe Development, Coordination and Design This manual is designed and developed by the OSCE Secretariat’s Conflict Prevention Centre, Programming and Evaluation Support Unit (CPC/PESU). Main Author: Sebnem Lust, Programme and Project Evaluation Officer Co-Authors: Laura Vai, Head of Programming and Evaluation Support Unit Sean McGreevy, Project Co-ordination Officer Editor: Keith Jinks Designer: Nona Reuter Published by the Organization for Security and Co-operation in Europe OSCE Secretariat CPC/PESU Wallnerstrasse 6 1010 Vienna Austria Telephone: +43 1 514 36 6122 Fax: +43 1 514 36 6996 www.osce.org Email: pcc-at@osce.org © 2010 OSCE ISBN: 978-92-9234-301-9 Rights and Permissions: All rights reserved. The contents of this publication may be freely used and copied for educational and other non-commercial purposes, provided that any such reproduction is accompanied by an acknowledgement of the OSCE as the source. ii Acknowledgements This manual contains comprehensive guidance on how the Organization for Security and Co-operation in Europe applies the Project Cycle Management method and the Logical Framework Approach to its project work, as well as essential information on the political, programmatic, regulatory and information technology aspects of project management. The manual’s purpose is to ensure coherence, consistency and transparency of project work across...

Words: 66299 - Pages: 266