...This would give you the range of the scores. i.e. 20 being the highest minus 2 being the lowest number and therefore the range would be 18. Pros- It can be easy to calculate. Cons- The results can be distorted due to extreme values, and this can have a negative impact on the range. Z scores- The z score, also knows as a ‘standard score’ is a very useful statistic because it allows you to calculate the probability of a scores occurring within our normal distribution. The value of z represents the distance between the raw score and the population mean in units of the standard deviation. The z is a negative when the raw score is below the mean, but a positive when the z is above the mean. Pros- score’ is a very useful statistic because it allows you to calculate the probability of a scores occurring within our normal distribution. It allows you to compare two raw scores that are from different tests. Cons- Predictions about the future are never 100% accurate, and that they always assume a normal distribution, when it may not be as accurate. Standard deviation – is a measuring how much the members of a group differ from the mean value for the group. The most common scores are recorded, but the scores from either end of the scale can be...
Words: 450 - Pages: 2
...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas: Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA NT2580 NT2670 Introduction to Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to Security Auditing for Compliance Countermeasures Information Security Email and Web Services NT1230 NT1330 Client-Server Client-Server Networking I Networking II IS3230 IS3350 NT1230 NT1330 Issues Client-Server Client-Server SecurityContext in Legal Access Security Networking I Networking II NT1110...
Words: 2305 - Pages: 10