Free Essay

Statistic, Use of Mac and Window

In:

Submitted By Charkyqz
Words 1168
Pages 5
Executive Summary

Through our daily observations, we see that a considerable number of SIM students have begun using Apple Macintosh computers. This is despite the fact that SIM’s existing hardware infrastructure does not support the use of a Macbooks (or Macs for short).

This report sets out to investigate whether or not SIM’s Integrated Information Technology Services (IITS) department should seriously consider updating the university’s hardware to keep up with SIM students changing usage. A statistical analysis of our findings is conducted.

Based on anecdotal observations, we hypothesized that 30% of the school population use an Apple Macbook. We then carefully conducted an online survey of 51 SIM students, ensuring a stratified sampling which reflects the distribution of the university’s student population. After conducting an upper tailed one-sample z test, we obtained sufficient evidence to reject our null hypothesis.

Based on our proportionate sample, we found out that more than 30% of our school population use an Apple Macbook. The large proportion of students using Apple Macbooks warrant an initiative by IITS to equip and update the school infrastructure with Mac-friendly software and hardware. The preference for an Apple Macbook has transformed it from an exotic choice to a popular choice chosen by the school population. We recommend IITS to embark on a feasibility study immediately to update the school’s firmware to support the Mac platform

1. Introduction: The Problem

SIM's existing hardware infrastructure does not support the use of Macs. Students rely heavily on laptops to get their university course work done. Through our daily observations, SIM students are making the switch to using a Mac instead of a laptop with a Windows operating system. Those who use Macs instead of Windows face a lot of difficulties.

Seminar rooms in SIM do not cater to Macs. Existing Mac users have to buy additional add ons to connect to the university’s infrastructure. Courses such as Computer as an Analysis Tool and every course that requires a laptop for use in examinations need the SIM Exam Browser installed. However, the SIM Exam Browser is not compatible with the Mac operating system. The student must completely adjust his system to run the exam browser.

In order to connect to SIM’s wireless network laptops need to use the WLAN-Finder, which is a .exe file. There is no university support for Mac users to connect to the university’s Wi-Fi system. Students have to resort to student-led grassroots Mac communities for advice on Wi-Fi configuration. Project rooms in SIM’s library use a system called WE-Present to link up laptops to screens. This system is incompatible with Macs. Students who use Macs also have difficulty printing on the university network. This is a huge hindrance to Mac users.

Currently, students with Macs need to use loaned laptops from CIT or the bootcamp software. This is troublesome and labour intensive. Furthermore, installing boot camp software to run two operating systems decreases the efficacy of Macs considerably.

2. Hypothesis

We sought to find out, using a sample, SIM's population of mac users versus that of PC laptop users. Our group felt that over 30% of the population would be a large enough figure for CIT to start to provide additional infrastructural and service support for Macintosh users. As such, we hypothesized that the population proportion that use Mac laptops is equals to or less than 30%. If H0 is not rejected, then the population of Mac users is not large enough for CIT to do anything about. If H0 is rejected, then CIT should do something about the infrastructural and service support for Macintosh users. We will conduct a single tailed, one-sample z-test in which:

Null hypothesis, H0: P ≤ 0.3
Alternative hypothesis, H1: P > 0.3
Significance level: 0.05

3. Data Collection

3.1 Population and Sample

We will be using the SIM undergraduate student body as our population, as these are the primary beneficiaries of IITS services. Our sample includes participants across the various schools at SIM. It includes students from year 1 to year 5 from the School of london, School of Bufflo. In our sample, the number of participants chosen per school corresponds with the proportion of each school to the total population of the university. This allows us to receive a more accurate result. As far as possible, this ensures that all sections of the student body are represented in the sample.

Table 1. Date retrieved from the student portal Oasis depicts the current student population per school as follows.

School | Number of Students | Proportion of the Total Student Population (%) | SOL | 2790 | 0.41 approx. | SOB | 1086 | 0.16 approx. | SOT | 845 | 0.12 approx. | SSS | 1064 | 0.16 approx. | SCC | 562 | 0.08 approx. | STL | 506 | 0.07 approx. | Total | 6853 | 100 |

Table 2. shows the breakdown of the sample. The total sample size is 51.

School | Number of Participants | London | 25 | Psychology | 7 | Buffalo | 5 | UOL | 5 | Technology | 6 | Social science | 3 | 3.2 Measurement

We conducted an online survey where 3 questions were asked. These questions are depicted in Figure 1 below. The first measurement question was whether the survey participant used a Macbook or Windows laptop. The second and third questions were for demographical purposes.

Figure 1. Screenshots of online survey questions.

4. Results

After sampling 51 SIM students, the following results were obtained as depicted in the Stem and Leaf diagram below (Figure 2). The number 1 is used to denote survey participants who use Macbooks. The number 2 is used to denote survey participants who use Windows Laptops. Amongst our survery participants, 22 use a Macbook and 29 use a Windows Laptop. Figure 2: Stem and Leaf diagram of the survey results.

5. Hypothesis Testing

Analyzing the sample data, we calculate the standard deviation (σ) and compute the z-score test statistic (z), where n = 51, and p = sample proportion.

σ = sqrt [ P * (1-P) / n ] z = (p – P) / σ

Using PH stat, the values obtained are shown in Figure 3. Since population size is at least 10 times as big as sample size, each sample point can only result in just two possible outcomes and the sample includes at least 10 successes and 10 failures, the conditions are met for the hypothesis testing of a proportion. Also, since n = 51, is sufficiently large, the sample is approximately normal according to the Central Limit Theorem (CLT). No assumption is needed.

As such, the data provides sufficient evidence that the proportion of mac users in SIM are more than 30%.

Figure 3: Screenshot of PH stat result

6. Conclusion & Recommendations

We conclude that there are more Mac users than we actually perceived. The larger than expected minority should be served by IITS. The school’s infrastructure should be optimized for Mac users as the mac users are currently being put in a disadvantageous position which does not optimize their learning experience. We recommend that IITS invest in a feasibility study to ascertain the effects.

Similar Documents

Premium Essay

Macs

...Mac Vs. PC “The biggest ongoing discussion has to be the one that’s dominated the technological world for well over two decades: the Mac vs Pc debate” (Intel.com). Many have debated that Pc is better than Mac while others have debated Mac is better than Pc. Only a few have said that it depends on what it’s used for. If only we had more insight to both sides of Mac and Pc. Many people pick a computer based on what they are used for to and don’t find the computer that’s right for them. Others don’t find out the facts about each computer and just go with the cheapest because it’s cheap, even though they would be getting a cheap computer it can still be the wrong kind of computer for them, plus it wouldn’t work to their advantage. Before reading this you have to dismiss the ideas you had about Mac’s and Pc’s. If you put aside what you think you know about Pc, and Mac you will understand what computer is best for you. “Mac is a line of personal (PCs) designed, developed, and marketed by Inc. It was initially targeted mainly at the home, education, and creative professional markets. Since the introduction of the Macintosh, the computer has seen significant evolution now making it one of, if not the most powerful general-purpose computers on the market. It now targets the business, science, and law markets as well.” “Microsoft Windows is a series of graphical interface operating systems developed, marketed, and sold by Microsoft. Microsoft introduced an operating named Windows on November...

Words: 2127 - Pages: 9

Premium Essay

Populariy and Usage Statistics of Certain Operating Systems

...POPULARITY AND USAGE STATISTICS OF DIFFERENT OPERATING SYSTEMS Submitted by: Bendicion, Divine Grace L. BSCS 3 Submitted to: Prof. Efren Semacio Instructor, Operating Systems Quality of Research (30%)…..…. | ------------------------------------------------- ------------------------------------------------- | Writing Quality (20%) ……….….. | ------------------------------------------------- ------------------------------------------------- | Analytical Strength (30%)….…... | ------------------------------------------------- ------------------------------------------------- | Effort (10%)……………….….…... | ------------------------------------------------- ------------------------------------------------- | References (10%)………….……. | ------------------------------------------------- ------------------------------------------------- | TOTAL ………………………….... | ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- | OVERVIEW AND DATA PRESENTATION A survey over the internet, specifically through Facebook, was done by the researcher from November 28, 2011 to December 2, 2011 to determine the popularity or usage statistics of certain operating systems. A picture with operating systems logos was posted by the researcher including the question “Which operating system do you prefer to use and why?” During this timespan, 71 respondents posted their answers...

Words: 1502 - Pages: 7

Premium Essay

Os on the Web

...Common Internet Operating Systems POS/355 Joseph Lyon University of Phoenix July 10, 2012 There are a number of operating systems that are used on and for the internet. The most common operating systems used today are Microsoft, Linux, and Mac OS. Each of these offer different ways to view the internet (browser), as well as interact with other computer systems via the internet. Each of these operating systems has almost a cult following whose users are very good at them. The most commonly used OS would be the Microsoft line of operating systems. These started from Windows 3.1 and have evolved to the most recent Windows 8. These operating systems are the most commonly used due to the easy to use GUI and Microsoft has one of the largest software libraries out there. Most Companies use a mix of Microsoft and Linux server systems. The most commonly used version is currently Windows XP, but due to the drop of support, will soon be Windows 7. A large factor to the commonality of this OS is due to the gaming industry and social networking sites. With the increase of graphical complexity of games increasing exponentially, the operating systems needed to be more efficient in its utilization of resources. Then, tie in the MMORPG (Massive multiplayer online role playing game), and you need a system that can put graphics and online resources together to allow playability. Why play a game by yourself when you can play online with a huge player base. With the Social...

Words: 820 - Pages: 4

Free Essay

To Thine Own Self Be True"

...QualNet 5.0.2 User’s Guide March 2010 Scalable Network Technologies, Inc. 6100 Center Drive, Suite 1250 Los Angeles, CA 90045 Phone: 310-338-3318 Fax: 310-338-7213 http://www.scalable-networks.com http://www.qualnet.com Copyright Information © 2010 Scalable Network Technologies, Inc. All rights reserved. QualNet is a registered trademark of Scalable Network Technologies, Inc. All other trademarks and trade names used are property of their respective companies. Scalable Network Technologies, Inc. 6100 Center Drive, Suite 1250 Los Angeles, CA 90045 Phone: 310-338-3318 Fax: 310-338-7213 http://www.scalable-networks.com http://www.qualnet.com ii QualNet 5.0.2 User’s Guide Table of Contents Preface................................................................................. xiii Chapter 1 Introduction to QualNet .......................................................... 1 1.1 Overview .................................................................................................................. 1 1.2 QualNet Architecture .............................................................................................. 2 1.3 Scenario-based Network Simulation..................................................................... 4 1.3.1 General Approach .............................................................................................. 4 1.3.2 Creating Scenarios............................................................................................. 4 1.3.3 Files...

Words: 86998 - Pages: 348

Free Essay

Operating Systems Comparison Outline

...Outline I. Introduction MAC OS X is the operating system that is currently being utilized by every MAC being sold. According to “Apple” (2016), “Built on a rock-solid Unix foundation, it’s engineered to take full advantage of what the hardware is capable of”. One of the more popular choices due to its commercial success, MAC OS is a very user-friendly operating system that allows you to work throughout numerous MAS OS devices. II. Memory Management a. Divides random access memory into two sections 1. Differs from Windows and Linux b. Uses system partition 1. Begins at lowest byte of memory 2. Extends upward c. Uses application partition 1. Uses memory contained in its own partition 2. Divided into three parts (Stack, Heap, Global Variables) d. Memory outside of system available for allocation 1. Have multiple applications open and running simultaneously III. Process Management a. Ran by application known as Activity Monitor 1. Comprised of two sections 2. User-Friendly b. Process List 1. View and manage all processes 2. Given Process ID (PID) 3. Unique identifier number c. System Statistics 1. Overview of total load on system 2. Divided into 5 sub categories (CPU, System Memory, Disk Activity, Disk Usage, Network) IV. File Management a. Designed to manage files to reduce disk and hardware usage. 1. MAC OS uses user-friendly software b. Two different applications to manage files 1. Finder 2. Spotlight V. Security a. MAC OS is designed with technologies...

Words: 700 - Pages: 3

Premium Essay

Xuynya

...Table of Contents Introduction 2 Human Aspect 3 Internet Security System10 Mobile Computing16 Conclusion21 References22 Introduction Background of the Company Apple was by two college dropout students: Steve Wozniak and Steve Jobs with the motto of “Think Differently”. In the early 1980s, Steve Wozniak left the company and Steve Jobs hired John Sculley as the President of the company. After facing many failures, Apple launched its Macintosh computers for house hold users. In mid 1980s, Steve Jobs had to leave the company because of his controversial relations with the president. At that time John Sculley rejected the offer of Microsoft‘s CEO, Bill Gates to license the Macintosh operating system to Microsoft. After this refusal, Gates developed DOS operating system and in late 1980s, the competition between DOS and Macintosh decreased Apple's sale, workforce and resignation of John Sculley. So, Apple's current CEO planned to purchase Next Step operating system of Jobs in order to improve the Macintosh operating system. In late 90s Jobs again became the CEO of the company and be started surprising relations with Microsoft by developing a Macintosh version of office software. Apple also took cost saving measures like streamlining the product line, production of printers. Steve Jobs brought Apples' focus on two concepts of consumer series with the prefix “I” for internet like iMac, iBook laptop and professional with prefix “power” such as PowerMac desktop and PowerBook...

Words: 5675 - Pages: 23

Premium Essay

The Byte of the Forbidden Fruit

...market value could never be coined similar to a personal computer. Let's talk about the build of the personal computer; it has more than one manufacturing brand that sells this device. You have Toshiba, Dell, Hewitt Packard, Acer, Gateway, and Samsung just to name a few. Each of these companies have there own way of custom building these devices. Take for instance, the device the laptop. The average laptop weighs about 5.48lbs give or take, depending on the manufacturing of the brand. Then there is Apple Inc. device it is the only manufacture of Macintosh. The average laptop device: MacBook Pro 4.5lbs and the Mac Air are 3lbs now that's a lighter load to carrier. Just because, the Mac is lighter to carry this doesn't siphoned its ability in operation. The PC operating system is created by Microsoft and Windows is the only operating system that can run on a PC. The Mac is the only computer in...

Words: 977 - Pages: 4

Free Essay

Buying a Pc

...gain an understanding of the tool and the types of measurements it can take. For this Lab you will need to install TracePlus/Ethernet on your (Windows) computer. (If you have a Mac, the application works fine in VMWare, Parallels, etc. Alternatively, you may use WireShark, Capsa Free, or Packet Peeper, as identified below). In addition to your textbook, refer to your notes taken during the demo of the tool in class. Open the app and select the proper capture interface (Ie – e01, e02, etc. These are your wired connections and wireless connection interfaces, if you have wireless. You may need to try various Ethernet Ports to find some data and get connected to the right interface. You will know you are collecting data when you see packets of information are being displayed. You will see an entry for each packet that arrives). Once the application running and collecting packets of data, as demonstrated in class, do the following: (1) Launch a YouTube video in your browser. Notice the increase in Packets. If you are using TracePlus, you can also see the increase in Bandwidth and %Bandwidth on the virtual Dashboard. Record the number of Packets. Look at the total inbound and outbound traffic. Which is greater and what are the values? (Tip: if you are using Wireshark, which does not have the visual dashboard, look under “Statistics” and “Conversations” to locate this information. For example Packets A->B is out and Packets A<-B is in. For Packet Peeper, you will...

Words: 988 - Pages: 4

Premium Essay

Operating System Comparisons

...Operating System Comparisons PRG/355 January 14, 2013 Steven Kernan Operating System Comparisons Table of Contents Introduction 3 Memory Management 3 File Management 4 Security 4 Conclusion 4 Reference 5 Introduction An operating system (OS) is software that manages the hardware and software resources of a computer system. Basically an OS is a set of libraries or functions which programs may use to perform specific tasks relating to interfacing with computer system components (The Computer Technology Documentation Project, n.d.). Advantages and disadvantages exist in every operating system. Reviewed in this paper is a comparison of some of the primary responsibilities of popular operating systems. The review includes Unix/Linux, Mac, and Microsoft Windows operating systems. Memory Management An important function of the OS is to manage the computer systems memory. Programs, processes, and resource do not simply float around in memory haphazardly. Memory is shared among these processes and resources. Accordingly, managed by the OS is an organized structure of locating processes in computer memory locations. The two primary types of memory controlled by an OS are main memory and virtual memory. Main memory is… (need general definition). Virtual (secondary) memory is… (need general definition). Intended memory management requirements include relocation, protection, sharing, logical organization, and physical organization. Processes may...

Words: 1019 - Pages: 5

Free Essay

Acceleration Incline

...Teacher’s Guide - Activity P03: Acceleration on an Incline (Acceleration Sensor) |Concept |DataStudio |ScienceWorkshop (Mac) |ScienceWorkshop (Win) | |Linear motion |P03 Acceleration.ds |(See end of activity) |(See end of activity) | |Equipment Needed |Qty |Equipment Needed |Qty | |Acceleration Sensor (CI-6558) |1 |Dynamics Cart (inc. w/ Track) |1 | |Angle Indicator (inc. w/ Track) |1 |Meter stick |1 | |Base and Support Rod (ME-9355) |1 |1.2 m Track System (ME-9429A) |1 | What Do You Think? When a sled accelerates down a snow-covered hill, on what does its acceleration depend? You may want to consider the height of the hill, the slope of the hill and the mass of the sled. How does its acceleration depend on the variable(s) you selected? Take time to answer the ‘What Do You Think?’ question(s) in the Lab Report section. Background A cart on an incline will roll down the incline as it is pulled by gravity. The direction of the acceleration due to gravity is straight down as shown in the diagram. The component...

Words: 1981 - Pages: 8

Free Essay

Software Engineering

...after a conversion had finished. Added the option to reduce CPU time to the conversion engine during a conversion. Changed the File menu's "Open Error Log" item to "Open Log". Added the option to print the conversion engine's messages by using the File menu's "Print Engine Messages" item. Added the ability to remove files from the file list by using the keyboard's delete button. Fixed a problem with conversions failing because the user attempted to start converting seconds after the program started. Added the ability to use ffmpeg-0.5 on Mac OS 10.1 to 10.3! Be able to convert some of the newest videos on older versions of the Mac OS! Added the ability to use ffmpeg-0.5 (x86 version) on Mac OS 10.4 running on an x86 processor (huge speed up). Disabled the Test button in the preferences when a test was taking place. Added the ability to select the text in the Additional Commands window. Removed the resize handle from the Additional Commands window. Improved support for unicode characters in...

Words: 1120 - Pages: 5

Premium Essay

Nmnmnnm

...User Guide YML864 Rev1 www.netcomm.com.a� ����4 ��e�� ����e 54Mbps Wireless Router 1 NB504 CoNteNts Package Contents .........................................................................................................................................4 Chapter 1: About this Guide ..........................................................................................................................5 1.1 Purposes ...........................................................................................................................................5 1.2 Conventions .......................................................................................................................................5 1.3 Overview of this User Guide ................................................................................................................5 Chapter 2: Introduction .................................................................................................................................6 2.1 Overview of the Router........................................................................................................................6 2.2 Features ............................................................................................................................................7 2.3 Panel Layout ......................................................................................................................................8 2.3.1 The Front...

Words: 19282 - Pages: 78

Premium Essay

Pcs Versus Mainframes

...little programs (lines of code) placed inside my personal computer to help it run smoothly and efficiently. Which it is. But not until recently did I discover that operating systems must also be used in larger mainframes and servers as well. After all, servers are computers too! And any computer, regardless of its size or purpose, needs internal instructions. It needs a set of executable code that makes the thing come alive. Operating systems are the soul of all computers everywhere. This begs a question or two: what types of OS’s are out there? And how do they differ from the one in my Mac? Also, if I wanted to swap out my current operating system for a different one (my friends keep telling me about all of the great things they’re doing with Linux), how easy of a task would that be? The most common OS for a desktop (or a laptop) in use today is Windows 7 ("Os Platform Statistics", 2012). But what about the operating systems which are used by small and large companies that host web pages? Or store hundreds of thousands (if not millions) of large data files in a centralized data center? Or provide search engine services? Companies like Google, facebook, and Yahoo!, maintain their own, internal OS’s, which are designed to serve, store and manipulate data according to the needs of the public. (Consider how Google started out as nothing more than a search engine with fancier algorithms than “the other guys”, and how Google now offers products like online documents, gmail...

Words: 2332 - Pages: 10

Premium Essay

Apple

...The Apple Company is launching a new fall campaign titled, “The Big Apple!” to promote the sales of its new laptop computer, the Mac Book Pro. Featuring the campaign in New York City, Apple stores will be selling the new MacBook Pro laptops with three new cover designs. Known for its simplicity in computer design, Apple expects to ‘wow’ audiences with a departure from the usual look and a venture into new creative territory. Aimed at (but not limited to) the creative personalities that make up fast-paced and glamorous New York City, the campaign is expected to be a big success. The campaign will consist of a city-wide contest where applicants can design a cover that involves some of the elements that represent New York City and then send their idea in to Apple. The judges will then pick one of the designs to be featured alongside the two other covers which will be created by two different icons in New York city which Apple will have personally picked. One will be an up-and-coming designer, the other an artist. By doing this, Apple creates a connection between the people in the city, the culture, and their own brand. The campaign will run from September through till December, during which time the contest will be held, the designs finalized, and the new Mac Books will be available for purchase. Target Audience/Market: In terms of the target audience that Apple is looking to focus on with their campaign, there are a few demographics that the company would like to adhere...

Words: 1957 - Pages: 8

Free Essay

Unix, Linux, Mac Os, Windows Os Comparison

...Introduction The most commonly known Operating Systems (OS) today are UNIX, Linux, MacOS, and Windows. These operating systems all behave in their own way and similar in others. This paper will discuss this comparison of how these operating systems utilize memory, process handling, file management, and security. Memory Management Each operating system is required to allocate a certain amount of memory for the operating system itself for the processes that are being used or executed. There are two places memory exists: physically on the motherboard of the computer and within the operating system itself. When the operating system dynamically divides the memory usage between these two areas, this is called memory management. Each operating system manages memory different from the others; however they all follow some basic rules of memory management. All of the operating system’s memory management in general follows these requirements: relocation, protection, sharing, logical organization, and physical organization (Stallings, 2015). Relocation of memory is the process that allows the operating system to move a process or file from physical memory to virtual memory and back again, depending on the need for that data. Virtual memory exists within the operating system which uses the hard drive to store temporary information and physical memory is located on the motherboard of the computer. While the process is in memory, protection of that area needs to be enabled to...

Words: 2918 - Pages: 12