Suppose you wish to study the relationship between the number of 'likes' on Facebook and the number of 'friends' one has on Facebook. Describe the statistical technique you would use.  ?

What will be an ideal response?


?I would the linear regression technique to study the relationship between number of 'likes' one gets and the number of friends one has on Facebook. The number of friends will be the independent or predictor variable. The number of likes will be the dependent variable. We expect a positive association between the two variable and we can expect a positive slope in the the linear regression. I would like to see an r-squared value of 0.70 or higher to ensure that at least 70% of the variability in the dependent variable is described by the linear regression.?

Computer Science & Information Technology

You might also like to view...

You can specify scaling to reduce or enlarge a worksheet for printing.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1) The default case is required in the switch selection statement. 2) The break statement is required in the default case of a switch selection statement to exit the switch properly. 3) The expression (x> y && a< b) is true if either the expression x>y is true or the ex- pression a< b is true. 4) An expression containing the || operator is true if either or both of its operands are true. 5) A given array can store many different types of values.

Computer Science & Information Technology

When establishing security in a database for implementation, Access routinely requires opening the file in Exclusive Access mode

Indicate whether the statement is true or false

Computer Science & Information Technology

A security architect is designing an enterprise solution for the sales force of a corporation which handles sensitive customer data. The solution must allow users to work from remote offices and support traveling users. Which of the following is the MOST appropriate control for the architect to focus onto ensure confidentiality of data stored on laptops?

A. Full-disk encryption B. Digital sign C. Federated identity management D. Cable locks

Computer Science & Information Technology