PSY 520: Module Eight Problem Set Questions

Regression Analysis


Use the data set in the Problem Set Data document. The data is in Excel format. The first tab of the spreadsheet lists the data, and the second tab is a key to the labeling of the data. (Note: This is the same data set used for the exercises in Modules Six and Seven.)


  1. Use both number of previous math courses taken and phobia rating to predict scores on the stats quiz (method = enter in SPSS). Are both predictors contributing significantly to the regression model? How do you know?


    1. SPSS output:


    1. Results write-up in APA format, including the interpretation of test results:

(see this link:






  1. Repeat the first exercise, adding mathquiz as a third predictor and provide the SPSS output. Is prevmath still a useful predictor? Explain. Write up the results in APA format, including the interpretation of test results.


a. SPSS output:



  1. APA write-up:



  1. Interpretation of adding math quiz scores to the regression model




What conclusion can you  draw about Commander 1's personality?

The U.S. Department of Homeland Security has identified what is determined to be critical infrastructure assets that are designated as potentially being of terrorist interest. Although the final responsibility and mission for protecting those assets and sectors of each remains with the DHS, the initial accountability rests with local ownership and authorities.

The DHS has formulated a National Infrastructure Protection Plan to explain and describe the national responsibility. A very significant majority of the infrastructure elements are under private or corporate ownership and maintenance and must share the bulk of responsibility for protection and security under their own mission plans for security.

Assignment Guidelines

  • Address the following in 3–4 pages:
    • What is the National Infrastructure Protection Plan (NIPP)?
      • When was it created?
      • Who created it?
      • Why was it created? Explain.
    • How important is the private sector with regard to critical infrastructure protection? Why?
    • What types of strategies can be used for critical infrastructure protection (CIP)?
      • What strengths currently exist in the United States with regard to CIP? Explain.
      • What weaknesses still need to be addressed? Why?
    • How can federal agencies effectively cooperate with private sector organizations? Explain.
      • What types of information should be disseminated to private sector organizations that are responsible for key assets? Explain.
      • What types of information, if any, should be withheld from the private sector? Why?
  • Be sure to reference all sources using APA style.

Read the 10-page report titled Information Sharing, Dot Connecting and Intelligence Failures: Revisiting Conventional Wisdom, by Russell Travers (2009). To access the report, click on the following link, and then scroll down to the bottom of the page. At the bottom, click on the link with the same title as the report:

National Counterterrorism Center Web site

Travers argues that information sharing in general has improved significantly since the attacks of 9/11. He proceeds to deconstruct many popular arguments made by others claiming that intelligence gathering and information sharing, as practiced by entities in the United States today, are flawed. He also discusses legal, policy-based, and regulatory obstacles that impair reasonable intelligence and information collection and processing.

After reading this piece, complete the following:

  • Define (that is, "operationalize") the concepts of intelligence versus information.
  • Do differences in these terms matter?
  • How might either be easier—or more difficult—to share with other agencies?

    • Also consider if some levels of government or sectors of society might be more or less amenable to sharing information. (For example, private sector entities that own and operate critical infrastructure upon which the nation or communities rely might hesitate to share proprietary information that makes them less competitive, economically. Is their reluctance reasonable?)
  • Research, summarize, critically evaluate, and report at least 3 of the significant information-sharing problems and challenges (and key agencies) reported in the 9/11 Commission Report.
    • For each of these challenges, use or dispute at least 2 of Travers’ main arguments that he makes in his paper to explain or justify these challenges.
  • Make certain to connect Travers’ arguments to the report’s challenges that you select.

LASA 2 Identity Formation

We have learned that adolescence is a time of transition between childhood and adulthood. A critical milestone of this stage is the ability to successfully achieve a sense of identity. Around the world, there are different rites of passage to mark the transition to adulthood. In the United States, this might include obtaining a driver's license, landing one's first job, senior prom, or high school graduation. In this assignment, we will explore the role that family and society play in the development of the individual's sense of self.

By Monday, April 6, 2015, create two documents for parents of minority teens 1) A 9–12-slide PowerPoint presentation (complete with speaker's notes) and 2) an accompanying 1–2-page handout/flier in Word document or PDF format. Be sure that both illustrate the following:

  1. Describe common rites of passage from two cultures around the world and compare them to a common American rite of passage.  Possible resources might include National Geographic and the Argosy University Online Library.
  2. Compare and contrast these rites to common US rites of passage. Do they coincide with the physical, cognitive, or socioemotional changes taking place at this age? Describe which specific changes (physical, cognitive, or socioemotional) they coincide with. Does this explain their importance in a particular culture?
  3. How might such a social ritual, such as a rite of passage, influence the identity formation process of adolescents?
  4. In light of Erikson and Marcia's theories, discuss how the process of identity development is affected when the adolescent belongs to a minority group (racial, ethnic, sexual, or religious). Be sure to explain these theories and how they apply to identity development.
  5. Summarize research from at least two peer-reviewed* studies on the effect of minority status on identity development, ensuring you describe the main findings of the study as well as the research methods used to study the topic.  
  6. Apply the information you gathered from the online notes, textbook, and research articles to provide at least three practical recommendations for what the family, school, and community can do to ease the process for adolescents.

*Peer-reviewed means an article from a reputable journal, which can be found in the Argosy University Online Library. Peer reviewed indicates that other professionals in the field have reviewed and deemed it worthy of publication, in contrast to much if what we find online: someone posting something he or she wants to, without someone else verifying that the research methods were rigorous enough and the study is valid. Use your textbook and course lectures as your primary resources, as well as articles from the Argosy University Online Library. If you must supplement from a website, do NOT use .coms. Instead, look for .org, .gov, and sometimes .edu for more reputable sources. Never use Wikipedia or

This assignment is worth 300 points and will be evaluated according to the rubric. Study the rubric carefully before you start work and refer to it periodically to complete this assignment.

By Monday, April 6, 2015, deliver the slideshow and the handout/flier to the M5: Assignment 1 Dropbox.

3-5 page paper on the importance of maintaining academic honesty. This

paper must be in proper APA format with 3-5 peer reviewed references


Please note that the title page and references page do not count in the required page count. It needs to be double-spaced and in APA format. It should not contain personal matters, and it should not be written in first person or second person (you should not use any of the following: I, me, my, we, our, you, your, etc.). It needs to be written using academic third person writing, as you would any academic paper in class.


Incident Details

Course ID: PSY/240, Start Date: December 12, 2011

Faculty: William Longstreet

Assignment Details:

Your week 4 assignment To Eat or Not to Eat posted to the Assignment link on

January 22, 2012 - contained a significant match to another student's paper

submitted on April 22, 2011.


ATT: this needs to be 0% plagiarism!!!




This is the site 

it is a calculus 3 assignment

There are 7 sections and there are 37 questions 

so each question $1 and it will be $37 

assume  the random variable x is normally distributed with mean u=86 and standard deviation o=4. find the indicated probability. P(73<x<80.