1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Temka [501]
3 years ago
10

Data were collected in twenty major urban areas on the percent of women in the labor force. Data were collected in 1968 and agai

n in 1972. Gains or losses in this percent were the basis for discussing whether or not there had been an increase in percent of women in the labor force over the period. What kind of design was this?
Business
1 answer:
garri49 [273]3 years ago
6 0

Answer: Matched pairs design

Explanation:

A matched pairs design is a type of study used when 2 treaments are present in an experiment. The individuals in the design can be divided into pairs using a blocking variable, and each pair can then be allocated to treatments at random. This is thus a special type of randomized block design.

In this case the blocking variable can be the various urban areas as 1968 is matched against 1972. Each city can be compared based on 2 measurements. From their each individual can be grouped into pairs and allocated to different treatments.

You might be interested in
ssume you are the Chief Information Officer (CIO)1 of the company that you dream of (any company, real or hypothetical). Give a
MAVERICK [17]

Answer: External threats are almost always malicious, with data theft, vandalism, and disruption of services all possible goals. Internal threats can be equally vicious and may also include blackmail or other illicit activities. Internal threats, however, are not always malicious

Internal threats originate from within the organization. The primary contributors to internal threats are employees, contractors, or suppliers to whom work is outsourced. The major threats are frauds, misuse of information, and/or destruction of information.

Explanation: An internal threat refers to the risk of somebody from the inside of a company who could exploit a system in a way to cause damage or steal data.

Employee Sabotage and Theft. ...

Unauthorized Access by Employees.

Weak Cyber Security Measures and Unsafe Practices. ...

Accidental Loss or Disclosure of Data

The following are ways to prevent Internal and External Security Threats :

1. Access data vulnerabilities, Penetration testing tools can be adopted to check the vulnerabilities or weak areas in the software systems. ...

2. Calculate Risk Scores. ...

3. Train Your Workforce. ...

4.Remove excessive privileges. ...

5.Encrypt Data. ...

6. Embrace the cloud.

8 0
3 years ago
Pepper Department store allocates its service department expenses to its various operating (sales) departments. The following da
just olya [345]

Answer:

$32,160.00  

Explanation:

Each of the expenses would be allocated as follows:

Advertising expense =   (300,000/1,000,000) ×  30,00  =9,000

Rent            (  3400/10,000 24000) ×   24,000 =   8,160

Administrative expenses  (8/24 ×  45,000)  =  15,000

Total expense allocated to Department B

= 9000+ 8160 + 15000

= $32,160.00  

4 0
3 years ago
Read 2 more answers
General motors’ stand against apartheid in south africa was based upon what came to be known as _____. the human rights moveme
vovikov84 [41]
The answer is Sullivan Principles. General Motors embraced what came to be named as Sullivan principles. This is name after Leon Sullivan which is also a member of GM's Board of Directors. Sullivan contended that it was morally right for GM to function in South Africa so long as two circumstances were satisfied. First, the company should not follow the apartheid laws in its own South African operations. Second, the firm should do all within its power to endorse the elimination of apartheid laws.
5 0
3 years ago
If a software package is purchased, consider a _____, which offers additional support and assistance from the vendor.​
GalinKa [24]
If a software package is purchased, consider a supplemental maintenance package which offers additional support and assistance from the vendor. 


Supplemental maintenance with assist in future issues while using the software. These can range from not working correctly or just needing a few tips on how to use the software. Most companies that sell software or electronics, offer these.
7 0
3 years ago
What are the five primary factors of production?
Lina20 [59]
Land, labor, capital, and entrepreneurship
7 0
3 years ago
Other questions:
  • Which stage of the selling process deals with the actual point of sale where the customer agrees to buy? Which stage relates to
    6·1 answer
  • What will be the result when managers use new forms of organizing?
    15·1 answer
  • At Flo Valley Manufacturing, workers are encouraged to find their own solutions to problems, and to implement their solutions wh
    6·1 answer
  • A successful TQM program incorporates all of the following except __________. ANSWER Unselected benchmarking Unselected centrali
    8·1 answer
  • Krizun Industries makes heavy construction equipment. The standard for a particular crane calls for 14 direct labor-hours at $16
    6·1 answer
  • Purvis Manufacturing, which produces a single product, has prepared the following standard cost sheet for one unit of the produc
    11·1 answer
  • What options are available on the Group, Sort, and Total pane? Check all that apply.
    7·2 answers
  • The sales returns and sales allowances accounts are classified as
    9·1 answer
  • The means by which the U.S. Bureau of Labor Statistics determines who is employed and unemployed is a ______.
    9·1 answer
  • The entry and exit of firms in a purely competitive industry help to improve resource allocation because:_______
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!