Need help? We are here

# CS628 – Data ScienceWeek 12 AssignmentMonroe CollegeNote: Read the resources posted in week 12 folder and the chapter 7 of the ebook

CS628 – Data Science

Week 12 Assignment

Monroe College

Note: Read the resources posted in week 12 folder and the chapter 7 of the ebook in

the week 12 folder (Python for Data Analysis).

Solve the following problems 1 to 3, work with the Nutrition_subset data set. The data set

contains the weight in grams along with the amount of saturated fat and the amount of

cholesterol for a set of 961 foods. Use Python.

1. The elements in the data set are food items of various sizes, ranging from a

teaspoon of cinnamon to an entire carrot cake.

a. Sort the data set by the saturated fat (saturated_fat) and produce a listing of

the five food items highest in saturated fat.

b. Comment on the validity of comparing food items of different sizes.

2. Derive a new variable, saturated_fat_per_gram, by dividing the amount of

saturated fat by the weight in grams.

a. Sort the data set by saturated_fat_per_gram and produce a listing of the

five food items highest in saturated fat per gram.

b. Which food has the most saturated fat per gram?

3. Derive a new variable, cholesterol_per_gram.

a. Sort the data set by cholesterol_per_gram and produce a listing of the five

food items highest in cholesterol fat per gram.

b. Which food has the most cholesterol fat per gram?

Solve the following problems 4 to 6, work with the adult_ch3_training data set. The
response is whether income exceeds \$50,000. Use Python.

4. Add a record index field to the data set.

5. Determine whether any outliers exist for the education field.

6. Do the following for the age field.

a. Standardize the variable.

b. Identify how many outliers there are and identify the most extreme outlier.

Order a Similar Paper and get 15% Discount on your First Order

## Related Questions

### Complete the assignment instructions in the Assignment 1 — Working with Codes document.  HAVING FUN WITH CODES

Complete the assignment instructions in the Assignment 1 — Working with Codes document.  HAVING FUN WITH CODES 1. Read about Cesar Ciphers. Visit the Cryptography Tutorial and decode the three strings shown. Cut and paste the decoded answer and record the value of the shift key for each. 1a ___________________ _____ 1b

### 1.Often budgets are a major concern for many organizations with the constant changes and ongoing advances in cybersecurity. Research compensating

1.Often budgets are a major concern for many organizations with the constant changes and ongoing advances in cybersecurity. Research compensating controls and provide a solution for the scenario: You head up a small team of IT and cyber professionals tasked with ensuring network security. A recent malware has come to

### culture of innovation in IT operations and integrate IT innovation

culture of innovation in IT operations and integrate IT innovation

### file attachedRead “Case 10.3: Amazon” and write an essay that answers the following questions: 1. What is the importance of

file attached Read “Case 10.3: Amazon” and write an essay that answers the following questions: 1. What is the importance of logistics in Amazon’s business model? 2. How has Amazon used AI and machine learning to improve its supply chain management and customer experience? 3. What are the benefits of

### Describe the network topologies, the devices, cabling, and connectors used in networking, and the tools used in network

Describe the network topologies, the devices, cabling, and connectors used in networking, and the tools used in network troubleshooting. Instructions: Responses should include direct questions.

### Instructions:Using Active Directory Group Policy Objects (GPO) or Microsoft Baseline Security Analyzer (MBSA) discuss how one would use them to

Instructions: Using Active Directory Group Policy Objects (GPO) or Microsoft Baseline Security Analyzer (MBSA) discuss how one would use them to secure the network. Describe the importance of having privileged and non-privileged states within an organization. List any observations, tips or questions about this lab that would prove helpful

### The case study and the instruction to the assignment is attached. Winter, 2021 IFSM301Case Study: GG Freightways (GGFRT) GGFRT is a regional

The case study and the instruction to the assignment is attached.  Winter, 2021 IFSM301 Case Study: GG Freightways (GGFRT) GGFRT is a regional transportation and distribution company in operation for over 30 years. The company serves major cities in the southwestern region of the United States. Their headquarters (1), terminals/warehouses

### Assignment 1: Conceptual Modelling & Logical DB Design

Assignment 1: Conceptual Modelling & Logical DB Design

### Using the LC-3 simulator, construct an assembly-level program (write the complete assembly code for lc3 simulator) that prompts the user for a starting

Using the LC-3 simulator, construct an assembly-level program (write the complete assembly code for lc3 simulator) that prompts the user for a starting address (in hex) and an ending address (in hex). Your program will then output the contents of memory (in hex) between the provided ranges (inclusive).

### Topics  1. What Researchers have learned about the Privacy Concerns in IoT Data Collection and Transmission

Topics  1. What Researchers have learned about the Privacy Concerns in IoT Data Collection and Transmission

### 3/25/24, 9:24 PM Assignment Information1/4IT 200 Project One Technology Hardware and Software Guidelines and RubricCompetencyIn this

3/25/24, 9:24 PM Assignment Information 1/4 IT 200 Project One Technology Hardware and Software Guidelines and Rubric Competency In this project, you will demonstrate your mastery of the following competency: Describe the technologies, hardware, and software used within the information technology �eld Scenario You are working as a contracted information

### Check the attachmentsPlease read the instructions and questions carefully in ” Assignment_5_2024_Fall.pdf” file and use “Auto.csv” to finish the as

Check the attachments Please read the instructions and questions carefully in ” Assignment_5_2024_Fall.pdf” file and use “Auto.csv” to finish the assignment. You should submit both 1) an R code ; 2) A PDF report with answers through the link “Submit Assignment 5 Here”. Guidelines: · Use only R for this

### check the attachementsPlease read the instructions and questions carefully in ” Assignment_4_2023_Fall.pdf” file and use “Auto.csv” to

check the attachements Please read the instructions and questions carefully in ” Assignment_4_2023_Fall.pdf” file and use “Auto.csv” to finish the assignment. You should submit both 1) an R code ; 2) A PDF report with answers through the link “Submit Assignment 4 Here” Guidelines: · Use only R for this

### Check the attachments Please read the instructions and questions carefully in ” Assignment_3_ 2024.pdf” file and use “Auto.csv” to

Check the attachments  Please read the instructions and questions carefully in ” Assignment_3_ 2024.pdf” file and use “Auto.csv” to finish the assignment. You should submit both 1) an R code ; 2) A PDF report with answers through the link “Submit Assignment 3 Here”. Guidelines: · Use R only for

### · A separately link listed below this posting contains al list case studies. Choose a case study from the list and read the information

· A separately link listed below this posting contains al list case studies. Choose a case study from the list and read the information provided. Then read 5 crucial elements in conducting a crisis audit reading in this link: After summarizing the company’s situation, using the 5 elements provided, explain

### Networking Project FeedbackI recommend removing the packet and circuit switching out since another student is covering that. Let the focus be on

Networking Project Feedback I recommend removing the packet and circuit switching out since another student is covering that. Let the focus be on the MAC sublayer that needs elaborate research to pull up the infographic and the video. These are not just pictures but gateways to learning. Be creative and

### Assignment Content 1. Top of FormIn this final case sudy, our focus will be in development of an effective crisis plan. Again, you

Assignment Content 1. Top of Form In this final case sudy, our focus will be in development of an effective crisis plan. Again, you can use the hyperlink provided in the reading to prepare your response on how well KFC responded to (or handled) this crisis. KFC and the shortage

### Chapters 8 and 9 Chapters 8 and 9Hogaboam, L., Chan, L., Cao, R. (2022). Applied Artificial Intelligence in Business: Concepts and Cases. Switzerland:

Chapters 8 and 9 Chapters 8 and 9Hogaboam, L., Chan, L., Cao, R. (2022). Applied Artificial Intelligence in Business: Concepts and Cases. Switzerland: Springer International Publishing.