Conduct an exploratory analysis of the creditdata.csv data

Assignment Help Computer Engineering
Reference no: EM13324482

Task 1 consists of the following sub tasks:

a) Assignment 2 requires that you research and critically evaluate literature surrounding the problem of effectively assessing loan applications for credit worthiness. Credit worthiness assessment reduces the risks associated with lending by determining which potential  loan applications are considered to be good, or alternatively a poor, credit risk and should on that basis be approved or rejected. Good risk management of loan applications can significantly improve the bottom line of financial institutions such as banks, building societies and credit unions. This research will inform your assessment of the credit data set which is provided forAssignment 2 (About 700 words).

b) Conduct an exploratory analysis of the creditdata.csv data set which is provided on the course study desk to identify what you consider to be top five key variables which contribute to determining whether a potential loan applicant is a good credit risk or a bad credit risk. Note
you should also refer to the data dictionary provided with the creditdata.csv file as this document defines each of the variables and their range of values. Discuss each of your five top variables in about 200 words in terms of the results of your exploratory data analysis using
RapidMiner data mining tool and the relevant supporting literature on credit assessment. Your discussion should also include appropriate statistical analysis results including graphs and tables produced from an exploratory data analysis using RapidMiner data mining tool (about
800 words).

Task 2 (Worth 40 marks) consists of the following sub tasks With the following excel file bicycle-sales.xlsx provided on the course study desk use Tableau 8.0 or a pivot table to produce the four following reports with appropriate accompanying graphs and briefly comment on each report/graph in about 125 words in terms of what trends and patterns are apparent in each report.

The bicycle sales.xlsx file contains the following dimensions and information:
1. Region
2. Sub Region
3. Market
4. Customer
5. Business Segment
6. Category
7. Model
8. Colour
9. Sales Date
10. Sales Period
11. List Price
12. Unit Price
13. Order Quantity
14. Sales Amount

a) Create a report and accompanying graph using Tableau 8.0 or a pivot table that lists by sub region, business segment and model for all mountain bikes sold for the years 2002, 2003 and 2004 and comment on key trends and patterns in this report (125 words approx.)

b) Create a report and accompanying graph using Tableau 8.0 or a pivot table that lists by region, sub region, business segment, unit price and list price for all bicycle clothing for the years 2002, 2003 and 2004 and comment on key trends and patterns in this report (125 words
approx.)

c) Create a report and accompanying graph using Tableau 8.0 or a pivot table that lists by region, sub region, business segment and model for all the road bicycles in order of the total sales for years 2002, 2003 and 2004 and comment on key trends and patterns in this report
(125 words approx.)

d) Create a report and accompanying graph using Tableau 8.0 or a pivot table that lists by category, model, order quality and colour for all bicycles for the years 2002, 2003 and 2004 and comment on key trends and patterns in this report (125 words approx).

Reference no: EM13324482

Questions Cloud

What is the maximum speed of the bob : A simple pendulum has a mass of 0.650 kg and a length of 2.00 m. It is displaced through an angle of 7.0° and then released. What is the maximum speed of the bob
How do you measure a health care leaders success : Leaders of the most accomplished and admired healthcare practices rarely achieve their success accidentally. The most successful healthcare leaders know that the practice of healthcare is more than simply a calling; it is a serious business.
Explain decryption speed : Considering the continuous increase in computer speed, the company decided to increase the size of the encryption key so that the time to break the encryption become more than 250 hours. What should be the minimum key size increase to meet this ob..
What should be minimum key size increase to meet objective : Considering the continuous increase in computer speed, the company decided to increase the size of the encryption key so that the time to break the encryption become more than 250 hours. What should be the minimum key size increase to meet this ob..
Conduct an exploratory analysis of the creditdata.csv data : Conduct an exploratory analysis of the creditdata.csv data set which is provided on the course study desk to identify what you consider to be top five key variables which contribute to determining whether a potential loan applicant is a good credi..
What is the distance it travels during this interval : An object moves with constant acceleration 4.35 m/s2 and over a time interval reaches a final velocity of 11.0 m/s. What is the distance it travels during this interval
What is the angle the string makes with the vertical : A large positively-charged object with charge q = 3.75 ?C is brought near a negatively-charged plastic ball suspended from a string of negligible mass. what is the angle the string makes with the vertical
Determine the angle between these two vectors : Vectors A and B have scalar product -3.00 and their vector product has magnitude 9.00. What is the angle between these two vectors
What is the cars displacement during this maneuver : if i car was travling at 22.2 m/s and went to 30.5 m/s in 5.2m/s what is the cars displacement during this maneuver

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd