# What are the null and alternative hypotheses?

You’re planning

• Null Speculation: (µ1=µ2)
• Different speculation: (µ1≠µ2)
• The information was randomly collected from seven managers and fourteen workers at totally different ranges of our firm.
• The workers have been requested for his or her satisfaction rankings on a scale of 1 to 10.
• The aim was to find out if there have been any variations in worker satisfaction amongst managers and contributors utilizing the 0.10 significance threshold.
• Excel was used to carry out the evaluation

Analyse

• Levels of freedom (df) = (ẟ1²/n1 + ẟ2²/n2)² / [ (ẟ1² / n1)² / (n1 – 1) ] + [ (ẟ2² / n2)² / (n2 – 1) ] (Cliff Notes, 2020)
• Df= 60.81
• Customary Error (SE): sqrt[ (ẟ12/n1) + (ẟ2/n2) ] (Cliff Notes, 2020)
• SE = 0.52119
• T-statistic = [ (x1 – x2) – d ] / SE (Cliff Notes 2020).
• T-statistic = 0.9617
• P-Worth =tdist(x, df,tails) (Cliff Notes, 2020)
• P-value = 0.34 + 0.34 = 0.68

## How do you place an order?

It takes a few steps to place an order with Us:

• The first step is to place your order. You will need to provide us with some basic information about your project.
• Once you have placed your order, you will be taken to our secure payment page.
• Once we receive your order, we will carefully review it and match you with a writer who has the skills and experience.
• Stay in contact with the writer and discuss vital details of research.
• Your completed proposal will be delivered via email within the specified deadline.

### You are secure when using our service

It's critical for each client to feel secure. As a result, we at Research Proposal Writing take precautions to secure your data.

Financial security You may securely pay for your purchase using a variety of secure payment methods.
Personal security The personal information of our clients is secure. Nobody else will have access to it.
Academic security We use a specialized program to check every completed paper to ensure that we deliver no-plagiarism samples.
Web security This website is safe from unauthorized breaches. We maintain our privacy management in line with the latest laws and regulations.