Skip Navigation

Browse Resources

Probability -- Elementary Probability -- General Rules -- Multiplication

View Resource Cartoon: Modeling biology

A cartoon to teach about the need to think carefully about the assumptions underlying a statistical model (also uses the idea that you can multiply chances for independent events to find the chance that they all occur). Drawn by British cartoonist John Landers based on an idea from Dennis earl. Free to use in the classroom and on course websites.
View Resource Coincidences: Remarkable or Random?

This text based website provides an explanation of some coincidences that are often discussed. It gives an explanation of the birthday problem along with a graphic display of the probability of birthday matches vs. the number of people included. It also discussess other popular coincidences such as the similarities between John F. Kennedy and Abraham Lincoln. It goes on to discuss steaks of...
View Resource Dataset: Being Warren Buffett: a classroom simulation of financial risk

March 24, 2009 Activity webinar presented by Nicholas Horton, Smith College, and hosted by Leigh Slauson, Otterbein College. Students have a hard time making the connection between variance and risk. To convey the connection, Foster and Stine (Being Warren Buffett: A Classroom Simulation of Risk and Wealth when Investing in the Stock Market; The American Statistician, 2006, 60:53-60) developed a...
View Resource Gallery: Reinterpreting Georges de La Tour

A sketch by Anastasia Mandel reinterpreting "The Dice Players" by Georges de La Tour (c. 1650-1651) with the statistical caption "The first practical probability studies." This is part of a collection of sketches by Anastasia Mandel and their accompanying statistical captions written by Stan Lipovetsky and Igor Mandel that took first place in the cartoon & art category of the 2009 A-Mu-sing...
View Resource Internal Validity Tutorial

This tutorial introduces 9 sources of threat to internal vailidity and asks the user to classify hypothetical experiments as either internally valid or invalid and identify the source of threat if invalid.
Next →