1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mariulka [41]
2 years ago
8

Suppose that, on average, 4 percent of all cd drives received by a computer company are defective. the company has adopted the f

ollowing policy: sample 50 cd drives in each shipment, and accept the shipment if none are defective. using this information, determine the following: a) what fraction of shipments will be accepted? b) if the policy changes so that a shipment is accepted if only one cd drive in the sample isdefective, what fraction of shipments will be accepted? c) what is the probability that a sample size of 50 will contain at least 10 defective cd drives? hint: you can use binomdist function. please help me, this is an excel question
Computers and Technology
1 answer:
kicyunya [14]2 years ago
6 0

The fraction of shipments that will be accepted is 0.1299.

<h3>How to calculate the probability?</h3>

Probability of a defective DVD = 0.04

Using Binomial distribution,

Fraction of shipments accepted = Probability of zero defects in sample of 50 = P(X = 0)

= 50C0 * 0.040 * (1 - 0.04)⁵⁰

= 0.96⁵⁰

= 0.1299

Fraction of shipments accepted = Probability of zero or one defects in sample of 50 = P(X = 0) + P(X = 1)

= 50C0 * 0.040 * (1 - 0.04)50-0 + 50C1 * 0.041 * (1 - 0.04)50-1

= 0.9650 + 50 * 0.04 * 0.9649

= 0.4005

Learn more about probability on:

brainly.com/question/24756209

#SPJ1

You might be interested in
A(n) ____ consists of a series of related instructions, organized for a common purpose, that tells the computer what tasks to pe
yarga [219]

Answer:

The correct answer is "Program".  

Explanation:

Program is the collection of statement or instruction which is developed for creating any software or any purpose. The program is implemented or executed by a computer to perform a particular task.The particular programmer always writes an instruction to develop a program.

Program are always organized for the common purpose, that specifies the computer what tasks to perform as well as how to perform that particular task for example if programmer develops a program of calculator then it should be only used for the calculation purpose.

7 0
3 years ago
b. Suppose instead that Miller had written a routine to constantly change his assigned IP address to other addresses used by his
amm1812

Answer:

It wouldn't be legal practice of SLS’

Explanation:

The Internet service address is the address of the internet where we getting the address of the internet sometimes it is known as the computer address of the host machine.  

Since the miller has changed the Ip address continuously in a constant manner also the other address which is giving by the internet service provider  The transfer of IP address, Miller will be able to receive their network. That sort of practice is not legal of SLS.

5 0
3 years ago
A scientific question may lead to a(n) , which can be tested.
kari74 [83]
A hypothesis or educated guess
6 0
3 years ago
Read 2 more answers
Cite los botones de edición que existen y determine en que ficha y grupo se encuentran.
Alina [70]

Answer:

GHRUDIFDSFHEOUSDHFHESDHFHEFE

Explanation:

SORRY I DONT KNOW

5 0
3 years ago
Write a subclass named 'ReadWrite' with the following additional behavior: Any necessary constructors. a method named 'setVal' t
nataly862011 [7]

Answer:

Java Class given below

Explanation:

class ReadOnly

{

protected int val;

public ReadOnly(int arg)

{

val = arg;

}

public int getVal()

{

return val;

}

}

class ReadWrite extends ReadOnly

{

private boolean dirty;

public ReadWrite(int arg)

{

super(arg);

dirty = false;

}

public void setVal(int arg)

{

val = arg;

dirty = true;

}

public boolean isDirty()

{

return dirty;

}

}

6 0
3 years ago
Other questions:
  • How can you tell if a hacker has administrative access?
    15·2 answers
  • When shooting in a windy outdoor environment a ___should be placed over the mic
    7·1 answer
  • What is the advantage of defining a target user?
    6·1 answer
  • When a user utilizes another computer to communicate with a third party, with the result that the third party cannot recognize t
    8·1 answer
  • It is safe to interchange oxygen and fuel gas hoses. A. False B. True
    13·2 answers
  • Anyone wanna play roblox?? My user is Tsvetok_luis
    11·2 answers
  • Which two options are negotiated via ncp during the establishment of a ppp connection that will use the ipv4 network layer proto
    7·1 answer
  • Which rotation speed is not a typical spindle rotation speed for magnetic hard drives?3100; 5400; 7200; 10000
    8·1 answer
  • Your worksheet contains a price in cell A5 and many formulas refer to that price how would you refer to that price in the formul
    12·1 answer
  • a radio frequency identification (rfid) tag provides a generic identification for a credit or debit card carrying the tag.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!