1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
user100 [1]
3 years ago
7

In computing descriptive statistics from grouped data, a. data values are treated as if they occur at the midpoint of a class. b

. the grouped data result is more accurate than the ungrouped result. c. the grouped data computations are used only when a population is being analyzed. d. none of these alternatives is correct.
Computers and Technology
2 answers:
koban [17]3 years ago
7 0

Answer: Option A: data values are treated as if they occur at the midpoint of a class

Explanation: In computing descriptive statistics from grouped data, data values are treated as if they occur at the midpoint of a class

Nikolay [14]3 years ago
7 0

Answer:A. Data values are treated as if they occur at the midpoint of a class

Explanation:Descriptive statistics is the process of describing or showing or summarising data in order to make it simple and easy to analyse or evaluate or draw conclusions from it. Descriptive statistics can be broadly categorized into four different categories which includes the following

Measurements of Frequency: such as Percent, Frequency. Etc

Measurements of Central Tendency. Mean, Median, and Mode.

Measurements of Dispersion such as Range, Variance, Standard Deviation.

Measurements of Position such as Quartile Ranks. Etc.

In computing,Descriptive statistics of grouped data values are treated as if they occur at the midpoint of a class.

You might be interested in
Write a Java application that inputs a series of 10 integers and determines and prints the largest and smallest integer. Use a c
klio [65]

Answer:

import java.util.Scanner;

public class LargestSmallest {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.print("Enter 10 integers: ");

       int num = in.nextInt();

       int i = 1;

       int min = num, max = num;

       while (i < 10) {

           num = in.nextInt();

           if (num > max) max = num;

           if (num < min) min = num;

           i++;

       }

       System.out.println("Largest number: " + max);

       System.out.println("Smallest number: " + min);

   }

}

Explanation:

A Java application that inputs a series of 10 integers and determines and prints the largest and smallest integer is written above.

5 0
3 years ago
Can y’all help me with these questions ?
andriy [413]
45. Nic card
46. Word processing
7 0
3 years ago
true or false: for most queries, the user location changes our understanding of the query and user intent.
Kipish [7]
The answer is true because I don't know
4 0
4 years ago
In an office there is a unisex bathroom with n toilets. The bathroom is open to both men and women, but it cannot be used by men
Gnesinka [82]

Answer:

Check the explanation

Explanation:

#include <stdio.h>

#include <stdlib.h>

#include <pthread.h>

#include <semaphore.h>

int mcount,wcount;

sem_t x,y,z,wsem,msem,cap;

void delay(void)

{

int i;

int delaytime;

delaytime = random();

for (i = 0; i<delaytime; i++);

}

void *woman(void *param)

{

sem_wait(&z);

sem_wait(&wsem);

sem_wait(&y);

wcount++;

if(wcount==1)

{ sem_wait(&msem); }

sem_post(&y);

sem_post(&wsem);

sem_post(&z);

sem_wait(&cap);

printf("woman in!\n");

delay();

printf("\twoman out!\n");

sem_post(&cap);  

sem_wait(&y);

wcount--;

if(wcount==0)

{ sem_post(&msem); }

sem_post(&y);

}

void *man(void *param)

{  

sem_wait(&z);

sem_wait(&msem);

sem_wait(&x);

mcount++;

if(mcount==1)

{ sem_wait(&wsem); }

sem_post(&x);

sem_post(&msem);

sem_post(&z);

sem_wait(&cap);

printf("\t\tman in!\n");

delay();

printf("\t\t\tman out!\n");

sem_post(&cap);

sem_wait(&x);

mcount--;

if(mcount==0)

{sem_post(&wsem);}

sem_post(&x);

}

int main(void)

{

int i;

srandom(60);

mcount = 0;

wcount = 0;

sem_init(&x,0,1); // for sem_init, initial value is 3rd argument

sem_init(&y,0,1);

sem_init(&z,0,1);

sem_init(&wsem,0,1);

sem_init(&msem,0,1);

sem_init(&cap,0,4); // eg. cap initialized to 4

pthread_t *tid;

tid = malloc(80*sizeof(pthread_t));

// You can use your cobegin statement here, instead of pthread_create()  

// I have forgone the use of pthread barriers although I suppose they would nicely imitate the functionality of cobegin.

// This is merely to retain simplicity.

for(i=0;i<10;i++)

{

pthread_create(&tid[i],NULL,woman,NULL);

}

for(i=10;i<20;i++)

{  

pthread_create(&tid[i],NULL,man,NULL);

}

for(i=0;i<20;i++)

{  

pthread_join(tid[i],NULL);

}

return(0);

}

5 0
3 years ago
What output is produced by
Natasha_Volkova [10]

Answer:

The answer to this question is given below in the explanation section. the correct option is C.

Explanation:

This is Java code statement:

System.out.print("Computing\nisInfun");

The output of this code statement is

Computing

isInfun

However, it is noted that the C option is not written correctly, but it is guessed that it will match to option C.

This Java code statement first prints "Computing" and then on the next line it will print "isInfun" because after the word "Computing" there is a line terminator i.e. \n. when \n will appear, the compiler prints the remaining text in the statement on the next line.

4 0
3 years ago
Other questions:
  • These systems consist of interlinked knowledge resources, databases, human experts, and artificial knowledge agents that collect
    9·1 answer
  • A university wants to install a client-server network. Which feature do you think is important for them as they set up the netwo
    7·1 answer
  • A text-only forum accessed through a bulletin board service (BBS) is known as a _____.
    14·1 answer
  • Virtual private network requires a secure remote connections<br><br> true or false?
    11·1 answer
  • Discuss the importance of employee security awareness training. What innovative ways should company’s implement security trainin
    14·1 answer
  • Voice authentication requires speech to text capability Facial recognition may be used for authentication The human iris is uniq
    6·1 answer
  • HURRY!!!!!!!!!!!!!
    15·1 answer
  • PLEASE HELP! WILL MARK AS BRAINLIEST!
    6·2 answers
  • Refer to the exhibit. Host B on subnet Teachers transmits a packet to host D on subnet Students. Which Layer 2 and Layer 3 addre
    11·1 answer
  • Software is in -----language​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!