1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ella [17]
3 years ago
8

A student takes 60 voltages readings across a resistor and finds a mean voltage of 2.501V with a sample standard deviation of 0.

113V. Assuming that errors are due to random processes, how many of the readings are expected to be greater than 2.70V?
Engineering
1 answer:
Lena [83]3 years ago
7 0

Answer:

There are 2 expected readings greater than 2.70 V

Solution:

As per the question:

Total no. of readings, n = 60 V

Mean of the voltage, \mu = 2.501 V

standard deviation, \sigma = 0.113 V

Now, to find the no. of readings greater than 2.70 V, we find:

The probability of the readings less than 2.70 V, P(X\leq 2.70):

z = \frac{x - \mu}{\sigma} = \frac{2.70 - 2.501}{0.113} = 1.761

Now, from the Probability table of standard normal distribution:

P(z\leq 1.761) = 0.9608

Now,

P(X\geq 2.70) = 1 - P(X\leq 2.70) = 1 - 0.9608 = 0.0392 = 3.92%

Now, for the expected no. of readings greater than 2.70 V:

P(X\geq 2.70) = \frac{No.\ of\ readings\ expected\ to\ be\ greater\ than\ 2.70\ V}{Total\ no.\ of\ readings}

No. of readings expected to be greater than 2.70 V = P(X\geq 2.70)\times Total\ no.\ of\ readings

No. of readings expected to be greater than 2.70 V = 0.0392\times 60 = 2.352 ≈ 2

You might be interested in
A program is seeded with 30 faults. During testing, 21 faults are detected, 15 of which are seeded faults and 6 of which are ind
Vesna [10]

Answer:

Estimated number of indigenous faults remaining undetected is 6

Explanation:

The maximum likelihood estimate of indigenous faults is given by,

N_F=n_F\times \frac{N_S}{n_S} here,

n_F = the number of unseeded faults = 6

N_S = number of seeded faults = 30

n_s = number of seeded faults found = 15

So NF will be calculated as,

N_F=6\times \frac{30}{15}=12

And the estimate of faults remaining is  N_F-n_F = 12 - 6 = 6

8 0
3 years ago
Which option should the engineers focus on as they develop the train in the following scenario?
pav-90 [236]

Answer:

  Engineers can design a train with a regenerative braking system

Explanation:

Assuming the point of the question is that the engineers want to focus on using energy efficiently when starting and stopping, they would likely want to consider a regenerative braking system. Such a system can store energy during braking so that it can be used during starting, reducing the amount of energy that must be supplied by an outside power source.

5 0
3 years ago
What's the difference between accuracy and percision in measuring and gaging?
lidiya [134]

Answer:

The term Accuracy means that how close our result to the original result.

Suppose we do any experiment in laboratory and we calculate mass = 7 kg but answer is mass = 15 kg then our answer is not accurate.

And the term Precision means how likely we get result like this.

Suppose we do any experiment in laboratory and we calculate mass five times and each time we get mass = 7 kg then our answer is precised but not accurate.

4 0
3 years ago
How many 10" diameter circles can be cut from a semicircular shape that has a 20"
N76 [4]

9514 1404 393

Answer:

  1

Explanation:

Only one such circle can be drawn. The diameter of the 10" circle will be a radius of the semicircle. In order for the 10" circle to be wholly contained, the flat side of the semicircle must be tangent to the 10" circle. There is only one position in the figure where that can happen. (see attached).

3 0
2 years ago
Read 2 more answers
MITM can present in two forms: eavesdropping and manipulation. Discuss the process involved when an attacker is eavesdropping an
Nikitich [7]

Answer / Explanation:

Eavesdropping attack is also sometimes refereed to as sniffing attack. It is simply the process by which an attacker or hacker tries to penetrate very suddenly into an unaware individuals network or server with the intention to steal information transmitted over the network or server through that computer.  

To prevent such attack, there are several mean which include installing network monitoring software to check who else is connected to the network but the most common method of preventing such attack is to encrypt the Hypertext Transfer Protocol (http) and the way to do this is by securing it with a sort of security key.

On installing the security key, the network becomes encrypted and secured such that whatever network transmitted over the network becomes encrypted and unable to read. The protocol then converts to (https).

5 0
2 years ago
Other questions:
  • Given the following data, plot the stress-strain curves for the two unknown materials on the same set of stress-strain axes. Den
    9·1 answer
  • What is CQ Thread Ball Valves​
    10·2 answers
  • What happens to a commercial airline at cruising altitude if the pilot does not touch the throttles?
    12·1 answer
  • What is the Principle of Entropy Increase?
    9·1 answer
  • Which utility program reads an assembly language source file and produces an object file?
    6·1 answer
  • Consider two different versions of algorithm for finding gcd of two numbers (as given below), Estimate how many times faster it
    9·1 answer
  • Select the correct answer.
    13·1 answer
  • Why is it important to always be wearing a personal flotation device (PFD) when in or around the water?
    9·2 answers
  • How many steps are there in the problem-solving process?
    9·2 answers
  • Typical noise associated with failed cv joint​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!