1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marina CMI [18]
3 years ago
13

A disadvantage of using an arithmetic mean to summarize a set of data is that __________.

Computers and Technology
1 answer:
harina [27]3 years ago
6 0
<span>A disadvantage of using an arithmetic mean to summarize a set of data is that it can be biased by one or two extremely small or large values. we cannot calculate the average of ratios and percentages by mean. Mean is always finite and not indefinite.</span>
You might be interested in
Draw an E-R diagram for the following situation:
VladimirAG [237]

Answer:

Hi there! This question is good to check your knowledge of entities and their relationships. The diagram and explanation are provided below.

Explanation:

The entity relationship diagram for the association between the entities according to the description in the question is drawn in the first attachment. We can further simplify the relationship by removing this many to many relationship between "Chemists" and "Projects" by adding another entity called "Worklist" as detailed in second attachment.

4 0
3 years ago
The more _____ a thumb drive has, the more storage capability it will provide. Hertz, bytes or pixels. The more _____ a micropro
beks73 [17]

Answer:

a) bytes

b) hertz

c) 1) hertz  and 2) bytes

Explanation:

A byte is the basic unit of information and data stored in a computer storage.  Hence, the storage capability of a drive will be measured in Bytes. On the other hand speed of processor is measured in terms of number of cycles made per second i.e hertz. Hence, the higher the value of hertz the higher is the speed of the computer.

5 0
3 years ago
When an object reference is passed as a parameter to a method, modifying the members of that object from inside the method will
bogdanovich [222]

Answer:

A) True

Explanation:

Objects are known as reference types, meaning that they are always accessed by references, not copied. When a method is called, passing an object to it, Java passes a reference of that object to the method and when that reference is modified, the changes can be seen in the object itself. Therefore a mutable object can be mutated anywhere- either from where it is created or by a method it is passed to. Hence the need to always use privacy modifier keywords such as public, private or protected, to determine the exposure of class properties and methods.

7 0
3 years ago
Assume the following Python code has already executed.
Ivanshal [37]

e. /Users/me/Documents/file.txt

7 0
3 years ago
During the _____ phase of the Systems Development Life Cycle (SDLC), the hardware, database management system (DBMS) software, a
konstantin123 [22]

Answer:

The correct answer to the following question will be the "Implementation Phase".

Explanation:

The implementation phase encompasses the work performed to accomplish the job range specifications as well as the constitution.

The development team completed the work identified in the schedule during the execution process and made significant improvements whenever the conditions of the project shifted.

There is some objective of this phase, such as:

  • Installing and putting the machine into service in the manufacturing environment.
  • To ensure that somehow the device meets the practical specifications as created.

So, it's the right answer.

8 0
3 years ago
Other questions:
  • Hannah weighs 210 pounds using the English System of measurement. If we convert her weight to the Metric System, she would weigh
    14·1 answer
  • True or False: You should only use your mirrors to see behind you when parallel parking.
    14·2 answers
  • What letter names the drive where windows most commonly stores data and files
    13·1 answer
  • Given the char * variables name1, name2, and name3, write a fragment of code that assigns the largest value to the variable max
    15·1 answer
  • Let A and B be two stations attempting to transmit on an Ethernet. Each has a steady queue of frames ready to send; A’s frames w
    7·1 answer
  • Do not use the scanner class or any other user input request. You application should be self-contained and run without user inpu
    5·1 answer
  • How do I fix this? It stopped adding up my points when i did one of the challenges.
    11·2 answers
  • Dragging a mouse over text is called
    9·1 answer
  • Alice has an item x and Bob has a set of five distinct items y1, y2, y3, y4 and y5. Design a protocol through which Alice (but n
    5·1 answer
  • What is the error in this program?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!