1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Masja [62]
4 years ago
8

A computer lab has two printers. Printer I handles 40% of all the jobs. Its printing time is Exponential with the mean of 2 minu

tes. Printer II handles the remaining 60% of jobs. Its printing time is Uniform between 0 minutes and 5 minutes. A job was printed in less than 1 minute. What is the probability that it was printed by Printer I?
Computers and Technology
1 answer:
Dennis_Churaev [7]4 years ago
3 0

Answer:  0.3042

Explanation:

Let A  and B are the events to that job done by Printer I and Printer II respectively.

Given : P(A)=0.40    P(B)=0.60

Printing time of Printer I is Exponential with the mean of 2 minutes.

i.e. average number of job done in one minute:\lambda=\dfrac{1}{2}

The cumulative distribution function (CDF) for exponential distribution:-

F(x)=1-e^{-\lambda x}, where \lambda is the mean.

Then, the cumulative distribution function (CDF) for Printer I:-

P(X|A)=1-e^{-\dfrac{1}{2} x}

i.e. P(X

Printing time of Printer II is Uniform between 0 minutes and 5 minutes.

The cumulative distribution function  (CDF) for uniform distribution in interval (a,b) :-

F(x)=\dfrac{x-a}{b-a}

Then, P(X|B)=\dfrac{x-0}{5-0}=\dfrac{x}{5}

i.e. P(X

Now, the required probability :-

\text{P(A}|X

Hence, the required probability = 0.3042

You might be interested in
Requests to retrieve data written in a language such as SQL are called…
Oksanka [162]
B. Queries

Queries can be fairly broad or written to focus on time frames, types of data, ranges etc.
5 0
3 years ago
⇒PLEASE HELP ME!!!!!!!!∧_∧
saveliy_v [14]
I think it might be Heading & Border
6 0
3 years ago
Read 2 more answers
How Extreme Programming addresses Software Testing andevolution ?
kumpel [21]

Answer:

Extreme programming is a software development technique which is used to enhance software quality and it's response to ever changing customer requirements.

Testing

Testing is main focus in extreme programming.Extreme programming addresses testing in a way that if a minute testing can eliminate a bit of flaws, extensive testing can terminate a lot of flaws.

Evolution in Extreme programming is like this:-

Coding:-First programmers will code the problem.

Testing :- Testing is done to remove flaws.

Listening:- Programmers must listen to the customers to what they need.

Designing:-Then design according to the customer needs.

6 0
3 years ago
You have heard that the Linux distribution your are going to install to run a new application runs best on a RISC architecture.
Artyom0805 [142]

Answer:

SPARC .

Explanation:

When the user has understood they're required to install the linux distribution to set up a specific program works better on such a RISC architecture. SPARC must therefore find the device from which it would work that following distribution for the Linux. It is a RISC and ISA that was previously designed through both Fujitsu and Sun.

6 0
3 years ago
The National Vulnerability Database (NVD) is responsible for actively performing vulnerability testing for every company's softw
V125BC [204]

Answer:

False

Explanation:

The answer to this question is false. This is because the NVD doesn't perform such tests on their own. Instead they they rely on third-party vendors, software researchers, etc to get such reports and do the assignment of CVSS scores for softwares

The National Vulnerability Database (NVD) is the United State governments leading resource for software vulnerability

8 0
3 years ago
Other questions:
  • Given a floating point variable fraction, write a statement that displays the value of fraction on the screen. Do not display an
    13·1 answer
  • Peripherals can be used to output information.<br> True<br> False
    9·2 answers
  • Suppose your name was Alan Turing. Write a statement that would print your last name, followed by a comma, followed by a space a
    10·1 answer
  • 1. The best program to present numerical data in would be ____. a. Access c. PowerPoint b. Excel d. Word
    6·1 answer
  • Anna’s computer will not power on. What aspect of the computer should Anna check (hardware or software)? How can Anna work to re
    5·1 answer
  • This is a text message that is stored on a user's computer by a Web server that helps trace the user's browsing habits. a. Scrip
    14·1 answer
  • A _______________ is a security threat that may launch a worm through a Trojan horse or launch a denial-of-service attack at a t
    10·1 answer
  • In a paragraph, describe in detail a practical real-world example of where you would implement a singly-linked list and why a si
    8·1 answer
  • What operating system do most users use?
    13·1 answer
  • On a Windows system, which Task Manager tab would you use to adjust the priority given to a specific program
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!