1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Masja [62]
3 years ago
8

A computer lab has two printers. Printer I handles 40% of all the jobs. Its printing time is Exponential with the mean of 2 minu

tes. Printer II handles the remaining 60% of jobs. Its printing time is Uniform between 0 minutes and 5 minutes. A job was printed in less than 1 minute. What is the probability that it was printed by Printer I?
Computers and Technology
1 answer:
Dennis_Churaev [7]3 years ago
3 0

Answer:  0.3042

Explanation:

Let A  and B are the events to that job done by Printer I and Printer II respectively.

Given : P(A)=0.40    P(B)=0.60

Printing time of Printer I is Exponential with the mean of 2 minutes.

i.e. average number of job done in one minute:\lambda=\dfrac{1}{2}

The cumulative distribution function (CDF) for exponential distribution:-

F(x)=1-e^{-\lambda x}, where \lambda is the mean.

Then, the cumulative distribution function (CDF) for Printer I:-

P(X|A)=1-e^{-\dfrac{1}{2} x}

i.e. P(X

Printing time of Printer II is Uniform between 0 minutes and 5 minutes.

The cumulative distribution function  (CDF) for uniform distribution in interval (a,b) :-

F(x)=\dfrac{x-a}{b-a}

Then, P(X|B)=\dfrac{x-0}{5-0}=\dfrac{x}{5}

i.e. P(X

Now, the required probability :-

\text{P(A}|X

Hence, the required probability = 0.3042

You might be interested in
The Hudson Engineering Group (HEG) has contacted you to create a conceptual model whose application will meet the expected datab
alexdok [17]

Answer:

The diagram of the ER and depreciation is in the attachments.

3 0
3 years ago
. Create an abstract Dollar class with two integer attributes, both of which are non-public (Python programmers - it is understo
aksik [14]

Answer:

Explanation:

The following code is written in Java. It creates the abstract dollar class that has two instance variables for the dollars and the coins that are passed as arguments. The test output can be seen in the picture attached below.

class Dollar {

   int dollars;

   double coin;

   private Dollar(int dollar, int coin) {

       this.dollars = dollar;

       this.coin = Double.valueOf(coin) / 100;

   }

   

}

4 0
2 years ago
The celestial sphere is divided into
7nadin3 [17]

Answer:

A.

Explanation:

4 0
3 years ago
Read 2 more answers
If the contents of encrypted file1.nc and encrypted file3.nc are different, but the original file1 and file3 are the same, and y
Over [174]

Answer:

The Difference is because of the salt added to the password before hashing or encrypting it.

Explanation:

The Difference is because of the salt added to the password before hashing or encrypting it.

Salts are random data used to mention uniqueness. Suppose if two users have same password for the same system. By adding Salt to the password makes it unique in the crypto system. Its a added security layer which can safeguard the passwords or hashed data in the keystore or storage.

Salt can be prepended to the password or appended to the password.

Suppose the password is “stuti” then its SHA256 HASH value is <u><em>“4beb1eb6f438495eede7b14ac0d2b955636a49412cd4eb5714341f5716144954”</em></u>

So, if we add a salt with random string <em>brainlysalttest</em> then its SHA256 HASH value is <u><em>“5429e85778f1b9f493da637848f253dedf3edbfbb72782d43eb7337cee45ab0c”</em></u>

If we append the salt <em>brainlytestsalt</em> to the same password and hash it using SHA256 then its hash value is : <u><em>“3919b677d80ae0da2b58f70b464f6492670ccffee78cf52972c6983995ed8f52”</em></u>

So clearly Salting to the password and Hashing the salted password will make the difference and also unique.

3 0
3 years ago
Carlie was asked to review a software prject for her company and determine what materials are needed. Whihc part of project mana
Helga [31]

Answer:

The answer is "Resources".

Explanation:

All services should definitely be reviewed through Carlie. However many Software Developers, Reviewers, and others are accessible are important to find out. Only then can Carlie find out because needed, the exact timelines. Because whenever establishing precise deadlines, she needs to take a look at the tools, that's why the above given choice is correct.

8 0
2 years ago
Other questions:
  • 3. Megan and her brother Marco have a side business where they shop at flea markets, garage sales, and estate
    9·1 answer
  • This was not a "true" operating system, but rather an operating environment.
    5·1 answer
  • When powering off your computer is best down using?
    8·2 answers
  • Using the FAFSA form , you can for apply for what
    14·2 answers
  • The local emergency manager has the responsibility for coordinating emergency management programs and activities. A local emerge
    7·1 answer
  • The practice of using similar but not identical domain names is called _____. domain spoofing domain masquerading domain tasting
    13·1 answer
  • Technician A says that high pressure in recycled refrigerant is only caused by air contamination. Technician B says that recycle
    15·1 answer
  • Give me a code that draws a house with a roof in python. Please Answer!!!
    9·1 answer
  • The sequence of instructions performed to execute one program instruction
    12·1 answer
  • Create a simple JavaScript calculator.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!