1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yuradex [85]
3 years ago
14

6. A distribution consists of three components with frequencies 200, 250 and 300 having means

Computers and Technology
1 answer:
White raven [17]3 years ago
3 0

Answer:

The mean  = 16

The standard deviation = 7.19

Explanation:

N1 = 200  X1 = 25   σ1 = 3

N2= 250  X2 = 10   σ2 = 4

N3 = 300  X3= 15   σ3 = 5

The mean of a combined distribution is given by:

X = \frac{X_1N_1+X_2N_2+X_3N_3}{N_1+N_2+N_3}\\X = \frac{25*200+10*250+15*300}{200+250+300}\\X=16

The differences from the mean for each component are:

D_1 = 25-16=9\\D_2=10-16=-6\\D_3=15-16=-1

The standard deviation of a combined distribution is given by:

\sigma=\sqrt{\frac{N_1(\sigma_1^2+D_1^2)+N_2(\sigma_2^2+D_2^2)+N_3(\sigma_3^2+D_3^2)}{N_1+N_2+N_3}}\\\sigma=\sqrt{\frac{200(3^2+9^2)+250(4^2+(-6)^2)+300(5^2+(-1)^2)}{200+250+300}}\\\sigma=\sqrt{\frac{18000+13000+7800}{750} }\\\sigma=7.19

The mean  = 16

The standard deviation = 7.19

You might be interested in
Ana is a music lover. She loves to download songs and videos on her computer every time she hears a new song. One day, her compu
o-na [289]

Answer:

Storage outage

As many new songs are released to the Internet every day, Anna might have download thousands of them, which made her computer ran out of storage and RAM(random access memory )

5 0
2 years ago
If userA wants to send a secure message to userB using an asymmetric cryptographic algorithm, which key does userB use to decryp
ANTONII [103]

Answer:

userB will use his/her private key.

Explanation:

The steps involved in using asymmetric cryptographic algorithm are as follow:

1. Each user generates a pair of keys to be used for the encryption and decryption of messages.

2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.

3. If UserA wishes to send a confidential message to UserB, UserA encrypts the message using UserB's public key.

4. When UserB receives the message, she decrypts it using her private key.

4 0
3 years ago
Help me help you............
KiRa [710]

Answer:

change how big or small the shape or sprite is

6 0
1 year ago
Which image property helps to create distinction between the highlights and shadows of an object?
Nutka1998 [239]
I know filters, so I know it is Saturation.
6 0
3 years ago
Read 2 more answers
A medical assistant at a local hospital is exploring the Start Menu of his/her computer and various Windows programs/application
Ratling [72]
<span>Five questions that people are most likely to ask about the application are as follows:1. What is the use and function of this application?. 2. Who is this application for? 3. How much does this application cost?. 4. Where can the application been used? and 5. Why should I use this application? </span>
7 0
2 years ago
Other questions:
  • Write a program that reads in the length and the width of a rectangular yard.
    5·1 answer
  • Alex's woodworking shop is trying to design a web page with Cascading Style Sheets (CSS). Alex would like create the new design
    11·1 answer
  • Are self driving cars essential for the future of transportation
    10·1 answer
  • Which value can be entered to cause the following code segment to display the message: "That number is acceptable." int number;
    11·1 answer
  • Which of the following does your textbook recommend for preparing PowerPoint slides? Group of answer choices
    9·1 answer
  • The first step when entering data is _
    6·1 answer
  • Carlos is using the software development life cycle to create a new app. He has finished coding and is ready to see the output i
    12·2 answers
  • What is bespoke software???​
    9·2 answers
  • Draw a flow chart to access the marks of three students. calculate the total avarage and display the result​
    11·1 answer
  • If a computer uses 500 characters, how many bits this system requires to give different code to all characters?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!