1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yuradex [85]
3 years ago
14

6. A distribution consists of three components with frequencies 200, 250 and 300 having means

Computers and Technology
1 answer:
White raven [17]3 years ago
3 0

Answer:

The mean  = 16

The standard deviation = 7.19

Explanation:

N1 = 200  X1 = 25   σ1 = 3

N2= 250  X2 = 10   σ2 = 4

N3 = 300  X3= 15   σ3 = 5

The mean of a combined distribution is given by:

X = \frac{X_1N_1+X_2N_2+X_3N_3}{N_1+N_2+N_3}\\X = \frac{25*200+10*250+15*300}{200+250+300}\\X=16

The differences from the mean for each component are:

D_1 = 25-16=9\\D_2=10-16=-6\\D_3=15-16=-1

The standard deviation of a combined distribution is given by:

\sigma=\sqrt{\frac{N_1(\sigma_1^2+D_1^2)+N_2(\sigma_2^2+D_2^2)+N_3(\sigma_3^2+D_3^2)}{N_1+N_2+N_3}}\\\sigma=\sqrt{\frac{200(3^2+9^2)+250(4^2+(-6)^2)+300(5^2+(-1)^2)}{200+250+300}}\\\sigma=\sqrt{\frac{18000+13000+7800}{750} }\\\sigma=7.19

The mean  = 16

The standard deviation = 7.19

You might be interested in
Select all of the true statements about financial literacy. Financial literacy is the knowledge about money and what you do with
erastova [34]

The correct statements about financial literacy from the given options are as follows:

  • Financial literacy is the knowledge about money and what you do with money.
  • Financial literacy includes information about income, banking, loans, career, credit, and consumer rights.
  • One reason to become financially literate is to save you money.
  • One reason to become financially literate is to help you make smart financial decisions.

The only option that isn’t included is: <em>One reason to become financially literate is to make you rich</em>.  Though knowledge about financial literacy can help you in managing your finances, you would need great amount of knowledge about other fields to be able to become rich - not just financial literacy.


5 0
2 years ago
Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
raketka [301]

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

4 0
3 years ago
Name the contributory components that are considered when determining an E/M code; they are not considered key components:
Vika [28.1K]

Answer:

time

Explanation:

E/M code is known as the evaluation and management code. The E&M code may be defined as the medical coding system which supports the medical billing process.  Every new patient is assigned a E/M code. The components that are not considered for determining the E/M code are coordination of care, the counselling, time and the nature of presenting problem.

7 0
2 years ago
Describe some of the moral, ethical, and legal issues surrounding responsible use of technology (and the information obtained th
rosijanka [135]

Answer:

Technology must be used in the right manner, and for the right purposes. When the latest in image processing is used to find a new planet through machine learning, we are right. However, when we kill somebody with a gun, we are not right. The bullet can be directed to legs rather than heart, and with continuous love and affection, any heart can be won. Sometimes this is allowed legally, Also it can be ethically correct as some institutions might allow it ethically, and it can be for some morally right as well. However, still, this is not right for some, and that is the almighty. And it's hard to match him morally or ethically. And for him nothing wrong is legal. Coming back to the use of technology in the workplace, you will find that you must follow the ethics of that institution, and your moral value must always be subsidiary to their ethics. And in the 21st century, and particularly in developed domains you will never be asked to sacrifice your moral value, and by the end of next quarter, this might be true for the whole world. Hence, ethics and moral values by then can in all cases be used interchangeably, However, when it comes to being legal, your institution will let you know all the laws, and you need to follow them, and these are applicable to all the institutions, and hence you need not require to sacrifice anything for being legal. Always remember that in the 21st century, you might see some very lethal technologies, and your job in the workplace is to study those technologies with your fullest potential. Issues will arise if you do not work with your fullest potential. And if you will, your moral value will be respected, and you will be easily able to obey their ethics, as no company ever think about even a little bad for their employees. And legally even the director is required to be correct just like you. And what is legal is being decided by the court and not any company. Hence, always try to work with your fullest potential, and never think to harm anybody, or your company. If you do this, you will be the hero of your company very soon.

Explanation:

And remember, the information that you get to know in your company is confidential, and you should not leak it to anybody, and even your relatives. Always keep them hidden inside you, and never ever try to leak them.

3 0
3 years ago
Helppp me eeeeee eee
gtnhenbr [62]

Answer:

a. taking risks

Explanation:

i hope this helps

3 0
2 years ago
Read 2 more answers
Other questions:
  • What might be the best response to a cyberbuly attack
    6·2 answers
  • 6. Write a program that can multiply an n x m matrix and m x n matrix together: The input specifications are these: Read n and m
    11·1 answer
  • What Will Social Media Look Like in the Future?
    6·1 answer
  • Describe a time when you influenced someone else’s knowledge around technology, whether it be an app, a new gadget, etc. What di
    14·1 answer
  • 27. List four advantages of Computer Aided Design over traditional hand
    10·1 answer
  • Write a loop to output the word EXAM 99 times
    8·1 answer
  • A pangram is a sentence that contains all the letters of the English alphabet at least once. For example, the quick brown fox ju
    6·1 answer
  • 8.7 Code Practice: Question 2 edhesive
    14·2 answers
  • I ate five M&amp;Ms: red, green, green, red and yellow. Only these three colors are possible. I assume that p(yellow)=3p(green)
    9·1 answer
  • Why do you need to put your phone on airplane mode.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!