1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RUDIKE [14]
3 years ago
12

A company that manufactures smartphones makes 70% of the phones with a touch screen and 55% of the phones with HD movie capabili

ty. 30% of the phones have both a touch screen and HD movie capability. What is the probability that a smartphone chosen at random has either a touch screen or HD movie capability?
Computers and Technology
2 answers:
Maru [420]3 years ago
5 0
Using Rule of Addition:
<span>It states that : "The probability that Event A or Event B occurs is equal to the probability that Event A occurs plus the probability that Event B occurs minus the probability that both Events A and B occur."
</span><span>
P(A or B) = P(A) + P(B) - P(A and B)
</span>                 = 0.7 + 0.55 - 0.3
                 = 1.55
CaHeK987 [17]3 years ago
4 0

The answer is A. 19/20

You might be interested in
How do you install an operating system?<br><br> Answer with full sentences
denis23 [38]

Answer:

On Windows. Insert the installation disk or flash drive. Restart your computer. Wait for the computer's first startup screen to appear. Press and hold Del or F2 to enter the BIOS page. Locate the "Boot Order" section. Select the location from which you want to start your computer.

Explanation:

6 0
3 years ago
Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also known as:
Nostrana [21]

Answer:

Zero-day exploits

Explanation:

Zero-day exploits refers to recently found vulnerabilities in a computer software program that has been in existence but was hitherto not known and addressed by the software security experts, however, these vulnerabilities were known to hackers. While the existence of these "loop-holes" in the software can go on unnoticed for several years, hackers can take advantage of it to cause harm to the computers' programs and data.

When these attacks occur, it is called a zero-day because the attack took place on the very day that the loop-hole was discovered in the software. So exploitation has already taken place before a fix is carried out.

5 0
3 years ago
Which field uses computer programs to automate tasks so that they can be performed better than by humans ?
rewona [7]

Answer:

ran out of comments

Explanation:  :)

5 0
2 years ago
What is the name that is given to a symbiotic relationship in which both species benefit?
avanturin [10]
Mutualism.
An example of mutualism is where insects pollinate plants, then the plants provide nectar.
7 0
4 years ago
Read 2 more answers
Which of the following are the two main types of copyright relevant to the recording industry? Select all that apply
Bond [772]

Answer:

LETTER A...

CUZ ITS TRUE

6 0
2 years ago
Other questions:
  • Cell division is called:
    7·1 answer
  • Select the correct answer.
    6·1 answer
  • When a partition is formatted with a file system and assigned a drive letter it is called a volume?
    10·1 answer
  • Select the correct answer.
    15·1 answer
  • What do you think is the most fascinating aspect of the internet?
    7·2 answers
  • Which search engine does not track users? Choose the answer.
    10·2 answers
  • 1)When the liquid is spun rapidly, the denser particles are forced to the bottom and the lighter particles stay at the top. This
    10·1 answer
  • When machining rotors, what is the reason for setting the indexing collars to zero?
    9·1 answer
  • Please answer this question​
    12·1 answer
  • A table of contents does not _____ automatically [customize table of contents]
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!