1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
scZoUnD [109]
3 years ago
5

In order to estimate the percentage of defects in a recent manufacturing batch, a quality control manager at Intel selects every

8th chip that comes off the assembly line starting with the 3rd, until she obtains a sample of 140 chips.
Computers and Technology
1 answer:
Bezzdna [24]3 years ago
7 0

Answer:

systematic sampling method

Explanation:

Based on the information provided within the question it can be said that in this scenario the method that was used was a systematic sampling method. This method focuses on selecting elements from a ordered sampling frame, which in this case refers to every 8th chip starting from the 3rd. This method repeats once the end of the list or process is reached which is 140 chips in this scenario.

You might be interested in
PYTHON
Korvikt [17]

Answer:

import random

print("Hello! I have a random number from 1 to 100! It is your job to try and guess it!")

number = random.randint(1,101)

guess = int(input("start to guess: "))

num_guesses = 1

while guess != number:

   if guess > number:

       print("lower")

       guess = int(input("try again: "))

       num_guesses +=1

   elif guess < number:

       print ("higher")

       guess = int(input("start to guess: "))

       num_guesses +=1

print("congrats it took you", num_guesses, "tries")

Explanation:

6 0
3 years ago
________ refers to the ICT architecture, where users access software applications and information systems remotely over the Inte
Slav-nsk [51]

Answer:

Cloud computing

Explanation:

Cloud computing refers to the process of making computer system resources like computing power and data storage available to user on-demand without requiring the user to manage them himself. The computer system resources include servers, applications, networks, services, storage, and others.

It allows data center to be available over the internet to a large number of users.

Cloud computing involves employing a network of remote servers which are hosted on the Internet for processing, storing, and managing data, instead of using a personal computer or a domestic server. Its aim is to ensure a coherence and economies of scaled through resources sharing.

There are two types of cloud computing: enterprise clouds, which its use can be restricted to just one organisation; and public cloud, which is meant for many organisation.

3 0
3 years ago
_____ is a method for analyzing and reducing a relational database to its most streamlined form. Structured query Normalization
mixas84 [53]
<span>Structured query Is The Answer.</span>
4 0
3 years ago
Enabling encryption of all data on a desktop or laptop computer is generally considered:______.
Nezavi [6.7K]

Enabling encryption of all data that are stored on a desktop or laptop computer is generally considered: essential for any computer.

<h3>What is information security?</h3>

Information security can be defined as a preventive practice which is typically used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technologies, encryption, frameworks, processes and network engineers.

<h3>The types of security control.</h3>

In Cybersecurity, there are three (3) different types of security control and these include the following:

  • Management security.
  • Physical security.
  • Operational security.

In this context, we can infer and logically deduce that the use of encryption, endpoint security, firewalls, intrusion detection systems (IDS), and biometric fingerprint readers is generally considered essential for any computer that stores data, unless they aren't sensitive information.

Read more on information security here: brainly.com/question/14286078

#SPJ4

4 0
2 years ago
What does it mean to have 2 warnings on brainly and what if i get another one?
steposvetlana [31]
By giving wrong answers or cheating I guess
5 0
3 years ago
Read 2 more answers
Other questions:
  • Consider the binary search tree constructed for the words oenology, phrenology, campanology, ornithology, ichthyology, limnology
    14·1 answer
  • If a user wants to change one small section of the formatting of a document and leave the rest the same, which process should be
    14·1 answer
  • What are three ways you cite evedince
    5·2 answers
  • Who want to be my friend
    7·2 answers
  • Ask me anything about grades kindergarten to fifth grade!
    12·1 answer
  • Boardman College maintains two files—one for Sociology majors and another for Anthropology majors. Each file contains students'
    5·1 answer
  • Hope fixes her mistake and comes up with this list.
    9·2 answers
  • When you're working with a word processing document and you press the DEL Key what happens
    7·2 answers
  • Find the error in the following code fragment. int a: System.out.print(a):​
    12·1 answer
  • Why might a programmer want to define his or her own functions? What are some potential disadvantages? How might new functions m
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!