1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
polet [3.4K]
3 years ago
6

Elwin Osbourne, CIO at GFS, Inc., is studying employee use of GFS e-mail for non-business communications. He plans to use a 98%

confidence interval estimate of the proportion of e-mail messages that are non-business; he will accept a 0.05 error. Previous studies indicate that approximately 30% of employee e-mail is not business related. Elwin should sample _______ e-mail messages.
Computers and Technology
1 answer:
ziro4ka [17]3 years ago
3 0

Answer: 456

Explanation:

Given : Significance level : \alpha= 1-0.98=0.02

Critical value : z_{\alpha/2}=2.33

Margin of error : E=\pm0.05

The prior proportion of employee e-mail is not business related: p=0.30

The formula to find the sample size is given by :-

n=(p(1-p))(\dfrac{z_{\alpha/2}}{E})^2

i.e. n=(0.3(0.7))(\dfrac{(2.33)}{0.05})^2=456.0276\approx456

Hence, Elwin should sample 456 e-mail messages.

You might be interested in
Class 10 computer unit 1 all excersise​
kenny6666 [7]
Y’all just asking for people do your work, literally not even a question
5 0
3 years ago
You are a psychologist who needs to provide a qualitative evaluation for IQ scores. Create a program that takes IQ scores (one a
dsp73

Answer:

Check the explanation

Explanation:

#include <iostream>

#include <iomanip>

using namespace std;

int getIQ(); // return the score

void printEvaluation(int);

int main()

{

   int IQ = 0;

   IQ = getIQ();

   

   printEvaluation(IQ);

   return 0;

}

int getIQ()

{

   int score = 0;

   cout << "Please enter your IQ Score to receive your IQ Rating:\n";

   cin >> score;

   

   return score;

}

void printEvaluation(int aScore)

{

   cout << "IQ Score: " << aScore << " IQ Rating: ";

   

   if (aScore <= 100)

   {

       cout << "Below Average\n";

   }

   else if (aScore <= 119)

   {

       cout <<"Average\n";

   }

   else if (aScore <= 160)

   {

       cout << "Superior\n";

   }

   else if (aScore >= 160 )

   {

       cout << "Genius\n";

   }

}

4 0
3 years ago
Identify different character components for a given typeface: Arial.
Shkiper50 [21]

Answer: Arial belongs to the sans serif family of typefaces. It is the most commonly used typeface, and it is the default typeface set in Microsoft Word. A character is a typographic element represented through an upper- or lowercase letter, number, or special character. Every letter of the alphabet has multiple parts that we describe with a particular set of terms. Typographers call this “letter anatomy.” The basic terms common to all letters are below:

An ascender is the stroke extending upward, going above the x-height (which is the height of the letter excluding the ascender or descender).

A descender is the stroke extending downward from the baseline (which is the imaginary horizontal line that aligns the bodies of the characters).

A bar is the horizontal stroke in the uppercase letters A, E, F, H, I, and T, as well as in the lowercase letters e, f, and t.

A counter is the blank space within the body stroke.

A bowl is a curved stroke that surrounds the counter.

A shoulder is a curved stroke beginning at the stem.

A serif is the tapered feature at the end of a stroke. Arial is a sans serif font, and it does not have tapered corners at the ends of the main strokes.

3 0
3 years ago
Cybersecurity breaches in the workplace generally happen because _____. Select 3 options. people deliberately try to hack into t
Lady_Fox [76]

Cybersecurity breaches in the workplace generally happen because:

  • People deliberately try to hack into the network people.
  • People make unintentional mistakes.
  • People do not know about cybersecurity protocols

<h3>What are the three main causes of security breaches?</h3>

The major reasons for data breaches are:

  • Old, Unpatched Security Vulnerabilities.
  • Human Error
  • Malware, etc.

Therefore, Cybersecurity breaches in the workplace generally happen because:

  • People deliberately try to hack into the network people.
  • People make unintentional mistakes.
  • People do not know about cybersecurity protocols

Learn more about Cybersecurity from

brainly.com/question/12010892

#SPJ1

5 0
2 years ago
Which slide elements must Claire use to enhance her presentation?
Alja [10]
She needs to use animations to enhance her presentation
8 0
3 years ago
Other questions:
  • Brenda's working on improving a Google Search Ads quality score so it potentially gets a better ad rank and performs better in t
    9·1 answer
  • Lucy has to move data from column A to column N in a worksheet. Which keys should she select to move data in the same worksheet?
    7·2 answers
  • How many buttons does a gamecube controller have?
    7·1 answer
  • What do you call the spreadsheet cell that is in effect and has a heavier black border around it?
    7·2 answers
  • The ______________ shows that you have fully researched the topic and gives you a chance to prove your claim.
    8·1 answer
  • 1. Software that is designed to intentionally cause harm to a device, server, or network is A. outware B.loggerware C.
    12·1 answer
  • How do I contact an admin
    8·1 answer
  • Rafi is developing an application to send urgent information about global health crises over the Internet to hospitals. He is wo
    6·1 answer
  • Edhesive in JAVA Write a method that takes a String parameter. If the String has a double letter (i.e. contains the same letter
    13·1 answer
  • Select the correct answer.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!