1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
UNO [17]
3 years ago
5

A computer program is tested by 5 independent tests. If there is an error, these tests will discover it with probabilities 0.1,

0.2, 0.3, 0.4, and 0.5, respectively. Suppose that the program contains an error. What is the probability that it will be found
Computers and Technology
1 answer:
Svetllana [295]3 years ago
5 0

Answer:

0.8488

Explanation:

Let E =error found by test 1

Let F=error found by test 2

Let G=error found by test 3

Let H=error found by test 4

Let I= error found by test 5

Given P(E)=0.1, P(F)=0.2, P(G)=0.3, P (H)= 0.4, P (I)=0.5

therefore P(notE)=0.9, P(notF)=0.8, P(notG)=0.7, P(not H)=0.6, P (notI)=0.5

Tests are independent P(not E & not F &not G & not H & not I=P(notE)*P(notF)*P(notG)*P (notH)*P (not I) =0.9*0.8*0.7*0.6*0.5 =0.1512

P(found by at least one test)= 1- P(not found by any test)=1-P(not E& not F & not G & not H & not I ) = 1-0.1512 = 0.8488

You might be interested in
What single word could be used to describe the importance of software design??
Eddi Din [679]
<span>abstraction possibly </span>
5 0
3 years ago
Which font style is said to be slightly above the other line of text?
Keith_Richards [23]
I think the answer would be "superscript"
8 0
3 years ago
Read 2 more answers
Give a recursive version of the algorithm Insertion-Sort (refer to page 18 in the textbook) that works as follows: To sort A[1..
Inga [223]

Answer:

see explaination

Explanation:

void insertion( int e,int *x, int start, int end)

{

if (e >= x[end])

x[end+1] = e;

else if (start < end)

{

x[end+1] = x[end];

insertion(e, x, start, end-1);

}

else

{

x[end+1] = x[end];

x[end] = e;

}

}

void insertion_recurssion(int *b, int start, int end)

{

if(start < end)

{

insertion_sort_recur(b, start, end-1);

insertion(b[end], b, start, end-1);

}

}

void main()

{

insertion_recurssion(x,0,5);

}

3 0
3 years ago
A college meal plan allows students to:
Licemer1 [7]
A college meal plan allows students to  PAY UPFRONT TO EAT A SPECIFIC NUMBER OF MEALS IN THE COLLEGE CAFETERIAS. Many colleges give students some degree of freedom when it comes to the choice of meal plans to sign up for. Students have to pay in advance for any meal they decide for. 
8 0
3 years ago
Read 2 more answers
A personal music database stores details of a personal music library, and can be used to manage your MP3, CD, or vinyl collectio
Rudiy27

Answer:

Check the explanation

Explanation:

Step 1: identify the entitles

From the statement given, the given entitles are artists, albums, tracks and played.

Step 2: identify the relationships

  1. One artist can make many albums
  2. One album can contain many tracks
  3. One track can be played many times.

Conversely, each play is associated with one track, a track is on one album, and an album is by one artist.

Step 3: identify the key attributes

The only strong entity in the database would be the “artist”, which has an attribute of artist ID so as to uniquely identifies it

Each album entity is uniquely identified by its album combined with the artist ID of the corresponding artist entity.

A track entity is similarly uniquely identified by its track ID combined with the related album ID and artist ID attributes.

The played entity is uniquely identified by a combination of its played time, and the related track ID attributes.

Step 4: identify other relevant attributes:

The attributes are straight forward; artist, albums, and track have names as well as identifiers to uniquely identify each entity. The track entity has a time attribute to solve the duration and the played entity has a timestamp to store when the track was played.

Step 5: Draw a complete ER diagram

The diagram explaining this question can be seen in the attached image below:

7 0
3 years ago
Other questions:
  • The act of engaging in crime through the use of a computer or similar type of device is called:
    8·1 answer
  • What percentage of jobs work in the entertainment industry?
    13·1 answer
  • What are the core scripting and coding technolies used to build ai platforms?
    14·1 answer
  • Each time the user selects an item from a list box in a web page, a postback occurs, the web page will redisplay, and the page_l
    12·1 answer
  • Which two options are negotiated via ncp during the establishment of a ppp connection that will use the ipv4 network layer proto
    7·1 answer
  • The purpose of​ a/an _________ system is to capture best practice solutions and program them into a set of rules in a software p
    13·1 answer
  • What does the top level domain in a url inducate? A. The organization or company that owns the website. B. The organization or c
    6·2 answers
  • Whats 12/29 divided by 12/34
    7·2 answers
  • Which of the following expressions in Java is equal to 4?
    11·1 answer
  • To stored three characters a computer occupies. Bytes memory space
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!