1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
77julia77 [94]
3 years ago
9

To develop programs for business travelers staying at convention hotels, Hyatt Hotels Corp. commissioned a study of executives w

ho play golf. The study revealed that 55% of executives admitted that they had cheated at golf. Also, 20% of the executives admitted that they have cheated at golf and had lied in business. Given that an executive is cheated at golf, what is the probability that the executive also had lied in business?

Computers and Technology
1 answer:
Alekssandra [29.7K]3 years ago
8 0

Answer:

0.364 is the probability that an executive cheated at golf also had lied in business.

Explanation:

See attached picture.

You might be interested in
Software (often on firmware) designed to make physical products and devices smarter by doing things like sharing usage informati
saveliy_v [14]

Answer:

Embedded Systems.

Explanation:

Software (often on firmware) designed to make physical products and devices smarter by doing things like sharing usage information, helping diagnose problems, indicating maintenance schedules, providing alerts, or enabling devices to take orders from other systems is referred to as Embedded Systems.

6 0
3 years ago
When the PT-109 American patrol boat, under the command of Lieutenant John F. Kennedy, was sunk by a Japanese destroyer, a messa
mr_godi [17]

Answer:

Meaning:

PT BOAT ONE OWE NINE LOST IN ACTION IN BLACKETT  

STRAIT TWO MILES SW MERESU COVE X CREW OF TWELVE  

X REQUEST ANY INFORMATION.

Explanation:

Playfair cipher  invented in 1854 by Charles Wheatstone was the first practical digraph substitution cipher. Lord Playfair promoted the use of the cipher, therefore it was named after him. Playfair cipher encrypts pairs of letters (digraphs) making it hard to break.  Frequency analysis can still be undertaken but requires much more cipher text in order to work. It requires no additional equipment to operate and is very fast therefore it is to protect information during war. It was used  by British forces in the Second Boer War and in World War I and during World War II by the Australians.  

When the PT-109 American patrol boat, under the command of Lieutenant John F. Kennedy, was sunk by a Japanese destroyer, a message was received at an Australian wireless station in the morning of the 2 of August 1943  in Playfair code:

KXJEY  UREBE  ZWEHE  WRYTU  HEYFS  

KREHE  GOYFI  WTTTU  OLKSY  CAJPO  

BOTEI  ZONTX  BYBWT  GONEY  CUZWR  

GDSON  SXBOU  YWRHE  BAAHY  USEDQ

Meaning:

PT BOAT ONE OWE NINE LOST IN ACTION IN BLACKETT  

STRAIT TWO MILES SW MERESU COVE X CREW OF TWELVE  

X REQUEST ANY INFORMATION.

5 0
3 years ago
Which option can be used to automatically scan a document to prepare it for publishing, identifying personal information that sh
lubasha [3.4K]

Answer:

Document Inspector  option can be used to automatically scan a document to prepare it for publishing, identifying personal information that should be removed

Explanation:

Document scanner: This converts the text written in the paper in to a digital form. Most probably it will convert the text in paper in to image only.

Document Inspector is the tool which removes the personal information while sharing the document. The personal information can be name, mail id, phone number etc. This personal information though hidden will get reflected while publishing and this document inspector allow us to protect these data from sharing.

Privacy manager: This is a software reducing the risk of unauthorized access of data

Security manager: This once again protect the document.

4 0
4 years ago
Please write me a one-paragraph summary of what you have learned about space technology.
kow [346]

Answer:

Space technology. Space technology is technology developed by space science or the aerospace industry for use in spaceflight, satellites, or space exploration. Space technology includes spacecraft, satellites, space stations, and support infrastructure, equipment, and procedures and space warfare. Launched into orbit in 1990, the Hubble truly is one of the greatest space instruments in the history of humanity. And it has been updated significantly in the twenty-first century. But the truth is, space exploration technology, and other discoveries and technologies that arise because of it, are incredibly influential and beneficial; not only does space research improve the economy by keeping scientists and engineers employed

Explanation:

5 0
3 years ago
write an algorithm to settle the following question: a bank account starts out with $10,000. interest is compounded monthly at 6
svp [43]

Using the knowledge in computational language in python it is possible to write a code that write an algorithm to settle the following question.

<h3>Writting the code:</h3>

<em>original = float(raw_input("Enter initial balance: "))</em>

<em>interest = float(raw_input("Enter promised return: "))</em>

<em>expenses = float(raw_input("Enter monthly expenses: "))</em>

<em />

<em>interest = interest / 100 / 12</em>

<em>month = 0</em>

<em>balance = original</em>

<em />

<em>if balance * interest - expenses >= 0:</em>

<em>print "You don't need to worry."</em>

<em>else:</em>

<em>while balance + balance * interest - expenses >= 0: # negation of the if condition</em>

<em>balance = balance + interest * balance # in one month</em>

<em>balance = balance - expenses</em>

<em>month = month + 1</em>

<em>print month, balance</em>

<em />

<em>print month / 12, "years and", month % 12, "months"</em>

See  more about python at brainly.com/question/18502436

#SPJ1

7 0
2 years ago
Other questions:
  • Tasha purchased a new tablet. She has several questions about how to connect to the internet, download apps, install software, a
    5·1 answer
  • You are writing an email to a potentional employer about a job opportunity. What can you do to make sure the email reflects your
    15·2 answers
  • Who invented the first RAM stick
    11·1 answer
  • The wired or wireless means of connecting a computer to the internet is called a ________.
    9·1 answer
  • Help PLEASE (in attachment)
    8·1 answer
  • OSHA standards appear in the ___________ and are then broken down into ____________.
    11·1 answer
  • The difference between a checked and an unchecked exception is:
    10·1 answer
  • Intrusion Detection System (IDS) is a security mechanism that detects unauthorized user activities, attacks, and network comprom
    5·1 answer
  • Does anyone know how to change there Name of the account that shows up? If you do please tell me in a comment and/or Answer.
    6·2 answers
  • Define operating system?explain the types of operating system on the basis of use.​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!