1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
d1i1m1o1n [39]
3 years ago
8

A small monster collector has captured ten Bagel-type small monsters. Each Bagel-type small monster has a 35% chance of being a

Sesame Seed-subtype and a 20% chance of being a Whole Wheat-subtype.What is the probability of exactly eight of the captured small monsters being Whole Wheat-subtypes?What is the probability of at least one of the captured small monsters being a Sesame Seed-subtype?What is the probability that there are no Sesame Seed- or Whole Wheat-subtype small monsters captured?What is the probability that are at least two Whole Wheat/Sesame Seed dual-subtype small monsters captured?

Computers and Technology
1 answer:
Doss [256]3 years ago
6 0

Answer:

Check the explanation

Explanation:

Each Bagel-type small monster has 0.35 probability of being a Sesame Seed-subtype and 0.2 probability of being a Whole Wheat-subtype.

The probability that exactly 8 of them are Whole Wheat-subtype is \binom{10}{8}(0.2)^8(0.8)^2 using multiplication principle, because first need to choose which 8 are Whole Wheat-subtype, and if exactly 8 of them are Whole Wheat-subtype, then other two are not Whole Wheat-subtype. The former has probability 0.2, while the latter has probability 1-0.2 = 0.8 .

Kindly check the attached images below for the complete answer to the question above

You might be interested in
Say you are running a program along with many other programs in a modern computer. For some reason, your program runs into a dea
swat32

Answer:

The OS deals with such deadlock to temporarily prevent resources from deadlocked processes. It is either it back off a process to some check point allowing preemption of a needed resource and restarting the process at the checkpoint later. Finally, successively kill processes until the system is deadlock free.

6 0
4 years ago
When a program lets the user know that an invalid menu choice has been made, this is an example of?
kolezko [41]

The question has the multiple choices below

A) Input validation
B) output correction
C) compiler criticism
D) output validation

The answer is (A) Input validation

Also known as data validation, it is the correct and proper testing of any input supplied by an application or a user. It prevents wrongly formed data from entering the system. Applications should be able to check and validate every input entered into the system since it is hard to detect a malicious user trying to gain entry into software.










5 0
3 years ago
Which of these is the function of a modeler?
Liono4ka [1.6K]

Answer:

Create 3D assets from sketches

Explanation:

A modeler Job is to model all of the 3D/2D assets needed to obtain the final result wanted by the developers. The modeler creates the assets from sketches or images provided to him according to the theme.

5 0
3 years ago
Read 2 more answers
Owners of individual domains get to decide what content is published on their websites. Why might this autonomy be important to
Alika [10]

Answer:

Explanation:

With an individual domain name we can upload all the content we want, in a free domain or share domain, upload content in some cases have a limit, for example the size of an image, in an individual domain we can add our brand, in a shared, we can add our brand side to company share those domains, we can have our own email address, practically we have a complete autonomy in our website.

4 0
3 years ago
When you go to a website, your web browser requests a web page from:
lakkis [162]

Answer: web server

Explanation:

When you go to a website, your web browser requests a web page from the web server. For this to happen, the IP address for the webpage has to be identified first, tmaftee which the browser will request appropriate data from the web server.

Such request comes in form of data packet and takes place through HTTP and.utnhas all the necessary information that is needed by the web server for the delivery of the webpage data.

3 0
3 years ago
Other questions:
  • In a clustered column chart, the names of each column are part of the ____ series. select one:
    14·2 answers
  • Which of the following refers to semitransparent text or a faint object that appears
    15·1 answer
  • Write a program thattakes a number x and its exponent y from the user and thencalculate the result
    10·1 answer
  • A high school student is working as a summer intern at your company. Explain to the intern how viruses, malware, and spam impact
    11·1 answer
  • How to connect xbox one controller
    5·1 answer
  • An empty frame used to reserve space for a picture to be inserted at a later time is known as a _____. shape image picture place
    7·1 answer
  • Find the domain and range of Y=x^3-9/x-3​
    14·1 answer
  • Class function which is called automatically as soon as the object is created is called as __
    6·1 answer
  • Take values of length and breadth of a rectangle from the user and check if it is square or not.
    8·2 answers
  • what is true about the depth of the troposphere? group of answer choices it varies with passing air masses. it is shallower in s
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!