1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
d1i1m1o1n [39]
3 years ago
8

A small monster collector has captured ten Bagel-type small monsters. Each Bagel-type small monster has a 35% chance of being a

Sesame Seed-subtype and a 20% chance of being a Whole Wheat-subtype.What is the probability of exactly eight of the captured small monsters being Whole Wheat-subtypes?What is the probability of at least one of the captured small monsters being a Sesame Seed-subtype?What is the probability that there are no Sesame Seed- or Whole Wheat-subtype small monsters captured?What is the probability that are at least two Whole Wheat/Sesame Seed dual-subtype small monsters captured?

Computers and Technology
1 answer:
Doss [256]3 years ago
6 0

Answer:

Check the explanation

Explanation:

Each Bagel-type small monster has 0.35 probability of being a Sesame Seed-subtype and 0.2 probability of being a Whole Wheat-subtype.

The probability that exactly 8 of them are Whole Wheat-subtype is \binom{10}{8}(0.2)^8(0.8)^2 using multiplication principle, because first need to choose which 8 are Whole Wheat-subtype, and if exactly 8 of them are Whole Wheat-subtype, then other two are not Whole Wheat-subtype. The former has probability 0.2, while the latter has probability 1-0.2 = 0.8 .

Kindly check the attached images below for the complete answer to the question above

You might be interested in
"You are on a service call to fix a customer’s printer when she asks you to install a software package. The software is on a per
pickupchik [31]

Answer:

Ask her to get a genuine software

Explanation:

if i will install, it can cause the following problems:

1. Prated software makes your system Vulnerable to the security attacks because the activities of the software are not monitored by any organization and no one is responsible for anything bad happened to your system.

2. It may stop working anytime because there would not be maintenance patches available for it so that it can work properly.

3. It cannot be updated and may cause problems in core functionalities of it.

4.Serious legal actions can be taken against anyone using them because  economy has drastic decrease due ti use of it.

7 0
3 years ago
A(n) _____ exists when there are functional dependencies such that XY is functionally dependent on WZ, X is functionally depende
Nat2105 [25]

A partial dependency exists.

We have two types of dependency. The partial dependency and the transitive dependency.

The answer here is partial dependency. It occurs when the attribute only depends on some parts of the element. In such attribute, the primary key is the determinant.

It can be shown as;

XY→WZ , X→W and XY is the primary key or the only candidate key

Read more at brainly.com/question/9588869?referrer=searchResults

3 0
3 years ago
Read 2 more answers
Jack is writing a paragraph for a school assignment. He proofreads his paper and notices that he used the word, "then" many time
Lynna [10]

He should use a Thesaurus.

5 0
4 years ago
Read 2 more answers
Which statement is true about dynamic microphones?
Xelga [282]

Answer:

b they have high sensitivity to surrounding sound

Explanation:

tell me it's correct or not

if it's correct so I hope it is helpful for you

but no so I am sorry

6 0
3 years ago
Read 2 more answers
Which term is used to mean the methods of a predator uses to befriend youth online?
sammy [17]
Pretty sure its called the grooming process

6 0
3 years ago
Read 2 more answers
Other questions:
  • Integrated circuits are made up of _____ and carry an electrical current
    14·1 answer
  • Employers will check you out on social media sites like Facebook, MySpace, and Twitter.
    6·2 answers
  • How do I sign into raterhub on my phone and my mobile device at the same time to complete phase 2 of my raters exam for sykeshom
    10·1 answer
  • What are factors that limit a technological design
    11·2 answers
  • A network that typically reaches a few meters, such as up to 10 meters (33 feet), and consists of personal devices such as mobil
    14·1 answer
  • The World Wide Web Click on a Description on the left, then click the Term that best fits the Description. Description Technolog
    5·1 answer
  • Both aliases and functions can be used to store commands that can be executed, but functions can also accept positional paramete
    14·1 answer
  • 2 examples of miniature storage media ?
    8·2 answers
  • Order the steps to use a logical argument as a rule type.
    15·2 answers
  • It was field day for the upper grades at Rock Creek School,
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!