1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yKpoI14uk [10]
3 years ago
11

An airline has found about 7% of its passengers request vegetarian meals. On a flight with 166 passengers the airline has 16 veg

etarian dinners available. What's the probability that it will be short of vegetarian dinners? (hint: Let X be the number of vegetarians. Identify a probability model for X. Write a probability expression for X that reflects "Short of vegetarian dinners" and compute.)
Computers and Technology
1 answer:
Ket [755]3 years ago
8 0

Answer:

P(x >16.5) = 0.3372

Explanation:

Given data:

P = 0.07

n = 166

Available vegetarian  dinner is 16

let P(X\leq 16) is number of short vegetarian meals

P(X\leq  16)  = binomial distribution (166, 0.09)

np = 166\times 0.09 = 14.94

n(1-p) = 166(1-0.09) = 151.06

Both value of np and n(1-p) greater than 5

x -  normal distribution  with

mean  = np = 14.94

standard deviation= \sqrt{np(1-p)}

                                [/tex]= \sqrt{14.94(1-0.09)}[/tex]

standard deviation = 3.687

Find P(x> 16) i.e P(X>16 ) = P(x >16.5)

P(x >16.5) = 1 - P(x <16.5)

                = 1 - P(\frac{x-\mu}{\sigma} < \frac{16.5 - \mu}{\sigma}

         = 1 - P{Z < [\frac{16.5 - 14.94}{3.67}]

                = 1 - P{z< 0.425}

                 = 1 - 0.6628

P(x >16.5) = 0.3372

You might be interested in
Computer security experts devote their time and energy to the protection of sensitive data and the prevention of an outside atta
Alik [6]

Answer:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

Explanation:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

An information security policy are set of rules/policies designed to guide employees for the protection of the security of company information and IT systems. The reasons for these policies are:

  1. It defines what is required from organization’s employees for the security of the IT systems
  2. Information security policies provide a means to secure the organization against external and internal threats
  3. Information security policies are a mechanism to for ensuring an organization’s legal and ethical responsibilities
  4. Information security policies are created to hold each employee responsible with regard to information security
4 0
3 years ago
Please Help!!!<br> I keep getting this answer wrong
IgorC [24]

Answer:

I think its option a. and d.

Explanation:

option a. is right I'm sure.

option b. and c. are doubtful for me.

option d. can be true. but unlike a job letter, resumes carry a deeper view of the employee's accomplishments and qualifications.

but I still hold with option a. and b. if it's wrong please do inform, so I can refer.

5 0
3 years ago
Can run mobile-style apps in the area known as the start screen, while running traditional software in the more familiar desktop
Travka [436]
The correct answer: Yes, mobile-style apps can run in a personal computer's desktop.

That is possible by means of a desktop application called emulatator. An emulator like Bluestacks allows a personal computer to run mobile-style apps by acting as a virtual drive in the personal computer's harddisk. 

Emulation is successful if the system requirements of the mobile-application is met by the personal computer's system attributes such as Random Access Memory abundance, Random Access Memory speed, Processing speed (in some cases core abundance e.g. core 2) etc. 

Some mobile-applications do not work in the personal computer's desktop, however, if this application requires platform specific functions such as mobile device's network provider etc.
4 0
3 years ago
Select the correct answer.
Veronika [31]
I think it’s c. llS....
6 0
3 years ago
Read 2 more answers
All changes
Vsevolod [243]

You should get up and move every 30 minutes

Hope  this helps

-scav

7 0
2 years ago
Other questions:
  • Which rock band apologized for automatically adding its new album to every iPhone 6 in 2014
    8·2 answers
  • A web client is sending a request for a webpage to a web server. from the perspective of the client, what is the correct order o
    14·1 answer
  • Mad Libs are activities that have a person provide various words, which are then used to complete a short story in unexpected (a
    8·1 answer
  • A software process describes the interrelationship among the phases by expressing their order and frequency, but does not define
    14·1 answer
  • Which search engine does not track users? Choose the answer.
    10·2 answers
  • What are binary code​
    7·2 answers
  • tell us things u did as a kid but don't want to admit to it (best gets brainly 5 stasr and a thank you)
    13·2 answers
  • How many of yall are willing to subscribe to my channel called "Space Juice" with around 245 subs?!​
    8·1 answer
  • Think about a career you would like to have 10 years from now.
    5·1 answer
  • Write an answer in three to five sentences that describes the photo, explains what better lighting would mean for your photograp
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!