1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ella [17]
3 years ago
6

the grade point average collected from a random sample of 150 students. assume that the population standard deviation is 0.78. f

ind the margin of error if c = 0.98.
Computers and Technology
1 answer:
salantis [7]3 years ago
3 0

Answer:

E =  14.81\%

Explanation:

Given

n = 150

\sigma = 0.78

c = 0.98

Required

The margin of error (E)

This is calculated as:

E = z * \frac{\sigma}{\sqrt{n}}

When confidence level = 0.98 i.e. 98%

The z score is: 2.326

So, we have:

E = 2.326 * \frac{0.78}{\sqrt{150}}

E = 2.326 * \frac{0.78}{12.247}

E =  \frac{2.326 *0.78}{12.247}

E =  \frac{1.81428}{12.247}

E =  0.1481

Express as percentage

E =  14.81\%

You might be interested in
What did research conducted in 2009 at Carnegie University Mellon predict?
riadik2000 [5.3K]

A.Information on social networking sites can give most or all digits of a person’s social security number.


5 0
3 years ago
United Broke Artists (UBA) is a broker for not-so-famous artists. UBA maintains a small database to track painters, paintings, a
lions [1.4K]

Answer:

Check the explanation

Explanation:

Kindly check the attached image below to see the relation and the table names.

7 0
3 years ago
Read 2 more answers
Which of the following situations best illustrates the process of authentication?a.A Web site sets users' passwords to expire ev
Paladinen [302]

Using an electronic signature on official documentation best illustrates the process of authentication

Further explanation:

The continuous rise of Electronic signatures has made it easier for people to accept signed documents by email or through electronic devices. One good example of electronic signatures is the implementation of digital signatures which broadly encompasses many types of electronic signatures out there. Digital signatures are unique to each signer and follow a standard authentication protocol called PKI. PKI use mathematical algorithms to generate what are known as private and public keys.

A good example is Bob and Jane. Jane sends an eSignature document using her private keys. Bob receives this document with an attached copy of Jane’s public key. The signature will be considered valid if the public key decrypts the signature correctly.

Learn more about eSignatures and electronic signatures.

brainly.com/question/8776017

#LearnWithBrainly

7 0
4 years ago
Will there be another season in Star vs the forces of evil?
valentina_108 [34]
The world may never kno
3 0
3 years ago
Which of the following statements about Java Class Libraries is false? Question 18 options: A) An advantage of using Java class
Novosadov [1.4K]

Answer:

D) Java class libraries are not portable

Explanation:

The Java Class Library (JCL) is an array of enthusiastically loadable libraries that Java applications can identify and refer to at run time. Since the Java Platform is independent of any particular operating system, applications can’t depend on any of the platform-native libraries.

The library is a massive collection and works of prebuilt classes that is distributed through the Java SE platform.

6 0
3 years ago
Other questions:
  • Mark, David, Tia, and Ashley are team members in a computer programming class. They have been assigned the task of creating a co
    12·1 answer
  • Janice has a "jammed" key on her keyboard. Every time she strikes the "S" key it sticks and doesn't pop back. What should Janice
    6·2 answers
  • What must you do first in order to change the font type size and colour of a particular text
    13·2 answers
  • Most large organizations store data through a strategy called a(n) ________ to promote efficient and safe use of data across the
    11·1 answer
  • What steps do you need to take to register
    14·1 answer
  • Why do we need vram​
    6·1 answer
  • The limit for characters in modern file systems is too small to accommodate keywords in titles
    7·2 answers
  • Write a program that simulates flipping a coin to make decisions. The input is how many decisions are needed, and the output is
    14·1 answer
  • What is this?
    15·2 answers
  • Element primer a partir del qual es generarà l'energia central solar fotovoltaica
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!