1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ozzi
3 years ago
8

Olivia works at a company that creates mobile phones. She wanted to estimate the mean amount of time their new phone's battery l

asts with regular use after a full charge. She took a random sample of
6
66 of these phones and randomly assigned each of them to a volunteer. She instructed them to fully charge the phones and use them as they regularly would until the battery died (without recharging the phone). Here are the data they reported:
Phone
1
11
2
22
3
33
4
44
5
55
6
66
Battery life (hours)
8.0
8.08, point, 0
6.0
6.06, point, 0
10.5
10.510, point, 5
9.0
9.09, point, 0
8.5
8.58, point, 5
12
1212
Mean
x
ˉ
=
9
x
ˉ
=9x, with, \bar, on top, equals, 9 hours
Standard deviation
s
x
=
2.07
s
x
​
=2.07s, start subscript, x, end subscript, equals, 2, point, 07 hours
Assume that all conditions for inference are met.
Which of the following is a
90
%
90%90, percent confidence interval for the mean battery life (in hours)?
Choose 1 answer:
Choose 1 answer:

(Choice A)
A
9
±
1.4
9±1.49, plus minus, 1, point, 4

(Choice B)
B
9
±
1.7
9±1.79, plus minus, 1, point, 7

(Choice C)
C
9
±
2.0
9±2.09, plus minus, 2, point, 0

(Choice D)
D
9
±
2.07
9±2.079, plus minus, 2, point, 07
Computers and Technology
1 answer:
Kisachek [45]3 years ago
3 0

An swer:  

                               

 E. xpl an ation:    

                               

You might be interested in
Carbon copy others who are..
My name is Ann [436]

Answer:

Is it Multiple Choice Question?

5 0
3 years ago
Read 2 more answers
The retention of encoded information over time is called storage. A measure of memory storage that involves identifying informat
Anni [7]

Answer: ask google and search quizlet by it , it will show you

Explanation:

7 0
3 years ago
Explain in details three security countermeasures you know.​
SpyIntel [72]

Answer:

The three options are:

1. Avoid sharing files and folders over the network without the permission of your administrators. You might fall in trouble otherwise.

2. Never share your credit card details with a third party through the internet. You can lose a lot of or all your money.

3. Always ensure that your password is strong enough or else your account can be hacked, And never share them with anybody.

Explanation:

Please check the answer.

4 0
3 years ago
Two fingers are assigned to six letters each. What fingers are they?
Lena [83]

Answer:

The left and right index finger

Explanation:

Left index finger: R, T, F, G, C, V

Right index finger: Y, U, H, J, B, N

8 0
3 years ago
Greg is the purchasing manager at a jeans-manufacturing company. He knows he could save his company money by using cheaper, thin
olasank [31]

Answer: B) Character

Explanation:

According to the question, character of Greg is depicted through the scenario as he is displaying his moral quality ,honesty and mind integrity through not providing low-quality product to his customers even though he has chance to save company money through buying shape material  .

Thus, he has good character to provide quality product and maintaining reputation and company as well as valuing his customers.                      

Other options are incorrect because fairness, community, expertise and competence are not the quality trait depicted through question's scenario. Thus, the correct option is option(B).

4 0
3 years ago
Other questions:
  • A ____ document identifies the purpose of the program being developed, the application title, the procedures to be followed when
    11·1 answer
  • Write the following function without using the C++ string class or any functions in the standard library, including strlen(). Yo
    12·1 answer
  • Which best describes inserting a table using the Table Gallery
    10·2 answers
  • Suppose you have one particular application that is trying to send data on the Internet but none of the data is making it to the
    15·2 answers
  • Match the keyboard shortcuts to the function they perform
    10·1 answer
  • Which 3D game has Bentley the Bear collect gems while avoiding enemy trees, bees, ghosts, skeletons, and Berthilda the witch?
    9·1 answer
  • How can i address inv file in c for open it?
    13·1 answer
  • The _____ method randomly rearranges the items in the list provided in the parentheses.
    5·2 answers
  • State whether the given HTML coding is True or False. <HR SIZE=5 COLOR=YELLOW ALIGN=RIGHT WIDTH=75%>​
    9·1 answer
  • Define technical writing. The proposal introduces the ……. (5 Mark)
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!