1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vaselesa [24]
2 years ago
15

.NET

Computers and Technology
1 answer:
valkas [14]2 years ago
7 0

Answer:

wait what making a chart

You might be interested in
Does the estimate of a tolerance level of 68.26% of all patient waiting times provide evidence that at least two-thirds of all p
ivanzaharov [21]

Answer:

Yes, because the upper limit is less Than 8 minutes

Explanation:

According to the empirical formula :

68.26% of data lies within 1 standard deviation from the mean;

Hence,

Mean ± 1(standard deviation)

The sample mean and sample standard deviation of the given data is :

Sample mean, xbar = Σx / n = 546 / 100 = 5.46

Sample standard deviation, s = 2.475 (Calculator)

The interval which lies within 68.26% (1 standard deviation is) ;

Lower = (5.460 - 2.475) = 2.985

Upper = (5.460 + 2.475) = 7.935

(2.985 ; 7.935)

Since the interval falls within ; (2.985 ; 7.935) whose upper level is less than 8 means patients will have to wait less Than 8 minutes.

8 0
3 years ago
Choose the correct line of code.
Naddika [18.5K]
Def_pow_(self,b): if not then I’m sorry
5 0
3 years ago
My mom works from home selling her craft work online to people all over the world. She can do this from home because we have acc
postnew [5]
The computer and a device
7 0
3 years ago
Read 2 more answers
A puppy weighed 6 ounces at birth. After two weeks, the puppy weighed 14 ounces. How much did the puppy gain? Model the equation
ivann1987 [24]
+8 ounces ...don't know what an alrebra tile so I just subtracted :)
7 0
2 years ago
Read 2 more answers
Linux implements _________ to determine how a user is to be authenticated and whether there are password policies associated wit
ira [324]

Answer:

Pluggable authentication modules (PAM).

Explanation:

These are schemes that are seen to be used in API authentication. It is relyed on to provide high authentification protocool in any correct form it is seen to be in use. also its ability to grant access to each other within two people interface are reasons big user clients refer to it in most of their policies that deals with their working system passwords and their database passwords to most of their files. This is why the company in the context which is a big firm rely on it for its services.

6 0
3 years ago
Other questions:
  • A company has critical systems that are hosted on an end-of-life OS. To maintain operations and mitigate potential vulnerabiliti
    14·1 answer
  • In cell I8, enter a nested logical function to display Need to Remodel if the apartment is unoccupied (No) AND was last remodele
    9·1 answer
  • Is it important for a writer to include voice and point of view in writing because...<br> Plz help
    10·1 answer
  • Write a Python program that prints your name, CS classes taken (or other relevant experience), and the date on separate lines. U
    5·1 answer
  • The 10 and 2 o'clock hand position on the steering wheel is no longer recommended because _____.
    13·1 answer
  • Misspelet errors are displays with a ...<br>.. below them<br>​
    10·1 answer
  • Superclass in python explanation
    7·1 answer
  • .<br>1.<br>CPU<br>f. ALU<br>. CU<br>h. CRT<br>g. LED<br>​
    15·1 answer
  • Need answer ASAP plz
    8·1 answer
  • ____ characterized the period now known a Web 1. 0. Augmented reality
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!