1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kicyunya [14]
3 years ago
11

Fifty-three percent of U.S households have a personal computer. In a random sample of 250 households, what is the probability th

at fewer than 120 have a PC?
Computers and Technology
1 answer:
aleksley [76]3 years ago
6 0

Answer:

The correct Answer is 0.0571

Explanation:

53% of U.S. households have a PCs.

So, P(Having personal computer) = p = 0.53

Sample size(n) = 250

np(1-p) = 250 * 0.53 * (1 - 0.53) = 62.275 > 10

So, we can just estimate binomial distribution to normal distribution

Mean of proportion(p) = 0.53

Standard error of proportion(SE) =  \sqrt{\frac{p(1-p)}{n} } = \sqrt{\frac{0.53(1-0.53)}{250} } = 0.0316

For x = 120, sample proportion(p) = \frac{x}{n} = \frac{120}{250} = 0.48

So, likelihood that fewer than 120 have a PC

= P(x < 120)

= P(  p^​  < 0.48 )

= P(z < \frac{0.48-0.53}{0.0316}​)      (z=\frac{p^-p}{SE}​)  

= P(z < -1.58)

= 0.0571      ( From normal table )

You might be interested in
Charlie wants you to include the following topics in your presntation: an overview of project management and its hrity,a descrip
maxonik [38]

Answer:

Explanation:

Project management is the process of planning, designing and implementing a project in an organized way to achieve the goals of an organization.

The project management process includes various activities like,

Definition – Initializing the project, identifying the needs

Planning – Organizing the activities and schedule the tasks

Execution – Coordinating people and resources and implement the tasks

Control – Monitoring the implementations, ensuring the objectives and goals

Closing – Acceptance of the project.

Task identification:

• Tasks are derived from the project deliverables and the requirements of the deliverables and the goals.

• All activities required for a complete process are to be identified.

• Identify intermediate deliverables for each major component

Relationships among tasks

The tasks can be interrelated. Start of completion of one task may depend on the start or end of another task. There can be four types of relationships among the tasks. They are:

• Finish-to-start – Task (B) cannot start until task (A) finishes

• Start-to-Start - Task (B) cannot start until task (A) starts

• Finish-to-Finish - Task (B) cannot finish until task (A) finishes

• Start-to-Finish - Task (B) cannot finish until task (A) starts

Schedule development:

Schedule development depends on the requirement, resources, duration and end date of the project. It provides a basis for monitoring the project progress.

• Gantt chart, PERT, CPM are the tools used to represent the project schedule.

• Gantt chart is the common tool for displaying project schedule information. They are easy to create and understand.

• These tools are useful at many stages of project management.

• They give critical path and slack time. Provide project documentation. They are useful in monitoring costs

4 0
3 years ago
Assume that strikeCounter has already been declared to be a "pointer to int". Assume further that strikeCounter has been initial
Feliz [49]

Answer:

int* strikeCounter ;

int someVal;

scanf("%d", &someVal);

strikeCounter =&someVal;

*strikeCounter =someVal*4;

Explanation:

Here we took one int variable and read that value from user. we assigned that int variable address to pointer variable "strikeCounter " and we are pointing the value of strikecounter as 4 times of that integer variable value

8 0
3 years ago
Michael needs to ensure that those items that are automatically archived are still easily accessible within Outlook. Which optio
rjkz [21]

Answer:

D.   Show archive folder in folder list

Explanation:

Other dude is wrong

8 0
3 years ago
Read 2 more answers
By definition, what is the process of reducing security exposure and tightening security controls?
saw5 [17]

Hardening is the technique of reducing security exposure and tightening security controls of software and network devices.

Security is a major concern, when connecting over a network. Through hardening, security of a network is protected from vulnerable activities. Hardening reduces exposures associated with security and provides tight controls for it.

Hardening is typically a collection of tools and techniques that are used to decrease vulnerability in computer software, applications, network devices and infrastructure. The main goal of hardening is to protect security by identifying and eliminating superfluous programs, applications, permissions and access, which in turn, reduces the chances that attackers and malware will gain access over the network ecosystem.

You can learn more about hardening at

brainly.com/question/27912668

#SPJ4

7 0
2 years ago
Write a C++ Programm in which inheritance is used
geniusboy [140]

Answer:

// C++ program to demonstrate inheritance

#include <iostream>

using namespace std;

// base class

class Animal {

  public:

   void eat() {

       cout << "I can eat!" << endl;

   }

   void sleep() {

       cout << "I can sleep!" << endl;

   }

};

// derived class

class Dog : public Animal {

  public:

   void bark() {

       cout << "I can bark! Woof woof!!" << endl;

   }

};

int main() {

   // Create object of the Dog class

   Dog dog1;

   // Calling members of the base class

   dog1.eat();

   dog1.sleep();

   // Calling member of the derived class

   dog1.bark();

   return 0;

}

8 0
3 years ago
Other questions:
  • A compound document contains _______ from different applications.
    12·2 answers
  • How people have contributed to the advancement of science
    7·1 answer
  • Open source software is copyrighted software that is distributed at no cost for a trial period.
    11·1 answer
  • What default length is used for the ospf dead interval?
    14·1 answer
  • With microprocessors, The integration of a whole _____ onto a single chip or on a few chips greatly reduced the cost of processi
    14·1 answer
  • Write a program that first reads in the name of an input file, followed by two strings representing the lower and upper bounds o
    8·1 answer
  • Indicate whether the statement is true or false. ____ 1. Autoglobal array elements are referred to with an index number. ____ 2.
    9·1 answer
  • Which of the following statements are true concerning abstraction and refinement? Select 3 options:
    14·1 answer
  • Type of cable installed on a patch panel?
    15·1 answer
  • Integrity! He talks to me of integrity! I described a circle in the air. I'd tried to build my integrity upon the role of Brothe
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!