A candle maker produces jar candles

Assignment Help Basic Computer Science
Reference no: EM13853398

1. A candle maker produces jar candles that have a label weight of 20.4 oz. Assume that the distribution of the weights of these candles is N (21.37,0.16). Let X denote the weight of a candle selected at random from the production line.

  1. (a)  Let X bar equal the sample mean of the 100 candles selected randomly. Find P (21.31 ≤ Xbar ≤ 21.39).
  2. (b)  Determine the minimum weight of the heaviest 2.5% of all candles. In other words, what is c satisfying P (X >c) = 0.025?
  3. (c)  Suppose that 15 candles are randomly selected and weighted. Let Y equal the number of these candles that weight less than 20.857 oz. Find P (Y ≤ 2).
  4. (d)  Now suppose 100 candles are randomly selected. Let W equal the number of these candles that weight less than 20.857 oz. Using the CLT (Central Limit Theorem), approximate P(W ≤ 5).

 

 

Reference no: EM13853398

Questions Cloud

Create a draft program design : Start creating the program structure using the provided integrated development environment (IDE). Create a draft program design
Calculate the total income and substitution effects : Xiao-Ping has 24 hours a day to divide between work and leisure, and her boss allows her to work as many hours as she wants.  She has $8 per day of non-labor income, and she works at a job that pays $8 per hour. Her preferences over leisure time R ? ..
How a project risk management strategy may be constructed : The management of risk is proving to be one of the most difficult tasks for the project management profession. How can risk be managed effectively and who should be responsible for this task?
Explain how constraints occur in system designs : Explain how constraints occur in system designs. Identify an example of a constraint you have encountered recently in your everyday life-whether at work or shopping
A candle maker produces jar candles : 1. A candle maker produces jar candles that have a label weight of 20.4 oz. Assume that the distribution of the weights of these candles is N (21.37,0.16). Let X denote the weight of a candle selected at random from the production line.(a)  Let X bar..
Write another method to return the perimeter : Write another method to return the perimeter, write another method to return the area. This means you will have a minimum of 4 methods in your program, you might have more depending on how you write the methods that save/return the sides.
What is an autoimmune disease? : What is an autoimmune disease?
Problem solving methodologies : The mathematical problems need to show how you derived your answer and responses. While I'm looking at the final product or your final answer, I'm also watching your problem solving methodologies. It's actually more important to me than the answer it..
Effect of integration of logistics : Effect of integration of logistics and supply chain management of Maternal, Newborn and child health (MNCH) commodities at Primary Health Care service delivery points.

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Write an essay on turing machine explain with examples

Write an essay on turing machine explain with examples

  Exams differ from standard computer exams

1.Do mobile device exams differ from standard computer exams? If so, how?  And what is a reasonable level of data modification? 2. Identify different forensic tools you can use to analyze iOS devices.  In relation to that tool, what are the pros and ..

  Create a simple tic-tac-toe program

For the Mid-Term assignment we are going to create a simple Tic-Tac-Toe program. You can design the user interface any way that you would like to. It should allow two places to put X's or O's down on the board and determine if a player as won or..

  Rsa protocol to encrypt and decrypt messages

In this problem you are enquired to hand-turn RSA protocol to encrypt and decrypt messages by using rather smaller numbers than are used in practice, so that calculations can be done by hand.

  Code problem huffman encoding

Given a string s of length at most 104 over the alphabet of lower case latin letters. In the first line output the number k of different symbols and the length l of a binary encoding. In each of the next k lines output a binary code of a symbol in th..

  Write a documented argumentative essay

Write a documented argumentative essay

  Complete the requirements using dbdl

Complete the requirements using DBDL and create Diagram. Make sure all tables are normalized to 3NF and exhibit proper relationships.

  16-bit 1''s complement numbe

Convert the following numbers to 16-bit 1's complement numbers (display results in hexadecimal)

  Write a method, insertat, that takes four parameters

write a method, insertAt, that takes four parameters: an array of integers; the length of the array; an integer, say insertItem; and an interger, say, index.

  Explains how hackers can hide their own ip address

Explains how hackers can hide their own IP address when attacking other computers, and how administrators can thwart this type of cracking

  Develop the new project plan using microsoft project

Develop the new project plan using Microsoft Project for two-day training session in which people are brought in from different parts of country.

  Writing java program which can develop anagrams

An anagram is a rearrangement of the letters of a word or phrase into a new word or phrase. Some of them can be quite amusing or apt. For example:

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd