Estimate the average weight of an adult male

Assignment Help Software Engineering
Reference no: EM13994899

Suppose we want to estimate the average weight of an adult male in Dekalb County, Georgia. We draw a random sample of 1,000 men from a population of 1,000,000 men and weigh them. We find that the average man in our sample weighs 180 pounds, and the standard deviation of the sample is 30 pounds. What is the 95% confidence interval.

(A) 180 + 1.86 
(B) 180 + 3.0 
(C) 180 + 5.88 
(D) 180 + 30 
(E) None of the above

Reference no: EM13994899

Questions Cloud

A veterinarian collects data on the number of times : A veterinarian collects data on the number of times race horses are raced during their career. The researcher finds the average number of races a horse enters is = 15.3 with a standard deviation of s = 6.8 in a sample of n = 20 horses. The standard e..
Minimum attractive rate of return : An energy efficient pump is proposed by a vendor. The pump will cost $45,000 installed, and will require $2,000 worth of maintenance each year for its life of 15 years. Energy costs will be $6,000 per year. A standard pump will cost $25,000 and will ..
Describe the economic wealth or poverty : Select a country and go to the CIA's World Factbook Website, and research its economic wealth or poverty. Note: Please review the other student's responses so that you do not repeat another student's selection of a country. Then, describe the econ..
What is the policy of import substitution : What is the policy of import substitution? Has this policy worked for the developing countries? If not, what are the problems of this policy? Mention any two benefits of export promotion policy.
Estimate the average weight of an adult male : Suppose we want to estimate the average weight of an adult male in Dekalb County, Georgia. We draw a random sample of 1,000 men from a population of 1,000,000 men and weigh them. We find that the average man in our sample weighs 180 pounds
Briefly describe other steps northern should take : Prepare any journal entries related to the change. Briefly describe other steps Northern should take to report the change.
Development economists consider phenomenon of child labor : Development economists consider the phenomenon of child labor as an example of ‘bad equilibrium’. Discuss briefly any two alternatives to a complete ban on child labor. Distinguish between a tenant farmer and a sharecropper. Whose exposure to risk is..
Describing the main aspects of personality testing : Write 150 to 200 words describing the main aspects of personality testing
Precise definition of globalization is difficult : A precise definition of globalization is difficult, because globalization is a process which removes economic, social and cultural boundaries of nation states. Discuss this process. Do you think that globalization is a win-win situation for all count..

Reviews

Write a Review

Software Engineering Questions & Answers

  Can capabilities protect against all trojan horses

A company develops a new security product using the extreme programming software development methodology. Programmers code, then test, the en add more code, then test, and continue this iteration.

  Writing and executing an insert statement

Make yourself a student by writing and executing an INSERT statement to insert a row into the STUDENT table with information about you.

  Discuss the culture and ethics in france analyze the

discuss the culture and ethics in france. analyze the differences and similarities between the united states and france

  Describe why the author of the article says that oil and

write a two to four 2-4 page paper in which you explain in your own words the information security concerns that exist

  Show the representation for the smallest positive number

A 15-bit floating point number has 1 bit for the sign of the number, 5 bits for the exponent and 9 bits for the mantissa (which is normalized). Numbers in the exponent are in signed magnitude representation.

  Describing additional security considerations

Write a 1 to 2 page memo describing additional security considerations you would add to a requirement definition

  Formal programming languages and natural languages

As we know that there are problems of understanding natural languages as opposed to formal programming languages. As an illustration of the complexities involved in the case of natural languages,.

  Evaluate the intended audience

Question: In order for technical communication to be effective, the writer must evaluate the intended audience, its characteristics, knowledge base, expectations, and needs.

  What solutions to secure dns operation do you know

How do you think DNS is important for the Internet operation? What happen if DNS of your company/network, your provider or root DNS failures? What solutions to secure DNS operation do you know?

  Systems analysis and design

You will create an image, but first you have to go through some training and planning phases, just as a programmer would do. Programming, systems analysis and design, and database management all require extensive planning.

  How project visualization maps to architectural views

Choose one of the agile software development methodologies/processes and explain how changes can be managed in software development projects. Describe how project visualization maps to architectural views.

  What are four types of cardinality constraints

What are four types of cardinality constraints? Provide personal examples of each

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd