Reference no: EM131087058
Econ 310, Spring 2014- Week 8:
Problem 1- {X1, X2, X3, X4} is a simple random sample with distribution N (2, 22), and the sample mean is X¯ = ¼ i=1∑4Xi. After drawing the random sample, we get the observation {-1, 0, 5, 3}.
1. What is E[X¯]? Will it change if you have a different sample, for example, {4, -1, 2, 6}?
2. What is V (X¯)? Will it change if you have a different sample?
3. What is the distribution of X¯? Do we have a enough information to answer this question?
4. Now, if Xi ∼ Exponential (λ = 0.5), what is the distribution of X¯ = ¼ i=1∑4 Xi?
5. If Xi ∼ Exponential (λ = 0.5) still, but we get a random sample with n = 64, what is the distribution of X¯ = 1/64 i=1∑4 Xi?
Problem 2- The amount of time a bank teller spends with each customer has a population mean µ = 3.10 minutes and standard deviation σ = 0.40 minute.
1. If a random sample of 50 customers is selected from a population of 500 customers, what is the probability that the average time spent per customer will be at least 3 minutes?
2. Now, suppose that we observe only 16 customers, and answer the same question.
Problem 3- In a binomial experiment {Xi; i ≤ n} with n = 300 and p = 0.55, we define a binomial random variable X = i=1∑300Xi ∼ Binomial (300, 0.55), and the proportion of success pˆ = X/300.
1. Find the approximate probability that X = 165.
2. Find the approximate probability that pˆ is greater than 60%.
3. We would like to repeat the same binomial experiment with p = 0.55, but with the smaller sample size. If we want to use the normal approximation to analyze pˆ, at least how many sample we need?
Operations of business organisations
: Stakeholders have influence on the operations of business organisations and they expect to be treatedfairly by these organisations. Identify five (5) stakeholders of an organisation and explain their expectations.
|
Secure electronic transactions
: There are five elements of network security that help your company and its customers engage in secure electronic transactions. Name each of the five elements of network security, provide a brief description of each and suggest One appropriate solu..
|
Viewpoint of workers and societies
: In a dispassionate manners, discuss the benefits and costs of sweatshop jobs from the viewpoint of such workers and the societies in which they live.
|
What is the return for the given portfolio
: Solve this using Excel and determine how much to invest in each of the two stocks. What is the return for this portfolio? What is the variance of this portfolio?
|
What is probability that the average time spent per customer
: If a random sample of 50 customers is selected from a population of 500 customers, what is the probability that the average time spent per customer will be at least 3 minutes
|
Comprehensive leadership plan for own style of leadership
: Develop a four- or five-page comprehensive leadership plan for your own style of leadership. Include strengths and weaknesses for yourself and how you will improve your leadership effectiveness moving forward.
|
What is the managerial view of business
: 1. What, in your view, makes a company "good" or "bad", particularly if you start with the idea that ethics is an important part of your evaluation? Why? 2. What is the managerial view of business? What is the stakeholder view? How do they differ?
|
Compute trumps break-even point in sales dollars
: Compute Trump's break-even point in sales dollars for next year assuming: The agents' commission rate remains unchanged at 15%.
|
Examine some of the it-supported customer services
: Access www.ups.com and www.fedex.com. Examine some of the IT-supported customer services and tools provided by the two companies. Compare and contrast the customer support provided on the two companies' Web sites.
|