Question

In: Statistics and Probability

Spam is of concern to anyone with an e-mail address. Several companies offer protection by eliminating...

Spam is of concern to anyone with an e-mail address. Several companies offer protection by eliminating spam e-mails as soon as they hit an inbox. To examine one such product, a manager randomly sampled his daily emails for 50 days after installing spam software. A total of 374 e-mails were received, of which 15 were spam. Is there evidence that the proportion of spam getting through is greater than 2%? α = 0.10 a. State your hypotheses. b. Which hypothesis test should you use? c. State your rejection rule (use the p-value approach). d. Show how the test statistic was calculated (write down the formula and plug in the numbers). e. What is the p-value? f. State your conclusion.

Solutions

Expert Solution

Ho :   p =    0.02                  
H1 :   p >   0.02       (Right tail test)          
                          
Level of Significance,   α =    0.10                  
Number of Items of Interest,   x =   15                  
Sample Size,   n =    374                  
                          
Sample Proportion ,    p̂ = x/n =    0.0401                  
                          
Standard Error ,    SE = √( p(1-p)/n ) =    0.0072                  
Z Test Statistic = ( p̂-p)/SE = (   0.0401   -   0.02   ) /   0.0072   =   2.7775
                          

                          
p-Value   =   0.0027 [Excel function =NORMSDIST(-z)      


Decision:   p-value<α , reject null hypothesis          

           
There is enough evidence to say taht  proportion of spam getting through is greater than 2%

.................

THANKS

revert back for doubt

please upvote


Related Solutions

The controller of a small business received the following e-mail with an authentic-looking e-mail address and...
The controller of a small business received the following e-mail with an authentic-looking e-mail address and logo: From: Big Bank [[email protected]] To: Justin Lewis, Controller, Small Business USA Subject: Official Notice for all users of Big Bank! Due to the increased incidence of fraud and identity theft, we are asking all bank customers to verify their account information on the following web page: www.antifraudbigbank.com Please confirm your account information as soon as possible. Failure to confirm your account information will...
12. When you send someone an e-mail address, it travels across the Internet to the ____________________...
12. When you send someone an e-mail address, it travels across the Internet to the ____________________ e-mail server at your ISP, then to the incoming e-mail server at your recipient's ISP.
Must be in C#: 7. E-MAIL ADDRESS BOOK Create a Windows Forms Application with a class...
Must be in C#: 7. E-MAIL ADDRESS BOOK Create a Windows Forms Application with a class named PersonEntry. The PersonEntry class should have properties for a person’s name, e-mail address, and phone number. Also, create a text file that contains the names, e-mail addresses, and phone numbers for at least five people. When the application starts, it should read the data from the file and create a PersonEntry object for each person’s data. The PersonEntry objects should be added to...
How would you respond to this post? There are several strategies companies who offer services can...
How would you respond to this post? There are several strategies companies who offer services can use to optimize their resources. The various strategies include scheduling for peak demand, chase demand, scheduling appointments or reservations, adjusting or sharing capacity, and cross-training employees (Vondermbse & White, 2013). Some restaurants can utilize reservations to help organize their busy time. In this case, management can have a clear idea of what the demand is, at what time, and can plan to schedule appropriate...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT