Question

In: Statistics and Probability

SnoopPro is a global company specializing in communications security. The company monitors over 1 billion Internet...

SnoopPro is a global company specializing in communications security. The company monitors over 1 billion Internet messages per day and recently reported that 70% of emails are spam. Suppose your inbox contains 25 messages. Let X be the number of messages that are spam. What is P(16 ≤ X ≤ 20)?

If a sample of size n = 64 is selected from a population with mean E(X) = 50 and standard deviation SD(X) = 8, then the probability that the sample mean x is less than 52 is:

The Central Limit Theorem states that

The distribution of the population mean μ will be about normal provided that the sample size n is sufficiently large

The sampling distribution of the sample proportion will be approximately normal provided that the population is normally distributed    

The sampling distribution of the sample mean x will be about normal provided that the sample size n is sufficiently large

The sample mean x will always equal the population mean μ when the sample size n is large enough.

As the sample size n gets larger and larger, the sampling distribution of the sample mean x is less concentrated around the central value

If the sample size n is large, then z follows a standard normal distribution, provided that the population is normally distributed

A sample of size n = 36 is selected from a population with mean E(X) = 55 and standard deviation SD(X) = 27. The expected value E(x) and standard deviation SD(x) of the sampling distribution of the sample mean x are:

The two curves below represent the sampling distribution of the sample mean X for two different sample sizes: n = 256 and n = 576.

In both cases the samples are selected from the same population.

Note that the standard deviation for sampling distribution A is SD(X) = 8 and for sampling distribution B the standard deviation is SD(X) = 12.

Question 1. Sampling distribution B comes from the sample that had sample size n =

Question 2. What is the standard deviation SD(X) of the population from which the samples are taken?

Solutions

Expert Solution

(1)

Question:

SnoopPro is a global company specializing in communications security. The company monitors over 1 billion Internet messages per day and recently reported that 70% of emails are spam. Suppose your inbox contains 25 messages. Let X be the number of messages that are spam. What is P(16 ≤ X ≤ 20)?

n = 25

p = 0.70

q = 1 - p = 0.30

= np = 25 X 0.70 = 17.5

To find P(16 ≤ X ≤ 20):

Applying Continuity Correction:

P(15,5 < X < 20.5):

For X = 15.5:

Z = (15.5 - 17.5)/2.2913

= - 0.8729

By Technology, cumulative area under standard normal curve = 0.1914

For X = 20.5:

Z = (20.5 - 17.5)/2.2913

= 1.3093

By Technology, cumulative area under standard normal curve = 0.9048

So,

P(16 ≤ X ≤ 20) = 0.9048 - 0.1914 = 0.7134

Do,

Answer is:

0.7134

(2)

Question:

If a sample of size n = 64 is selected from a population with mean E(X) = 50 and standard deviation SD(X) = 8, then the probability that the sample mean x is less than 52 is:

= 50

= 8

n = 64

SE = /

= 8/

= 1.00

To find P(<52):

Z =(52 - 50)/1.00

= 2.00

By Technology, cumulative area under standard normal curve = 0.9772

So,

P(<52):= 0.9772

So,

Answer is:

0.9772

(3)

Question:

The Central Limit Theorem states that

Correct option:

The sampling distribution of the sample mean will be about normal provided that the sample size n is sufficiently large

(4)

Question:

A sample of size n = 36 is selected from a population with mean E(X) = 55 and standard deviation SD(X) = 27. The expected value E(x) and standard deviation SD(x) of the sampling distribution of the sample mean are:

(i)

The expected value E(x) of the sampling distribution of the sample mean is = Population Mean = 55

(ii)

The standard deviation SD(x) of the sampling distribution of the sample mean is =

AS PER DIRECTIONS FOR ANSWERING, FIRST 4 QUESTIONS ARE ANSWERED.


Related Solutions

Slappey Communications is a technology firm in Birmingham, Alabama, specializing in telecommunications, computer, and network security....
Slappey Communications is a technology firm in Birmingham, Alabama, specializing in telecommunications, computer, and network security. Its owner, Bill Slappey, invested nearly $770,000 in property, plant, and equipment for the business in 2014 (See “Small Firms Poised to Spend More on Plants, Equipment,” A. Loten and V. Monga, Wall Street Journal, September 3, 2014.) Slappey spent about $100,000 to build a 1,000-square-foot “cloud storage” room, or a warehouse for network servers. Slappey also spent about $670,000 on computers, servers, and...
Over time, Google grew from an Internet search company to a global mass of related and...
Over time, Google grew from an Internet search company to a global mass of related and unrelated businesses operating around the globe. Google’s founders decided to give the organization a new name, Alphabet, to reflect its current diversity. They also gave it a new structure that would allow the highly specialized operations to function interdependently, meaning that there is flexibility and some autonomy but also unification and coordination. What type of structure is Alphabet using? a. International divisions b. Global...
(Security-For-All Bhd (MFA) is a company specializing in installing and maintaining security systems for businesses and...
(Security-For-All Bhd (MFA) is a company specializing in installing and maintaining security systems for businesses and residential customers. It has been operating for 10 years. The company buys supplies ranging from CCTV cameras, smart locks, keypad locks, sensors, alarms, smoke detectors and other equipment from reputable vendors in town for customers’ installations /Purchase of supplies -The purchasing process starts with filling up of purchase requisition forms by the Inventory Department when the inventory level reaches the re-order point. They then...
Risk Assessment- Exercise #1 Social Konnections Inc. (SKI or the “Company”) is a global Internet company...
Risk Assessment- Exercise #1 Social Konnections Inc. (SKI or the “Company”) is a global Internet company that runs Social Konnections, a large social media networking Web site. SKI has experienced steep growth since its launch in 2005, and the Company went public in 2007. SKI currently has over 500 million active users who visit the site to connect with others, express themselves, and play games. Last year, substantially all of SKI’s revenue came from advertisers who market their products and...
Risk Assessment- Exercise #1 Social Konnections Inc. (SKI or the “Company”) is a global Internet company...
Risk Assessment- Exercise #1 Social Konnections Inc. (SKI or the “Company”) is a global Internet company that runs Social Konnections, a large social media networking Web site. SKI has experienced steep growth since its launch in 2005, and the Company went public in 2007. SKI currently has over 500 million active users who visit the site to connect with others, express themselves, and play games. Last year, substantially all of SKI’s revenue came from advertisers who market their products and...
Risk Assessment- Exercise #1 Social Konnections Inc. (SKI or the “Company”) is a global Internet company...
Risk Assessment- Exercise #1 Social Konnections Inc. (SKI or the “Company”) is a global Internet company that runs Social Konnections, a large social media networking Web site. SKI has experienced steep growth since its launch in 2005, and the Company went public in 2007. SKI currently has over 500 million active users who visit the site to connect with others, express themselves, and play games. Last year, substantially all of SKI’s revenue came from advertisers who market their products and...
1. A company that wants to send data over the Internet will use an encryption program...
1. A company that wants to send data over the Internet will use an encryption program to ensure data security. All data will be transmitted as four-digit integers. The application should read a four-digit integer entered by the user and encrypt it as follows:  Replace each digit with the remainder of the new value divided by 10 by adding 6 to the digit. Then replace the number in the first digit with the third, and the number in the...
1) A company that wants to send data over the Internet will use an encryption program...
1) A company that wants to send data over the Internet will use an encryption program to ensure data security. All data will be transmitted as four-digit integers. The application should read a four-digit integer entered by the user and encrypt it as follows:  Replace each digit with the remainder of the new value divided by 10 by adding 6 to the digit. Then replace the number in the first digit with the third, and the number in the...
1. A company that wants to send data over the Internet will use an encryption program...
1. A company that wants to send data over the Internet will use an encryption program to ensure data security. All data will be transmitted as four-digit integers. The application should read a four-digit integer entered by the user and encrypt it as follows:  Replace each digit with the remainder of the new value divided by 10 by adding 6 to the digit. Then replace the number in the first digit with the third, and the number in the...
Liquidity Management Global Manufacturing Company (GMC) is an Ohio-based company specializing in electronic controls for automated...
Liquidity Management Global Manufacturing Company (GMC) is an Ohio-based company specializing in electronic controls for automated manufacturing and assembly line machinery. GMC’s products are used in a wide variety of industries, including automotive, computers, consumer electronics, and appliances. The company was founded by two electrical engineers, Frank Kilowatt and Larry Voltz and began operations in 1979, initially selling their products to smaller manufacturing machinery suppliers in the U.S. market. They have expanded significantly in recent years and now sell a...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT