Question

In: Statistics and Probability

An instructor thinks that math majors can write and debug computer programs faster than the math...

An instructor thinks that math majors can write and debug computer programs faster than the math majors. A sample of 18 business majors took an average of 39 minutes and a sample of 12 math majors took an average of 35 minutes. The standard deviations are 9 and 4 respectively. If the value of the test statistic is 1.44, is there evidence to support the claim? Assume that the variables are normally distributed and the population variances are equal. Use alpha= 0:1. Use the p - value approach. 1

Solutions

Expert Solution

please rate if it is helpful


Related Solutions

5. (7) To see if female math majors study harder than males, we collected a random...
5. (7) To see if female math majors study harder than males, we collected a random sample of study hours per day from math majors. Assume all variables have normal distributions, answer the questions based on the provided outputs using correct statistical technique.                                                                            Paired Samples Test Paired Differences mean Std. Dev. Std. Error t Sig. (2-tailed) female– male .4 .750 .250 1.98 .058 Group Statistics gender N Mean Std. Deviation Std. Error Mean hours male 22 1.0985 .416654...
Due to the recovery that is threatening to cause sales togrow faster than the company can...
Due to the recovery that is threatening to cause sales togrow faster than the company can produce output, City Manufacturing, Inc. has decided to change its credit terms from net 35 days to net 30 days. City believes that this policy change will keep sales at their current level, but decrease the firm’s averagecollection period by 5 days (from 35 days to 30 days). Assume that this policy change will have no effect on costs, and because it also will...
Problem 1. Write two computer programs to simulate a Unicode stream cipher that consists of both...
Problem 1. Write two computer programs to simulate a Unicode stream cipher that consists of both encryption and decryption algorithms. The encryption program accepts inputs from an existing text file, called “letter.txt.” The encryption program produces an output ciphertext file, called “secret” The decryption program takes “secret” as input and decrypts it into a plaintext, called “message.txt.” - The random “seed” must be known, but be kept secure, by the pseudorandom number generators in both encryption and decryption programs. Note...
10) If Drew Brees can read fan letters and type the responses faster than anyone else,...
10) If Drew Brees can read fan letters and type the responses faster than anyone else, why would he hire someone to do that job? Use economic concepts to explain.
MY MATH İS TERRBİLE THAN YOU İMAGİNE. so can you summarize and show all the formulas...
MY MATH İS TERRBİLE THAN YOU İMAGİNE. so can you summarize and show all the formulas and basic questions of all of them, I will upvote and I will pray for you:D Thank you Hypothesis Tests of a Single Population 1)Formulate null and alternative hypotheses for applications involving -a single population mean from a normal distribution -a single population proportion (large samples) -the variance of a normal distribution 2) Formulate a decision rule for testing a hypothesis 3) Know how...
Computer programs can be used to make decisions about your insurance as well as the rates you will be charged for health and life insurance policies.
Computer programs can be used to make decisions about your insurance as well as the rates you will be charged for health and life insurance policies. For example, certain preexisting conditions may raise your insurance premiums considerably. Is it ethical for insurance companies to access your health records and then make insurance decisions about you? Explain your answer.
Computer Security Bell-LaPadula Model Given the access rights as follows: Nada can read and write to...
Computer Security Bell-LaPadula Model Given the access rights as follows: Nada can read and write to file A, can append to file B, and can write to file C. Maha can read file A, can write to file B, and cannot access file C. Write the access control matrix M that specifies the described set of access rights for subjects Nada and Maha to objects file A, file B and file C. Then the subject’s security levels are LNada= Confidential...
Write a regular expression that can represent any digit, without more than one digit or non...
Write a regular expression that can represent any digit, without more than one digit or non digit characters.
Please write using computer/phone's keyboard, so I can copy the answer directly. Showing image is optional....
Please write using computer/phone's keyboard, so I can copy the answer directly. Showing image is optional. I need plagiarism free answers pls. Will upvote for sure Answer the following questions about PWM (Pulse-Width Modulation) and write around 6-7 lines per question.    Do a research about PWM and its applications. Choose one of PWM applications and write about it in more details.           
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT