Question

In: Math

Elwin Osbourne, CIO at GFS, Inc., suspects that at least 25% of e-mail messages sent by...

Elwin Osbourne, CIO at GFS, Inc., suspects that at least 25% of e-mail messages sent by GFS employees are not business related. A random sample of 300 e-mail messages was selected to test this hypothesis at the 0.01 level of significance. Fifty-four of the messages were not business related. The appropriate decision is _______.

increase the sample size

gather more data

reject the null hypothesis

fail to reject the null hypothesis

maintain status quo

Solutions

Expert Solution

Null hypothesis          

       
                  
Alternative hypothesis      

           
                  
We have for given example,                  
Population proportion value is =0.25              
x=54   
                  
n=300              
Level of significance =   0.01              
Estimate for sample proportion =54/300=0.18
                  
Z test statistic formula for proportion                  


=-2.8  

P value =0.0024.................by using Z table or Excel =NORMSDIST(-2.8)

P value < 0.01

reject the null hypothesis

Related Solutions

6.2        Radical Rewrite: Instruction E-Mail—Tips for Avoiding Hackers Your Task. Analyze the following e-mail to be sent...
6.2        Radical Rewrite: Instruction E-Mail—Tips for Avoiding Hackers Your Task. Analyze the following e-mail to be sent by the CEO to all employees. Step 1: Identify five or more weaknesses describing why each is a weakness. Step 2: Revise this e-mail so that it reflects writing techniques you learned in this and previous chapters. To:           Staff Members From:          G. B. Goldman <[email protected]> Subject: Hackers!                 Staff Members: This is to inform you that, like other banks, we are afraid of hackers....
Which of the following business messages would not use the direct strategy? a. An e-mail message...
Which of the following business messages would not use the direct strategy? a. An e-mail message to a staff introuducing a new employee b. A letter a customer denying his or her request for credit c. A letter to a coworker congratulating him or her on a recent promotion d. An oral presentation detailing the specifics of a new company wellness initiative
Let M(x, y) be "x has sent y an e-mail message" and T(x, y) be "...
Let M(x, y) be "x has sent y an e-mail message" and T(x, y) be " x has telephoned y, " where the domain consists of all students in your class. Use quantifiers to express each of these statements. g. There is a student in your class who sent every one else in your class an email message. I answer  ∃x( x ≠ y ∧ ∀? M (x, y) ) But answer on text book is  ∃x( x ≠ y → ∀?...
The controller of a small business received the following e-mail with an authentic-looking e-mail address and...
The controller of a small business received the following e-mail with an authentic-looking e-mail address and logo: From: Big Bank [[email protected]] To: Justin Lewis, Controller, Small Business USA Subject: Official Notice for all users of Big Bank! Due to the increased incidence of fraud and identity theft, we are asking all bank customers to verify their account information on the following web page: www.antifraudbigbank.com Please confirm your account information as soon as possible. Failure to confirm your account information will...
You are going to secure messages sent between A and B, confidentially is not an issue...
You are going to secure messages sent between A and B, confidentially is not an issue but integrity. The number of messages will be high so the algorithm needs to be computationally efficient. Describe a solution for this including algorithms to be used and management of keys. Kindly answer this question in the field of Applied Computer Security
How to diagram and describe how messages are actually encapsulated and decapsulated as they are sent...
How to diagram and describe how messages are actually encapsulated and decapsulated as they are sent from one host across two routers to another host. Only include the 2 host and 2 routers - no switches host a ----------------router --------------router----------host b
The following poorly written e-mail tells customers that their e-mail addresses have been hacked. However, the...
The following poorly written e-mail tells customers that their e-mail addresses have been hacked. However, the message is clumsy and fails to include essential information in revealing security breaches to customers. Your Task. List at least seven weaknesses Revise this message using the suggestions you learned in this chapter about security breach messages. To: Kara Khalial [[email protected]] From: Justin Small [[email protected]] Subject: Customer Security Incident at Princeton Payment Systems Cc: Bcc: Companies and individuals across the country are experiencing more...
Write a c++ Program To simulate the messages sent by the various IoT devices, a text...
Write a c++ Program To simulate the messages sent by the various IoT devices, a text le called device data.txt is provided that contains a number of device messages sent, with each line representing a distinct message. Each message contains a device name, a status value and a Unix epoch value which are separated by commas. Your c++ program will read this le line by line. It will separate the message into device name, status value and epoch value and...
a)examine five basic features of an e mail
a)examine five basic features of an e mail
Question 6 (1 point) The number of text messages sent by a random sample of students...
Question 6 (1 point) The number of text messages sent by a random sample of students at a local university was collected and the following histogram was created: Which of the following statements is likely true: Question 6 options: The distribution of number of text messages sent is approximately symmetric, so the mean is approximately the same as the median. The distribution of number of text messages sent is skewed to the left, so the mean is likely less than...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT