Chapter 8: Q73E (page 500)
Use Tables V, VI, VII, and VIII in Appendix D to find each of the following F-values
- \({F_{.05}}\;where\;{v_1} = 9\;and\,{v_2} = 6\)
Short Answer
- The F-value is 4.10.
Chapter 8: Q73E (page 500)
Use Tables V, VI, VII, and VIII in Appendix D to find each of the following F-values
All the tools & learning materials you need for study success - in one app.
Get started for freeGiven the following values of , , and , form a 90% confidence interval for
a.
b.
c.
d.
Whistle-blowing among federal employees. Whistle blowing refers to an employeeโs reporting of wrongdoing by co-workers. A survey found that about 5% of employees contacted had reported wrongdoing during the past 12 months. Assume that a sample of 25 employees in one agency are contacted and let x be the number who have observed and reported wrongdoing in the past 12 months. Assume that the probability of whistle-blowing is .05 for any federal employee over the past 12 months.
a. Find the mean and standard deviation of x. Can x be equal to its expected value? Explain.
b. Write the event that at least 5 of the employees are whistle-blowers in terms of x. Find the probability of the event.
c. If 5 of the 25 contacted have been whistle-blowers over the past 12 months, what would you conclude about the applicability of the 5% assumption to this
agency? Use your answer to part b to justify your conclusion.
Drug content assessment. Scientists at GlaxoSmithKlineMedicines Research Center used high-performance liquidchromatography (HPLC) to determine the amountof drug in a tablet produced by the company (Analytical
Chemistry, Dec. 15, 2009). Drug concentrations (measuredas a percentage) for 50 randomly selected tablets are listedin the table below and saved in the accompanying file.
a. Descriptive statistics for the drug concentrations areshown at the top of the XLSTAT printout on the nextpage. Use this information to assess whether the dataare approximately normal.
b. An XLSTAT normal probability plot follows. Use thisinformation to assess whether the data are approximatelynormal.
91.28 92.83 89.35 91.90 82.85 94.83 89.83 89.00 84.62
86.96 88.32 91.17 83.86 89.74 92.24 92.59 84.21 89.36
90.96 92.85 89.39 89.82 89.91 92.16 88.67 89.35 86.51
89.04 91.82 93.02 88.32 88.76 89.26 90.36 87.16 91.74
86.12 92.10 83.33 87.61 88.20 92.78 86.35 93.84 91.20
93.44 86.77 83.77 93.19 81.79
Descriptive statistics(Quantitative data) | |
Statistic | Content |
Nbr.of Observation | 50 |
Minimum | 81.79 |
Maximum | 94.83 |
1st Quartile | 87.2725 |
Median | 89.375 |
3rd Quartile | 91.88 |
Mean | 89.2906 |
Variance(n-1) | 10.1343 |
Standard deviation(n-1) | 3.1834 |
Working on summer vacation. According to a Harris Interactive (July 2013) poll of U.S. adults, about 60% work during their summer vacation. (See Exercise 3.13, p. 169.) Assume that the true proportion of all U.S. adults who work during summer vacation is p = .6. Now consider a random sample of 500 U.S. adults.
a. What is the probability that between 55% and 65% of the sampled adults work during summer vacation?
b. What is the probability that over 75% of the sampled adults work during summer vacation?
Vulnerability of counting party Web spots. When you subscribe to your Facebook account, you're granted access to further. Then 1 million counting parties (RP) Web spots. Vulnerabilities in this sign-on system may permit a bushwhacker to gain unauthorized access to your profile, allowing the bushwhacker to impersonate you on the RP Web point. Computer and systems Masterminds delved into the vulnerability of counting party Web spots and presented their results at the Proceedings of the 5th AMC Factory on Computers & Communication Security (October 2012). RP Web spots were distributed as Garรงon- inflow or customer- inflow Web spots. Of the 40 garรงon- inflow spots studied, 20 were planted to be vulnerable to impersonation attacks. Of the 54 customer-inflow spots examined, 41 were. Plant to be vulnerable to impersonation attacks. Give your opinion on whether a customer- inflow Web point is more likely to be vulnerable to an impersonation attack than a garรงon- inflow Website. However, how much more likely? If so.
What do you think about this solution?
We value your feedback to improve our textbook solutions.