Chapter 4: Q88E (page 262)
Find a value of the standard normal random variable z, call it such that
Chapter 4: Q88E (page 262)
Find a value of the standard normal random variable z, call it such that
All the tools & learning materials you need for study success - in one app.
Get started for freeSuppose x is a normally distributed random variable with = 11 and = 2. Find each of the following:
a)
b)
c)
d)
e)
f)
Box plots and the standard normal distribution. What relationship exists between the standard normal distribution and the box-plot methodology (Section 2.8) for describing distributions of data using quartiles? The answer depends on the true underlying probability distribution of the data. Assume for the remainder of this exercise that the distribution is normal.
a. Calculate the values of the standard normal random variable z, call them zL and zU, that correspond to the hinges of the box plot—that is, the lower and upper quartiles, QL and QU—of the probability distribution.
b. Calculate the zvalues that correspond to the inner fences of the box plot for a normal probability distribution.
c. Calculate the zvalues that correspond to the outer fences of the box plot for a normal probability distribution.
d. What is the probability that observation lies beyond the inner fences of a normal probability distribution? The outer fences?
e. Can you better understand why the inner and outer fences of a box plot are used to detect outliers in a distribution? Explain.
4.138 The random variable xcan be adequately approximated by an exponential probability distribution with . Find the probability that xassumes a value
a. More than 3 standard deviations from
b. Less than 2 standard deviations from
c. Within half a standard deviation of
Detecting a computer virus attack. Chance (Winter 2004) presented basic methods for detecting virus attacks (e.g.,Trojan programs or worms) on a network computer that are sent from a remote host. These viruses reach the network through requests for communication (e.g., e-mail, Web chat, or remote log-in) that are identified as “packets.” For example, the “SYN flood” virus ties up the network computer by “flooding” the network with multiple packets. Cyber security experts can detect this type of virus attack if at least one packet is observed by a network sensor. Assume that the probability of observing a single packet sent from a new virus is only .001. If the virus actually sends 150 packets to a network computer, what is the probability that the virus is detected by the sensor?
Executive coaching and meeting effectiveness. Can executive coaching help improve business meeting effectiveness? This was the question of interest in an article published in Consulting Psychology Journal: Practice and
Research(Vol. 61, 2009). The goal of executive coaching is to reduce content behaviors (e.g., seeking information, disagreeing/ attacking) in favor of process behaviors (e.g., asking clarifying questions, summarizing). The study
reported that prior to receiving executive coaching, the percentage of observed content behaviors of leaders had a mean of 75% with a standard deviation of 8.5%. In contrast, after receiving executive coaching, the percentage of observed content behaviors of leaders had a mean of 52%
with a standard deviation of 7.5%. Assume that the percentage
of observed content behaviors is approximately normally distributed for both leaders with and without executive coaching. Suppose you observe 70% content behaviors by the leader of a business meeting. Give your opinion on whether or not the leader has received executive coaching.
What do you think about this solution?
We value your feedback to improve our textbook solutions.