Q.No.2. A study of the effect of smoking on sleep patterns is conducted. The measure observed is the time, in minutes, that it takes to fall asleep. These data are obtained: [3] Smokers:69.3 56.0 22.1 47.6 53.2 48.1 52.7 34.4 60.2 43.8 23.2 13.8 Non Smokers: 28.6 25.1 26.4 34.9 28.8 28.4 38.5 30.2 30.6 31.8 41.6 21.1 36.0 37.9 13.9

Answers

Answer 1

Answer:

(a) [tex]\bar x_1 = 43.7[/tex]     [tex]\bar x_2 = 30.25[/tex]

(b) [tex]\sigma_1 = 16.93[/tex]    [tex]\sigma_2 = 7.14[/tex]

(c) Smoking increases the time to fall asleep

Explanation:

Solving (a): The sample mean of each group

Mean is calculated as:

[tex]\bar x = \frac{\sum x}{n}[/tex]

So, we have:

Smokers

[tex]n_1= 12[/tex] and

[tex]\bar x_1 = \frac{69.3 +56.0+ 22.1 +47.6+ 53.2+ 48.1+ 52.7 +34.4+ 60.2 +43.8 +23.2 +13.8}{12}[/tex]

[tex]\bar x_1 = \frac{524.4}{12}[/tex]

[tex]\bar x_1 = 43.7[/tex]

Non Smokers

[tex]n_2 = 15[/tex] and

[tex]\bar x = \frac{28.6 +25.1 +26.4 +34.9 +28.8 +28.4 +38.5 +30.2 +30.6 +31.8 +41.6 +21.1 +36.0 +37.9 +13.9}{15}[/tex]

[tex]\bar x_2 = \frac{453.8}{15}[/tex]

[tex]\bar x_2 = 30.25[/tex]

Solving (b): The standard deviation of each group

This is calculated as:

[tex]\sigma = \sqrt{\frac{\sum(x - \bar x)^2}{n-1}}[/tex]

For smokers

[tex]n_1= 12[/tex]

So:

[tex]\sigma_1 = \sqrt{\frac{(69.3 -43.7)^2+(56.0-43.7)^2+..........+(13.8-43.7)^2}{12-1}}[/tex]

[tex]\sigma_1 = \sqrt{\frac{3152.04}{11}}[/tex]

[tex]\sigma_1 = \sqrt{286.5491}[/tex]

[tex]\sigma_1 = 16.93[/tex]

For non-smokers

[tex]n_2 = 15[/tex]

So:

[tex]\sigma_2 = \sqrt{\frac{(28.6 -30.25)^2+(25.1 -30.25)^2+..........+(13.9 -30.25)^2}{15-1}}[/tex]

[tex]\sigma_2 = \sqrt{\frac{713.2575}{14}}[/tex]

[tex]\sigma_2 = \sqrt{50.9469}[/tex]

[tex]\sigma_2 = 7.14[/tex]

Solving (c): Impact of smoking on time to sleep

In (b), we have:

[tex]\sigma_1 = 16.93[/tex] --- smokers

[tex]\sigma_2 = 7.14[/tex] --- non-smokers

Smokers have larger standard deviation (i.e. large variability) than non-smokers. This means that smokers require more time to fall asleep.


Related Questions

Choose the word that matches each definition. 1. IP Address 2. Server 3. Port Each term is only used once._____________ a number used within a computer to identify a specific process ____________ a numerical reference to a particular device in a network ___________ a computer that handles requests and returns data to other computers in a network

Answers

Answer:

  Port      a number used within a computer to identify a specific process.

   IP Address     a numerical reference to a particular device in a network.

   Server           a computer that handles requests and returns data to other computers in a network.

Explanation:

A port number is a number used to uniquely identify a particular process, application or program on a computer. From the networking parlance, it is a logical address that uniquely identifies a process, protocol or application communicating with other process, protocol or application over a network. For example;

i. a file transfer protocol (FTP) could use a port number of 20 or 21.

ii. a simple mail transfer protocol (SMTP) could use a port number of 25

Internet Protocol (IP) address is a numerical reference or label assigned to a particular device in a network which helps to uniquely identify the device on the network. IP addresses (version 4) are expressed as a group of four numbers separated by a dot. For example, an IP address may look like this: 192.168.0.90

A server is a computer that receives requests from other computers, processes these requests and returns some data to the other computers  in a network. In reality, these servers and the computers they serve can actually be some applications or programs. Servers provide resources, data, services or programs to other computers over a network.

Answer:

IP address: an Internet Protocol (IP) address is a numerical reference to a particular device in a network

port: a number used within a computer to identify a specific process

server: a computer that handles requests and returns data to other computers in a network

Explanation:

edge 2022

what is the most improved Android robot​

Answers

Answer:

They are the humanoid robots.

Identify the error and write correct HTML program 5 Cyber Bullying Tips<\head>Don't Respond Talk to a trusted adult <|html>

Answers

Answer:

<html>

<head> Cyber Bullying Tips </head>

<body>

Don't Respond, Talk to a trusted adult

</body>

</html>

Why does brainly always say, "We're sorry, but we are not able to complete your registration at this time"?! Now I cant view any answers to any questions!

Answers

Answer and Explanation:

It's very likely a network issue. You could do a hard refresh on your browser or brainly app. Simply clear your application's cache or your browser data or cache and then try again. You could also try re-installing your app. If this doesn't work, please reach out to the Brainly customer support team for help.

A folder has been shared with other users and set to read-only. What does this mean for users?
Users can only read the name of the shared folder.
Users cannot add new folders or files.
Users can read and edit files.
Users can add new files but not new folders.

Answers

Answer:

It means that users can only read or, depending on that platform, read and edit files in the folder

Diana has created a graphic design portfolio for a major project. What kind of portfolio would increase Dlana's chances of getting selected?
OA
a portfolio with some case studies of her graphic design work
OB.
a portfolio with graphic designs in her favorite theme
Ос.
a portfolio containing contact numbers of references
OD.
a portfolio that emphasizes large images and many colors
OE. a portfolio that emphasizes her qualifications and experience

Answers

Answer:

Hello There!!

Explanation:

I believe the answer is O A. a portfolio with some case studies of her graphic design work.

hope this helps,have a great day!!

~Pinky~

What is the next line?
>>>
tupleB = (5, 7, 5, 10, 2,5)
tupleB.index(5,3)
>>>
A. 0
B. 5
C. 3
D. 1

Answers

The right answer is option 4: 2

Explanation:

Lists are used in Python to store elements of same or different data types.

Different functions are used in Python on List. One of them is count.

Count is used to count how many times a specific value occurs in a list.

The syntax for count is:

listname.count(value)

In the given code,

The output will be 2

Hence,

The right answer is option 4: 2

Hadoop is : open source software framework designed for distributing data-processing over inexpensive computers. data mining platform designed for storing and analyzing big data produced by web communications and transactions. high-speed platform used to analyze large data sets pre-configured hardware-software system designed for analyzing big data. NoSQL database technology that stores both data and procedures acting on the data as object

Answers

Answer: open-source software framework designed for distributing data-processing over inexpensive computers.

Explanation:

Hadoop refers to the collection of open-source software utilities which are important in facilitating the use of a network of several computers to solve big data.

It provides huge storage for different kinds of data, and the ability to handle concurrent tasks virtually. Therefore, the correct option is "open-source software framework designed for distributing data-processing over inexpensive computers".

Describa las etapas del arranque de viruta

Answers

Answer:

Las virutas son partículas que se eliminan mecánicamente de una pieza de trabajo mecanizada. En el contexto de la tecnología de fabricación, especialmente el mecanizado, el término se refiere principalmente a virutas de metal; En principio, sin embargo, las virutas se crean en todo tipo de mecanizado de cuerpos sólidos. Las astillas de madera son el resultado de la carpintería. Cuando se mecanizan plásticos, se crean virutas, así como cuando se mecanizan materiales minerales, cristalinos o amorfos como el vidrio, que a menudo se realiza mediante esmerilado.

list any three positive impacts of computer technology in our society?

Answers

Answer:

nWhich statement about the origins of the American population is true?

A most Americans descend from people who first populated this continent about 20,000 years ago

b about 98 percent of Americans live in this country due to the waves of Irish and German people who came in mid 1800s

c immigration expander the American population before 1806 ,bur has no significantly contributed to it since then

d the vast majority. of Americans ms either descended from immigrats or are immigrants themselves

Explanation:

sjsikskakakakakkakznxjduwjawjieieiwiwiwiwiwiw idek computer mouse laptopdhsjsjsjsjjsjs

an_is a sepuence of precise instructions which result in a solution​

Answers

Answer:

algorithm.

Explanation:

An algorithm can be defined as a standard formula or procedures which comprises of set of finite steps or instructions for solving a problem on a computer. The time complexity is a measure of the amount of time required by an algorithm to run till its completion of the task with respect to the length of the input.

Furthermore, the processing symbols and their functions used in developing an algorithm are oval (start or stop), diamond (decision-making), circle (on-page connector), parallelogram (input and output), rectangle (calculation), arrow (flow or direction) and pentagon (off-page connector).

Some of the characteristics of an algorithm include the following;

I. An algorithm can be written using pseudocode. A pseudocode refers to the description of the steps contained in an algorithm using a plain or natural language.

II. An algorithm can be visualized using flowcharts. A flowchart can be defined as a graphical representation of an algorithm for a process or workflow.

In conclusion, an algorithm is a sequence of precise instructions which result in a solution​ for solving problems using a computer system.

in a dark place you have only a match , a twig , campfire logs , and oil lamp and a candle which do you literally first /
a twig
a campfire
none of the above

Answers

Answer:

You would use a twig first :)

Explanation:

Answer:

The glowing embers from the crackling campfire lit up the nighttime sky.

Explanation:

Have you searched Buzz Ch.at on playstore​

Answers

Answer:

Reorder terms.

y=52x−1

Cancel the common factor of 22.Factor 22 out of −2-2.

y−4=5x2+52⋅(2(−1))y-4=5x2+52⋅(2(-1))

Cancel the common factor.

y−4=5x2+52⋅(2⋅−1)y-4=5x2+52⋅(2⋅-1)

Rewrite the expression.

y−4=5x2+5⋅−1y-4=5x2+5⋅-1

Multiply 55 by −1-1.

y−4=5x2−5

When visiting or learning about other places, what new things have you experienced? Choose all that apply.
food and drink
music and art
languages
values and ideas
technology

Answers

This is a question that’s has no wrong or right answer, basically you just click whatever you’ve experienced.

Answer:

All of these answers

Explanation:

A ____ is an icon that does not directly represent a file, folder or application but serves as a link to it?​

Answers

Answer:

Shortcut

Explanation:

A file can be defined as a computer resource that avails end users the ability to store or record data as a single unit on a computer storage device.

Generally, all files are identified by a name, icon, size, and type (format) such as audio, image, video, document, system, text, etc.

Furthermore, files are organized or arranged in directories. These directories are paths that describes the location wherein a file is stored on a computer system.

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem. Thus, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

In Computer science, it's possible to create a shortcut in several directories (locations) on a computer, so as to reference a file, folder or software application and serve as an executable link.

Hence, a shortcut is an icon that does not directly represent a file, folder or application but serves as a link to it.

Additionally, deleting the shortcut of a data file, folder or software application would not permanently delete or uninstall the main data file respectively.

¿Por qué es importante usar adecuadamente el celular?

Answers

Answer:

to stop it from breaking

Explanation:

The smallest piece of information a computer can store is

Answers

Answer:

bit

Explanation:

confia

A bit is the smallest piece of information in a computer, a single value storing either 0start text, 0, end text or 1start text, 1, end text. A byte is a unit of digital information that consists of 8 of those bits.

1 punto
María tiene una empresa de mercancia
seca, dicha empresa brinda su servicio de
ventas de estas mercancías al por mayor y
menor para su clientela. ¿De qué tipo de
Comercio hablamos en este ejemplo?: *

Answers

Answer:

Retailing.

Explanation:

La venta al por menor o retailing es el suministro de bienes físicos a los consumidores para uso personal, sea en pequeña o grandes cantidades, siempre que esté destinado a consumidores finales. Es un sector que consta de diferentes ramas (como la industria alimentaria, la industria de la moda, la industria del mobiliario para el hogar, etc.). El comercio minorista es el último eslabón de la cadena de suministro que va desde el fabricante hasta el consumidor.

Kiko loves to surf the internet and check on different websites. One day he received an email from unknown source. When he opens it, he was directed to a site and logged using his credit card number. After a few days,he learned that his card was use by someone in purchasing an expensive item. What internet threat did Kiko experience and what can you do to avoid it.​

Answers

He experienced phishing

Phishing is a method of trying to gather personal information using deceptive e-mails and websites.

Here are some measures to avoid phishing. You can pick up the one you liked the most

Always check the spelling of the URLs in email links before you click or enter sensitive informationWatch out for URL redirects, where you're subtly sent to a different website with identical designIf you receive an email from a source you know but it seems suspicious, contact that source with a new email, rather than just hitting reply. Don't post personal data, like your birthday, vacation plans, or your address or phone number, publicly on social media

Choose the issue that is occurring from the drop-down menu. During the , development teams transform the requirements into a software application design. During the , the software design is implemented by developers in code. In the , software is evaluated for quality. Any issues with the software are logged as to be resolved by developers. Software that is maintained by developers is said to be .

Answers

Answer: See explanation

Explanation:

During the, (software design phase), developmentt teams transform the requirements into a software application design.

During the (software development phase), the software design is implemented by developers in code.

In the (software evaluation phase), software is evaluated for quality.

Any issues with the software are logged as (bugs) to be resolved by developers.

Software that is maintained by developers is said to be (supported).

Answer:

1) 2

2) 1

3) 2

4) 2

5) 3

Explanation: just did it

Select the three reasons that the gaming industry is set to grow.

A) more colleges offering jobs in game design

B) a decrease in the average age of gamers

C) an expanding market on mobile phones

D) expanding markets in Asia

E) new accessories that will attract more players

Answers

The answers are A, C, E

Answer:

expanding markets in Asia, new accessories that will attract more players, an expanding market on mobile phones

Explanation:

In terms of technology, wich of the four devices is the most recent?

a. keyboard
b. joystick
c. scanner
d. camera​

Answers

Joystick (1972)

They consider the typewriter a keyboard…late 1800’s
Scanner (1957)
Camera (late 1800)

3 Negative ways of using the Internet​

Answers

Answer:

1. It rots the mind of children

2. It's to too addicting

3. can show bad things.

Explanation:

1. Cyber bullying.
2. Gambling (playing games where you win money)
3. Identity theft, hacking.

Please help me with my question ​

Answers

Answer:

1. Template

2. Name of the website

3. Signature of the instructor

Which headphones are a better option, the HyperX Cloud Stinger or the Logitech G432

Answers

Answer:

The Logitech ones.

Explanation:

Surprisingly I've used all 3 of them and the Logitech ones are the one with not only the best sound quality. And the mic isn't horrible either.

An input value has to be greater than 18 and less than 65 if a driving license is to be approved for issue. What type of input checking is appropriate?

Answers

Answer:

You should use an "if" statement to check whether the number is greater than 18 or less than 65.

Explanation:

You usually use "if" statements whenever you want to compare a number to another. Keep in mind that "if" statements are not only used for comparison!

5.2
Explain ONE reason why the special equipment is used when
testing eyesight for a driver's licence.
(2)​

Answers

Answer:

In order to reduce the risk of accidents on the roads.

Explanation:

The special equipment is used when  testing eyesight for a driver's license in order to reduce the risk of accidents on the roads. Good eyesight is very important for good and safe driving so to find out the eyesight of the driver, the license officer used special equipment in order to check driver's eyes. If the eyesight is good, the officer provide license to the person otherwise not so that no accidents happen on the road.

What do you call a commercial transaction beyween a buisness and buisness thatis transactedd online?
A.B2B - commerce
B.B2.B commerce
C. B2b digital transaction
D.B2B e - commerce

E. Non of the above

Answers

Answer:

c.B2b digital transaction

Explanation:

yan lang po sana makatulong

Which option is not available in the Presenter view of a presentation?

Answers

Group of answer choices.

A. Next Slide Preview

B. Pen/Laser Pointer tools

C. Open Slide Show

D. Navigation Controls

Answer:

C. Open Slide Show

Explanation:

PowerPoint application can be defined as a software application or program designed and developed by Microsoft, to avail users the ability to create various slides containing textual and multimedia informations that can be used during a presentation.

Some of the features available on Microsoft PowerPoint are narrations, transition effects, custom slideshows, animation effects, formatting options etc.

Basically, the views that are available on the Microsoft PowerPoint application includes;

1. Slide Sorter.

2. Notes Page.

3. Reading Pane.

4. Presenter view.

Presenter view avails the user an ability to use two monitors to display his or her presentation. Thus, one of the monitors displays the notes-free presentation to your audience while the other monitor lets you view the presentation with notes that you have added to the slides, as well as the navigation and presentation tools.

Furthermore, the Presenter view was developed by Microsoft Inc. to have the following options;

I. Next Slide Preview.

II. Pen/Laser Pointer tools.

III. Navigation Controls.

However, Open Slide Show is an option which is not available in the Presenter view of a presentation.

what type of computer system can be found in the computer lab at school?
A. mini
B. micro
C. Mainframe
D. super​

Answers

Answer:

B: micro

Explanations

a small computer that contains a microprocessor as its central processor.

Other Questions
when two capacitors are connected in series, the effective capacitance is 2.4muF and when connected in parallel, the effective capacitance is 10muF. calculate the individual capacitances. Five uses of the start button determine the equation of the circle graphed below .( help please ) Why do plants need water, light, and carbon dioxide? When computer boots which I pont program starts first? O Operating System O Metaphor System O Basic System O Computer System A researcher posts an online advertisement offering $25 in exchange for participation in a short study. The researcher accepts the first 10 people who respond to the advertisement. Which of the following statements is true about the sample? (1 point) aIt is not a valid sample because it is only a short study. bIt is a valid sample because money was offered to participants. cIt is a valid sample because the first 10 people were selected to participate. dIt is not a valid sample because it is not a random sample of the population. Book: HolesStanley and his family half-jokingly blame their misfortunes on Stanley's "no-good-dirty-rotten-pig-stealing-great-great-grandfather." Do you believe in fate that people are lucky or unlucky or do you believe, as Mr. Pendanski tells the boys, that we are all responsible for ourselves and our destinies? Please give real answers with an explaination. 50 points + I will give the brainliest. No Docs/No Files/No Links only answer with explaination. Q.does salt make water boil at a higher temperature? Deforestation occurs when large Amounts of trees are cut down and not replaced which of the following would result from deforestation A. Decrease carbon in the atmosphere B. Increased carbon in the atmosphere PLEASE HELPI REALLY NEED ALOT OF HELP write a letter to your friend telling him or her about yhe cause as well as effects of social evils. 100 students attended a revision lesson at the weekend.Each student went to Maths or English or Science.55 of these students attended on Saturday.Over the weekend a total of 40 students went to Maths.12 of the 27 students that went to Science went on Sunday.10 students went to English on Saturday.How many students went to the Maths revision lesson on Saturday? who is the last juror to hold out for a guilty verdict but is finally convinced at the end of act 3 pWhich of the following is an appropriate paraphrase of this original language from a source? Original Language: "Small dogs make more aggressive companions because they see themselves as personal protectors, while large dogs see the entire property as their domain." From an article titled "Why Your Dog is Yippy" by writer John Brown, published in Dog Magazine, on page 27. In the village where Fyokla and Danilka live, who are the people who know everything about nature? A pole 11 feet tall is used to support a guy wire for a tower, which runs from the tower to a metal stake in the ground. After placing the pole, Jayden measures the distance from the pole to the stake and from the pole to the tower, as shown in the diagram below. Find the length of the guy wire, to the nearest foot. 11 ft 20 ft-8 ft franklin races bikes. in his city there are 4 lengths of race tracks. The chart shows the race tracks and each tracks length in miles A. 1/4B. 3/2C. 1 3/4D. 4/4 Franklin races 3 laps in the same lane. the total distance he raced is more than 4 1/2miles which track does franklin race on? In 1852, the famed Cumberland Road, or National Road, was finallycompleted. It stretched from Maryland to Illinois, covering nearly600 miles and five states. How do you think the towns along thehighway benefited from the new traffic? Explain your answer inparagraph form. Choose the false statement about the Building and Personal Property Coverage Form. A Personal property owned and used to service the building is included in the building coverage B Tenant's improvements that are not legally removable are included in the Personal Property of Others Coverage C Personal property of others that is in the insured's care, custody, and control is automatically included up to $2,500 under coverage extensions D Building Coverage includes the building structure, completed additions, permanently installed fixtures, machinery and equipment