Find the probability that someone scores above a 17

Assignment Help Basic Computer Science
Reference no: EM131187831

Scale questionnaire (Psychological Reports, August 1997). Scores on the scale range from 0 (no anxiety) to 20 (extreme anxiety).

The mean score was 11 and the standard deviation was 3.5. Assume that the distribution of all scores on the Dental Anxiety Scale is normal with μ = 11 and σ = 3.5.

(a) Suppose you score a 16 on the Dental Anxiety Scale. Find the z-value for this score.

(b) Find the probability that someone scores between a 10 and a 15 on the Dental Anxiety Scale.

(c) Find the probability that someone scores above a 17 on the Dental Anxiety Scale.

Reference no: EM131187831

Questions Cloud

Discuss the legal and ethical issues : Discuss the legal and ethical issues surrounding the historic product liability case mentioned in most Business Ethics books as the Ford Pinto case.
Estimate the proportion of contaminated wells : Find the mean and standard deviation for the MTBE levels of the sampled wells and construct the interval y¯ ± 2s. Estimate the percentage of wells with MTBE levels that fall within the interval. What rule did you apply to obtain the estimate? Expl..
Who move their capital from one stock to another : What is the policy justification under §1031 for allowing real estate investors to exchange one property for another (e.g., exchange rental property for a farm) without recognizing gain, but not other investors who move their capital from one stoc..
Speculate on the technological limitations regarding data : Next, speculate on the technological limitations regarding data, software, and hardware that you believe might challenge your chosen organization / agency in the future. Provide a rationale for your response.
Find the probability that someone scores above a 17 : Find the probability that someone scores above a 17 on the Dental Anxiety Scale.
Describe how the experiment was conducted : Describe how the experiment was conducted, i.e., what was the procedure: (4-6 sentences). Identify all the main effects and interactions (if the design is factorial). Make sure you state the main effect for EACH independent variable you nam..
What is language : What is language? What are some of the ways language can be an obstacle to communication? Select one of your obstacles and share your personal example/experience. What emphasis strategies could have been employed to address any of the obstacles yo..
Evaluate the efficacy of the results presented in the study : Discuss and evaluate the efficacy of the results presented in the study. Address, the strengths, weaknesses, and limitations of the study, and suggest future research directions. Include additional forms of statistical analyses as part of the sugg..
Apply bcg matrix on any company : Apply BCG matrix on any company? Q: Critically discuss whether the sole purpose of the company should be to make profit?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Compare the performance of this algorithm

Compute the parallel run time, speedup, and efficiency of this formulation. Compare the performance of this algorithm with that in Section 12.2.2.

  Explaining topic important for network administrators

Why is the topic important for network administrators today?

  Differentiate between the term machine language and

question 1. distinguish between machine language and assembly language. question 2. distinguish between

  Prints its volume and surface area

Write an application that reads the radius of a sphere and prints its volume and surface area. Use the following formulas, in which r represents the sphere's radius. Print the output to four decimal places

  What is the ieee-754 single-precision binary representation

Program: What is the IEEE-754 single-precision binary representation of the floating point number 49.625?

  Write an analytical report describing the impact of breach

The case study focuses on a major IT security breach that occurred in the recent past. Consider yourself as the IT person in charge at TJX. You need to analyze the case and describe the impacts of the breach on TJX.

  Requiring a system recovery

Tapes are sent offsite for disaster recovery every morning at 10 a.m. The customer experiences a system crash on the Wednesday of the third week at 3 p.m., requiring a system recovery. How many days worth of tapes need to be retrieved to perform a..

  Determine the next flavor of beer

Dell's Ideastorm, Best Buy's IdeaX, New York city's Simplicity, and Samuel Adams' Facebook application to determine the next flavor of beer are a few of the examples that use crowdsourcing. From the e-Activity, assess whether ideasourcing generates t..

  Make an argument for the state of the economy

Based on current data, make an argument for the state of the economy. Are we in a recessionary or inflationary gap? Neither? Are we in a deep recession? Are we in a large inflationary gap? If we are in neither, what direction (recession or inflation)..

  What information is required to setup a new account

What information is required to setup a new account, what category information is collected by the site

  Discuss measures that can be to proactively reduce risk

Discuss measures that can be taken to proactively reduce risk.

  Create folder named lastname firstname in a google drive

Creat a Google Drive account, and Create folder named Lastname_Firstname in a Google Drive account; upload A2_part3_data, rename as GICC Renovations and open in Google Sheets.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd