Population mean expenditure for males and females

Assignment Help Basic Computer Science
Reference no: EM132689159

USA Today reports that the average expenditure on Valentine's day is $100.89. Do male and female consumers differ in the amounts they spend? The average expenditure in a sample survey of 40 male consumers was $135.67, and the average expenditure is a sample survey of 30 female consumers was $68.64. Based on past surveys, the standard deviation for male consumers is assumed to be $35.00, and the standard deviation for female consumers is assumed to be $20.

What is the point estimate between the population mean expenditure for males and the population mean expenditure for females?

At a 99% confidence, what is the margin of error?

Develop a 99% confidence interval for the difference between the two population means.

Reference no: EM132689159

Questions Cloud

Republican party national committee : You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website.
Discuss the various security related components : For this assignment research and discuss the various security related components that must be addressed when implementing any system
Understanding for some different qualitative methods : We focused on developing an understanding for some different qualitative methods.
Reconnaissance and scanning plan : How would you determine the best attack vector you wish to exploit? How would you prioritize different targets of opportunity?
Population mean expenditure for males and females : What is the point estimate between the population mean expenditure for males and the population mean expenditure for females?
Discuss what went right during the redesign : Discuss what went right during the redesign and what went wrong from your perspective.
Evaluate history of the data encryption standard : Evaluate the history of the Data Encryption Standard (DES) and then how it has transformed cryptography with the advancement of triple DES.
Think attack can be classified as cyber terrorism : There are a variety of ways that a cyber-attack can cause economic damage. When do you think an attack can be classified as cyber terrorism?
Discuss the major competitors in global e-commerce : Circuit City was an American consumer electronics company founded by Samuel Wurtzel in 1949. History of Circuit City. Discuss competitors in global e-commerce.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What are they and can they be measured directly

What are they and can they be measured directly?

  Kantian perspective and Act Utilitarian perspective

List any three reasons of promoting higher-level programming languages. Evaluate the scenario from a Kantian perspective and Act Utilitarian perspective.

  Aps before the increase in disposable income

Suppose that the level of disposable income and consumption in a country called Y are $400 billion and $240 billion, respectively.

  Interactions in the light of game theory

Are they behaving optimally in relation to the repeated interactions they have with other individuals or firms?

  Describe two IT Governance Frameworks

What is IT Governance? Describe two IT Governance Frameworks? which do you consider the top three in importance and why?

  With replacement order matters

Given an alphabet of size N=9. Write a c++ program that compares the number of possible sequences of the length L that can be generated inder the following assumptions: With replacement order matters, without replacement order matters, and without..

  Concept of utilitarianism written bentham and mill

Explain the main differences between the concept of Utilitarianism as written Bentham and Mill's?

  The low and high integer in a range of integers

The low and high integer in a range of integers

  Calculate the actual present worth of the purchase

1. The IRR for the investment that Barry recommended is . Enter your answer for the IRR using 2 decimal places and no % sign. For example, if you calculate an IRR as 7.53%, enter it as 7.53. 2. Using a 10% MARR, calculate the actual present worth..

  Purpose of operational and communications policies

Discuss the importance and purpose of operational and communications policies in the context of n-tier systems implementation.

  Show how rsa can be used for two-way authentication

Show how RSA can be used for two-way authentication.

  Scenarios for deployment of the operating system

Draft a response to the questions below, which will address different scenarios for deployment of the operating system.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd