Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
QUESTION 1
(a) The salaries of employees of a firm are found to be follow a normal distribution of mean Rs 13 500 and standard deviation of Rs 3000.
(i) Calculate the probability that an employee chosen randomly gets a salary 1. less than or equal to Rs 15000. 2. greater than Rs12000. 3. between Rs 12500 and Rs 14000.
(ii) 25% of the employees will have salaries less than which amount?
(b) Oil is automatically filled in jars by a machine in the production line of a factory. In a sample of 100 jars, the mean weight is found to be 505 g and the standard deviation is of 9 g
(i) Determine the 95 % confidence interval for the mean weight of the jars
(ii) Interpret your result in (i)
QUESTION 2
(a) Analyse the different methods for collecting data
(b) Explain by taking examples 3 types of Sampling techniques.
(c) Discuss the advantages and disadvantages of a written questionnaire
Processor X has a clock speed of 2Ghz and takes one cycle for integer operations, two cycles for memory operations, and four cycles for floating point operations.
Write the send and receive primitives for stated processes. Identify at least three properties of communication channel or link in this scheme
Operating System Proposal
simulating the cpu scheduling for a computer architecture with 64k of memory and 3 io devices. simulate the long-term
Write a multi-threaded program to solve producer and consumer problem
Starting from the current head position, what is the total distance (in cylinders) that the disk arm moves to satisfy all the pending requests for each of the following algorithms
Write a paper, examining computer forensic issues as they are related to Microsoft Windows and Macintosh environments and explain UNIX as a key component for forensic examiners;
Qqueue for service (if the server process is busy servicing another request). Requests in queue are served according to the scheduling policy in use: First-In-First-Out (FIFO) scheduling.
Discuss what roles do firewalls and proxy servers play in network security? Determine the importance of maintaining security on a LAN?
With the help of analogy to explain the differences between logical and physical security to a nontechnical person.
Assume that the passwords were eight characters long but that the salt length was increased to 24 bits. Again, the salts (and the corresponding algorithms) are known to all users. What would be the expected time to find all users' passwords using ..
There is a school of thought that discusses that, far from being undesirable, few degree of scope creep may in fact be beneficial for certain types of assignments.
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd