3) A statistical test involves the following null and alternative hypotheses H: 4=64 H. u > 64 Which of the following describes a Type Il error? A) Failing to reject the null hypothesis when the population mean is 64 B) Failing to reject the null hypothesis when the population mean Is greater than 64 Rejecting the null hypothesis when the populatlon mean is 64 D) Rejecting the null hypothesis when the population mean Is greater than 64 Falling to reject the null hypothesis when the p-value Is less than the slgnificance level

Answers

Answer 1

Failing to reject the null hypothesis  when population mean is greater than 64

What exactly is a hypothesis?

A hypothesis is an assumption formed based on evidence. This is the first step in any investigation that converts research questions into predictions. It consists of variables, a population, and the relationship between the variables. A research hypothesis is a theory used to test the relationship between two or more variables.

Hypothesis Characteristics

The hypothesis has the following characteristics:

To be considered reliable, the hypothesis must be clear and precise.

If the hypothesis is a relational hypothesis, the relationship between variables should be stated.

The hypothesis must be specific and leave room for further testing.

The hypothesis must be explained in a straightforward manner.

Here Null Hypothesis is: Mo: M = 64 Alternative Hypothesis is HA: 1764

Type II. enor occurs when we fail to reject null Hypothesis but null Hypothesis is false

So here, failing to reject the null the hypothesis when population mean is greater than 64

So, Option A, Option C, Option D, OptionE "are wrong.

The correct option is  Option B

Failing to reject the null hypothesis when population mean is greater than 64

To know more about Population,click on the link :

https://brainly.com/question/27991860

#SPJ1


Related Questions

32.
are also known as cyber burglars.
a. Hackers
b. Programmers
c. Software Engineers d. Crackers.
Page 3 of 4​

Answers

Answer:

a

Explanation:

hackers access your system unauthorized

NO FOOLISH ANSWERS!!! Please I need this for class and I don't have time to be played with.

35 points


Create an informational slide using ethical Internet research and citation practices.

Choose a topic on anything you think would be interesting to research – for example, a famous or historical person, a place, an animal, or a device or invention. You will use the Internet to complete your research. With this research, you will create an informational presentation slide that describes your topic. Your informational slide should contain the following elements:

• An introductory image - it can be a direct picture of the person/place/thing, or a photo that relates to it in some way. This photo must be free to use, meaning you will have to check the copyright details for any photo you select. (10 points)

• A 200- to 300-word explanation of the topic. Use Internet sources to research the topic, and then write an explanation in your own words based on what you have learned. (10 points)

• Properly cited Internet sources for both the image and written section. (5 points)

Answers

When conducting ethical Internet research, it is important to use reliable sources and to properly cite any information or images used in your presentation.

For your informational slide, I recommend choosing a topic that interests you and conducting thorough research using reputable Internet sources.
To begin, select an introductory image that relates to your topic and is free to use. Make sure to check the copyright details of any image you select to ensure you are not violating any copyright laws. This image should be visually appealing and help to introduce your topic to your audience.
Next, write a 200- to 300-word explanation of your topic using Internet sources. Be sure to use your own words and avoid plagiarism. Use credible sources such as academic journals, government websites, or established news outlets to ensure accuracy and reliability.
Finally, properly cite your sources for both the image and written section. Use a citation style such as MLA or APA to ensure that you are properly crediting the authors or creators of your sources.
By conducting ethical Internet research and using proper citation practices, you can create an engaging and informative informational slide on any topic of your choosing.

Learn more about Internet here:

https://brainly.com/question/15625711

#SPJ11

what are the functions of online gaming communities?

Answers

Answer:

As a high-quality communication system, online games provide a virtual world where gamers communicate with each other by using rich interactive multimedia. This would facilitate communication among online gamers and enhance the development and maintenance of interpersonal relationships.

program that shows if it's an integer or not​

Answers

isInteger() method returns true if a value is an integer of the datatype Number. Otherwise it returns false

[10] what is the primary benefit of making a computing system fault-tolerant?

Answers

The primary benefit of making a computing system fault-tolerant is to increase the system's reliability and availability, by reducing the risk of system failure due to hardware or software faults.

Fault tolerance is the ability of a system to continue operating in the event of a fault, such as a hardware failure, power outage, or software error.

By designing a computing system to be fault-tolerant, the system can continue to provide essential services even when one or more components fail, without causing significant downtime or data loss.

Some of the key benefits of making a computing system fault-tolerant include:

Increased reliabilityImproved availabilityBetter data protectionIncreased scalability

Learn more about fault tolerance here:

https://brainly.com/question/29484867

#SPJ11

in most cases, letters of recommendation are required for admission to

Answers

A university or college.

sort the following features based on whether they correspond to active margins, passive margins, or both.

Answers

Based on the given features, here is the sorting based on whether they correspond to active margins, passive margins, or both:

Active Margins:

Submarine lava eruptions

Trench

Accretionary prism

Few or no earthquakes

Passive Margins:

Gentle continental slope

Mid-ocean ridge

Continental rise

Formation of sedimentary rock

Broad continental shelf

Both Active and Passive Margins:

Formation of igneous rock

Underlain by oceanic crust

Can be adjacent to thick continental crust

Please note that the classification of certain features may vary depending on specific geological contexts, and the classification provided here is a general representation.

Learn more about sorting here:

https://brainly.com/question/32237883

#SPJ11

Sort The Following Features Based On Whether They Correspond To Active Margins, Passive Margins, Or Both. Features: Formation Of Igneous Rock Submarine Lava Eruptions Trench Gentle Continental Slope Accretionary Prism Few Or No Earthquakes Mid-Ocean Ridge Continental Rise Underlain By Oceanic Crust Formation Of Sedimentary Rock Broad Continental Shelf Can Be

Sort the following features based on whether they correspond to active margins, passive margins, or both.

Features:

formation of igneous rock

submarine lava eruptions

trench

gentle continental slope

accretionary prism

few or no earthquakes

mid-ocean ridge

continental rise

underlain by oceanic crust

formation of sedimentary rock

broad continental shelf

can be adjacent to thick continental crust

Answer:

Active margin: mid-ocean ridge, accretionary prism, submarine lava eruptions, trench, and formation of igneous rock.

Passive margin: broad continental shelf, gentle continental slope, few or no earthquakes, and continental rise.

Both: can be adjacent to thick continental crust, underlain by oceanic crust, and formation of sedimentary rock.

Explanation:

An active margin creates or destroys the Earth's crust. Think of convergent and divergent boundaries. A passive margin doesn't create or destroy the Earth's crust, so think of where land meets a continental shelf.

A mid-ocean ridge, submarine lava eruptions, and the formation of igneous rock all create the Earth's crust. A trench destroys the Earth's crust, and accretionary prisms are part of a trench.

Continental shelves, continental slope, and continental rise don't create or destroy crust. Earthquakes usually occur when the crust is created or destroyed.

Continental shelves and converging boundaries can include continental crust and oceanic crust. The formation of sedimentary rock uses existing rock, so it doesn't create new crust, but it can occur at active margins as well.

In a computer instant messaging​ survey, respondents were asked to choose the most fun way to​ flirt, and it found that ​P(D)equals0.660​, where D is directly in person. If someone is randomly​ selected, what does Upper P (Upper D overbar )​represent, and what is its​ value?

Answers

Answer: 0.340

Explanation:

If someone is randomly​ selected, what does Upper P (Upper D overbar )​represent an individual who doesn't flirt directly in person.

Since P(D) = 0.660

Upper P (Upper D overbar )​ will be:

= 1 - 0.660

= 0.340

what version of vsftpd contained the smiley face backdoor?

Answers

Answer:

Chris Evans, author of vsftpd announced that the master site for vsftpd was compromised and that the latest version of vsftpd (vsftpd-2.3.4.tar.gz) was backdoored. The backdoor payload is interesting. In response to a smiley face in the FTP username, a TCP callback shell is attempted. There is no obfuscation.

Explanation:

The master site for vsftpd was compromised, and the most recent version of vsftpd has a backdoor, according to vsftpd programmer Chris Evans. The payload on the backdoor is intriguing. A TCP callback shell is tried in response to a smiley in the FTP username. There is no concealment.

What version of vsftpd had smiley face backdoor?

Vsftpd version 2.3. 4 that could be downloaded from the main site was found to have been compromised in July 2011. A ":)" smileyface can be used as the username when entering into a compromised vsftpd-2.3. 4 server, giving users access to a command shell on port 6200.

The idea behind the attack against VSFTPD 2.3. 4 is to send a specific sequence of bytes on port 21 to start the malicious vsf sysutil extra() function, which, if executed successfully, opens the system's backdoor on port 6200.

causes the backdoor to be opened, which causes a shell to start listening on TCP port 6200. After a client connects to it and disconnects from it, the shell stops listening. This might be used by a remote, unauthenticated attacker to execute arbitrary code as root.

Thus, The master site for vsftpd was compromised, and the most recent version of vsftpd has a backdoor.

For more information about vsftpd had smiley face backdoor, click here:

https://brainly.com/question/535743

#SPJ6

option 1: untangle a knot you see in the world. option 2: if you had a time machine and could go back in time or into the future for a day, where/when would you go, what would you do, and why?

Answers

Option 1: This could involve anything from a twisted shoelace or a complicated knot in a piece of rope.

Option 2: I would choose to go back in time to the year of the first moon landing.

How to entangle a knot?

The best way to untangle a knot is to start by gently pulling on one of the ends of the knot. This will allow you to see how the knot is structured and how it is tied. Once you have an idea of what the knot looks like, you can use your hands to gently pull apart the individual strands of the knot. Once you have separated the strands, you can carefully use a pair of scissors to cut the knot. Be sure to cut the knot carefully and evenly so that it does not create any new knots. After cutting the knot, you can then use your hands to gently separate the strands of the knot until it is completely untangled.

To learn more about time machine refer to:

https://brainly.com/question/27973693

#SPJ4

which of these is an aggregator?
a. a browser plug-in b. a widget
c. an RSS reader d. a utility

Answers

Answer:

Answer is C. an RSS reader

A good sentence about art

Answers

Answer:

Art, in its broadest sense, is a form of communication. It means whatever the artist intends it to mean, and this meaning is shaped by the materials, techniques, and forms it makes use of, as well as the ideas and feelings it creates in its viewers . Art is an act of expresThe three classical branches of visual art are painting, sculpture, and architecture. Music, theatre, film, dance, and other performing arts, as well as literature and other media such as interactive media, are included in a broader definition of the arts.

sing feelings, thoughts, and observations.

Now, remove any element founded in creativity, art and design, and all that remains are piles of materials that require human imagination and visual thinking. Art forces humans to look beyond that which is necessary to survive and leads people to create for the sake of expression and meaning.

MAY THE FORC E BE WITH U

Megan wants to post a picture of her and her friend Jennifer on her social media page. What should Megan do before she posts the picture?

A. Add a caption.
B. Ask her friend for permission.
C. Make sure she looks good.
D. Edit the picture using Photoshop.

Answers

Answer:

B. Ask her friend for permission.

Explanation:

Answer: B ask her friend for permission

hope you do good on the test or quiz.. it would mean alot to be brainlEst

Correct all the mistakes in the following sentence:

When you proofread look for punctuation spelling and Capitalization Mistakes.

Answers

Answer:

When you proofread, look for punctuation, spelling, and capitalization mistakes.

Explanation:

Answer:

When you proofread, look for punctuation, spelling, and capitalization mistakes.

:]

"Great Rock and Roll Pauses" tells the story of:

Answers

"Great Rock and Roll Pauses," tells the story of the family of a 12-year-old. Thus, option B is correct.

In a PowerPoint presentation, a teen examines her family's behavior and the motivations behind it. The narrative of "Great Rock and Roll Pauses" centers on a 12-year-old's family. In the short tale "Great Rock and Roll Pauses," Sasha makes the argument that when a rock performance pauses, one is pleased that it doesn't end. This is something that practically all of the individuals featured in the book have gone through.

Therefore, option B is correct.

Learn more about family, here:

https://brainly.com/question/13084401

#SPJ1

The question is incomplete, Complete question probably will be  is:

"Great Rock and Roll Pauses" tells the story of:

A. the best rock music ever.

B. the family of a 12-year-old.

C. the lives of famous rock stars.

D. the way to make music charts.

How many seconds long is the longest sound in the world?

Answers

112 seconds long according to theverge

A period in which unemployment is low, business produces many goods and services, and wages are good is called ______.

A. prosperity
B. productivity
C. personal income
D. business cycle

Answers

Answer:

A

Explanation:

what are some concerns that need to be taken care of while collecting data?
grade 10

Answers

It is crucial to address various concerns while collecting data, including ensuring data privacy and security, obtaining informed consent, and minimizing bias or discrimination in data collection methods.

Collecting data requires careful consideration of privacy and security measures to protect individuals' personal information. This involves implementing secure data storage systems and employing encryption techniques to safeguard the data. Additionally, it is of utmost importance to obtain informed consent from participants.

Ensuring that they possess a comprehensive comprehension of the objectives and potential risks entailed in data collection. Informed consent should be voluntary in nature, encompassing transparent details regarding the utilization of the data and the measures taken to uphold participants' privacy. Lastly, it is vital to be mindful of bias and discrimination in data collection methods.

To know more about data collection, refer:

https://brainly.com/question/30479163

When collecting data, several concerns need to be addressed:

1. Privacy: Ensure that appropriate measures are in place to protect the privacy and confidentiality of individuals whose data is being collected. Obtain informed consent and handle sensitive information securely.

2. Validity: Ensure that the data being collected accurately represents the intended variables or phenomena. Use reliable and valid measurement techniques, conduct proper sampling, and minimize bias.

3. Reliability: Aim for consistent and reproducible results by using standardized data collection methods and ensuring inter-rater reliability. Employ appropriate controls and checks to reduce errors or inconsistencies.

4. Ethics: Adhere to ethical guidelines and consider the potential impact of data collection on participants or other stakeholders. Avoid harm, respect autonomy, and maintain integrity throughout the data collection process.

5. Bias and Fairness: Be mindful of potential biases in data collection methods, sampling, or analysis that could lead to unfair or discriminatory outcomes. Strive for inclusivity and transparency in data collection practices.

6. Data Quality: Ensure the accuracy, completeness, and relevance of the collected data. Implement data validation and cleaning procedures to identify and rectify errors or inconsistencies.

How would you rate this answer on a scale of 1 to 5 stars?

why is data processing done in computer

Answers

Answer:

Explanation:

Data processing occurs when data is collected and translated into usable information. Usually performed by a data scientist or team of data scientists, it is important for data processing to be done correctly as not to negatively affect the end product, or data output.Any use of computers to perform defined operations on data can be included under data processing.

unix is a __ and ___​

Answers

Answer:

UNIX IS A MULTIUSER COMPUTER AND OPREATING SYSTEM.

a employee who has intregity is

Answers

Answer:

is some one who demonstrates  sound moral and ethical principles ,always does the right thing no matter when or who's watching, they can be trusted around the staff and the stakeholders. which means that that person is honest, fair, and dependable

Explanation:

i actually just did a report for a class that i am taking called human resources

i hoped this helped you

Select the correct answer.
Which relationship is possible when two tables share the same primary key?
А.
one-to-one
B.
one-to-many
C.
many-to-one
D.
many-to-many

Answers

Answer:

Many-to-one

Explanation:

Many-to-one relationships is possible when two tables share the same primary key it is because one entity contains values that refer to another entity that has unique values. It often enforced by primary key relationships, and the relationships typically are between fact and dimension tables and between levels in a hierarchy.

what is the network number of address 165.34.45.14 with a subnet mask of 255.255.240.0?

Answers

The network number of the IP address 165.34.45.14 with a subnet mask of 255.255.240.0 is 165.34.32.0.

To determine the network number of the IP address 165.34.45.14 with a subnet mask of 255.255.240.0, we can perform a bitwise logical AND operation between the IP address and the subnet mask. This will yield the network address.

Here are the steps to perform this operation:

Convert the IP address and subnet mask from dotted decimal notation to binary notation:

IP address: 10100101.00100010.00101101.00001110

Subnet mask: 11111111.11111111.11110000.00000000

Perform a bitwise logical AND operation between the IP address and the subnet mask:

10100101.00100010.00101101.00001110 (IP address)

11111111.11111111.11110000.00000000 (Subnet mask)

10100101.00100010.00100000.00000000 (Network address)

Convert the binary network address back to dotted decimal notation:

Network address: 165.34.32.0

Therefore, the network number  is 165.34.32.0.

Learn more about network number here:

https://brainly.com/question/28218464

#SPJ11

what happens if another interrupt is activated while current interrupt is being served? will the program jump to new interrupt? how does avr handles this kind of situation?

Answers

If a new interrupt is triggered while a current interrupt is being serviced in AVR microcontrollers, the AVR will complete the current instruction and immediately jump to the new interrupt vector if it has a higher priority, based on the Interrupt Priority Levels (IPLs) mechanism.

In AVR microcontrollers, when an interrupt is being serviced and another interrupt is triggered, the AVR will complete the current instruction before acknowledging the new interrupt request. Once the current instruction is completed, the AVR will check for any pending interrupt requests. If there is another pending interrupt request with higher priority than the one currently being serviced, the AVR will immediately jump to the new interrupt vector and start servicing the new interrupt.

The AVR handles this situation by using a mechanism called Interrupt Priority Levels (IPLs). IPLs are used to assign priorities to different interrupt sources. When an interrupt is triggered, the AVR compares its IPL with the current IPL level. If the new interrupt's IPL is higher than the current IPL, the AVR will immediately jump to the new interrupt. If the new interrupt's IPL is lower than or equal to the current IPL, the AVR will continue servicing the current interrupt until it completes.

To avoid conflicts and ensure proper operation, it's important to carefully manage the interrupt priorities and make sure that the most critical interrupt sources have the highest priority. Additionally, interrupt service routines should be designed to be as short and efficient as possible to minimize the risk of new interrupt requests being missed.

Learn more about interrupt vector here: brainly.com/question/12950323

#SPJ4

You are working from home and want to discuss a controversial topic. It is important you see the facial expressions of your coworkers during the meeting. The best way to conduct this meeting is using _______.

Answers

Answer:

Maintaing Focus and keeping the meeting comfortable and moving.

Explanation:

Answer:teleconference

Explanation:

‍♀️

which statements describe OneDrive? Multiple choice


Possible Answers:


1. OneDrive is available to subscribers of office 365.


2. The Onedrive Browser allows access to Excel online.


3. Onedrive is a storage location on your personal computer.


4. New documents can be created and uploaded on OneDrive.


5. OneDrive ensures that changes in files are updated in the computer and the cloud.

Answers

Answer:

1, 2, 4, 5.

Explanation:

Believe me, it's true.

Write a program that prints how many times you can fill your 22gal car with gas when the station only has 200gal left? CODEHS.

Answers

The program that prints how many times you can fill your car with gas is as  follows:

gas_tank = 22

gas_station = 200

num_times = int(gas_station/gas_tank)

print(f"The number of times is {num_times}")

How to write the program?

From the question, we have the following parameters:

Size of gas in the car = 22 gallons

Size of gas remaining in the station = 200 gallons

Represent these parameters as:

gas_tank = 22

gas_station = 200

So, the program in Python is as follows:

# Size of gas tank in your car

gas_tank = 22

# Amount of gas remaining in the station

gas_station = 200

# The number of times you can fill the car

num_times = int(gas_station/gas_tank)

# Print the number of times

print(f"The number of times is {num_times}")

Note that comments are used to explain each line

Read more about programs at

https://brainly.com/question/26497128

#SPJ1

What is the advatage of print, broadcast, film/cinemavido games, new meida

Answers

Print media, such as newspapers, magazines, and books, offer the advantage of in-depth coverage and analysis of topics.

They allow for detailed reporting and interpretation of events and issues, as well as providing a permanent record of information. Print media can also be easily archived and referenced for future use.

Broadcast media, such as television and radio, offer the advantage of immediacy and reach. They can quickly disseminate information to a wide audience, and their visual and auditory nature can make stories more engaging and memorable. Broadcast media can also offer live coverage of events, allowing audiences to experience breaking news in real time.

Film/cinema and video games offer the advantage of immersive storytelling. They can transport audiences to other worlds and allow them to experience stories in a more visceral and interactive way. They also have the ability to use powerful visual and auditory effects to convey emotions and ideas.

New media, such as social media and digital platforms, offer the advantage of interactivity and engagement. They allow for direct communication and interaction between content creators and audiences, as well as enabling audiences to participate in the creation and sharing of content themselves. New media can also provide personalized content recommendations based on users' interests and preferences.

To know more about Print media click here:

brainly.com/question/29884875

#SPJ4

Which of these jobs would be most appropriate for someone who majors in information systems? A. Managing a group of programers B. Creating a cloud based customer service application app C. Providing telephone tech support D. Designing a database for an online retailer.

Answers

Answer:

B. Creating a cloud based customer service application app

Explanation:

Information Systems is described as an "academic study of various systems encompassing a particular reference associated with the complementary networks and information of the software and hardware that different organizations and people use to collect, create, process, distribute, and filter data.

The information system includes an integrated pair of different components for storing, collecting, and processing data, along with this, it is utilized for providing knowledge, information, and digital products.

In the question above, the correct answer is option-B.

You are asked to optimize a cache design for the given references. there are three direct-mapped cache designs possible, all with a total of eight words of data:

Answers

Answer:

Computer Science. Computer Science questions and answers. You are asked to optimize a cache design for the given references. There are three direct-mapped cache designs possible, all with

Explanation:

Computer Science. Computer Science questions and answers. You are asked to optimize a cache design for the given references. There are three direct-mapped cache designs possible, all with

Other Questions
Medicare Part A provides hospital coverage. Which of the following persons is not covered under Part A?a. A person 62 or older and receiving railroad retirementb. Disabled beneficiaries regardless of age that have received Social Security for two years.c. Chronic kidney patients who require dialysis or a renal transplantd. A person 65 or older entitled to a monthly Social Security check Activist investors often try to influence a board to sell off a business unit if it does not have a lot of synergy with other business units. To gain enough influence with the board, these investors usually require when a 2.75-kg fan, having blades 18.5 cm long, is turned off, its angular speed decreases uniformly from 10.0 rad/s to 6.30 rad/s in 5.00 s. (a) what is the magnitude of the angular acceleration of the fan? Why do you think there is/ was an assumption that decentralized political civilizations in Africa were viewed as unimportant by historians? Consider the line segment ABshown. Which of the followinglocations for point C makes ABC a right triangle with hypotenuse AB?A - C(7,9)B - C(1,4)C - C(2,3)D - C(8,7) 5.14 LAB: Convert to reverse binary Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in reverse binary. For an integer x, the algorithm is: As long as x is greater than 0 Output x modulo 2 (remainder is either 0 or 1) Assign x with x divided by 2 Note: The above algorithm outputs the O's and 1's in reverse order. Ex: If the input is: 6 the output is: 011 6 in binary is 110; the algorithm outputs the bits in reverse. when determining how large to make a visual, your main consideration is question 32 options: how many pages you need your report to be. how important and complex the information in the visual is. whether the visual's content is negative or positive. how much room you will need for borders. whether the visual will be in color or black and white. You invest $600 in a security with a beta of 1.2 and $400 in another security with a beta of 0.90. The beta of the resulting portfolio is __________ ? True or False: The last continent for the Homo Erectus to migrate to was South America? (Not including Antarctica) the use of deception in social psychological research occurs when the researchers require_____ in their study. group of answer choices a. realistic experimentation b. televised reality c. mundane realism d. experimental realism Wilson, CPA, obtained sufficient appropriate audit evidence to render an opinion on Abco's December 31, Year 1, financial statements on March 6, Year 2. A subsequent event requiring adjustment to the Year 1 financial statements occurred on April 10, Year 2. Wilson decides not to dual date the report and completes the extended audit procedures for subsequent events on April 24, Year 2. If the adjustment is made without disclosure of the event, Wilson's report ordinarily should be dated:a. April 24, Year 2.b. March 6, Year 2.c. April 10, Year 2.d. Using dual dating. Which of the following terms refers to digital and networked information and communication technologies that began emerging in the later half of the twentieth century?A. Digital MediaB. Mediated CommunicationC. Social MediaD. New Media assume that print todays date is a function that uses no parameters. write a statement that calls (invokes) this function. During one season of racing at the Talladega Superspeedway, the mean speed of the cars racing there was found to be 158.9 mph with a standard deviation of 6.7 mph. What speed represents the 30th percentile for speeds of race cars at Talladega? Assume that the racing speeds are normally distributed. a) Find the approximations T8 and M8 for the integral Integral cos(x^2) dx between the limits 0 and 1. (b) Estimate the errors in the approximations of part (a). (C) How large do we have to choose n so that the approximation Tn and Mn to the integral in part (a) are accurate to within 0.0001? using the unit normal table, find the proportion under the standard normal curve that lies between the following values. (hint: draw a picture.) do not round your answer. (a) the mean and z What is the area of the base, B,of the prism?B = 12 ftWhat is the volume, V, of the prism?V= ? ft4 ft6 ft3 ft PLEASE HELP ASAP!!!!! The television show Pretty Betty has been successful for many years. That show recently had a share of 23, meaning that among the TV sets in use, 23% were tuned to Pretty Betty. Assume that an advertiser wants to verify that 23% share value by conducting its own survey, and a pilot survey begins with 13 households have TV sets in use at the time of a Pretty Betty broadcast. Find the probability that none of the households are tuned to Pretty Betty. P(none) =___ Find the probability that at least one household is tuned to Pretty Betty. P(at least one) = ___Find the probability that at most one household is tuned to Pretty Betty. Plat most one) = ___If at most one household is tuned to Pretty Betty, does it appear that the 23% share value is wrong? (Hint: Is the occurrence of at most one household tuned to Pretty Betty unusual?)O no, it is not wrong O yes, it is wrong hybridization and inbreeding are important methods used in selec-tive breeding. evaluate these methods to deter-mine how they are similar and different.