Mark

Mark

BA6933 Chapter-6

1.Whenever the probability is proportional to the length of the interval in which the random variable can assume a value, the random variable follows a(n) _____ distribution.A) uniform 2.There is a lower limit but no upper limit for a random…

BA6933 Chapter-5

1. A numerical description of the outcome of an experiment is called a _____.A) random variable 2. A random variable that can assume only a finite number of values is referred to as a(n) _____.A) discrete random variable 3. A…

BA6933 Week-2 Chapter-4

1.The probability of at least one head in two flips of a coin is: A) 0.75 2.Posterior probabilities are computed using _____. A) Bayes’ theorem 3.The complement of P(A | B) is _____. A) P(A^C | B) 4.The probability of…

BA6933 Week-3 Quiz

1. The interquartile range is the difference between the _____.A) first and third quartiles 2. The variance is equal to the _____.A) standard deviation 3. Generally, which of the following is the least appropriate measure of central tendency for a…

IS5803 WEEK 2 Solutions

1._____ can help a systems analyst understand how the current system is supposed to work. A. Document review 2._____ is a planned meeting during which a systems analyst obtains information from another person. A. An interview 3. System developers can…

BA6933 Week-2 Quiz

1.The minimum number of variables represented in a bar chart is _____.A) 1 2.The minimum number of variables represented in a histogram is _____.A) 2 3. Which of the following graphical methods is most appropriate for categorical data?A) pie chart…

BA6933 Week-1 Quiz

1.Which of the following is an example of quantitative data: the number of people in a waiting line 2.Which of the following is an example of categorical data? social security number 3.The number of observations in a complete data set…

Module 5 Quiz

1.Which term refers to a set of wireless technologies that enables smartphones and other devices to establish radio communication over a short proximity?Near field communication (NFC) 2.An advantage of Wired Equivalent Privacy (WEP) is that it can be trusted alone…

Module 4 Quiz

1.Which of the following is NOT a class of client/server processing?network-based processing 2.An advantage of an intranet-based approach to corporate computing is:all of the above 3.A computer that houses information for manipulation by networked clients is a __________.server 4.Advantages of…

Module 3 Quiz

1.Which type of certificate authority is maintained and controlled by the company that implemented it?In-house certification authority (CA) 2.A digital certificate binds an individual’s identity to a public key.True 3.A public key infrastructure __________.provides all of the components needed for…