How many hours per week do you spend on e-mail? data are presented here for a gss sample of 99 men and women, who each reported the number of hours they spent per week on e-mail.

Answers

Answer 1

The proportion of the sample that spent 3 hours or less per week on email is given as: 57.57%. See the computation below for explanation.

What is the calculation justifying the above result?

Given:

Total Number of People = 99

Number of people that spent 3 hours or less per week on e-mail

= 19+20+13+5 = 57

Thus, Required Proportion (Those who spent 3 hours or less per week on email)

57/99

= 0.5757

[tex]$\approx$[/tex] 57.57%

Learn more about sampling:
https://brainly.com/question/24466382

#SPJ1

Full Question:

How many hours per week do you spend on email? Data are represented here for a GSS sample of 99 men and women, who each reported the number of hours they spent per week on email E-mail Hours per Week Frequency 19 20 13 4 10 or more 23 What proportion of the sample spent 3 hours or less per week on e-mail?


Related Questions

Given an array of integers of size 5, how does the computer know where the 3rd indexed variable is located?

Answers

The computer knows where the 3rd indexed variable is by adding space for 3 integers to the base address of the array.

A data type can be defined as metadata that defines the type of data that can be placed inside a PHP variable; Metadata means that it is data about data (information about data such as structure and syntax).

A data type in simpler words can be defined as nothing but a classification of values that can be used in variables and a collection of methods and operators that can be applied to those values. PHP programming language supports approximately 7 different standard data types, these data types are:

IntegerFloat (or double)StringBooleanArrayObjectNull

You can learn more about data type here https://brainly.com/question/14581918

#SPJ4

A _________, such as apple.com and whitehouse.gov, uniquely identifies a site and a brand on the web.

Answers

A domain name such as apple.com and whitehouse.gov, uniquely identifies a site and a brand on the web.

What is Domain name?

This is known to be a kind of Application programming interface. The  domain name is said to be a series or a string of letters that tells more about a realm of administrative autonomy.

It  tells about authority as well as control that is found  within the Internet. Domain names are said to be used in a lot of networking contexts and therefore, A domain name such as apple.com and whitehouse.gov, uniquely identifies a site and a brand on the web.

Learn more about Domain name from

https://brainly.com/question/13153286
#SPJ1

Which type of social engineering attack attempts to discover personal information through the use of email?

Answers

Answer:

A phishing attack

Explanation:

Phishing is a form of social engineering. Phishing attacks use email or malicious websites to solicit personal information by posing as a trustworthy organization

How do clustered systems differ from multiprocessor systems? what is required for two machines belonging to a cluster to cooperate to provide a highly available service?

Answers

In order to complete a distributed computational task, clustered systems are often built by fusing several computers into a single system.

On the other hand, multiprocessor systems could be a single physical object made up of numerous CPUs.

A multiprocessor system is more strongly coupled than a clustered system. While the processors in a multiprocessor system might be able to interact using shared memory, clustered systems require messages.

The state on the two machines needs to be copied and regularly updated for two machines to deliver a highly available service. If one of the machines breaks down, the other might step in to take over.

Learn more on clustered systems here:

https://brainly.com/question/26150121

#SPJ4

An internet ________ is a collection of utility programs designed to maintain your security and privacy while you are on the web.

Answers

An internet security suites is a collection of utility programs designed to maintain your security and privacy while you are on the web.

What is Internet Security Suite?

As the name is called, an Internet Security Suite is known to be a kind of a protection services where all your security requirement are known to be in one package.

Note that they are called an all in one computer security packages that a person can have and it come with an anti-virus scanner, as well as an anti-spyware scanner, email protection, and others.

Therefore, An internet security suites is a collection of utility programs designed to maintain your security and privacy while you are on the web.

Learn more about internet security suites from

https://brainly.com/question/16341928
#SPJ1

object-oriented methods provide an easy transition to o-o programming languages such as c , java, and swift

Answers

Object-oriented methods provide an easy transition to o-o programming languages such as c , java, and swift is a true statement.

What are programming languages?

Programming languages can be defined as a mode of our electronic medium in which the strings of the graphical design as well as the visual elements are being included, it is basically a machine output with the person get.

After using these various languages the person is getting output after the languages use like C, C plus, Java, etc all views languages contribute to an object-oriented method.

Learn more about programming languages, here:

https://brainly.com/question/23959041

#SPJ1

Explain the impact of the continuing evolution of computer hardware and the accompanying evolution of operating systems software.

Answers

As computer hardware continues to evolve, so too does the software that runs on it. Operating systems are constantly being updated to take advantage of new hardware capabilities and to address security concerns. This continuing evolution has a major impact on the way we use computers.

For example, new hardware developments have led to the creation of new types of devices, such as touchscreen laptops and tablets.

Operating systems have been adapted to make use of these new devices, and the way we interact with computers has changed as a result. Similarly, the way we store and access data has also evolved, thanks to advances in storage devices and networking technology.

The ongoing evolution of computer hardware and software is thus having a major impact on the way we live and work. As new capabilities are introduced, we find new ways to use computers to improve our lives.

Learn more on computer hardware here:

https://brainly.com/question/24370161

#SPJ4

Other Questions
While calculating the drug dose of anti-viral medications for children who have aids a pediatric nurse uses what? Concerning psychology's goals, making observations is an example of _____ behavior. Determine whether each of the following functions is a solution of laplace's equation uxx uyy = 0. Lu is from korea and pedro is from ecuador. lu and pedro share what percentage of their genes? The rise of agriculture marked a shift away from Using your previous experiences to perceive something is ____, while relying only upon the immediate stimulus properties to perceive something is if a bird catches its prey from a height which was initially at rest then momentum is conserved for?BirdPreyBothNone The ______ of a business, agency, household, or another economics unit involves the acquisition and use of financial resources and the protection of equity capital from various sources of risk. Which solution is most acidic?A.pH=3B.pH=7C.pH=10D.pH=14 Which vertebrae type is characterized by a large size and wide, kidney-shaped body?. Three red cards are numbered 1, 2, and 3 and the other three green cards are also numbered 1, 2, and 3. All of them are in a box. Randomly pick 2 cards one by one with returning before the second pick. Find the probability that they have the same number or the same color. Identify examples of consumer protections implemented by the federal government. simplify each expression.3. 7^-2(-3)2 4. a^-3/b^-2 for a= 5 and b= 6 please answer this im bad at math Does 10x = 2.5x have one solution, no solutions, or infinite solutions? Insurance companies may initially cover the costs for collisions but the costs are then? How does Sir Gawains motivation advance the plot of the narrative? Which fact from Americas Place in the 21st Century World is MOST relevant in concluding that Americas enemy today is different? A. Terrorists lurk in unknown places. B. Americas success in Vietnam was mixed. C. President Monroe was president in the early 19th century. D. Many people do not want America to be the worlds police officer. who said electrons move around the nucleus billions of times in one second Please help solve The following transactions occur for Badger Biking Company during the month of June:a. Provide services to customers on account for $47,000.b. Purcilase bike equipment by signing a note with the bank for $39,000.c. Repay $32,000 of the note in (b) above.d. Pay utilities of $4.700 for the current month.Analyze each transaction and indicate the amount of increases and decreases in the accounting equation. (Decreases to accountclassifications should be entered as a negative.)Transaction()GAssets""11LiabilitiesStockholdersEquity