(a) A virtual hard disk in a virtual machine is a file that simulates the physical hard disk. (i) Discuss the impact of the contiguous block allocation to the virtual machine performance in terms of seeking time during the start-up of a virtual machine. (6 marks) (ii) Discuss the impact of the individual block allocation to the virtual machine performance in terms of data storing time and secking time while user is downloading huge amount of data in the virtual machine. (6 marks) (b) A disk is divided into tracks, and tracks are divided into blocks. Discuss the effect of block size on (i) waste per track. (4 marks) (ii) seeking time. (4 marks) [lotal : 20 marks]

Answers

Answer 1

A virtual hard disk in a virtual machine is a file that simulates the physical hard disk. The performance of a virtual machine is impacted by the allocation of contiguous blocks and individual blocks.

Contiguous block allocation refers to storing data in sequential blocks on the virtual hard disk. During the start-up of a virtual machine, contiguous block allocation can improve performance by reducing seeking time. Since the blocks are stored in a continuous manner, the virtual machine can access them quickly without the need for excessive disk head movement. This results in faster start-up times for the virtual machine.

Individual block allocation, on the other hand, involves storing data in non-sequential blocks on the virtual hard disk. When a user downloads a large amount of data in the virtual machine, individual block allocation can affect performance in two ways. Firstly, storing data in individual blocks can increase data storing time because the virtual machine needs to locate and allocate multiple non-contiguous blocks for the downloaded data. Secondly, it can also increase seeking time during data retrieval, as the virtual machine needs to perform additional disk head movements to access the non-sequential blocks.

In summary, contiguous block allocation improves seeking time during virtual machine start-up, while individual block allocation can impact data storing time and seeking time when downloading large amounts of data in the virtual machine.

Learn more about virtual hard disk

brainly.com/question/32540982

#SPJ11


Related Questions

What is the basic purpose of the osi physical layer?.

Answers

The basic purpose of the osi physical layer: To coordinates rules for transmitting bits.

Osi physical layer

OSI Physical layer is important as it help to coordinates the  rules for transmitting bits and it is responsible for transmitting bits from one device to another or from one computer to another.

In order for the transmission to successful take place in OSI Physical layer the bits must be encoded into signals in which the bits are then transmitted across a communication channel.

Inconclusion the basic purpose of the osi physical layer: To coordinates rules for transmitting bits.

Learn more about Osi physical layer here:https://brainly.com/question/24793290

A check you issued last week has been stolen. You can prevent the amount on the check from being withdrawn from your account by an unauthorized person by:

Answers

I understand that you want to prevent the amount on a stolen check from being withdrawn from your account by an unauthorized person.

How to prevent it?

1. Contact your bank immediately to report the stolen check.
2. Request a "stop payment" on the check, which will prevent the check from being cashed or the amount being withdrawn from your account.
3. Monitor your account closely to ensure no unauthorized transactions occur.

By following these steps, you can protect your account and prevent the stolen check from being used to withdraw funds without your permission.

To know more about account visit:

https://brainly.com/question/22917325

#SPJ11

NEED THIS ASAP!!) What makes open source software different from closed source software? A It is made specifically for the Linux operating system. B It allows users to view the underlying code. C It is always developed by teams of professional programmers. D It is programmed directly in 1s and 0s instead of using a programming language.

Answers

Answer: B

Explanation: Open Source software is "open" by nature, meaning collaborative. Developers share code, knowledge, and related insight in order to for others to use it and innovate together over time. It is differentiated from commercial software, which is not "open" or generally free to use.

Select the correct answer. Tom is working with a layer on a graphic design project, and he wants to add a mask for the entire layer. What should he first ensure? A. that no part of the image is changed, by using a Lock switch B. that some part of the image is revealed, by choosing Select C. that no part of the image is selected, by choosing Deselect D. that some part of the image is darkened, by using the Burn tool E. that some part of the image is made lighter, by using the Dodge tool

Answers

A. By using a Lock switch, you can ensure that no part of the image is altered. Before adding a mask to the entire layer, Tom should make sure that no part of the image is unintentionally changed.

What is Mask layering?

Mask layering, or layer masking, is a technique used in graphic design and image editing that allows the user to selectively hide or reveal parts of a layer. A mask is essentially a grayscale image that is associated with a layer, and it controls the opacity of the layer in a non-destructive way.

When a mask is applied to a layer, areas of the layer that are white in the mask are fully visible, while areas that are black are fully hidden. Areas that are shades of gray are partially visible, with darker shades of gray corresponding to more hidden areas, and lighter shades of gray corresponding to more visible areas.

Layer masking is a powerful tool that allows designers and artists to create complex compositions and manipulate images in a non-destructive way, without permanently altering the original image data. It is commonly used in tasks such as removing backgrounds, blending images together, and creating complex text effects.

To learn more about Mask layering, visit: https://brainly.com/question/30437287

#SPJ1

g o o g l e h a n g o u t ??

Answers

G Hangouts is a cross platform messaging app developed by G. Originally a feature of G Plus, G Hangouts became a stand-alone product in 2013.

A document intended for World Wide Web distribution is commonly referred to as
A. optical
B. magnetic
C. volume
D. pages

Answers

correct option is D. Web page. A document or resource on a Web site, transported over the Internet, created using the established standards, and made viewable to a user through a program called a browser.

A document intended for World Wide Web distribution is commonly referred to as a page. Thus, the correct option for this question is D.

What is a document on a world wide web called?

A web page (also written as a webpage) is a document that is suitable for the World Wide Web and web browsers. It is a type of document which can be displayed in a web browser such as Firefox, Chrome, Opera, Microsoft Internet Explorer or Edge, or Apple's Safari.

According to the context of this question, a web browser takes you anywhere on the internet. It significantly retrieves information from other parts of the web and displays it on your desktop or mobile device. The information is transferred using the Hypertext Transfer Protocol, which defines how text, images, and video are transmitted on the web.

Therefore, a document intended for World Wide Web distribution is commonly referred to as a page. Thus, the correct option for this question is D.

To learn more about Web pages, refer to the link;

https://brainly.com/question/28431103

#SPJ2

Translate the following ASCII codes into strings of characters by interpreting each group of eight bits as an ASCII character.
a. x48656c6c6f21
b. x68454c4c4f21
c. x436f6d70757465727321
d. x4c432d32

Answers

The Translations are,

(a) Hello!(b) hELLO!(c) Computers!(d) LC-2

What is ASCII codes?There are 128 characters in the 7-bit character system known as ASCII. It includes the letters and numerals from 0 to 9, as well as certain special characters and the upper and lower case English letters from A to Z. ASCII is the foundation for all character sets used in HTML, on the Internet, and in contemporary computers. American Standard Code for Information Interchange, also known as ASCII, is a character encoding standard for electronic communication. Text is represented by ASCII codes in computers, telecommunications systems, and other hardware. The lowercase alphabet has an ASCII value between 97 and 122. Additionally, the capital alphabet has an ASCII value between 65 and 90.

The Translations are,

(a) Hello!(b) hELLO!(c) Computers!(d) LC-2

To learn more about ASCII codes refer to:

https://brainly.com/question/28480297

#SPJ4

How do i change my username on brainly? ​

Answers

Brainly does not allow users to change their usernames. If you would like to change your username, you will need to create a new account with a new username.

What is Brainly ?

Brainly is an educational technology company that provides a peer-to-peer learning platform. It is a social learning network where users can ask and answer questions related to academic topics. Brainly enables students to collaborate and learn from each other in a safe and engaging environment. The platform is designed to help students learn from each other and get academic help from their peers, who are usually from different countries and speak different languages.

Brainly also offers an online tutoring service, in which students can get personalized help from qualified tutors. The platform also has a gamified learning system that encourages users to learn more and earn rewards for doing so. Brainly is available for free on the web, iOS, and Android.

To learn more about Brainly

https://brainly.com/question/28498043

#SPJ1

The Java library’s ........ interface defines functionality related to determining whether one object is greater than, less than, or equal to another object.
Any class that implements the Comparable interface must provide a ........ method
What does it mean for a class’s equals and compareTo methods to be "consistent"?
The size of a list is a fixed value, i.e., it does not change over time.
An ....... mechanism allows us to move through the elements of a data structure one at a time in a given sequence
The binary search algorithm can be implemented recursively. true or false
The binary search algorithm is O(log 2N), where N is the size of the list. true or false

Answers

The Java library’s Comparable interface defines functionality related to determining whether one object is greater than, less than, or equal to another object.

What is the role of a java library?

Any class that implements the Comparable interface must provide a compareTo method.

For a class's equals and compareTo methods to be "consistent", they must return the same results when comparing objects. That is, if two objects are considered equal according to the equals method, they must also be considered equal according to the compareTo method.

The size of a list is not necessarily a fixed value, as it can change over time with the addition or removal of elements.

An iterator mechanism allows us to move through the elements of a data structure one at a time in a given sequence.

The binary search algorithm can be implemented recursively. (True)

The binary search algorithm is O(log 2N), where N is the size of the list. (True)

Find out more on Java library here: https://brainly.com/question/25653505

#SPJ1

Cloud-based services can open doors to leveraging Artificial Intelligence (AI) without dramatically increasing risk. Which client is best suited for these kind of opportunities?

Answers

Cloud-based services offer an opportunity for businesses to leverage artificial intelligence (AI) without significantly increasing the risks involved. The technology can be of benefit to a variety of clients, but some industries are better suited for it than others.

In general, cloud-based services are an ideal solution for businesses that require high-speed data processing and management without incurring a significant increase in costs. This includes businesses that have high volumes of data to process and manage, as well as those that require access to advanced data analysis tools. Industries that can benefit from AI and cloud-based services include retail, healthcare, finance, manufacturing, and transportation.

In retail, AI and cloud-based services can be used to analyze customer behavior and provide personalized recommendations, while in healthcare, AI can be used to diagnose diseases and provide personalized treatment plans. In finance, AI can be used to detect fraud and make financial predictions, while in manufacturing, it can be used to optimize production and minimize waste. In transportation, AI can be used to improve logistics and route planning.

To know more about artificial visit:

https://brainly.com/question/28948682

#SPJ11

How is text formatted

A. Underlined text

B. Highlighted text

C. Bold text

D. Italicized text

Answers

bold text is a answer

what is the ipv6 prefix of the address 2001:00cb:1562:0dc3:5400:0001:24a0:0014 if the prefix length is /56

Answers

2001:00cb:1562:0d:

Moreover, An IPv6 address prefix is ​​a combination of an IPv6 prefix address and prefix length used to represent a block of address space (or network), similar to using a combination of IPv4 subnet address and netmask to specify a subnet. An IPv6 address prefix has the form ipv6-prefix/prefix-length.

You can learn more about this at:

https://brainly.com/question/29312398#SPJ4

What is Communication​

Answers

Computer communications describes a process in which two or more computers or devices transfer data, instructions, and information. ... A sending device that initiates an instruction to transmit data, instructions, or information. A communications device that connects the sending device to a communications channel.

List preconditions and postconditions, base case, inductive hypothesis, need to show, proof.
Algorithm for computing the k-th power of 2
Algorithm 2 Power_of_2(natural number k)
Input: k , a natural number
Output: k-th power of 2
Algorithm:
if k = 0, then return 1;
else return 2*Power_of_2(k - 1) .

Answers

Preconditions: The input 'k' must be a natural number.

Postconditions: The algorithm returns the k-th power of 2.


The algorithm for computing the k-th power of 2 takes a natural number 'k' as input and returns the k-th power of 2 as output.

The preconditions of the algorithm specify that the input 'k' must be a natural number, which means it should be a positive integer greater than or equal to 1. This condition ensures that the algorithm operates on valid input values.

The base case of the algorithm is defined as k = 0, where the algorithm returns 1. This is because any number raised to the power of 0 is equal to 1, and in this case, we are calculating the 0-th power of 2.

The inductive hypothesis of the algorithm is that for a given value of k, if we can compute the (k-1)-th power of 2, then we can compute the k-th power of 2 by multiplying the (k-1)-th power of 2 by 2. This recursive approach allows us to calculate the k-th power of 2 by repeatedly reducing the value of k until we reach the base case.

To prove the correctness of the algorithm, we need to show that it terminates and produces the desired result. The termination is ensured by the decrement of k in each recursive call until it reaches the base case of k = 0. The correctness is proven by the inductive step, where we assume the algorithm works correctly for (k-1) and show that it also works for k. This recursive reasoning guarantees that the algorithm correctly calculates the k-th power of 2 for any valid input value of k.

Learn more about algorithms.
brainly.com/question/21172316

#SPJ11

even though entropy change is evaluated based on an internally reversible process, the entropy change between two states of a system can be determined for any process linking the two states whether reversible or of answer choicestruefalse

Answers

No, the entropy change can only be accurately determined for an internally reversible process, not for any process linking the two states.

Can the entropy change between two states of a system be determined for any process linking the two states?

The statement is false. The entropy change between two states of a system can only be accurately determined for an internally reversible process, not for any process linking the two states.

Entropy is a state function, meaning it depends only on the initial and final states of a system and is independent of the path taken between them for reversible processes.

For irreversible processes, the entropy change depends on the specific details of the process and cannot be easily determined.

Therefore, while entropy change is evaluated based on an internally reversible process, it cannot be determined for any process, reversible or irreversible, linking the two states.

Learn more about entropy change

brainly.com/question/31428398

#SPJ11

what are trends in GPS ? ​

Answers

Answer:

New Trends in GPS & Telematics in 2021 and Beyond - Rewire Security. Real-time location tracking systems for cars, vans, motorcycles, lorries, wired or plug & play options—battery-powered GPS tracking systems with magnets attached to flat metal surfaces such as containers.

Explanation:

a college requires that all employees use the last four digits of their us social security number that is unique to all citizens to access a college copier. which type of security threat is this?

Answers

This type of security measure poses a risk of identity theft, which is a form of information security threat.

The use of the last four digits of a person's US Social Security Number (SSN) as a form of identification is not a secure practice because this information can be easily obtained by others through various means. Once someone has access to a person's SSN, they can potentially use it to commit fraud, open unauthorized accounts, or steal the person's identity. Therefore, this practice should be avoided or supplemented with additional authentication methods to reduce the risk of identity theft.

You can learn more about identity theft at

https://brainly.com/question/28081665

#SPJ11

After a programmer plans the logic of a program, the next step is to __________

Answers

Following the planning of a program's logic by a programmer, the program is coded. Programming enables users to create computer code, apps, and websites. Programming is defined as the process of writing instructions for computers using computer languages.

Computer code is used to code the websites, apps, and other technologies with which we interact daily.Many of the finest tech jobs necessitate the ability to code.

Therefore, the final answer is "Coding the Program ".

Learn more:

brainly.com/question/735555

use of concave mirrors​

Answers

Explanation:

concave lens use for shaving mirrors and satellite

studocu implementation of a static environment (grid) using an array or other data structure that will represent the above grid. a function/method to determine what action to take. the decision should be based upon markov decision process. consideration of reward policy that incorporates the action costs in addition to any prizes or penalties that may be awarded. a function/method to calculate the optimal policy when a blocked state is encountered. a function/method to calculate the optimal policy when the fire state is encountered. a function/method to test if the desired goal is achieved or not.

Answers

The function will return true if the agent has successfully reached the fire state and false otherwise. The success of the agent's current policy will be tested by running multiple simulation trials.

Implementation of a static environment using an array or other data structure that will represent the grid: It's easy to use a two-dimensional integer array to represent the grid of cells. Consider using 0 to represent empty cells, 1 to represent cells containing obstacles, and 2 to represent cells containing fire. Consider the use of the following code to instantiate and populate the grid array in a new function named initialize_ environment(): int[][] grid = new int[5][5];grid[0] = new int[] {0, 1, 0, 0, 0};grid[1] = new int[] {0, 1, 1, 0, 0};grid[2] = new int[] {0, 0, 0, 0, 2};grid[3] = new int[] {0, 1, 1, 1, 1};grid[4] = new int[] {0, 0, 0, 0, 0};This creates a 5 by 5 grid with obstacles in the 2nd row and two obstacles in the 3rd column, with the goal represented by the fire at location (2,4). A function/method to determine what action to take:You can use the Markov Decision Process to determine what action to take based on the current state of the grid. The Q-learning algorithm is commonly used to make decisions based on Markov Decision Process. The function named get_next_action() should utilize the Q-learning algorithm to make the appropriate decision based on the state of the grid. A function/method to calculate the optimal policy when a blocked state is encountered:When the agent encounters a blocked state, the agent must be able to learn from its experience and adapt its decision-making process to avoid making the same error again. The optimal policy will be recalculated, taking into account the obstacles encountered during the previous attempt, using a function named update_policy_when_blocked(). A function/method to calculate the optimal policy when the fire state is encountered:When the agent encounters a fire state, the agent must be able to learn from its experience and adjust its decision-making process accordingly to avoid further risk of harm to the agent. The optimal policy will be recalculated, taking into account the obstacles encountered during the previous attempt, using a function named update_policy_when_fire(). A function/method to test if the desired goal is achieved or not:To test if the agent has accomplished its goal, use a function named test_goal().

Learn more about static

brainly.com/question/26609519

#SPJ11

When using the red / yellow I green method to present status of a project, green can mean which of the following?
O ready to start
O complete
Oon track
O all of these

Answers

Answer:

D. All of these

Explanation:

I hope this helps you! Have a great day!

bren~

Group of programs are software

Answers

Answer:

yes it is

true

Explanation:

group of programs are software

If your e-mail program has a spell checker, you don't have to proofread your e-mail messages. Spell checker does it for you and is better at it than humans.


True

False

Answers

Answer:

False you would still have to proof read to make sure you don't sound dum⁶ saying what ever your trying to say and spell check doesn't always correct things

Which of these functions in excel is best suited for extracing a substring from within a long text message? a) LOWER b) TRIM c) MID d) LEN e) CONCAT

Answers

The MID function extracts a predetermined number of characters, starting at a predetermined point, from a text stream. The text string, the beginning location, and the amount of characters to return are substring

A contiguous group of characters contained within a longer string is referred to as a substring in computer programming and text processing. It is simply an isolated or extracted section of the original string that meets certain requirements, such as a starting location and the amount of characters to be present in the substring. Applications like data processing, text analysis, and information retrieval frequently use substring operations. The MID function in Excel is frequently used to extract substrings from larger text sequences. Some programming languages, such as Python's string slicing notation or Java's substring method, also include built-in procedures or methods for manipulating

Learn more about substring here:

https://brainly.com/question/28447336

#SPJ4

which item is developed last in the cyclical design process

Answers

The item that is developed last in the cyclical design process is known to be Prototype.

What is the last step in the design process?

Designers which can be known to be evaluators are said to test the complete product using the best solutions known to be in the Prototype stage.

Note that The item that is developed last in the cyclical design process is known to be Prototype.

Learn more about  design process from

https://brainly.com/question/10039920

#SPJ1

complete the c program below to generate the following process tree: uid pid ppid c stime tty time cmd 501 51948 51942 0 12:40pm ttys002 0:00.00 main 501 51949 51948 0 12:40pm ttys002 0:00.00 main 501 51950 51948 0 12:40pm ttys002 0:00.00 main 501 51951 51948 0 12:40pm ttys002 0:00.00 main 501 51952 51948 0 12:40pm ttys002 0:00.00 main 501 51953 51950 0 12:40pm ttys002 0:00.00 main 501 51954 51951 0 12:40pm ttys002 0:00.00 main 501 51955 51950 0 12:40pm ttys002 0:00.00 main 501 51956 51952 0 12:40pm ttys002 0:00.00 main 501 51957 51951 0 12:40pm ttys002 0:00.00 main 501 51958 51952 0 12:40pm ttys002 0:00.00 main 501 51959 51952 0 12:40pm ttys002 0:00.00 main 501 51960 51951 0 12:40pm ttys002 0:00.00 main 501 51961 51952 0 12:40pm ttys002 0:00.00 main 501 51962 51951 0 12:40pm ttys002 0:00.00 main 501 51963 51952 0 12:40pm ttys002 0:00.00 main 501 51964 51952 0 12:40pm ttys002 0:00.00 main notes: main is the name of the process. the pid of the parent process is 51948. use wait and exit when needed to guarantee the following output: i am the parent process i am the child process 0 i am the child process 1 i am a grandchild process from child process 1 i am a grandchild process from child process 1 i am the child process 2 i am a grandchild process from child process 2 i am a grandchild process from child process 2 i am a grandchild process from child process 2 i am a grandchild process from child process 2 i am the child process 3 i am a grandchild process from child process 3 i am a grandchild process from child process 3 i am a grandchild process from child process 3 i am a grandchild process from child process 3 i am a grandchild process from child process 3 i am a grandchild process from child process 3

Answers

This program first creates 4 child processes using a for loop and the `fork()` function. Inside each child process, it creates 3 grandchild processes using another for loop and `fork()`. The `printf()` function is used to display the desired output for each process.

The `wait()` function is used to wait for the child and grandchild processes to finish before continuing. The `exit()` function is used to terminate the child and grandchild processes.

The C program to generate the desired process tree is as follows:

```
#include
#include
#include
#include

int main(void)
{
   int i;
   pid_t pid;

   // Create 4 child processes
   for (i = 0; i < 4; i++)
   {
       pid = fork();

       if (pid == 0)
       {
           // Child process
           printf("I am the child process %d\n", i);

           // Create 3 grandchild processes
           for (int j = 0; j < 3; j++)
           {
               pid = fork();

               if (pid == 0)
               {
                   // Grandchild process
                   printf("I am a grandchild process from child process %d\n", i);
                   exit(0);
               }
               else if (pid > 0)
               {
                   // Parent process
                   wait(NULL);
               }
           }

           exit(0);
       }
       else if (pid > 0)
       {
           // Parent process

           wait(NULL);
       }
   }

   printf("I am the parent process\n");

   return 0;
}
```

Learn more about programming:

https://brainly.com/question/29330362

#SPJ11

Which best describes what technology does?
a. Improves results
b. Eliminates jobs
c.Reorganizes information
d. Creates smaller, faster devices

Answers

The best answer is a) Improves results.

Technology can help to improve results in many different ways, such as by providing new methods of communication, automation of processes, and more efficient storage and access of data. Technology is the application of scientific knowledge for practical purposes, especially in industry. It is used to create new products, processes, and services that make our lives easier and more efficient. Technology has the ability to improve results in many different areas, including communication, transportation, healthcare, and education.

Technology can also be used to create smaller and faster devices, reorganize information, and eliminate some manual tasks. However, its primary purpose is to improve results.

Learn more about technology at https://brainly.com/question/7788080

#SPJ11

security is a major concern with m-commerce. how can m-commerce software ensure the security of transmissions and that the transaction is being made with the intended party over a public network?

Answers

To ensure the security of transmissions and that transactions are being made with the intended party over a public network, m-commerce software can use several security measures. One of the most common measures is to use encryption to protect data while it's being transmitted. Another important security measure is to use authentication and access controls to ensure that only authorized parties have access to sensitive information.

In addition, m-commerce software can use secure protocols such as HTTPS and SSL/TLS to protect against eavesdropping and tampering. Two-factor authentication can also be used to add an extra layer of security, where a user must provide two different authentication factors, such as a password and a fingerprint. Overall, the use of these security measures can help ensure that m-commerce transactions are safe and secure.

You can learn more about encryption at

https://brainly.com/question/28283722

#SPJ11

The analysis tools associated with the ________ subsystem include query-by-example and structured query languages (SQL). data manipulation application generation data administration attribute analysis

Answers

Answer:

it is the mouse or software

a hard disk is a _ storage device

Answers

electro-mechanical data storage device

Electro-mechanical data storage device
Other Questions
Use the K_spa expressions for CuS and ZnS to calculate the pH where you might be able to precipitate as much Cu2+ as possible while leaving the Zn2+ in solution, and find what concentration of copper would be left. Assume the initial concentration of both ions is 0.075M. PLZ HELP ILL GIVE THE BRAINLIEST TO U Why does Jefferson italicize the word Christian at the end of the first paragraph? An author makes a comparison between the story's protagonist and a famous historical figure. Which figure of speech did they use? Allusion Context clue Onomatopoeia Personification 2. 3. 4. 5. 6. 7. A(n)results when a vehicle loses part or all of its grip on the road. is a technique that can be applied when trying to move your vehicle out of deep snow. The action of a vehicle's rear end sliding out to a side is called a(n) is a technique of reducing your speed as quickly as possible while maintaining control of your vehicle. Driving at a speed where the stopping distance of your vehicle is longer than the distance you can see with your headlights is called occurs when a tire loses road surface contact and rises on top of water. It is a(n)when your front tires begin 1 18 1 1 to plow and your vehicle is not responding, or not responding as quickly as it should, to a steering input. The following data set shows the times a product failed in a series of tests. What is the range of this data set? {16, 12, 19, 15, 12, 15, 14, 18, 11, 10, 19, 10}A 9B 10C 15D 19 I NEED HELPwhat is hard news? what is an example of a story that might be hard news The Survey of Study Habits and Attitudes (SSHA) is a psychological test that measures the motivation, attitude, and study habits of college students. Scores range from 0 to 200 and follow (approximately) a normal distribution with mean 115 and standard deviation =25. You suspect that incoming freshman have a mean which is different from 115 because they are often excited yet anxious about entering college. To test your suspicion, you test the hypotheses H0:=115, Ha:115. You give the SSHA to 25 students who are incoming freshman and find their mean score. Based on this, you reject H0 at significance level =0.01. Which of the following would be most helpful in assessing the practical significance of your results?A. Take another sample and retest just to make sure the results are not due to chance.B. Report the P-value of your test.C. Construct a 99% confidence interval for in order to see the magnitude of the difference between 115 and your sample results.D. Test the hypotheses again, this time using significance level =0.001.(b) In testing hypotheses, if the consequences of rejecting the null hypothesis are very serious, we shouldA. insist that the level of significance be smaller than the P-value.B. use a very small level of significance.C. insist that the P-value be smaller than the level of significance.D. use a very large level of significance.(c) A medical researcher is working on a new treatment for a certain type of cancer. The average survival time after diagnosis on the standard treatment is two years. In an early trial, she tries the new treatment on three subjects who have an average survival time after diagnosis of four years. Although the survival time has doubled, the results are not statistically significant even at the 0.10 significance level. The explanation isA. the calculation was in error. The researchers forgot to include the sample size.B. the sample size is small.C. the placebo effect is present, which limits statistical significance.D. that although the survival time has doubled, in reality the actual increase is really two years. Mr. Swift is the volunteer coordinator for a company that puts on running races. Last year, thecompany organized 6 short races and 7 long races, which required a total of 682 volunteers.This year, the company organized 8 short races and 9 long races, which required 888volunteers in total. How many volunteers does each type of race require? 100x40+79-40+1/4=? do you know the answer The earth's diameter is approximately 12,756 km. what is the approximate radius? Which of the following was not one of Confucianisms rules for becoming a moral person?A.Follow your societys social norms.B.Be loyal to your nature.C.Ignore laws made by your rulers.D.Respect your parents. What did each state have to give up in order to accept the Articles Of Confederation?1. land2. all power3. money for taxes4. some power there are 50 solidiers in a military camp. food provision for them is for 12 days, how long will their provision last if 10 more soldiers to win the camp (direct and inverse proportion) What is not an example of a contract? question 17 options: a rental lease a report card a credit card agreement a cell phone plan For a n-JFET CS amplifier circuit with the following values: VDD 18V, RL -20 ks2, R = 60 ks2, R = 80 k2, Rp 12k2, Rss = 1 k2, Rs = 10052 (source internal resistance). Assume Ipss=20mA and V - 4.0 V. Assume Rss is fully bypassed. Given the equation for A, as following: a. Find the operating points Ip, Vos and VDs b. Find the ac voltage gain A,: [ The equation is: [A] = gm Ra (RD|R)/(Rs+RG)] c. The input Resistance Ri d. Draw the ac equivalent circuit using a JFET ac model Explain how you will apply the 45 - 45 - 90 to a right triangle with a leg that's measured 12? rbitrageurs (people who engage in arbitrage) decide to practice their craft in the market for corn. Which of the following will happen? Corn will become less expensive during the harvest season than in previous harvest seasons. Corn will become less expensive during the offseason than in previous offseasons. Seasonal price fluctuations of corn will increase. The offseason price of corn will be consistently less than the harvest season price. As the Earth rotates, the Sun appears to move across the sky. What is the effect of the Suns path on the length of the day? how did the boundary created by the proclamation of 1763 affect the colonists?