14, 19, 18, 12, 22, 15, 16, 16, 14, 14, 21, 20
![subject](/tpl/images/cats/informatica.png)
Computers and Technology, 26.02.2020 07:27 jadawada223
What is the mean of the data set?
14, 19, 18, 12, 22, 15, 16, 16, 14, 14, 21, 20
15.75
16.00
16.75
19.50
A town's yearly snowfall in inches over a 10-year period is recorded in this table.
What is the mean of the snowfall amounts?
15.0 in.
17.0 in.
17.9 in.
18.9 in
Year Snowfall in inches
1997 15
1998 11
1999 18
2000 25
2001 13
2002 20
2003 16
2004 28
2005 15
2006 18
Item 3
Kathleen made 29, 38, 45, 42, and 36 points on her assignments.
What is the mean number of points Kathleen made?
16
36
38
45
Item 4
What is the mean of the values in the stem-and-leaf plot?
Enter your answer in the box.
Key: 2|5 means 25
A stem-and-leaf plot with a stem value of 1 with a leaf value of 2, 3, 5, a stem value of 2 with a leaf value of 8 and 8, a stem value of 3 with a leaf value of 0, and a stem value of 4 with a leaf value of 2.
What is the mean of the values in the dot plot?
Enter your answer in the box.
A number line ranging from 40 to 50 with one dot over 40, two dots over 41, one dot over 45, two dots over 48, three dots over 49, and one dot over 50.
![ansver](/tpl/images/cats/User.png)
Answers: 1
![](/tpl/images/ask_question.png)
![](/tpl/images/ask_question_mob.png)
Another question on Computers and Technology
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 21.06.2019 15:10
Awould be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas is a combination of the likelihood that such a misconfiguration could happen, a hackerβs exploitation of it, and the impact if the event occurred.
Answers: 3
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 22.06.2019 03:50
You are working as a security analyst in a company xyz that owns the whole subnet range of 23.0.0.0/8 and 192.168.0.0/8. while monitoring the data, you find a high number of outbound connections. you see that ip's owned by xyz (internal) and private ip's are communicating to a single public ip. therefore, the internal ip's are sending data to the public ip. after further analysis, you find out that this public ip is a blacklisted ip, and the internal communicating devices are compromised. what kind of attack does the above scenario depict?
Answers: 3
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 22.06.2019 10:30
Dave has to create animations for a game. which tool can dave use?
Answers: 3
![question](/tpl/images/cats/informatica.png)
Computers and Technology, 22.06.2019 13:00
Which option should u select to ignore all tracked changes in a document
Answers: 1
You know the right answer?
What is the mean of the data set?
14, 19, 18, 12, 22, 15, 16, 16, 14, 14, 21, 20
14, 19, 18, 12, 22, 15, 16, 16, 14, 14, 21, 20
Questions
![question](/tpl/images/cats/istoriya.png)
![question](/tpl/images/cats/mat.png)
Mathematics, 11.02.2022 09:30
![question](/tpl/images/cats/ekonomika.png)
![question](/tpl/images/cats/mat.png)
Mathematics, 11.02.2022 09:30
![question](/tpl/images/cats/mat.png)
![question](/tpl/images/cats/mat.png)
![question](/tpl/images/cats/fizika.png)
![question](/tpl/images/cats/obshestvoznanie.png)
Social Studies, 11.02.2022 09:30
![question](/tpl/images/cats/User.png)
![question](/tpl/images/cats/ekonomika.png)
![question](/tpl/images/cats/istoriya.png)
History, 11.02.2022 09:30
![question](/tpl/images/cats/mat.png)
![question](/tpl/images/cats/obshestvoznanie.png)
![question](/tpl/images/cats/mat.png)
![question](/tpl/images/cats/en.png)
![question](/tpl/images/cats/himiya.png)
![question](/tpl/images/cats/biologiya.png)
Biology, 11.02.2022 09:40
![question](/tpl/images/cats/mat.png)
![question](/tpl/images/cats/mat.png)
Mathematics, 11.02.2022 09:40