3. In the observed responses 30% of the texts have reportedly used the emoji. What would be the actual number if the procedure outlined in the previous paragraph was used, where in 75% of the cases the true answer is provided? 4. What is the risk if the actual answer is recorded in 99% instead of 75% of the cases?
I just need help with question 3 & 4


Operating System:
An operating system is the most important type of system software in any computer system, which is responsible for running application software and acts as an interface between the user and the hardware. It manages the input/output operations of the hardware, configures and maintains peripheral devices such as printers and scanners, and provides an environment for running applications. It also provides services such as memory management, multitasking, scheduling, networking, security, and data management. Operating systems also provide a user interface, which allows users to interact with the system and access their programs, files, and other resources.
Trending now
This is a popular solution!
Step by step
Solved in 3 steps









