answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga_2 [115]
2 years ago
12

Captain Emily has a ship, the H.M.S Crimson Lynx. The ship is five furlongs from the dread pirate Umaima and her merciless band

of thieves.
If her ship hasn't already been hit, Captain Emily has probability

3/5 of hitting the pirate ship. If her ship has been hit, Captain Emily will always miss.

If her ship hasn't already been hit, dread pirate Umaima has probability

​​ 1/7 of hitting the Captain's ship. If her ship has been hit, dread pirate Umaima will always miss.

If the Captain and the pirate each shoot once, and the pirate shoots first, what is the probability that the pirate misses the Captain's ship, but the Captain hits?
Computers and Technology
1 answer:
Paladinen [302]2 years ago
4 0
 The probability of the pirate missing the Captain's ship is 6/7 and the probability of the Captain hitting the pirate ship given the pirate missing the Captain's ship is 3/5.
So the probability that <span>the pirate misses the Captain's ship, but the Captain hits is then the probability of the pirate missing the Captain's ship times the probability of the Captain hitting the pirate ship given the pirate missing the Captain's ship.
</span>
ANSWER: 6/7 times 3/5 = 18/35 
You might be interested in
Lukas entered the date 9-17-2013 in an Excel workbook. He wants the date to appears as “Tuesday, September 17, 2013.” Instead of
Sphinxa [80]
<span>The answer is highlight cells, select the Insert tab, click on the number, select Date from the category box, highlight the correct format, and click OK.</span>
8 0
2 years ago
Consider the following class definitions.
Serggg [28]

Answer:

The correct answer is option A

Explanation:

Solution

Recall that:

From the question stated,the following segments of code that should be used in replacing the /* missing code */ so that the value 20 will be printed is given below:

Android a = new Android(x);

a.setServoCount(y);

System.out.println(a.getServoCount());

The right option to be used here is A.

4 0
2 years ago
You resurrected an old worksheet. It appears to contain most of the information that you need, but not all of it. Which step sho
vagabundo [1.1K]

Answer:

The answer is "check the worksheet is not read only"

Explanation:

The read only mode is used for read the file data, and it doesn't allows the user to update the file, and for updating the worksheet we should check iut does not open in the read-only mode.

If it is open, then we close it and for close we goto the office button and click on the tools option after that goto general setting, in this there is a check box for turn off the read-only mode.

 

8 0
2 years ago
_____ is a method of delivering software, in which a vendor hosts the applications, and customers access these applications over
marysya [2.9K]

Answer:

Option A: Software-as-a-service

Explanation:

Software-as-a-service (SAAS) is one of the cloud computing business models. The software is not delivered as a product hosted in the client machine. Instead, a customer just pays a subscription fee (sometimes free for limited quota) to gain access to the software which is hosted in a remote server maintainer by software vendor.

One benefit of SAAS is that the software vendor will usually responsible for software maintenance and update. The customer has no longer require to pay extra cost to upgrade the software. So long as the subscription is still valid, a customer can always access to the newest features of software.    

Some examples of SAAS which is popular include DropBox, Google App, DocuSign, Microsoft Office 365 etc.

3 0
2 years ago
Problem 1a. Write a function named hasFinalLetter that takes two parameters 1. strList, a list of non-empty strings 2. letters,
mash [69]

Answer:

The answer is the programming in Python language has strings and characters that has to be declared in the method.

Explanation:

#method

def hasFinalLetter(strList,letters):

output = #output list

#for every string in the strList

for string in strList:

#findout the length of each string in strList

length = len(string)

#endLetter is last letter in each string

endLetter = string[length-1]

#for each letter in the letters list

for letter in letters:

#compare with endLetter

#if we found any such string

#add it to output list

if(letter == endLetter):

output.append(string)

#return the output list

return output

#TestCase 1 that will lead to return empty list

strList1 = ["user","expert","login","compile","Execute","stock"]

letters1 = ["a","b","y"]

print hasFinalLetter(strList1,letters1)

#TestCse2

strList2 = ["user","expert","login","compile","Execute","stock"]

letters2 = ["g","t","y"]

print hasFinalLetter(strList2,letters2)

#TestCase3

strList3 = ["user","expert","login","compile","Execute","stock"]

letters3 = ["k","e","n","t"]

print hasFinalLetter(strList3,letters3)

8 0
2 years ago
Other questions:
  • Where is the Name Manager dialog box found?
    13·1 answer
  • Carefully choosing from a set of alternatives to accomplish an objective is known as? A. Independence B. Decision making C. Netw
    9·2 answers
  • Write a sequence of statements that create a file named "greeting" and write a single line consisting of "Hello, World!" to that
    5·1 answer
  • Assume the availability of a function is_prime. Assume a variable n has been associated with positive integer. Write the stateme
    15·1 answer
  • The vast amount of data collected from Internet searches, social media posts, customer transactions, military
    8·1 answer
  • Distinguish among packet filtering firewalls, stateful inspection firewalls, and proxy firewalls. A thorough answer will require
    9·1 answer
  • A credit card company receives numerous phone calls throughout the day from customers reporting fraud and billing disputes. Most
    10·1 answer
  • To create a public key signature, you would use the ______ key.
    5·1 answer
  • 4.2 Code Practice: Question 2
    12·2 answers
  • Question 1:State the values of a, b, c, d and e after the following operations are carried out:
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!