Dick cheney approach, Computer Engineering

Assignment Help:

How many "true" terrorists are there in the US?  I don't know, but let's suppose that there are 3000 out of a total population of, say, 3,000,000.  That is, one person in 100,000 is the real deal and very scary.  Now consider the Dick Cheney approach to searching for them (also very scary):  pervasive telephone wire-tapping linked to advanced voice analysis software. The software can detect terrorists within the utterance of three words, after which it automatically calls the FBI.  Assume that the system is 99% accurate.  That is, if a true terrorist is on the line, the software will notify the FBI 99% of the time; whereas, for non-terrorists, it will call the FBI (in error) only 1% of the time.  Presumably no software today is so accurate, but who knows with what NSA is fiddling.  When the FBI gets a report from the system, what is the probability that it has found a true terrorist (round off to nearest answer as needed)?

1.                  0.99

2.                  0.98

3.                  0.66

4.                  0.33

5.                  0.01

6.                  0.001

7.                  0.0001

8.                  None of the above

9.                  All of the above

10.              I don't have a clue.


Related Discussions:- Dick cheney approach

The statement vline is used to insert vertical lines, Like ULINE the statem...

Like ULINE the statement VLINE is used to insert vertical lines. No , Vline is not used to insert vertical lines.

Two ways for restricting the value range for a domain, What are the two way...

What are the two ways for restricting the value range for a domain? By specifying fixed values. By stipulating a value table.

Minimum total number of shelv, Write a program that finds the minimum total...

Write a program that finds the minimum total number of shelv, C/C++ Programming

Zero address instruction format, Zero address instruction format is used fo...

Zero address instruction format is used for  (A) RISC architecture.      (B) CISC architecture.  (C) Von-Neuman architecture.   (D) Stack-organized architecture.

Find a connection factory, Why do I get an exception when trying to find a ...

Why do I get an exception when trying to find a connection factory? Ans) The exception is regularly something like java.io.InvalidClassException or java.lang.NoClassDefFoundErro

Project on adaptive concept map, to develop an adaptive concept map providi...

to develop an adaptive concept map providing personalized learning for Operating System subject with text file(in any form like html,ppt,txt,doc,pdf)as input

What are rdram, What are RDRAM? RDRAM are Rambus DRAM. Rambus needs spe...

What are RDRAM? RDRAM are Rambus DRAM. Rambus needs specially designed memory chips. These chips use cell arrays based on the standard DRAM technology. Multiple banks of cell a

Determine the workarounds in multiple inheritances, What are several issues...

What are several issues for selecting best workarounds in multiple inheritances? Some restrictions methods are used. Use two approaches of delegations, which is an implementati

Explain the necessary conditions for deadlock to occur, Explain the necessa...

Explain the necessary conditions for deadlock to occur. Conditions for deadlock to arise are: i. Mutual exclusion: At least one resource must be held in a non-sharable mo

Online movie booking system using data structures, I want to know...if ther...

I want to know...if there is a program available in C code using data structure for online movie booking system

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd