Dick cheney approach, Computer Engineering

Assignment Help:

How many "true" terrorists are there in the US?  I don't know, but let's suppose that there are 3000 out of a total population of, say, 3,000,000.  That is, one person in 100,000 is the real deal and very scary.  Now consider the Dick Cheney approach to searching for them (also very scary):  pervasive telephone wire-tapping linked to advanced voice analysis software. The software can detect terrorists within the utterance of three words, after which it automatically calls the FBI.  Assume that the system is 99% accurate.  That is, if a true terrorist is on the line, the software will notify the FBI 99% of the time; whereas, for non-terrorists, it will call the FBI (in error) only 1% of the time.  Presumably no software today is so accurate, but who knows with what NSA is fiddling.  When the FBI gets a report from the system, what is the probability that it has found a true terrorist (round off to nearest answer as needed)?

1.                  0.99

2.                  0.98

3.                  0.66

4.                  0.33

5.                  0.01

6.                  0.001

7.                  0.0001

8.                  None of the above

9.                  All of the above

10.              I don't have a clue.


Related Discussions:- Dick cheney approach

Performance equation of computer system, Performance Equation of computer s...

Performance Equation of computer system: Following equation is frequently used for expressing a computer's performance ability: The CISC approach tries to minimize the

Interconnection network, Interconnection Network Introduction Th...

Interconnection Network Introduction This unit discusses the types and properties of interconnection networks.  In multiprocessor systems, there are multiple I/O modules

Positive logic nand gate is equivalent to negative logic nor, Show that a p...

Show that a positive logic NAND gate is equivalent to negative logic NOR gate. Ans:  Positive logic denotes True or 1 with a high voltage and False or 0 with a low volt

Difference between overlay graph and correlate graph, Overlay Graph: It ove...

Overlay Graph: It overlay the content of two graphs that shares an ordinary x-axis. Left Y-axis on the merged graph show's the present graph's value & Right Y-axis illustrate the v

How can we convert infix expression to a postfix expression, One can change...

One can change an infix expression to a postfix expression using a By using Stack you can convert infix expression to a postfix expression

Error detection mechanism must be in-built, Error detection mechanism may i...

Error detection mechanism may include checking mechanical and data communication errors. These errors must be reported to processor. The illustrations of kind of mechanical errors

Phython, super ascii string checker

super ascii string checker

Advantages of random scan display, Advantages of random scan display ...

Advantages of random scan display Early computer displays: basically an oscilloscope. Control X, Y with vertical/horizontal plate voltage. Often used intensity as

#microprocessor, Program to transfer 10 byte of data from DMS to EMS using ...

Program to transfer 10 byte of data from DMS to EMS using 8086 instructions

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd