Dick cheney approach, Computer Engineering

Assignment Help:

How many "true" terrorists are there in the US?  I don't know, but let's suppose that there are 3000 out of a total population of, say, 3,000,000.  That is, one person in 100,000 is the real deal and very scary.  Now consider the Dick Cheney approach to searching for them (also very scary):  pervasive telephone wire-tapping linked to advanced voice analysis software. The software can detect terrorists within the utterance of three words, after which it automatically calls the FBI.  Assume that the system is 99% accurate.  That is, if a true terrorist is on the line, the software will notify the FBI 99% of the time; whereas, for non-terrorists, it will call the FBI (in error) only 1% of the time.  Presumably no software today is so accurate, but who knows with what NSA is fiddling.  When the FBI gets a report from the system, what is the probability that it has found a true terrorist (round off to nearest answer as needed)?

1.                  0.99

2.                  0.98

3.                  0.66

4.                  0.33

5.                  0.01

6.                  0.001

7.                  0.0001

8.                  None of the above

9.                  All of the above

10.              I don't have a clue.


Related Discussions:- Dick cheney approach

What is software and hardware interrupt, What is Software and hardware inte...

What is Software and hardware interrupt The software interrupts are program instructions. These instructions are inserted at desired location in a program. A program formed int

Explain one two motion selector per subscriber, What is 1 00 line exchang...

What is 1 00 line exchange with one two-motion selector per subscriber. Design: In, Strowger switching system is designed by using one two-motion selector for all subscrib

Explain about RISC architecture, Q. Explain about RISC ARCHITECTURE? Le...

Q. Explain about RISC ARCHITECTURE? Let's first list some significant considerations of RISC architecture: 1. RISC functions are kept simple unless there is a very good reas

Illustrate header section of a device driver, Q. Illustrate Header section ...

Q. Illustrate Header section of a device driver? Header comprises information which allows DOS to identify the driver. It also comprises pointers which allow it to chain to ot

Explain about behavioral notations, Explain about Behavioral Notations ...

Explain about Behavioral Notations These notations contain dynamic elements of the model.  Their elements comprise interaction and the state machine. It also comprise classe

Show typical microprocessor system architecture, Q. Show typical microproce...

Q. Show typical microprocessor system architecture? A microprocessor system bus consists of three physical buses: the address bus, the data bus, and the control bus. The types

Change to palindrome, given a string S convert it to palindrome by doing ch...

given a string S convert it to palindrome by doing character replacement.convert S to palindrome with minimum character replacements

The three main elements of ldb, The three main elements of LDB are:- St...

The three main elements of LDB are:- Structure Selections and Database Program.

Network topology, According to the report, network 1 and network 2 are not ...

According to the report, network 1 and network 2 are not able to reach network 3. As shown on OTBNetwork Topology above, OTB Inc. has 2 routing protocols running due transition iss

Isoquants, what are the types of isoquants

what are the types of isoquants

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd