Dick cheney approach, Computer Engineering

Assignment Help:

How many "true" terrorists are there in the US?  I don't know, but let's suppose that there are 3000 out of a total population of, say, 3,000,000.  That is, one person in 100,000 is the real deal and very scary.  Now consider the Dick Cheney approach to searching for them (also very scary):  pervasive telephone wire-tapping linked to advanced voice analysis software. The software can detect terrorists within the utterance of three words, after which it automatically calls the FBI.  Assume that the system is 99% accurate.  That is, if a true terrorist is on the line, the software will notify the FBI 99% of the time; whereas, for non-terrorists, it will call the FBI (in error) only 1% of the time.  Presumably no software today is so accurate, but who knows with what NSA is fiddling.  When the FBI gets a report from the system, what is the probability that it has found a true terrorist (round off to nearest answer as needed)?

1.                  0.99

2.                  0.98

3.                  0.66

4.                  0.33

5.                  0.01

6.                  0.001

7.                  0.0001

8.                  None of the above

9.                  All of the above

10.              I don't have a clue.


Related Discussions:- Dick cheney approach

Where can i find my user preferences?, Customized User Preferences offer tr...

Customized User Preferences offer tremendous versatility to your individual Bugzilla experience. Let's plunge into what you can do! The first step is to click the "Edit prefs" link

Explain what are user controls, Briefly explain what user controls are and ...

Briefly explain what user controls are and what server controls are and the differences between the two.   An ASP.NET control (sometimes known as a server control) is a server-

Explain about the logical devices, Explain about the Logical Devices ...

Explain about the Logical Devices Locator, to indicate a position and/or orientation Pick, to select a displayed entity To input a single value in the space of re

Explain the techniques used for protection of user files, Explain the techn...

Explain the techniques used for protection of user files. This is easier to protect against accidental than malicious misuse. Protection of user files implies that file owne

Multiple instruction and multiple data stream (mimd), Multiple Instruction ...

Multiple Instruction and Multiple Data stream (MIMD): In this categorization, numerous processing elements and multiple control units are ordered as in MISD. However the differ

Hat are the advantages and disadvantages of hardwired, What are the advanta...

What are the advantages and disadvantages of hardwired and micro programmed control? Advantages of hardwired control i. Operate at high speed ii Each state of this coun

Line of code of assembly language, In how many ways line of code of assembl...

In how many ways line of code of assembly language can be divided? A line of code of an assembly language program can be divided in three columns called as fields. The fields d

8085 programs, what is the theory used to check whether a number is negativ...

what is the theory used to check whether a number is negative or positive?

Support concurrent programming, Q) a.Define the programming-language featur...

Q) a.Define the programming-language features that are required to properly  support concurrent programming? b. What support do these features need from the operating system?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd