answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Neporo4naja [7]
2 years ago
13

A computer system uses passwords that are six characters and each character is one of the 26 letters (a-z) or 10 integers (0-9).

Uppercase letters are not used. Let A denote the event that a password begins with a vowel (either a, e, i, o, u) and let B denote the event that a password ends with an even number (either 0, 2, 4, 6, or 8). Suppose a hacker selects a password at random. Determine the following probabilities. Round your answers to four decimal places (e.g. 98.7654).
Computers and Technology
1 answer:
lesantik [10]2 years ago
4 0

Question continuation

Determine the following probabilities:

a. P(A)

b. P(B)

c. P(A ∩ B)

d. P(A ∪ B)

Answer:

a. P(A) = 0.1389

b. P(B) = 0.1389

c. P(AnB) = 0.0193

d. P(AuB) = 0.2585

Explanation:

Given

Password length = 6

Letters (a-z) = 26

Integers (0-9) = 10

Total usable characters = 26 + 10 = 36

a. P(A) = Probability that a password begins with vowel (a,e,i,o,u)

Probability = Number of required outcomes/ Number of possible outcomes

Number of required outcomes = Number of vowels = 5

Number of possible outcomes = Total usable characters = 36

P(A) = 5/36

P(A) = 0.13888888888

P(A) = 0.1389

b. P(B) = Probability that the password ends with an even number (0,2,4,6,8)

Probability = Number of required outcomes/ Number of possible outcomes

Number of required outcomes = Number of even numbers = 5

Number of possible outcomes = Total usable characters = 36

P(B) = 5/36

P(B) = 0.13888888888

P(B) = 0.1389

c. P(AnB)

This means that the probability that a password starts with a vowel and ends with an even number

P(AnB) = P(A) and P(B)

P(AnB) = P(A) * P(B)

P(AnB) = 5/36 * 5/36

P(AnB) = 25/1296

P(AnB) = 0.01929012345

P(AnB) = 0.0193 ----_---- Approximately

d. P(AuB)

This means that the probability that a password either starts with a vowel or ends with an even number

P(AuB) = P(A) or P(B)

P(AuB) = P(A) + P(B) - P(AnB)

P(AuB) = 5/36 + 5/36 - 25/1296

P(AuB) = 335/1296

P(AuB) = 0.25848765432

P(AuB) = 0.2585 ----_---- Approximately

You might be interested in
a. STOP: What is a technology habit you practice today that you now realize will not help you to be successful? Explain why it’s
Zina [86]
A technology habit that I practice today that I realize will not help me to be successful is playing games on my phone. It’s important to stop doing this because instead of playing a game I could be doing more helpful things, like reading a book.
3 0
2 years ago
Read 2 more answers
In the process of retrieving a specific memory from a web of associations a person needs to activate one of the strands that lea
iVinArrow [24]

Answer:

Priming.

Explanation:

The brain is the centre of control for all animals. It coordinates the body system, breathing, beating of the heart, memory, gait, speech, sight etc.

Memory is stored in the brain ( the function of the cerebral cortex in the cerebrum). Two types of memory are the long term and the short term memory. The long term memory stores information permanently in the brain, while the short term holds the information for a while and either transfers it to the long term memory or the memory decays.

To retrieve a specific memory from the wide memory of the brain, it activates a strand that leads to the memory, this process is called priming.

6 0
2 years ago
Which of the following is NOT a benefit of virtual memory? speed up of process creation increases in the effective access time o
lubasha [3.4K]

Answer:

speed up of process creation increases in the effective access time of memory

Explanation:

Virtual memories are often used in order to save up ram for other applications and not being limited by the actual physical memory that we have, in this case the virtual memory is slower than normal memories since they are not actual memories and are restricted to the spee of the connection or the speed of the disk where they are located.

8 0
2 years ago
Which is true for a hosted blog software
professor190 [17]
Since you have not provided the choices wherein I will have to choose from to arrive at an answer, I will just explain to you the concept revolving around a hosted blog software. Hosted blog software are basically installed by the owner of the web server in which among its famous platforms is the Blogger.
7 0
2 years ago
Read 2 more answers
Find and record a set of instructions containing a repetition clause (e.g., instructions on a shampoo bottle, a recipe, etc.). H
Leto [7]

This question belongs to scratch programming. This programming language has various instructions to carry out various tasks. There are different types of repeat statement available. This statement or instruction allows the user / programmer to repeat certain line of statements to a number of times. Here, according to the question, we need to use “Repeat after me”

If you take a music note, the tempo, timing and pitch needs to be mentioned clearly and “:” represents that a particular note to be repeated only once.

3 0
2 years ago
Other questions:
  • Which of the given information should you keep confidential and why? a. You see a memo with the name of your coworker, who will
    13·2 answers
  • A firm that wanted to enable its employees to use and share data without allowing outsiders to gain access could do so by establ
    14·1 answer
  • When you use a while loop to compute the product of several values, you should initialize the variables holding the product to _
    15·1 answer
  • Which situation best describes the prosumer effect?
    7·1 answer
  • Suppose a host has a 1-MB file that is to be sent to another host. The file takes 1 second of CPU time to compress 50%, or 2 sec
    12·1 answer
  • What three requirements are defined by the protocols used in network communications to allow message transmission across a netwo
    11·1 answer
  • Suppose that, even unrealistically, we are to search a list of 700 million items using Binary Search, Recursive (Algorithm 2.1).
    11·1 answer
  • Assume that the following method header is for a method in class A. public void displayValue(int value) Assume that the followin
    11·1 answer
  • Write a method that accepts a String object as an argument and displays its contents backward. For instance, if the string argum
    10·1 answer
  • Assign total_owls with the sum of num_owls_A and num_owls_B.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!