answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Neporo4naja [7]
1 year ago
13

A computer system uses passwords that are six characters and each character is one of the 26 letters (a-z) or 10 integers (0-9).

Uppercase letters are not used. Let A denote the event that a password begins with a vowel (either a, e, i, o, u) and let B denote the event that a password ends with an even number (either 0, 2, 4, 6, or 8). Suppose a hacker selects a password at random. Determine the following probabilities. Round your answers to four decimal places (e.g. 98.7654).
Computers and Technology
1 answer:
lesantik [10]1 year ago
4 0

Question continuation

Determine the following probabilities:

a. P(A)

b. P(B)

c. P(A ∩ B)

d. P(A ∪ B)

Answer:

a. P(A) = 0.1389

b. P(B) = 0.1389

c. P(AnB) = 0.0193

d. P(AuB) = 0.2585

Explanation:

Given

Password length = 6

Letters (a-z) = 26

Integers (0-9) = 10

Total usable characters = 26 + 10 = 36

a. P(A) = Probability that a password begins with vowel (a,e,i,o,u)

Probability = Number of required outcomes/ Number of possible outcomes

Number of required outcomes = Number of vowels = 5

Number of possible outcomes = Total usable characters = 36

P(A) = 5/36

P(A) = 0.13888888888

P(A) = 0.1389

b. P(B) = Probability that the password ends with an even number (0,2,4,6,8)

Probability = Number of required outcomes/ Number of possible outcomes

Number of required outcomes = Number of even numbers = 5

Number of possible outcomes = Total usable characters = 36

P(B) = 5/36

P(B) = 0.13888888888

P(B) = 0.1389

c. P(AnB)

This means that the probability that a password starts with a vowel and ends with an even number

P(AnB) = P(A) and P(B)

P(AnB) = P(A) * P(B)

P(AnB) = 5/36 * 5/36

P(AnB) = 25/1296

P(AnB) = 0.01929012345

P(AnB) = 0.0193 ----_---- Approximately

d. P(AuB)

This means that the probability that a password either starts with a vowel or ends with an even number

P(AuB) = P(A) or P(B)

P(AuB) = P(A) + P(B) - P(AnB)

P(AuB) = 5/36 + 5/36 - 25/1296

P(AuB) = 335/1296

P(AuB) = 0.25848765432

P(AuB) = 0.2585 ----_---- Approximately

You might be interested in
Which of the following statements is incorrect? An operating system provides an environment for the execution of programs. An op
rosijanka [135]

Answer:

command line and graphical user interface

Explanation:

there were (and still are) operating system with no graphical user interface at all, as for example some Unix releases

8 0
1 year ago
What protocol communicates data between routers representing the edges of autonomous systems?Distance-vectorLink stateInterior g
Nata [24]

Explanation:

Exterior gateway protocol are the routing protocols that are used on the internet for exchanging routing information among the autonomous system. These autonomous systems can be gateway protocol, vector routing protocol.

8 0
1 year ago
Read the attached paper titled A Survey of Coarse-Grained Reconfigurable Architecture and comment on it. Make sure to specifical
Pani-rosa [81]

Answer:

lol

Explanation:

I NEED POINTS

5 0
1 year ago
An online article in 2001 described a study in which twelve sixth-grade students who had not previously played chess participate
ipn [44]
Bdbxhdhdhdbxbdhdhxhxhdhdhdhdhdhdhdhdhdbdhdhdhdhdhdhrhrhrhrhrhdhdhdhdisisieiejjdidieieieieieiei
6 0
1 year ago
"Describe how implementation of a RAID Level 2 system would be beneficial to a university payroll system. In your own words, des
Darina [25.2K]

Answer:

In RAID 2 Hamming Code ECC Each piece of the information word is kept in touch with an information plate drive . Every datum word has its Hamming Code ECC word recorded on ECC circles. On Read, the ECC code confirms the right information or revises the single plate blunders.  

Strike Level 2 is one of the two innately equal mapping and assurance strategies characterized in the Berkeley paper. It has not been broadly sent in the business to a great extent since it requires an extraordinary plate highlights. Since plate creation volumes decides the cost, it is increasingly practical to utilize standard circles for the RAID frameworks.  

Points of interest: "On the fly" it gives information blunder amendment. Amazingly high information move rates is possible.Higher the information move rate required,better the proportion of information circles to ECC plates. Moderately basic controller configuration contrasted with the other RAID levels 3,4 and 5.  

Impediments: Very high proportion of the ECC plates to information circles with littler word sizes - wasteful. Passage level expense are extremely high - and requires exceptionally high exchange rate prerequisite to legitimize. Exchange rate is equivalent to that of the single plate, best case scenario (with shaft synchronization). No business executions can't/not industrially suitable.

4 0
2 years ago
Other questions:
  • Jenny has to include the image of a sun on one of her slides. She needs to write relevant text about it on a dark background on
    6·1 answer
  • In your own words, what is pair-programming? What is the role of the driver? What is the role of the navigator? What are some be
    15·1 answer
  • Write a class with a constructor that accepts a String object as its argument. The class should have a method that returns the n
    13·1 answer
  • You have configured your firewall to authenticate a group of 100 users who are in your company. You set up the database of users
    14·1 answer
  • Your project must satisfy the following requirements:
    7·1 answer
  • Describe a strategy for avoiding nested conditionals. Give your own example of a nested conditional that can be modified to beco
    15·1 answer
  • Select the correct navigational path to freeze the top row of your worksheet. Select the panes you wish to freeze. Click the tab
    15·2 answers
  • JAVA Write a program that first asks the user to type a letter grade and then translates the letter grade into a number grade. L
    9·1 answer
  • An online retailer is looking to implement an enterprise platform. Which component of the enterprise platform will help the comp
    8·1 answer
  • Plz help code practice for python
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!