Question

Can someone please help me with my homework, I'd really appreciate it. 1. According to Internet...

Can someone please help me with my homework, I'd really appreciate it.

1. According to Internet security experts, approximately 90% of all e-mail messages are spam (unsolicited commercial e-mail), while the remaining 10% are legitimate. A system administrator wishes to see if the same percentages hold true for the e-mail traffic on her servers. She randomly selects e-mail messages and checks to see whether or not each one is legitimate. (Unless otherwise specified, round all probabilities below to four decimal places; i.e. your answer should look like 0.1234, not 0.1234444 or 12.34%.)

a. Assuming that 90% of the messages on these servers are also spam, compute the probability that the first legitimate e-mail she finds is the fourth message she checks.



b. Compute the probability that the first legitimate e-mail she finds is the fourth or fifth message she checks.



c. Compute the probability that the first legitimate e-mail she finds is among the first four messages she checks.



d. On average, how many messages should she expect to check before she finds a legitimate e-mail? (Round your answer to one decimal place.)

2. An actress has a probability of getting offered a job after a try-out of 0.08. She plans to keep trying out for new jobs until she gets offered. Assume outcomes of try-outs are independent.
Find the probability she will need to attend more than 7 try-outs.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Let x be the number of failures before first success ( number of spams before getting first legitimate )

p is the probability that message is legitimate = 0.10

x follow geometric distribution with p = 0.10, q = 0.90

P( x ) = qx*p ; x = 0,1,2,3,...

a) P( fourth message is legitimate ) = P( x = 3 )  

=(0.90)3*0.1

= 0.0729

b) P( 4th or 5th legitimate message ) = P( x =3 ) + P( x = 4 )

= 0.0729 + (0.90)4*0.1 = 0.0729 + 0.0656

= 0.1385

c) P( legitimate among the first four messages ) = P(0) + P(1) + P(2) + P(3)

= 0.10 * [ (0.90)0+ (0.90)1 +(0.90)2 + (0.90)3 ]

= 0.3439

d) Expected legitimate mails = q / p = 0.9/0.1

Expected legitimate mails =  9

2) Let x be the number of failure before first success ( number of rejected jobs before getting first offer )

p = 0.08 , q = 0.92

x follows geometric distribution with p = 0.08 and q = 0.92

P( more than 7 try-outs. ) = P( x = 8 ) + P( x = 9 ) + P( x = 10) +...

= 1 - P( x ≤ 7)

= 1 - [ P(0) + P(1) + P(2) + P( 3) + P(4) + P(6) +P(7) ]

= 1 - 0.08 [ 0.920 + 0.921 +0.922 +0.923 +0.924 +0.925 +0.926 + 0.927 ]

= 0.5444

Add a comment
Know the answer?
Add Answer to:
Can someone please help me with my homework, I'd really appreciate it. 1. According to Internet...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Question 21 According to Internet security experts, approximately 90% of all e-mail messages are spam (unsolicited...

    Question 21 According to Internet security experts, approximately 90% of all e-mail messages are spam (unsolicited commercial e-mail), while the remaining 10% are legitimate. A system administrator wishes to see if the same percentages hold true for the e-mail traffic on her servers. She randomly selects e-mail messages and checks to see whether or not each one is legitimate. (Unless otherwise specified, round all probabilities below to four decimal places; i.e. your answer should look like 0.1234, not 0.1234444 or...

  • Can someone please help me for this assignment? Cryptography — the science of secret writing —...

    Can someone please help me for this assignment? Cryptography — the science of secret writing — is an old science; the first recorded use was well before 1900 B.C. An Egyptian writer used previously unknown hieroglyphs in an inscription. We will use a simple substitution cypher called rot13 to encode and decode our secret messages. ROT13 ("rotate by 13 places", sometimes hyphenated ROT-13) is a simple letter substitution cipher that replaces a letter with the 13th letter after it, in...

  • using C++ language!! please help me out with this homework In this exercise, you will have...

    using C++ language!! please help me out with this homework In this exercise, you will have to create from scratch and utilize a class called Student1430. Student 1430 has 4 private member attributes: lastName (string) firstName (string) exams (an integer array of fixed size of 4) average (double) Student1430 also has the following member functions: 1. A default constructor, which sets firstName and lastName to empty strings, and all exams and average to 0. 2. A constructor with 3 parameters:...

  • i need help on question 3 to 22 please. Midterm ex review. MATH 101 Use the...

    i need help on question 3 to 22 please. Midterm ex review. MATH 101 Use the following information to answer the next four exercises. The midterm grades on a chemistry exam, graded on a scale of 0 to 100, were: 62, 64, 65, 65, 68, 70, 72, 72, 74, 75, 75, 75, 76,78, 78, 81, 82, 83, 84, 85, 87, 88, 92, 95, 98, 98, 100, 100,740 1. Do you see any outliers in this data? If so, how would...

  • Help needed for Project procurement to answer Questions 1-10: Building Trust   Pauly Shore is a junior...

    Help needed for Project procurement to answer Questions 1-10: Building Trust   Pauly Shore is a junior procurement manager for the Goldwell Restaurant Group. He is responsible for the procurement of IT commodities for the data center. After months of negotiating with the three best and lowest-priced bidders for the computer paper contract, Pauly selected Frankie’s Paper Company.  Pauly’s decision was made after a round of golf at Frankie’s country club. On the eighteenth hole, Frankie extended his hand to Pauly and...

  • How can we assess whether a project is a success or a failure? This case presents...

    How can we assess whether a project is a success or a failure? This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT