(a)
The alarm will be turned on when at least one of the 3 sensors detecting the movement
P(Failure of all the 3 sensors detecting the movement) = 0.013 = 0.000001
So,
P(at least one of the 3 sensors detecting the movement) = 1 - 0.000001 = 0.999999
So,
Answer is:
0.999999
(b)
P(All the 3 sensors detecting the movement) = 0.993 = 0.970299
So,
Answer is:
0.970299
1. (25 pts) A home security system is equipped with three motion sensors that will trigger...
a) A security system for a building has three ways of detecting an intruder. 1. Security camera (SC) which sends a 1 when an intruder is detected. 2. Motion sensor (MS) which sends a 0 when an intruder is detected. 3. Noise level detector (NLD) which sends a 1 when the noise level rises beyond a certain threshold. The system should work such that the alarm should sound when: • SC doesn’t detect an intruder but the MS and the...
A security system for a building has three ways of detecting an intruder. 1. Security camera (SC) which sends a 1 when an intruder is detected. 2. Motion sensor (MS) which sends a 0 when an intruder is detected. 3. Noise level detector (NLD) which sends a 1 when the noise level rises beyond a certain threshold. The system should work such that the alarm should sound when • SC doesn’t detect an intruder but the MS and the NLD...
A security system for a building has three ways of detecting an intruder. 1. Security camera (SC) which sends a 1 when an intruder is detected. 2. Motion sensor (MS) which sends a 0 when an intruder is detected. 3. Noise level detector (NLD) which sends a 1 when the noise level rises beyond a certain threshold. The system should work such that the alarm should sound when • SC doesn’t detect an intruder but the MS and the NLD...
A security system for a building has three ways of detecting an intruder. 1. Security camera (SC) which sends a 1 when an intruder is detected. 2. Motion sensor (MS) which sends a 0 when an intruder is detected. 3. Noise level detector (NLD) which sends a 1 when the noise level rises beyond a certain threshold. The system should work such that the alarm should sound when • SC doesn’t detect an intruder but the MS and the NLD...
Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...
CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...