Compute the probabilities for the following situations

Assignment Help Basic Computer Science
Reference no: EM131245284

Compute the probabilities for the following situations. These probabilities can be computed analytically, or you may write a computer program to generate the probabilities by simulation.

(a) Out of a group of 23 students, what is the probability that 2 students share the same birthday?

(b) Out of a group of 100 students, what is the probability that 3 students share the same birthday?

(c) How many students must be in the class for the probability to be at least 50% that there are 2 who share a birthday in the same month?

Reference no: EM131245284

Questions Cloud

What is the probability that every one in the class : Calculate the following probabilities: (it may help to answer the question for N = 2 initially, and work your way up. Also assume that there are 365 days in the year) What is the probability that every one in the class has a birthday on January 1st.
Characteristics of transformational and transactional leader : Analyze the key characteristics of transformational and transactional leadership and apply them to two leaders of your choice - Refer to the Background readings on transformational and transactional leadership.
How does your self-identity influence your experience : What do you believe is the most significant demographic change facing the American workplace? Why? Why is it important for an organization to have a clear definition of diversity? What three principles would you list as the most important in defining..
Income guarantee program with an income guarantee : Consider an income guarantee program with an income guarantee of $5,000 and a benefit reduction rate of 40%. A person can work up to 2,000 hours per year at $10 per hour. Which of these two income guarantee programs is more likely to discourage work?..
Compute the probabilities for the following situations : Compute the probabilities for the following situations. These probabilities can be computed analytically, or you may write a computer program to generate the probabilities by simulation.
Should it be replaced by the new machine : The applicable corporate tax rate is 40%, and the firms cost of capital is 12%. The old machine has been fully depreciated and has no salvage value. - Should it be replaced by the new machine?
Describe a series of record accesses : For each of the three self-organizing list heuristics (count, move-to-front, and transpose), describe a series of record accesses for which it would require the greatest number of comparisons of the three.
Define role that social class play criminal justice system : Compare and contrast the competing models of the criminal justice system. Which most closely relates our current state in the criminal justice system? Provide clear examples to justify your answer.
Characterize the difference in running times : Which gives the better performance, binary search on a sorted list, or sequential search on a list ordered by frequency where the frequence conforms to a Zipf distribution? Characterize the difference in running times.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explain the security risks and applicable laws

Explain the security risks and applicable laws that govern the privacy risk. Describe the security measures that the organization needs to implement to mitigate the risks.

  Evaluate the user dialog strategies used by a menu-driven

Write a four to five (4-5) page paper in which you:Evaluate the user dialog strategies used by a menu-driven interface.Determine why menu-driven interfaces continue to be popular in the modern computing age.

  Evaluate the potential remedies for breach of contract

Evaluate the potential remedies for breach of contract that might be available is someone breached the contract you created.

  Program to print astericks for every number that user enters

One interesting application of computers is drawing of graphs and bar charts (sometimes called histograms). Write down script which reads five numbers between 1 and 30.

  What are the major differences between methodologies

What are the major differences between methodologies for mining heterogeneous information networks and methods for their homogeneous counterparts?

  Question in unix os

What if we need the portion from a text based on some keyword. Now i want the middle portion where i found EO427849242. I tried with sed but it does not give me the desired result.

  Performing system recovery

Identify the recovery option you would use for your provided example, and provide a rationale for its selection.

  Difference between multiprogramming and multi-threading

Under what circumstances would you choose to use an interpreted language?

  Composition of us federal

1. Briefly describe how the composition of U.S. federal, and state/local government spending has changed over the last 50 years. [Hint: Consider changes in defense spending, spending on education, spending on healthcare, and social security]

  What are the main qualities to look for in an lcd monitor

What are the main qualities to look for in an LCD monitor?

  Create an array of five insuredpatient objects

Create an array of five InsuredPatient objects. Create a program that justifies the following- Prompts the user for all the patient data, plus the name of the insurance company; the insurance company set accessor determines the percentage paid.

  Most common methods of protecting code

This exercise looks at reverse engineering and \cracking" applications. For this exercise you should log into the VM as user: dan, password: dan!dan. In Dan's home directory you will nd two jarles, two ELF executables, the tool JD-GUI and the eval..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd