Random string of 100,000 characters is written

Assignment Help Basic Computer Science
Reference no: EM13163382

Solve the following problems using linearity of expectation. Clearly explain the steps. (For each problem you will want to think about what the appropriate random variables should be and define them explicitly.)

(a) A coin with probability p of coming up heads is tossed independently n times. What is the expected number of occurrences of the string HH? For example, in HHHTHHT, it occurs 3 times, once starting at position 1, once starting at position 2 and once starting at position 5.

(b) A random string of 100,000 characters is written down, where each character is independently, equally likely to be any of the upper-case letters A through Z in English. What is the total expected number of occurrences of the sequences "FOOFOO" and "OOFOOF"? For example, in the sequence ABOFOOFOOFOO, the sequence FOOFOO occurs twice (once starting at the 4th character, and once starting at the 7th character), and OOFOOF occurs once (starting at the 5th character).

Reference no: EM13163382

Questions Cloud

State a growth factor for cells : A growth factor for cells was identified from extracts of rat brain. Preliminary characterization was done on this activity using several methods.
How many grams of ch3oh must be added : How many grams of CH3OH must be added to water to prepare 150 mL of a solution that is 2.0 M CH3OH?
Revaluation and de-recognition of depreciable assets : Prepare journal entries to record the revaluation on 1 July 2013 and the subsequent sale on 1 July 2014 and revaluation and de-recognition of depreciable assets
Program that counts the number of occurrences of lowercase : Write a program that counts the number of occurrences of lowercase and uppercase vowels in entered lines of text. Use a two-dimensional array to store the vowel counts. The array's first column holds the counts for the lowercase vowels, and the secon..
Random string of 100,000 characters is written : A random string of 100,000 characters is written down, where each character is independently, equally likely to be any of the upper-case letters A through Z in English.
Determine the mass of aluminum acetate : Determine the mass of aluminum acetate that can be made if you do the reaction with 125 grams of acetic acid and 275 grams of aluminum hydroxide.
Formula gives the distance between two points ( : formula gives the distance between two points (x1, y1) and (x2, y2) in the Cartesian plane:
Which one of these compounds should be soluble in water : Based on the solubility rules, which one of these compounds should be soluble in water?
Jobs can be scheduled partially : Assume that jobs can be scheduled partially, so that a job of value Vi which requires time Ti will receive value, x Vi , if processed only for time, t = x Ti, for a fraction, 0

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identify all substrings to create one of five given words

Given a string of letters, identify all substrings that create one of five given words. For example, if the words (arguments) are: structure; such; system; blue.

  The authentication process in a synchronous token system

Describe how the Kerberos authentication process work and outline the main components within the Kerberos environment, their respective functions and the level of security provided by Kerberos. Draw a diagram supporting your explanation Explain..

  Describe some ways for the firsthand knowledge

Describe some ways in which the firsthand knowledge we have of some topic goes beyond what we are able to write down in a language. What accounts for our inability to express this knowledge?

  Explain computer etiquette for effective communication

Each day we should be careful to insure that personal information is not compromised. Computer etiquette is difficult for effective communication.

  Program to randomly select three numbers

Write a program to randomly select the numbers of 3 finalist to recieve a prize. Make sure not to pick the same number twice.

  Compare time complexity of convolution with kernel

Compare the time complexity of convolution with a n x n kernel when using: direct convolution with the 2-D mask, and separable kernel.

  Evaluate for risk management purposes

Choose three information assets that a typical organization has and evaluate for risk management purposes which vulnerability should be evaluated for additional controls first?

  Computing conditional probability

Pprocessor failed sometime in the interval [4; 8] years. Given this information, what is the conditional probability that it failed before it was 5 years old?

  Determine maximum size of register file in instruction-set

You are designing simple 32-bit instruction-set architecture which requires to support 45 opcodes, three source operands and one destination operand. Determine the maximum size of register file that this architecture can use?

  Explaining distributed music in physical cds and mp3 files

For some time, popular music has been distributed on physical CDs. It can now be distributed in MP3 files. Explain the nature of the similarity or difference.

  Read in information systems

Discuss communication in Unix vs other communication tools we use outside of the operating system (example:text, IM). Discuss anything you have read in Information Systems this past week or tell me what is on your mind about Information Systems.

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd