What is the average number of guesses needed

Assignment Help Basic Computer Science
Reference no: EM131189685

The guess-a-number game starts with one player (the chooser) picking a number between 1 and 100 (inclusive) and secretly writing it down. The other player (the guesser) attempts to guess the number. After each guess, the chooser responds with "correct" (the guesser guessed the number and the game is over), "higher" (the actual number is higher than the guess), or "lower" (the actual number is lower than the guess).

a. Explain why the guesser can receive slightly more than one bit of information for each response.

b. Assuming the chooser picks the number randomly (that is, all values between 1 and 100 are equally likely), what are the best first guesses? Explain why these guesses are better than any other guess. (Hint: there are two equally good first guesses.)

c. What is the maximum number of guesses the second player should need to always find the number?

d. What is the average number of guesses needed (assuming the chooser picks the number randomly as before)?

e.  Suppose instead of picking randomly, the chooser picks the number with the goal of maximizing the number of guesses the second player will need.
What number should she pick?

f. How should the guesser adjust her strategy if she knows the chooser is picking adversarial?

g. What are the best strategies for both players in the adversarial guess a number game where chooser's goal is to pick a starting number that maximizes the number of guesses the guesser needs, and the guesser's goal is to guess the number using as few guesses as possible.

Reference no: EM131189685

Questions Cloud

Describe the concepts of federalism and checks and balances : Describe the concepts of federalism and checks and balances, and provide one example to illustrate each. In what ways did the Civil War and the Great Depression change the Constitution?
What happens when there is a failure in an sla : What happens when there is a failure in an SLA? Use an example to analyze a failure in an SLA and how important SLAs are to the buyer in a BPO contract agreement.
Defend the cost of benchmarking in an industry : What is benchmarking? Please support your answer. Defend the cost of benchmarking in an industry.
What specifically do you do to complete your tasks : What specifically do you do to complete your tasks? What are your thoughts about how technology might improve your processes? What are the challenges and obstacles that would be overcome with the use of an information system
What is the average number of guesses needed : What are the best strategies for both players in the adversarial guess a number game where chooser's goal is to pick a starting number that maximizes the number of guesses the guesser needs, and the guesser's goal is to guess the number using as f..
Current situations and discussions in class : Why does a company need to know about laws such as the WARN Act? Convince the executive team that communicating information such as the WARN Act is important when a BPO contract has been signed. Use examples from current situations and discussions..
What blind spots could your theory lead you to have : What blind spots could your theory lead you to have? What personal values seem to underlie your theory; that is, "People, managers, or organizations should/not _______(what?)."
Define capacity and priority : What is meant by value added and why is that important? Provide an example of at least two value added products. Define capacity and priority. Why are each of these important to production planning? Explain your answer and provide examples for ea..
Storage management and security : Select a restaurant with which you are familiar (it can be the same one you used previously) and determine the most likely storage management challenge that restaurant would face, along with how you believe the restaurant addresses that challenge.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Is the difference y-x exactly representable

Is the difference y-x exactly representable, regardless of exponent range, if gradual underflow is allowed? WHy?

  Purpose and goals of the mobile self-service

Elaborate on the guidelines for how the self-service Website can be kept current as newer mobile devices are being introduced at a rapid rate and the design of the Website for mobile devices and the interfaces that are applicable to the mobile devic..

  Explain why this statement is true

Write the pseudo code for a recursive version of the BFS traversal algorithm.

  Relationship of human service organizations and populations

How do the unique relationship between human service organizations and the populations they serve impact ethical decisions?

  Identify scanning-enumeration tools about attack framework

Research and recommend at least 2 scanning and enumeration tools that your organization could use. Perform a scan against your home/personal machine or network, and supply the following information about your organization:

  Application of artificial intelligence what are application

what are application of artificial intelligence in different fields and also explain it? ltbrgtwhat are application of

  Damaged lithium ion battery explodes

Jared Newman @onejarednewman  pdfcrowd.comopen in browser PRO version Are you a developer? Try out the HTML to PDF API Microsoft blends the old and new with Windows 10 Damaged Lithium Ion battery explodes

  Create a method called pterodactyl fly

Modify the world to use an event instead of a loop to make the pterodactyl fly while the world is running. You might need to refer back to Chapter 3, which covers events.

  What does cissp stand for

What does CISSP stand for? Using the internet, find out what continuing education is required for the holder of a CISSP t remain current and in good standing.

  A device that converts mechanical into electrical energy is

A device that converts mechanical into electrical energy is?

  Define the contested boundaries among amazon

Define the contested boundaries among Amazon, Apple, Facebook and Google

  Explaining the threats of social engineering

Imagine that you are explaining the threats of Social Engineering to the Corporate Entity to a nontechnical audience.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd