Dick cheney approach, Computer Engineering

How many "true" terrorists are there in the US?  I don't know, but let's suppose that there are 3000 out of a total population of, say, 3,000,000.  That is, one person in 100,000 is the real deal and very scary.  Now consider the Dick Cheney approach to searching for them (also very scary):  pervasive telephone wire-tapping linked to advanced voice analysis software. The software can detect terrorists within the utterance of three words, after which it automatically calls the FBI.  Assume that the system is 99% accurate.  That is, if a true terrorist is on the line, the software will notify the FBI 99% of the time; whereas, for non-terrorists, it will call the FBI (in error) only 1% of the time.  Presumably no software today is so accurate, but who knows with what NSA is fiddling.  When the FBI gets a report from the system, what is the probability that it has found a true terrorist (round off to nearest answer as needed)?

1.                  0.99

2.                  0.98

3.                  0.66

4.                  0.33

5.                  0.01

6.                  0.001

7.                  0.0001

8.                  None of the above

9.                  All of the above

10.              I don't have a clue.

Posted Date: 2/22/2013 1:12:55 AM | Location : United States







Related Discussions:- Dick cheney approach, Assignment Help, Ask Question on Dick cheney approach, Get Answer, Expert's Help, Dick cheney approach Discussions

Write discussion on Dick cheney approach
Your posts are moderated
Related Questions
Virtual Memory is a way of extending a computer's memory by using a disk file to replicate add'l memory space. The OS remain track of these add'l memory addresses on the hard disk

Q. Show the Comparison of ASCII and EBCDIC? EBCDIC is an easier to employ code on punched cards due to BCD compatibility. But ASCII has some of major benefits on EBCDIC. These

How physical addressing is performed in WAN?  WAN networks operate as similar to a LAN. All WAN technology describes the specific frame format a computer uses while sending an

Challenges Facing Operations Managers - Information Systems While information systems should be seen as tools that enable better performance their implementation also brings a

Difference between Vertical and Horizontal Organization Vertical Organizations  It is a usual approach which is typified by a functional approach to work in which departme


Vuser_init action haves procedures to login to a server.

Extension of propositional logic: Away from proving  theorems directly, and the other main use for rewrite rules is to prepare a statement just for use before we search for th

Define cache memory? A special very high speed memory known as a cache is sometimes used to increase the speed of processing by making current programs and data available to th

Change this program so that every client will now send ten integers and receives their sum from the server. In Java, for loops can be easily executed as follows: for (int i = 0 ; i