How many losers did you have after d - 1 days

Assignment Help Basic Computer Science
Reference no: EM131081759

Suppose each day (starting on day 1) you buy one lottery ticket with probability 1/2; otherwise, you buy no tickets. A ticket is a winner with probability p independent of the outcome of all other tickets. Let Ni be the event that on day i you do not buy a ticket. Let Wi be the event that on day i, you buy a winning ticket. Let Li be the event that on day i you buy a losing ticket.

(a) What are P[W33], P[L87], and P[N99]?

(b) Let K be the number of the day on which you buy your first lottery ticket. Find the PMF PK (k).

(c) Find the PMF of R, the number of losing lottery tickets you have purchased in m days.

(d) Let D be the number of the day on which you buy your jth losing ticket. What is PD(d)? you buy your jth losing ticket on day d, how many losers did you have after d - 1 days?

Reference no: EM131081759

Questions Cloud

Examine fictional case study of the people bank of bradbury : Examine the fictional case study of the People's Bank of Bradbury (found in the Module Two Resources folder) and describe the problems and issues therein. Discuss how the leader's style and approach could have led to the problems experienced by th..
Overall description of database : Your first step is to select a database you will design and implement.  You will write a report describing the database design development life cycle and describe in details the steps needed to properly create the database you have selected for yo..
What is the pmf of k : What is the PMF of K, the number of fish that are hooked on a single cast of the line?
Goals and objectives for this departmental lan : Identify at least 5 security controls and counter measure that can help achieve CIA goals and objectives for this departmental LAN
How many losers did you have after d - 1 days : Let D be the number of the day on which you buy your jth losing ticket. What is PD(d)? you buy your jth losing ticket on day d, how many losers did you have after d - 1 days?
Knowledge of access controls and public key infrastructures : Using your knowledge of access controls and Public Key Infrastructures (PKI), align and apply a solution for handling PKI and key management for a large enterprise with many remote users and workers.
Penetration testing for web servers and web applications : Using your knowledge of OWASP and penetration testing for Web servers and Web applications, describe your approach to performing an intrusive penetration test on a production Web server and Web application with a back-end SQL database.
Components of comprehensive disaster recovery plan : Students will submit a 750-1,000-word paper (double-spaced) this week, identifying and describing the key components of a comprehensive disaster recovery plan for any incident that could disrupt an organization's network and data.
Calculate the phi, psi and omega angles for residues : Describe what information is provided in each column of a standard PDB file. Calculate the phi, psi and omega angles for residues 201-216. Include your results in the same word document.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Create a class named safestack

Assignment:Create a class named SafeStack that implements a stack of strings. Use an instance of stack from to hold string values and implement the same interface as the data type. However, your implementation (class) should throw an exceptio..

  How many of the bits in a 6 bit unsigned number

Design a logic circuit to figure out how many of the bits in a 6 bit unsigned number equal 1. Design the simplest possible circuit to accomplish this.

  Why is crm so much broader than ar management

Why is CRM so much broader than AR management? What new elements does this ERP function bring to organizations?

  Wrtie a recursive boolean function named ismember

wrtie a recursive boolean function named isMember that accepts two arguments: an array and a value. Teh function shourld return true if the value is found in the array, or false if the value is not found in the array.

  How does a network based idps differ from a host based idps

How does a network based IDPS differ from a host based IDPS?

  Write a program that creates a binary tree

Write a program that creates a Binary Tree from an array of integers, goes through it using inorder traversal (saving that to another array), then makes another balanced binary tree.

  Compare to the theoretical means

check the computed means and compare to the theoretical means (hint use the two previous equations to write two equations with two unknowns then solve for the unknowns by hand.)

  Computer with three hard disks

You have a computer with three hard disks. A RAID 0 volume uses space on Disk 1 and Disk 2. R RAID 1 volume uses space on Disk 2 and Disk 3. Disk 2 fails. Which of the following is true?

  Write a program to solve a simple payroll calculation

Write a program to solve a simple payroll calculation. Find the amount of pay given, hours worked, and hourly rate. (The formula to calculate payroll is pay = hourly rate * hours worked.) Use these values to test the calculation:

  What could encourage or force companies to change to ipv6

What could encourage or force companies to change to IPv6?

  Express e and f in sum-of-minterms algebraic form

Express E and F in sum-of-minterms algebraic form.

  Problem regading the interesting characteristic

A bitwise operation 'f' has an interesting characteristic, such that, if f(a,b) = c, it always turns out to be the case that f(b,a) = c; f(a,c) = b; f(c,a) = b; f(b,c) = a; f(c,b) = a.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd