Question

In: Statistics and Probability

A student uses n passwords, but forgets which one is for his email. If the student...

A student uses n passwords, but forgets which one is for his email.
If the student tries the passwords at random (even multiple times in a row, suspecting
a typo), what is the probability that the student will need exactly k tries to login?
What if the student writes down tried passwords and doesn't reuse them?

Solutions

Expert Solution

The probability to choose the correct password = 1/n

The probability to choose the incorrect password = 1-(1/n) = (n-1) / n

The probability that the student will need exactly k tries to login = Probability that incorrect password is chosen (k-1) times and correct password was chosen in kth try

= [(n-1) / n]k-1 [1/n]

= (n-1)k-1 / nk

If the student writes down tried passwords and doesn't reuse them, then,

probability that incorrect password on 1st try = (n-1)/n

probability that incorrect password on 2nd try = (n-2)/(n-1) {There is a mail password in n-1 remaining passwords}

probability that incorrect password on 3rd try = (n-3)/(n-2)   {There is a mail password in n-2 remaining passwords}

....

probability that incorrect password on (k-1)th try = (n-k+1)/(n-k+2)   {There is a mail password in n-k+2 remaining passwords}

probability that correct password on (k)th try = 1/(n-k+1)

= [(n-1)/n] * [(n-2)/(n-1)] * [(n-3)/(n-2)] * ..... * [(n-k+1)/(n-k+2) ] * [1/(n-k+1)]

= 1/n


Related Solutions

A man has a set of n keys, one of which fits the door to his...
A man has a set of n keys, one of which fits the door to his apartment. He tries the keys randomly, throwing away each ill-fitting key that he tries until he finds the key that fits. That is, he chooses keys randomly from among those he has not yet tried. This way he is sure to find the right key within n tries. Let T be the number of times he tries keys until he finds the right key....
At a university, each student is assigned a system login name, which the student uses to...
At a university, each student is assigned a system login name, which the student uses to log into the campus computer system. Write the code that generates system login names for students. You will use the following algorithm to generate a login name: Get the first three characters of the student’s first name. (If the first name is less than three characters in length, use the entire first name.) Get the first three characters of the student’s last name. (If...
Email from Suresh Batik I received the following email from a former student. I hope you...
Email from Suresh Batik I received the following email from a former student. I hope you are doing well. I took your Managerial Accounting class ten years ago and have a question on how to do costing in a service-based business. Currently, I am working for a firm that manufactures various products used in pipelines (torque wrenches, flange pullers, bolts and flanges, grinding machines, etc.). Five years ago we began servicing pipelines in refineries, offshore/onshore platforms, nuclear plants, etc. Our...
Email is becoming one of the most common forms of communication in the workplace. Although email...
Email is becoming one of the most common forms of communication in the workplace. Although email is a main form of business communication, it is not always done well. Many employers complain of employees who send poorly written and confusing emails. Because of their extensive use, it is important to learn how to write emails professionally with informative subject lines, appropriate greetings, well-organized bodies, and complete closing information. This assignment will allow you the opportunity to practice composing professionally written...
Email is becoming one of the most common forms of communication in the workplace. Although email...
Email is becoming one of the most common forms of communication in the workplace. Although email is a main form of business communication, it is not always done well. Many employers complain of employees who send poorly written and confusing emails. Because of their extensive use, it is important to learn how to write emails professionally with informative subject lines, appropriate greetings, well-organized bodies, and complete closing information. This assignment will allow you the opportunity to practice composing professionally written...
Email is becoming one of the most common forms of communication in the workplace. Although email...
Email is becoming one of the most common forms of communication in the workplace. Although email is a main form of business communication, it is not always done well. Many employers complain of employees who send poorly written and confusing emails. Because of their extensive use, it is important to learn how to write emails professionally with informative subject lines, appropriate greetings, well-organized bodies, and complete closing information. This assignment will allow you the opportunity to practice composing professionally written...
email persuading a lender to defer paying a student loan. what is at stake for the...
email persuading a lender to defer paying a student loan. what is at stake for the loan if it defers the loan? what regulating bodies govern how a lender may alter a the terms of a loan agreement? what objections might a lender raise to differing the loan? what channel is the best way to reach the lender what tone will work best in the message to the lender? how long of a deferral are you requesting?
Student Name:                                        &n
Student Name:                                                                                              Date: PROFESSIONAL ATTRIBUTES MOST VALUED BY EMPLOYERS Courtesy of National Association of Colleges and Employers (NACE) Instructions: Part I: Choose from the following list, five attributes (abilities) you already possess. Describe, in detail, how you demonstrated each of these attributes (abilities) in a real-life situation in either a school or work environment. List of attributes (abilities): Decision making/problem solving Verbal communication with both internal and external customers Obtaining and processing information Planning, organizing, and prioritizing work Analyzing quantitative...
A computer system uses passwords that contain exactly 5 characters, and each character is 1 of...
A computer system uses passwords that contain exactly 5 characters, and each character is 1 of the 3 lowercase letters (a, b, c) or 3 upper case letters (A, B, C) or the 5 odd digits (1, 3, 5, 7, 9). Let Ω denote the set of all possible passwords, and let A and B denote the events that consist of passwords with only letters or only integers, respectively. Determine the probability that a password contains at least 1 uppercase...
A computer system uses passwords that contain exactly six characters, and each character is 1 of...
A computer system uses passwords that contain exactly six characters, and each character is 1 of the 26 lowercase letters (a–z) or 26 uppercase letters (A–Z) or 10 integers (0–9). Let Ω denote the set of all possible passwords, and let A and B denote the events that consist of passwords with only letters or only integers, respectively. Determine the number of passwords in each of the following events. (a) Password contains all lowercase letters given that it contains only...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT