Question

In: Statistics and Probability

Suppose that the security code for a particular automobile’s locks consists of 4 bytes of data...

Suppose that the security code for a particular automobile’s locks consists of 4 bytes of data transmitted via a low power radio. A byte is either sent correctly or is distorted by interference. The car locks are only opened if all 4 bytes are received correctly. Let C be the event that a byte is received correctly and F be the event that the byte is distorted in transmission. Then CCCC would mean that all four bytes were received correctly and the car locks will open, etc.

a) List the elements of the sample space for the transmission of the security code. Now let B be the event that the ith byte is received correctly.

b) List the elements of the events B1, B2, B3, and B4. Are these events disjoint?

c) List the sample points that constitute each of the following events and describe the events

in words:

i) B1C

ii) B1 U B2

iii) B1 ? B2

iv) B1 ? B2 ? B3 ? B4

v) B1 ? B2 ? B3 ? B4C

vi) (B1 U B2 U B3 U B4)C

Solutions

Expert Solution

(a)

In this case, the sample space will have: 2^4 = 16 possible outcomes, which are as shown below:

{ CCCC, CCCF, CCFC, CFCC, FCCC, CCFF, CFFC, FCCF, FFCC, CFCF, FCFC, CFFF, FCFF, FFCF, FFFC, FFFF }

(b)

B1 is the event where first byte is received correctly, so the possible outcomes for this event are:

{ CCCC, CCCF, CCFC, CFCC, CCFF, CFFC, CFCF, CFFF }

B2 is the event where second byte is received correctly, so the possible outcomes for this event are:

{ CCCC, CCCF, CCFC, FCCC, CCFF, FCCF, FCFC, FCFF }

B3 is the event where third byte is received correctly, so the possible outcomes for this event are:

{ CCCC, CCCF, CFCC, FCCC, FCCF, FFCC, CFCF, FFCF }

B4 is the event where fourth byte is received correctly, so the possible outcomes for this event are:

{ CCCC, CCFC, CFCC, FCCC, CFFC, FFCC, FCFC, FFFC }

No these events are not disjoint, because all of them have some common outcomes.

(c)

I could only understand the second part, all other parts are not correctly typed.

(ii) B1 U B2

This is the event in which either the first byte or the second byte or both are correct.

For this event the possbile outcomes are:

{ CCCC, CCCF, CCFC, CFCC, CCFF, CFFC, CFCF, CFFF, FCCC, FCCF, FCFC, FCFF }


Related Solutions

Given a security code for door access consists of 4 alphanumeric characters, and the first character...
Given a security code for door access consists of 4 alphanumeric characters, and the first character has to be a letter. Determine the proportion of security code that: is a unique code                                                                                          begin with a vowel (a, e, i, o, u)                                                                  end with odd number (1, 3, 5, 7, 9) begin with a vowel and end with odd number                 
IP Security and IPSec Suppose you have an IPv4 packet with 825964 bytes length. Assume that...
IP Security and IPSec Suppose you have an IPv4 packet with 825964 bytes length. Assume that this packet is to be sent through a network having 1500 bytes MTU. Question: (a) How many minimum fragments must be created from the IP packet? (b) What would be the value of “flag” and “offset” fields of the first fragment? Justify your answer. (c) What would be the value of “flag”, “offset”, and “length” fields of the last fragment? Justify your answer. (d)...
For the next 4 questions suppose the following holds: Suppose the security I and security J...
For the next 4 questions suppose the following holds: Suppose the security I and security J have the following historical returns: Year rI rJ 2015 20% 40% 2016 29% 36% 2017 -12% -25% What is the (arithmetic) average return on security I? 9.17% 12.33% 13.00% 14.18% 15.52% What is the standard deviation of the return on security I? (Use n-1 for the denominator.) 9.09% 17.39% 20.82% 21.55% 25.18% Suppose you invest 50% of your money in I and the rest...
A message consists of 8,000,000 bytes. The sender’s network adapter can transmit at a rate of...
A message consists of 8,000,000 bytes. The sender’s network adapter can transmit at a rate of 100,000 bytes per a second. The receiver’s network adapter can receive 40,000 bytes per second.   It takes 20 ms for data to move across the network.   Assuming no data is lost on the way, how long does it take for the message to read in by the receiver?
Suppose the Ontario cannabis market of a particular specie consists of the following supply and demand...
Suppose the Ontario cannabis market of a particular specie consists of the following supply and demand curves: QD = 150 - 20p QS = 40p where Q is the number of packs of cannabis per year (in millions!), and p is the price per pack. a. Calculate the price elasticities of each curve at the equilibrium price/quantity. b. Demand for cannabiss is generally more elastic over longer periods of time as consumers have more time to kick the habit. What...
A particular cipher is implemented by combining the ASCII representation of plaintext characters with pseudorandom bytes...
A particular cipher is implemented by combining the ASCII representation of plaintext characters with pseudorandom bytes (eight-bit binary strings of 1s and 0s) using the XOR function. In the process of encrypting a message, a character in the plaintext, a capital X, is XORed with the pseudorandom byte 10110100. a. What is the ciphertext (in binary form) generated by the encryption of the character ‘M’? (Please show your work.) b. How is the plaintext for this encrypted J recovered? (Please...
Suppose an application generates chunks 60 bytes of data every 200msec. Assume that each chunk gets...
Suppose an application generates chunks 60 bytes of data every 200msec. Assume that each chunk gets put into a TCP packet and that the TCP packet gets put into IP packets. What is the % of overhead that is added in because of TCP and IP combines? 1) 40% 2) 10% 3) 20% 4) 70%
Why are physical locks alone not a sufficient security control to protect organizational assets? How is...
Why are physical locks alone not a sufficient security control to protect organizational assets? How is the concept of "defense in depth" enforced with respect to physical security in a data center? How can insufficient climate controls in a data center affect the hardware?
For many locks used in gyms, the owner can set a six digit pass code to...
For many locks used in gyms, the owner can set a six digit pass code to lock it. A. How many digits could you choose from for the first number of the pass code if it cannot begin with 0 or 1? How many digits could you choose from for the second number of the pass code? Assume that the numbers cannot be repeated. How many different six digit pass codes are possible if the numbers in the pass code...
Suppose that a population consists of the six values 4, 8, 5, 3, 8, and 4....
Suppose that a population consists of the six values 4, 8, 5, 3, 8, and 4. (a) Find the population mean and variance. (b) Calculate the sampling distribution of the mean of a sample of size 3 by displaying all possible such samples (chosen without replacement). (c) Use the results from (b) to find the mean and variance of the sampling distribution. (d) Compare the answers from (c) with those obtained from the general formulas for E(X) and Var(X) derived...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT