Questions
Jim is a 60-year-old Anglo male in reasonably good health. He wants to take out a...

Jim is a 60-year-old Anglo male in reasonably good health. He wants to take out a $50,000 term (i.e., straight death benefit) life insurance policy until he is 65. The policy will expire on his 65th birthday. The probability of death in a given year is provided.

x = age 60 61 62 63 64
P(death at this age) 0.01066 0.01402 0.01663 0.01978 0.02377

Jim is applying to Big Rock Insurance Company for his term insurance policy.

(a)

What is the probability that Jim will die in his 60th year? (Enter a number. Enter your answer to five decimal places.)


Using this probability and the $50,000 death benefit, what is the expected cost to Big Rock Insurance (in dollars)? (Enter a number. Round your answer to two decimal places.)
$  

(b)

What is the expected cost to Big Rock Insurance for years 61, 62, 63, and 64 (in dollars)? (For each answer, enter a number. Round your answers to two decimal places.)
year 61 $  
year 62 $  
year 63 $  
year 64 $  

What would be the total expected cost to Big Rock Insurance over the years 60 through 64 (in dollars)? (Enter a number. Round your answer to two decimal places.)
$  

(c)

If Big Rock Insurance wants to make a profit of $700 above the expected total cost paid out for Jim's death, how much should it charge for the policy (in dollars)? (Enter a number. Round your answer to two decimal places.)
$  

(d)

If Big Rock Insurance Company charges $5000 for the policy, how much profit does the company expect to make (in dollars)? (Enter a number. Round your answer to two decimal places.)
$

In: Statistics and Probability

(please type the answers) (system and technology 5360)case 5-1: Yahoo Wins the Gold and Silver Me......

(please type the answers) (system and technology 5360)case 5-1: Yahoo Wins the Gold and Silver Me...
(please type the answers) (system and technology 5360)

case 5-1: Yahoo Wins the Gold and Silver Medal for the Worst Hacks in History, case study listed below

Yahoo Wins the Gold and Silver Medal for the Worst Hacks in History!
It wasn’t until Fall 2016 that Yahoo alerted its users and the public to the first of two of the largest known breaches of user information in history that had occurred 2–3 years earlier. On September 22, 2016, Yahoo publicly disclosed that over 1 billion Yahoo account records were stolen in mid-2013. A second news release on December 15, 2016, revealed a second attack that occurred in 2014 when the account information of over 500 million Yahoo account holders was breached. The delay in reporting is partly due to the fact that Yahoo itself did not know of the breach until shortly before releasing these statements to the public. The information leaked in the attacks included e-mail accounts, telephone numbers, street addresses, unencrypted security questions and answers, but no financial information.

To add insult to injury, at the time of the first news release, Yahoo was in negotiations with mega-corporation Verizon to acquire Yahoo for $4.83 billion. After the first news release, Verizon said that the announcement could have a negative impact on their purchasing decision. The second news release caused Verizon to further review the financial implications of the two breaches and reduce its offer by $350 million.

The 2013 breach was conducted by an unknown unauthorized third party. The information stolen in the 2014 attack was sold by a “state-sponsored actor” on the Dark Web for 3 Bitcoins (approx. $1,900). The actor, who used the name “Peace” is of Russian origin and attempted to sell data from 200 million Yahoo users online. Yahoo urged all of its users to change their passwords and security questions and to review their accounts for suspicious activity. To date, little information has been released on the 2013 breach, but more is known about the incident that occurred in 2014.

How the Second Attack was Carried Out

The data theft was similar to the way in which a typical online attack of a database is carried out. The protections used for database containing the login and personal information were insufficient to protect against the advanced methods used by the hackers. In this case, the encryption method employed in the database was broken by the hacker. Additionally, cybercrime analyst Vitali Kremez maintains that the hacker stole the information from Yahoo slowly and methodically so as to not draw attention to the breach taking place.

Since the breach was not immediately detected, the hacker had plenty of time to leverage the information in a financially, personal, or politically beneficial manner. It is not clear if the seller is the original hacker.

Impact of the Data Breach

Since the breaches were so devastating and far reaching to most of Yahoo’s customer base, Verizon is having second thoughts about the acquisition. Craig Silliman, general counsel to Verizon, said Verizon has “a reasonable basis” to believe that the data breach will have a significant impact on the deal proceedings and the likelihood that it will actually happen (Fiegerman, 2016). He furthers to explain that Yahoo will have to convince Verizon that the breach will not affect future processes in the company and that more security features have been and will be implemented. Also, the incidents could make the Yahoo deal worth about $200 million less than the $4.8 billion initially settled upon. In addition to the decreased value of Yahoo’s core assets, the company’s stock fell about 2% after the comments by Craig Silliman.

Justice is Served

On March 17, 2017, the U.S. Department of Justice indicted two Russian Intelligence agents and two state-sponsored hackers, Alexsey Belan and Karim Baratov, for the theft of the Yahoo user data in 2014. Belan, one of the FBI’s most notorious criminal hackers, had been previously indicted in two other cases. In the indictments it was revealed that the targets of the theft included Russian journalists, U.S. and Russian government officials, military personnel, and private-sector employees of financial, transportation, and other companies (Balakrishnan, 2017).

The obvious issue surrounding the Yahoo data breaches is Internet security. Simple username, password, and security questions simply are not enough to keep hackers at bay. UC Davis professor Hemant Bhargava notes that two-factor authentication (TFA) is successful in many other companies and that Yahoo should follow suit (Matwyshyn & Bhargava, 2016). An example of TFA would be that a user is asked to enter information such as username and password, then a mobile app generates and sends a random number code for the user to enter before being granted access to his or her account. Both the Yahoo account and the mobile app are linked to a common, secure account. This method is exceptionally popular and useful since over 50% of Web users access the Web through their mobile phones.



question 1. provide a detailed overview of the case study and a detailed problem statement of the case study

In: Operations Management

A method used by the Environmental Protection Agency (EPA) for determining the concentration of ozone in...

A method used by the Environmental Protection Agency (EPA) for determining the concentration of ozone in air is to pass the air sample through a "bubbler" containing sodium iodide, which removes the ozone according to the following equation: O3(g)+2NaI(aq)+H2O(l)→O2(g)+I2(s)+2NaOH(aq)

Part A) How many moles of sodium iodide are needed to remove 5.95×10−6 mol O3?

Part B) How many grams of sodium iodide are needed to remove 2.1 mg of O3?

In: Chemistry

Consider the perfectly competitive market for canoes. Suppose the market demand for canoes is described by:...

Consider the perfectly competitive market for canoes. Suppose the market demand for canoes is described by: Q d = 200 − 2 P and the market supply of canoes is described by: Q s = 2 P.

  1. Suppose there is currently a price floor of $70 in place in the market for canoes. Consumer surplus under this price floor is (A) $900 (B) $4,900 (C) $2,500 (D) $1,800 .
  2. Suppose the government removes the price floor, consumer surplus will (A) decrease by $1600 (B) increase by $1100 (C) increase by $1600 (D) increase by $3200

In: Economics

T or F with concise Explaination Constrained price-bottom government policies lead to excessive demand, which is...

T or F with concise Explaination

Constrained price-bottom government policies lead to excessive demand, which is more inefficient than market discipline ( )
Those who have the will and ability to pay the price get scarce resources in the market economy.()
A decrease in supply will cause the biggest price increase when demand is very inelastic. ( )
If the government removes taxes on goods, both the price paid by the buyer and the price received by the seller will be lowered." ()
For an inelastic demand curve, the total return moves in the same direction as the price ().

In: Economics

DNA polymerase III builds new DNA strands in the 5' to 3' direction...always adding the new...

DNA polymerase III builds new DNA strands in the 5' to 3' direction...always adding the new nucleotide to the 3' end of the existing strand. As it adds new nucleotides, it proofreads its work. If a mistake is detected, DNA polymerase will act as an exonuclease and excise the incorrect nucleotide. A. What supplies the energy needed to add the new nucleotide to the existing chain? B. Please explain why evolution has favored 5’ to 3’ polymerases, as opposed to 3’ to 5’ ones (hint...what happens if DNA Polymerase removes a nucleotide?).

In: Biology

Fill in the table below concerning chromatin modification. Name of Enzyme Function Writer (W)or Eraser (E)?...

  1. Fill in the table below concerning chromatin modification.

Name of Enzyme

Function

Writer (W)or Eraser (E)?

Action leads to open (O) or closed (C) chromatin

Effect on transcription (+/-)

Adds acetyl groups to histones

HMT

HDAC

Removes methyl groups from histones

DMT

  1. A moth census on Wooded Island counted 100 black (BB) moths, 40 gray (Bb) and 60 white (bb) moths. What are the genotypic frequencies? What are the allelic frequencies? Is the population in Hardy-Weinberg equilibrium?   

Ill Rate High

In: Biology

Data Structures on Java Basic Linked List exercises a. Suppose x is a linked-list node and...

Data Structures on Java

Basic Linked List exercises

a. Suppose x is a linked-list node and not the last node on the list.

What is the effect of the following code fragment?

x.next = x.next.next

b. Singly Linked List has two private instance variables first and last as that point to the first and the last nodes in the list, respectively. Write a fragment of code that removes the last node in a linked list whose first node is first. Is there any advantage of keeping the last pointer in a linked list implementation? Explain.

In: Computer Science

C++ PROGRAM Code a generic (with templates) Queue structure (linear Data structure with FIFO functionality) and...

C++ PROGRAM

Code a generic (with templates) Queue structure (linear Data structure with FIFO functionality) and create a test to validate its functionality. The data consists of persons with the attributes of name, last name, age, height and weight.

- Remembrer that,

Their structure consists of:

  • Head: Pointer to the first element of the queue
  • Tail: Pointer to the last element of the queue

And the following operations:

  • Pop: Removes the element at the head
  • Top: Returns the current element at the head
  • Push: Adds a new element at the tail
  • isEmpty: Determine if there are any elements in the queue

In: Computer Science

Assume that x has a normal distribution with the specified mean and standard deviation. Find the...

Assume that x has a normal distribution with the specified mean and standard deviation. Find the indicated probability. (Enter a number. Round your answer to four decimal places.)

μ = 18; σ = 3.6

P(x ≥ 30) =

In: Statistics and Probability