1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexxandr [17]
4 years ago
14

Consider two medical tests, A and B for a virus. Test A is 95% effective at recognizing the virus when it is present but has a 1

0% false positive rate (indicating that the virus is present, when it is not). Test B is 90% effective at recognizing the virus, but has a 5% false positive rate. The two tests use independent methods of identifying the virus. The virus is carried by 1% of all people. Say that a person is tested for the virus using only one of the tests and that test comes back positive for carrying the virus. Which test returning positive is more indicative of someone really carrying the virus?
Computers and Technology
1 answer:
finlep [7]4 years ago
8 0

Answer:

Test B.

Explanation:

Test A - 95% effective with 10% false positive rate.

Test B -90% effective with 5% false positive rate.

Test A and B are independent methods.

One of the tests is carried out on a person and turns out to be positive.

To calculate the effectiveness of the test,

  Test A = Effectiveness in  percentage divided  by the false positive rate.

                   95/10 = 9.5

 

  Test B  = Effectiveness in  percentage divided  by the false positive rate.

                   90/5 = 18.

   

Test B has a higher effective rate than Test A.

Therefore Test B is more indicative of a positive result than Test A.

You might be interested in
When a class contains a pointer to dynamically allocated memory, it is a good idea to equip the class with?
Valentin [98]

No it is not a good idea, it shouldn’t be memberwise assignment NOT be used when an object contains a pointer to dynamically allocated memory. Class members are private by default, the following describes a class that would be a good candidate for conversion to a template class is a class which defines a new type of array. 

5 0
3 years ago
Which type of computer allows the user to enter text by handwriting
mixer [17]

Answer:Pen computing refers to any computer user-interface using a pen or stylus and tablet, over input devices such as a keyboard or a mouse.

4 0
4 years ago
A acrostic sentence for mutualism?
melamori03 [73]
Must have
Understand
Today for
Urgent
Answer
List it too
It's not hard
So listen to
Me
6 0
3 years ago
In its entirety, the CCM process reduces the risk that ANY modifications made to a system result in a compromise to system or da
Tom [10]

Answer: True

Explanation: CCM process is the process which basically watches over any change or modification that is being made in the data and it will only be implemented when there is no adverse effect of the change.It procedure helps in reducing the risk due to any modification made in data of a system. CCM process also take care of the confidentiality of data and integrity as well and helps inn maintaining it.Therefore the given statement is true.

8 0
3 years ago
An attacker has hidden an NFC reader behind an NFC-based kiosk in an airport. The attacker uses the device to capture NFC data i
tatiyna

Answer:

Nfc relay attack

Explanation:

The NFC relay attack occurs when data is extracted by an attacker who puts himself in the middle of two parties having a communication with each other. As the message gets to a party, the attacker gets it and modifies it to their taste then passes it on.

This attacker in this question is extracting data by establishing communication between end user devices and reader in the kiosk

5 0
3 years ago
Other questions:
  • P6. In step 4 of the CSMA/CA protocol, a station that successfully transmits a frame begins the CSMA/CA protocol for a second fr
    8·1 answer
  • Why do bullies and criminals often say things online they otherwise wouldn’t say
    9·2 answers
  • . Does Zuckerberg believe in the thought that “the endpoint is when you sell the
    15·1 answer
  • Use BlueJ to write a program that reads a sequence of data for several car objects from an input file. It stores the data in an
    5·1 answer
  • You want to centrally back up the files users store in the Documents folder in their user profiles, but you don’t want users to
    7·1 answer
  • Write the definition of a function half which recieves a variable containing an integer as a parameter, and returns another vari
    15·1 answer
  • The computer virus is simply a.......... a. diseases b.set of computer instrustruction or code c. types of bacteria​
    9·1 answer
  • Using the simple alphabet code below, you will decode and encode the message. Write the Full
    6·1 answer
  • Only the one dose audio editors and video editors know this
    9·2 answers
  • What are some similarity's between NES console and consoles today
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!