1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mumz [18]
2 years ago
7

Suppose you are given a bag containing n unbiased coins. You are told that n − 1 of these coins are normal, with heads on one si

de and tails on the other, whereas one coin is a fake, with heads on both sides. . Suppose you reach into the bag, pick out a coin at random, flip it, and get a head. What is the (conditional) probability that the coin you chose is the fake coin?. Suppose you continue flipping the coin for a total of k times after picking it and see k heads. Now what is the conditional probability that you picked the fake coin? . Suppose you wanted to decide whether the chosen coin was fake by flipping it k times. The decision procedure returns fake if all k flips come up heads; otherwise it returns normal. What is the (unconditional) probability that this procedure makes an error?
Computers and Technology
1 answer:
Charra [1.4K]2 years ago
4 0

Answer:

a) [2/n+1]

b) 2ᵏ/[2ᵏ + (n-1)]

Explanation:

(n-1) coins are fair and only 1 is a fake coin with two heads.

This means there are a total of n coins in the bag.

Let the probability of getting a head be P(h)

Probability of picking a fake coin = P(f) = (1/n)

Probability of getting head on a fake coin = P(h|f) = 1

Probability of picking a fake coin and getting a head = P(f n h) = (1/n) × 1 = (1/n)

Probability of picking the right (original) coin = P(r) = (n-1)/n

Probability of getting a head on the right coin = P(h|r) = (1/2)

Probability of picking a real coin and getting a head = P(h n r) = [(n-1)/n] × (1/2) = [(n-1)/2n]

a) The required conditional probability is the probability that the coin is fake, given that it turns up head

P(f|h) = P(f n h)/P(h)

P(f n h) = (1/n)

But, we do not have P(h). We can obtain it through the relation,

P(h) = P(h n r) + P(h n f)

= P(r) P(h|r) + P(f) P(h|f)

= {[(n-1)/n] × [1/2] + [1/n] [1]

= [(n-1)/2n] + [1/n]

= (n+1)/2n

P(f|h) = P(f n h)/P(h)

= (1/n) ÷ [(n+1)/2n] = [2/n+1]

b) The second required probability

Probability that it's a fake coin, given that we get k heads.

P(f|k heads) = P(f n k heads) ÷ P(k heads)

P(f n k heads) = (1/n) × 1ᵏ = (1/n)

But, we do not have P(k heads). We can obtain it through the relation,

P(k heads) = P(r n k heads) + P(f n k heads)

P(r n k heads) = [(n-1)/n] × [1/2)ᵏ

= [(n-1)/2ᵏn]

P(f n k heads) = (1/n)

P(k heads) = P(r n k heads) + P(f n k heads)

= [(n-1)/2ᵏn] + [1/n]

P(f|k heads) = P(f n k heads) ÷ P(k heads)

= [1/n] ÷ {[(n-1)/2ᵏn] + [1/n]}

On simplifying,

We obtain

P(f|k heads) = 2ᵏ/[2ᵏ + (n-1)]

Note that, Bayes rule is the guiding principle in all the conditional probability evaluations we have done above.

Hope this Helps!!!

You might be interested in
Which is NOT true?<br> 9 + 4 = 17 - 4<br> 8 + 7 = 14 + 3<br> 11 = 19 - 8<br> 5 + 8 = 20 - 7
Fudgin [204]

Answer:

B 8 + 7 = 14 + 3

Explanation:

7 0
2 years ago
A resistor bank is connected to a controller with conductor insulation rated 75 °C. The resistors are not used in conjunction wi
irina [24]

Explanation:

This means that it requires a disconnecting means for each motor, and it must be located in sight from the motor location and the driven machinery location.

Multiply the FLC of the largest motor by 125%.

Add up the FLCs of the other motors.

Multiply the continuous non-motor loads by 125%.

Add up all of the above to the total of the non-continuous loads.

3 0
3 years ago
During an investigation of a cybercrime, the law enforcement officers came across a computer that had the hard drive encrypted.
borishaifa [10]

Answer:

b. Try to convince the owner of the computer to give you to decryption key/password.

Explanation:

Encrypted hard drives have maximum security and high data protection. to access them you need to enter a password to unlock them.

The image filtering technique is a method that serves to selectively highlight information contained in an image, for which it does not work.

The encryption algorithm is a component used for the security of electronic data transport, not to access data on an encrypted hard drive.

The encryption key is used in encryption algorithms to transform a message and cannot be exposed by disconnecting the hard drive from its power source.

4 0
3 years ago
Which of the following mountain ranges stretches from Alabama to Canada?
Vikki [24]
The Appalachian Mountains
4 0
3 years ago
What is thesql command to list the total sales by customer , month , and product, with subtotals by customer and by month and a
alexira [117]

Answer:

The answer is below

Explanation:

The the sql command to list the total sales by customer , month , and product, with subtotals by customer and by month and a grand total for all product sales is:

SELECT S.CUS_CODE, T.TM_MONTH, S.P_CODE,

SUM(S.SALE_UNITS*S.SALE_PRICE) AS "TOTSALES"

FROM DWDAYSALESFACT AS S INNER JOIN DWTIME AS T ON S.TM_ID =

T.TM_ID

GROUP BY S.CUS_CODE,T.TM_MONTH,S.P_CODE WITH ROLLUP;

4 0
2 years ago
Other questions:
  • Write a program that takes as input an arithmetic expression followed by a semicolon ";". The program outputs whether the expres
    11·1 answer
  • Which of the following jobs are most likely to be in greater demand due to the increasing prevalence of mobile computing? deskto
    13·1 answer
  • The layout button is located in the ____ group on the home tab?
    14·1 answer
  • Describe the major research, discoveries, or impact Timothy Berners-Lee has made on the scientific community. 100 points for ans
    6·1 answer
  • To implement a small database, a database designer must know the "1" and the "M" sides of each relationship and whether the rela
    13·1 answer
  • A popular database software program called ____ offers a wizard and QBE tool to help build and generate SQL queries
    9·1 answer
  • Describe how a cell’s content and format attributes are related.
    13·2 answers
  • 1) SuperFetch is a memory-management technique that a) determines the type of RAM your system requires. b) makes the boot-up tim
    7·1 answer
  • Given positive integer n, write a for loop that outputs the even numbers from n down to 0. If n is odd, start with the next lowe
    8·1 answer
  • What's the difference between joystick and mouse​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!