1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Juliette [100K]
3 years ago
11

A detective agency is looking to bust an arms sale. According to available intelligence, the sale is likely to happen in one of

the three locations A, B, or C. Historical patterns indicate that P(A) (the likelihood that the sale will happen at A) is twice that of P(B), and likewise, P(B) = 2P(C). What is the probability distribution of the arms sale happening in these 3 places? Let us denote the location of the sale with a memoryless source X, i.e., X takes values ‘A’, ’B’, ’C’, with probabilities P(A), P(B), and P(C) respectively. Calculate it’s entropy H(X) in bits. Note that H(X) represents the amount of uncertainty in the location of the sale. The director of the agency is not very happy with the level of uncertainty. So he looks up recent covert transmissions for hints. He finds a recent coded message from agent Atomic Blonde which indicates that the sale will not happen at C. Let us denote the message from agent Blonde as Y , and in this case Y ="not C". Given this information, what is the new uncertainty H(X|Y = "not C")?
Computers and Technology
1 answer:
Paha777 [63]3 years ago
4 0

Answer:

Probability Distribution={(A, 4/7), (B, 2/7), (C, 1/7)}

H(X)=5.4224 bits per symb

H(X|Y="not C")=0.54902 bits per symb

Explanation:

P(B)=2P(C)

P(A)=2P(B)

But

P(A)+P(B)+P(C)=1

4P(C)+2P(C)+P(C)=1

P(C)=1/7

Then

P(A)=4/7

P(B)=2/7

Probability Distribution={(A, 4/7), (B, 2/7), (C, 1/7)}

iii

If X={A,B,C}

and P(Xi)={4/7,2/7,1/7}

where  Id =logarithm to base  2

Entropy, H(X)=-{P(A) Id P(A) +P(B) Id P(B) + P(C) Id P(C)}

=-{(1/7)Id1/7 +(2/7)Id(2/7) +(4/7)Id(4/7)}

=5.4224 bits  per symb

if P(C)  =0

P(A)=2P(B)

P(B)=1/3

P(A)=2/3

H(X|Y="not C")= -(1/3)Id(I/3) -(2/3)Id(2/3)

=0.54902 bits per symb

You might be interested in
On what basis can you categorize the generations of computers
3241004551 [841]

what the answer to this question....


7 0
3 years ago
Sequential and direct access are two methods to locate data in memory. Discuss why major devices now a days use direct access? H
djverab [1.8K]

Answer:

Direct data access reduces the speed of retrieving data from memory or storage. Retrieving data and storing it in a cache memory provides direct access to data in the storage.

Explanation:

Sequential memory access, as the name implies, goes through the memory length location in search of the specified data. Direct memory access, provides a memory location index for direct retrieval of data.

Examples of direct and sequential memory access are RAM and tapes respectively. Data in sequential memory access can be access directly by getting data in advance and storing them in cache memory for direct access by the processor.

3 0
3 years ago
While investigating an email issue, a support technician discovers no users can access their email accounts on the company’s ema
PolarNik [594]

Answer:

C. Escalate the problem to a server administrator to check for issues with the server.

Explanation:

Pinging is a tool or program that IT technicians and professional for testing if a particular host or server is reachable. Since after the support technician pinged the email server from various location and the LAN results in 0% packet loss, this means that the fault is not from the LAN, but that the host server or server administrator is unreachable or have issues. Thus, the next step of troubleshooting is to escalate the issue to the server administrator to check for issues with their server.

5 0
3 years ago
Noise can be a barrier to communication. True or False ​
ziro4ka [17]

Answer:

True

Explanation:

This is true because noise is one of the most common communication barriers.

5 0
3 years ago
Which category best represents: during class, students use their mobile phones to share answers to an assignment?
Studentka2010 [4]
The best category is cheating
5 0
3 years ago
Read 2 more answers
Other questions:
  • ____ is suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
    11·1 answer
  • Mike is reading about machine-dependent programming languages. Which languages are machine-dependent programming languages?
    11·1 answer
  • How do you return a value from a function?
    6·1 answer
  • The 2 main types of copyright relevant to the recording industry?
    5·2 answers
  • Which one of the following business names would be rated Incorrect for name accuracy? Answer McDonald's McDonald's H&M McDon
    14·1 answer
  • What led to fall of axum?
    15·2 answers
  • What is something about online conferencing that you understand better now. <br> What did you learn?
    9·1 answer
  • What is the correct way to write h1 tag
    12·1 answer
  • Write a function transpose(matrix) that returns the transpose of the input matrix, which is represented as a list of lists. Reca
    9·1 answer
  • Which access method would be most appropriate if your manager gave you a special cable and told you to use it to configure the s
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!