Chapter 4: Problem 17
Briefly explain the three approaches to probability. Give one example of each approach.
/*! This file is auto-generated */ .wp-block-button__link{color:#fff;background-color:#32373c;border-radius:9999px;box-shadow:none;text-decoration:none;padding:calc(.667em + 2px) calc(1.333em + 2px);font-size:1.125em}.wp-block-file__button{background:#32373c;color:#fff;text-decoration:none}
Learning Materials
Features
Discover
Chapter 4: Problem 17
Briefly explain the three approaches to probability. Give one example of each approach.
All the tools & learning materials you need for study success - in one app.
Get started for free
Five percent of all items sold by a mail-order company are returned by customers for a refund. Find the probability that of two items sold during a given hour by this company, a. both will be returned for a refund b. neither will be returned for a refund Draw a tree diagram for this problem.
An appliance repair company that makes service calls to customers' homes has found that \(5 \%\) of the time there is nothing wrong with the appliance and the problem is due to customer error (appliance unplugged, controls improperly set, etc.). Two service calls are selected at random, and it is observed whether or not the problem is due to customer error. Draw a tree diagram. Find the probability that in this sample of two service calls a. both problems are due to customer error b. at least one problem is not due to customer error
The probability that a student graduating from Suburban State University has student loans to pay off after graduation is .60. The probability that a student graduating from this university has student loans to pay off after graduation and is a male is \(.24\). Find the conditional probability that a randomly selected student from this university is a male given that this student has student loans to pay off after graduation.
A Wired Equivalent Privacy (WEP) key is a security code that one must enter in order to access a secure WiFi network. The characters in the key are used from the numbers 0 to 9 and letters from \(\mathrm{A}\) to \(\mathrm{F}\), which gives 16 possibilities for each character of the key. Note that repeats are allowed, that is, the same letter or number can be used more than once in a key. A WEP key for a WiFi network with 64 -bit security is 10 characters long. a. How many different 64 -bit WEP keys can be made by using the given numbers and letters? b. A specific 64 -bit network has a WEP key in which the 2 nd, 5 th, 8 th, and 9 th characters are numbers and the other 6 characters are letters. How many different WEP keys are possible for this network? c. A hacker has determined that the WiFi network mentioned in part b will lock him out if he makes 20,000 unsuccessful attempts to break into the network. What is the probability that the hacker will be locked out of the network?
Terry \& Sons makes bearings for autos. The production system involves two independent processing machines so that each bearing passes through these two processes. The probability that the first processing machine is not working properly at any time is \(.08\), and the probability that the second machine is not working properly at any time is \(.06\). Find the probability that both machines will not be working properly at any given time.
What do you think about this solution?
We value your feedback to improve our textbook solutions.