MATH107 Quiz-3
1(0.5). Simplify expression with complex numbers.
Write the answer in form a+bi, where a and b are real numbers.
(6 4i)(5 + 9i)
Solution: 6 ( 5+9 i )4 i ( 5+9 i )=30+54 i20 i36 i 2=30+34 i+36=66+34 i
2(0.5). Simplify expression with complex
Answer 2
a) HYPOTHESES
Null hypothesis- There is no significant association between teaching quality and
research quality
Alternate hypothesis- There is significant association between teaching quality and
research quality
b) When there is no association,
Answer 9
means detector says you Lied
+ means detector says you told the Truth
L means person did Lie
T means person told the Truth
We have the following information
P( | L ) = 0.90
P( + | L ) = 0.10
P( | T ) = 0.02
P( + | T ) = 0.98
We have to find
P
P(
Answer 4
Null hypothesis- Non-sense equation does not increase peoples perception of the quality of a
paper.
Alternate hypothesis- Non sense equation increases peoples perception of the quality of a paper.
Picture for sampling distribution
Shade for p val
6.
2
x + 4 x8
This can be written as
2
2
4
4
2
Step 1: x + 4 x8= x+ 2 2 8
( ) ()
[If we have the quadratic equation
in completing the square we first write this equation in this form
(
2
x+
2
Step 2: Solve it here.
This is the final answer
2
4
4
2
2
8=( x
Answer 7
a) We have mean = 100 and SD = 15, z = 1.96 for 95% confidence interval and we assume
25% or 0.25 Margin of error in the sample size
Sample size = (z2*SD)/(ME2) = (1.96^2 * 15)/(0.25^2) = 921.98 or 922
b)
c)
(
P z>
120100
120100
135100
P
< z<
=P
Security in Computing, 4th Ed, Pfleeger
Chapter 7
Security in Networks
Part 1: Threats in Networks
1
Chapter 7
Chapter 7. Security in Networks
In this chapter
Networks vs. stand-alone applications and
environments: differences and similarities
Threats aga
Q4 ) Calculation of Spearson's Rank Coefficient of bi-variate data
X
Y di2 = (Yi - Xi)2
7
3
1
2
9
6
10
8
4
5
1
2
3
4
5
6
7
8
9
10
Total
36
1
4
4
16
0
9
0
25
25
120
N=
10
rs =
0.2727273
Conclusion - As value of r is positive so it is positively correlated
Q1) Presentation of bi-variate data through scatter-plot diagram and calculations of co
N =
X
Y
7
3
1
2
9
3
10
8
13
5
8
7
3
2
5
11
9
15
0
1
16
14
12
10
8
6
4
2
10
Covariance=
0
[(X -Mean )(Y -Mean )] / N
i
0.49
X
i
Y
1
2
ram and calculations of covariance
Database and Data
Mining Security
CHAPTER 6: SECURITY IN COMPUTING
Database
Adatabaseis
a collecton ofdataand a set ofrulesthat organize the data
by specifying certain relatonships among the data.
Rules describes thelogicalformat for the data.
Adatabas
Security in Computing, 4th Ed, Pfleeger
Chapter 4
Protection in GeneralPurpose Operating Systems
1
Chapter 4
In this chapter
Protection features provided by general-purpose
operating systems:
protecting memory, files, and the execution environment
Control
Security in Computing, 4th Ed, Pfleeger
Chapter 2
Elementary Cryptography
1
Chapter 2
In this chapter
Concepts of encryption
Cryptanalysis: how encryption systems are
"broken"
Symmetric (secret key) encryption and the DES
and AES algorithms
Asymmetric (pu
Administrating
Security
CHAPTER 8: SECURITY IN COMPUTING
Security Plan
Asecurity
planis a document that describes how an organization will address its
security needs.
The plan is subject to periodic review and revision as the organization's security
need
Legal and Ethical
Issues in Computer
Security
CHAPTER 11: SECURITY IN COMPUTING
11.1 Protecting Programs and
Data
Copyrights, patents, and trade secrets are legal devices that can protect
computers, programs, and data.
Law and Computer Security
Law
and
Chapter 3
Security in Computing, 4th Ed, Pfleeger
Chapter 3
Program Security
1
Chapter 3
In this chapter
Programming errors with security implications
Malicious code
viruses, worms, Trojan horses
Program development controls against malicious
code and vul
Chapter
p 2
Elementary Encryption
Ch l P.
Charles
P Pfleeger
Pfl
& Sh
Sharii LLawrence Pfl
Pfleeger, SSecurity
i in
i Computing,
C
i
4th Ed., Pearson Education, 2007
1
y In this chapter
y Concepts
C
off encryption
i
y Cryptanalysis: how encryption systems
Security in Computing, 4th Ed, Pfleeger
Chapter 7
Security in Networks
Part 2: Network Security Control
1
Previous chapters have presented several
strategies for addressing security concerns,
Chapter 7
Network Security Controls
such as encryption for conf
Security in Computing, 4th Ed, Pfleeger
Chapter 7
Security in Networks
Part 3: Firewalls and IDS
1
Chapter 7
Firewalls
A firewall is a device that filters all traffic between a
protected or "inside" network and a less trustworthy or
"outside" network.
Usu
Security in Computing, 4th Ed, Pfleeger
Chapter 2
Elementary Cryptography
1
Chapter 2
The Data Encryption Standard (DES)
developed for the U.S. government
1976
intended for use by the general public
accepted as a cryptographic standard both in the
United
Security in Computing, 4th Ed, Pfleeger
Chapter 1
Is There a Security Problem
in Computing?
1
Crossing the street is risky
Chapter 1
Risk is a fact of life
But, you still cross the street!
Using computers is risky (from the security and
privacy perspectiv
A sample is drawn from the the normal population with the following Observation. Test the hy
population mean is 4 against the alternative mean more than 4 . Take standard deviation of th
X
3
6
7
8
6
Mean =
5.1
Ho = u=4
H1 = u>4
=
=
Zcal =
0.05
3
(Mean(X)
Security in Computing, 4th Ed, Pfleeger
Chapter 2
Elementary Cryptography
1
Chapter 2
The Data Encryption Standard (DES)
Double and Triple DES
the DES 56-bit key length is not long enough for some
people to feel comfortable
Computing power has increased d
An electrical firm manufactures light bulbs that have a length of life th
normally distributed, with mean equal to 800 hours and a standard
deviation of 40 hours. Find the probability that a random sample of 1
have an average life of less than 775 hours.
Chapter
p 3
Program Security
Ch l P.
Charles
P Pfleeger
Pfl
& Sh
Sharii LLawrence Pfl
Pfleeger, SSecurity
i in
i Computing,
C
i
4th Ed., Pearson Education, 2007
1
y In this chapter
y Programming
P
i errors with
i h security
i implications:
i li i bbuffer
QUES12:
A fabric manufaturer believes that proportion of order for raw material arriving late is p
that 3 or fewer arrive late,the hypothesis that p=0.6 should be rejected in favour of alte
Find the probability of commiting
a)
type1 error if the propotion
Microsoft Excel 12.0 Answer Report
Worksheet: [solver.xlsx]Sheet1
Report Created: 4/25/2014 11:20:52 AM
Target Cell (Value Of)
Cell
Name
$F$37 x
Original Value
Final Value
9.5 -2.84217E-014
Adjustable Cells
Cell
$G$37 y
$H$37 z
Original Value
Final Value
QUES6:
X
Y
Z
Consider the Following trivariate data:
11
17
26
28
2
4
6
5
2
3
4
5
1)
Find the multiple correlation coefficient
2)
3)
rxy.z and ryz.x and xz.y
Find the partial correlation coefficent
Determine the partial representation equation of variable
Two types of instuments for measuring the amount of sulphur monoxide in the Atmosp
desired to determine whether the 2 types of instruments yield measuremnets having th
for the two instruments
Instrument 1
Standard Variation
Instrument 2
0.86
0.82
0.75
0.6