The data file includes the text of three books of the Bible (Joshua, Jonah and Philippians) using the ESV translation.  While these are all great books, our only interest for this project is how often each letter is used.  1) In the Word file containing the Biblical text, use the “Find” feature to identify how many times each letter occurs (i.e. the letter’s frequency).  Create an Excel spreadsheet to display the number of occurrences of each letter in the English alphabet.  Using the find feature, here is the amount for each letter in alphabet  A 1810 B 323 C 442 D 1097 E 2845 F 609 G 416 H 1689 I 1381 J 134 K 143 L 935 M 586 N 1503 O 2237 P 379 Q 5 R 1362 S 1407 T 2235 U 703 V 257 W 513 X 17 Z 6 2) In the Excel spreadsheet, sum your frequencies to compute the total number of letters in the 3 books (this is n).  a) In your spreadsheet, use the formula to compute the sample proportion of each letter’s appearances relative to total number of letters (i.e. find the relative frequency of each letter). Use the Excel sorting function to sort the letters in order of their frequencies.  b) Use the simple Confidence Interval (CI) formula to find a 95% CI on the proportion of how often each letter is used in English text in general. Enter the lower bound in the first Excel column (using   ) and the upper bound in the next column (using  ).  3)  Identify those letters whose Cls do not overlap with any the CIs of any of the other letters.  (For example the CI [0.042, 0.052] overlaps with [0.050, 0.060] because the upper bound of the first CI is greater than the lower bound of the second CI.)  List the letters with the non-overlapping Cis and specify how many such letters there are.  4) The previous analysis could be useful if our goal was to decipher an encrypted message, where each letter is scrambled (for example, each “a” might become a “g”, while each “b” might become an “o” and so forth).  a) Assume that the letter “z” in encrypted message has a relative frequency of 0.06 (it accounts for 6% of the total number of letters). Which letter’s Confidence Intervals found in question 2 include 0.06 and thus are the most likely candidates to be the letter which was encrypted as “z”? b) Further assume that “y” in the encrypted message has a relative frequency of 0.04 (4%). Which letter’s question 2 CIs include 0.04? c) If “x” in the encrypted message has a relative frequency of 0.02 (2%), which letter’s question 2 CIs include 0.02? 5) a) How many possible ways are there to assign actual letters of the text to the encrypted letters in a message? (Hint: “A” could be assigned to any one of the 26 letters, including itself.  Once “A” has been assigned, “B” can be assigned to any letter except the letter that corresponds to “A”).  b) As your answer to part (a) makes clear, there are a super-high number of possible ways all the letters could be assigned.  Knowing something about each letter’s relative frequency dramatically reduces the number of likely combinations.  For example, if there were only 3 possible options for each encrypted letter in the message, then how many possible ways would there be to assign real letters to the letter in the encrypted message?   (I just need help with parts 3 - 5b)

Glencoe Algebra 1, Student Edition, 9780079039897, 0079039898, 2018
18th Edition
ISBN:9780079039897
Author:Carter
Publisher:Carter
Chapter10: Statistics
Section10.6: Summarizing Categorical Data
Problem 2GP
icon
Related questions
Question
100%

The data file includes the text of three books of the Bible (Joshua, Jonah and Philippians) using the ESV translation.  While these are all great books, our only interest for this project is how often each letter is used. 

1) In the Word file containing the Biblical text, use the “Find” feature to identify how many times each letter occurs (i.e. the letter’s frequency).  Create an Excel spreadsheet to display the number of occurrences of each letter in the English alphabet. 

Using the find feature, here is the amount for each letter in alphabet 

A

1810

B

323

C

442

D

1097

E

2845

F

609

G

416

H

1689

I

1381

J

134

K

143

L

935

M

586

N

1503

O

2237

P

379

Q

5

R

1362

S

1407

T

2235

U

703

V

257

W

513

X

17

Z

6

2) In the Excel spreadsheet, sum your frequencies to compute the total number of letters in the 3 books (this is n). 

a) In your spreadsheet, use the formula to compute the sample proportion of each letter’s appearances relative to total number of letters (i.e. find the relative frequency of each letter). Use the Excel sorting function to sort the letters in order of their frequencies. 

b) Use the simple Confidence Interval (CI) formula to find a 95% CI on the proportion of how often each letter is used in English text in general. Enter the lower bound in the first Excel column (using   ) and the upper bound in the next column (using  ). 

3)  Identify those letters whose Cls do not overlap with any the CIs of any of the other letters.  (For example the CI [0.042, 0.052] overlaps with [0.050, 0.060] because the upper bound of the first CI is greater than the lower bound of the second CI.)  List the letters with the non-overlapping Cis and specify how many such letters there are. 

4) The previous analysis could be useful if our goal was to decipher an encrypted message, where each letter is scrambled (for example, each “a” might become a “g”, while each “b” might become an “o” and so forth). 

a) Assume that the letter “z” in encrypted message has a relative frequency of 0.06 (it accounts for 6% of the total number of letters). Which letter’s Confidence Intervals found in question 2 include 0.06 and thus are the most likely candidates to be the letter which was encrypted as “z”?

b) Further assume that “y” in the encrypted message has a relative frequency of 0.04 (4%). Which letter’s question 2 CIs include 0.04?

c) If “x” in the encrypted message has a relative frequency of 0.02 (2%), which letter’s question 2 CIs include 0.02?

5) a) How many possible ways are there to assign actual letters of the text to the encrypted letters in a message? (Hint: “A” could be assigned to any one of the 26 letters, including itself.  Once “A” has been assigned, “B” can be assigned to any letter except the letter that corresponds to “A”). 

b) As your answer to part (a) makes clear, there are a super-high number of possible ways all the letters could be assigned.  Knowing something about each letter’s relative frequency dramatically reduces the number of likely combinations.  For example, if there were only 3 possible options for each encrypted letter in the message, then how many possible ways would there be to assign real letters to the letter in the encrypted message?

 

(I just need help with parts 3 - 5b)

The data file includes the text of three books of the Bible (Joshua, Jonah and Philippians) using
the ESV translation. While these are all great books, our only interest for this project is how
often each letter is used.
1) In the Word file containing the Biblical text, use the "Find" feature to identify how many
times each letter occurs (i.e. the letter's frequency). Create an Excel spreadsheet to display the
number of occurrences of each letter in the English alphabet.
2) In the Excel spreadsheet, sum your frequencies to compute the total number of letters in the 3
books (this is n).
a) In your spreadsheet, use the formula p = to compute the sample proportion of each letter's
appearances relative to total number of letters (i.e. find the relative frequency of each letter).
Use the Excel sorting function to sort the letters in order of their frequencies.
b) Use the simple Confidence Interval (CI) formula ( p – 1.96,
p + 1.96
to find a 95%
CI on the proportion of how often each letter is used in English text in general. Enter the lower
bound in the first Excel column (using p – 1.96
" ) and the upper bound in the next column
bd
(using p + 1.96.
n
Transcribed Image Text:The data file includes the text of three books of the Bible (Joshua, Jonah and Philippians) using the ESV translation. While these are all great books, our only interest for this project is how often each letter is used. 1) In the Word file containing the Biblical text, use the "Find" feature to identify how many times each letter occurs (i.e. the letter's frequency). Create an Excel spreadsheet to display the number of occurrences of each letter in the English alphabet. 2) In the Excel spreadsheet, sum your frequencies to compute the total number of letters in the 3 books (this is n). a) In your spreadsheet, use the formula p = to compute the sample proportion of each letter's appearances relative to total number of letters (i.e. find the relative frequency of each letter). Use the Excel sorting function to sort the letters in order of their frequencies. b) Use the simple Confidence Interval (CI) formula ( p – 1.96, p + 1.96 to find a 95% CI on the proportion of how often each letter is used in English text in general. Enter the lower bound in the first Excel column (using p – 1.96 " ) and the upper bound in the next column bd (using p + 1.96. n
3) Identify those letters whose Cls do not overlap with any the CIs of any of the other letters.
(For example the CI [0.042, 0.052] overlaps with [0.050, 0.060] because the upper bound of the
first CI is greater than the lower bound of the second CI.) List the letters with the non-
overlapping Cis and specify how many such letters there are.
4) The previous analysis could be useful if our goal was to decipher an encrypted message,
where each letter is scrambled (for example, each "a" might become a "g", while each "b" might
become an “o" and so forth).
a) Assume that the letter "z" in encrypted message has a relative frequency of 0.06 (it accounts
for 6% of the total number of letters). Which letter's Confidence Intervals found in question 2
include 0.06 and thus are the most likely candidates to be the letter which was encrypted as “z"?
b) Further assume that “y" in the encrypted message has a relative frequency of 0.04 (4%).
Which letter's question 2 CIs include 0.04?
c) If “x" in the encrypted message has a relative frequency of 0.02 (2%), which letter's question
2 CIs include 0.02?
5) a) How many possible ways are there to assign actual letters of the text to the encrypted letters
in a message? (Hint: “A" could be assigned to any one of the 26 letters, including itself. Once
"A" has been assigned, "B" can be assigned to any letter except the letter that corresponds to
"A").
b) As your answer to part (a) makes clear, there are a super-high number of possible ways all the
letters could be assigned. Knowing something about each letter's relative frequency
dramatically reduces the number of likely combinations. For example, if there were only 3
possible options for each encrypted letter in the message, then how many possible ways would
there be to assign real letters to the letter in the encrypted message?
Transcribed Image Text:3) Identify those letters whose Cls do not overlap with any the CIs of any of the other letters. (For example the CI [0.042, 0.052] overlaps with [0.050, 0.060] because the upper bound of the first CI is greater than the lower bound of the second CI.) List the letters with the non- overlapping Cis and specify how many such letters there are. 4) The previous analysis could be useful if our goal was to decipher an encrypted message, where each letter is scrambled (for example, each "a" might become a "g", while each "b" might become an “o" and so forth). a) Assume that the letter "z" in encrypted message has a relative frequency of 0.06 (it accounts for 6% of the total number of letters). Which letter's Confidence Intervals found in question 2 include 0.06 and thus are the most likely candidates to be the letter which was encrypted as “z"? b) Further assume that “y" in the encrypted message has a relative frequency of 0.04 (4%). Which letter's question 2 CIs include 0.04? c) If “x" in the encrypted message has a relative frequency of 0.02 (2%), which letter's question 2 CIs include 0.02? 5) a) How many possible ways are there to assign actual letters of the text to the encrypted letters in a message? (Hint: “A" could be assigned to any one of the 26 letters, including itself. Once "A" has been assigned, "B" can be assigned to any letter except the letter that corresponds to "A"). b) As your answer to part (a) makes clear, there are a super-high number of possible ways all the letters could be assigned. Knowing something about each letter's relative frequency dramatically reduces the number of likely combinations. For example, if there were only 3 possible options for each encrypted letter in the message, then how many possible ways would there be to assign real letters to the letter in the encrypted message?
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 4 steps

Blurred answer
Recommended textbooks for you
Glencoe Algebra 1, Student Edition, 9780079039897…
Glencoe Algebra 1, Student Edition, 9780079039897…
Algebra
ISBN:
9780079039897
Author:
Carter
Publisher:
McGraw Hill
College Algebra
College Algebra
Algebra
ISBN:
9781938168383
Author:
Jay Abramson
Publisher:
OpenStax
Elementary Geometry For College Students, 7e
Elementary Geometry For College Students, 7e
Geometry
ISBN:
9781337614085
Author:
Alexander, Daniel C.; Koeberlein, Geralyn M.
Publisher:
Cengage,
College Algebra (MindTap Course List)
College Algebra (MindTap Course List)
Algebra
ISBN:
9781305652231
Author:
R. David Gustafson, Jeff Hughes
Publisher:
Cengage Learning