Concept explainers
Authorizing computer users with palm prints. Access to computers, email, and Facebook accounts is achieved via a password—a collection of symbols (usually letters and numbers) selected by the user. One problem with passwords is that persistent hackers can create programs that enter millions of combinations of symbols into a target system until the correct password is found. An article in IEEE Pervasive Computing (October-December2007) investigated the effectiveness of using palm prints to Identify authorized users. For example, a system developed by Palmguard, Inc. tests the hypothesis
H0: The proposed user is authorized
Ha: The proposed user is unauthorized by checking characteristics of the proposed user’s palm print against those stored in the authorized users’ data bank.
- a. Define a Type I error and Type II error for this test. Which is the more serious error? Why?
- b. Palmguard reports that the Type I error rate for its system is less than 1%, whereas the Type II error rate is .00025%. Interpret these error rates.
- c. Another successful security system, the EyeDentifyer, “spots authorized computer users by reading the one-of-a-kind patterns formed by the network of minute blood vessels across the retina at the back of the eye.” The EyeDentifyer reports Type I and II error rates of .01% (1 in 10,000) and ,005% (5 in 100,000), respectively. Interpret these rates.
Want to see the full answer?
Check out a sample textbook solutionChapter 7 Solutions
Statistics For Business And Economics, Student Value Edition Plus Mystatlab With Pearson Etext -- Access Card Package (13th Edition)
- Researchers were interested in the effect of sleep on memory consolidation. Twenty-four participants were randomly assigned to either a “Sleep” or “No-Sleep” group, such that there were 12 participants in each group. On the first day, all participants were flashed pictures of 15 different objects on a computer screen and asked to remember as many objects as possible. That night, the “Sleep” group got an ordinary night’s sleep. The “No-Sleep” group was kept awake until the second night. All participants got an ordinary night’s sleep on the second and third nights. On the fourth day, all participants were tested to see how many of the original 15 objects they remembered. The data is below. Conduct an independent samples t-test, two-tailed, alpha = .05. Sleep NoSleep 14 8 13 9 8 6 9 13 11 7 10 9 9 10 13 12 12 8 11 11 14 9 13 12 Write the null hypothesis in symbols and words. Write the alternative hypothesis in symbols and words. By hand, calculate the…arrow_forwardResearchers were interested in the effect of sleep on memory consolidation. Twenty-four participants were randomly assigned to either a “Sleep” or “No-Sleep” group, such that there were 12 participants in each group. On the first day, all participants were flashed pictures of 15 different objects on a computer screen and asked to remember as many objects as possible. That night, the “Sleep” group got an ordinary night’s sleep. The “No-Sleep” group was kept awake until the second night. All participants got an ordinary night’s sleep on the second and third nights. On the fourth day, all participants were tested to see how many of the original 15 objects they remembered. The data is below: Conduct an independent samples t-test, two-tailed, alpha = .05. Sleep NoSleep 14 8 13 9 8 6 9 13 11 7 10 9 9 10 13 12 12 8 11 11 14 9 13 12 Write the null hypothesis in symbols and word and write the alternative hypothesis in symbols and words By hand, calculate…arrow_forwardAn automobile manufacturer obtains the microprocessors used to regulate fuel consumption in its automobiles from three microelectronic firms: A, B, and C. The quality-control department of the company has determined that 5% of the microprocessors produced by firm A are defective, 9% of those produced by firm B are defective, and 7.5% of those produced by firm C are defective. Firms A, B, and C supply 35%, 30%, and 35%, respectively, of the microprocessors used by the company. What is the probability that a randomly selected automobile manufactured by the company will have a defective microprocessor?arrow_forward
- A plant physiologist studying a small beach-dwelling plant called the Great Lakes sea rocket, Cakile edentula, wondered if the plants grew faster in competition with non-kin plants than when in competition with seedlings that are close relatives. She set up a direct study of kin recognition by growing sets of four seeds in one container. When the seedlings reached a phase of vigorous root growth, about 8 weeks after planting, she carefully removed the soil and weighed the root masses. Plants grouped with siblings had the following root weight statistics: n = 24 X = 6.25 g s = 0.47 g Plants grouped with unrelated seedlings had the following root weight statistics: n = 20 X = 7.22 g s = 0.55 g Are the plants grown in competition with unrelated individuals allocating sig- nificantly more resources to root growth than those growing among relatives?arrow_forwardA research wants to determine if pre-natal exposure to the hormones in birth control pills alters the sex makeup of midshipman fish populations (which are typically half male and half female).Specifically, the researcher wishes to test the hypothesis that exposure to hormones will increase the number of females in the population.The researcher exposes a group of pregnant midshipman fish to birth control hormones and records the sex of the first 11 offspring birthed.They then observe that 1 are female.Use a sign test and a alpha of .05 to test the indicated hypothesis.What is the critical value?arrow_forwardThe gene ACTN3 encodes a protein that assists fast-twitch muscles. The three possible genotypes are RR, RX, and XX. Genotype was assessed in three groups: non-athletes, elite sprinters, and elite endurance runners. RR RX XX Total Non-athletes 130 226 80 436 Sprinters 53 48 6 107 Endurance 60 88 46 194 Total 243 362 132 737 Calculate P(XX | sprinter) Is genotype independent of group? Justify your answer with an appropriate equality or inequality between two probabilities.arrow_forward
- Match each term with its definition. Terms: 1. Caesar cipher 2. Cipher 3. Ciphertext 4 Cryptosystems 5. Decryption 6. Encryption 7 Random substitution cipher Defimitions: A set of instructions that are used for performing encryption or decryption An encryption system in which each letter of the alphabet is mapped to another random letter of the alphabet The process of transforming encrypted data into its original form Encrypted text transformed from the original text An encryption system in which the characters of the alphabet are shifted to create a secret alphabet system The process of changing data to keep it safe and securearrow_forwardThe article “A ‘White’ Name Found to Help in Job Search” (AP, 1/15/03) described an experiment to investigate if it helps to have a white-sounding first name when looking for a job. Researchers sent 5000 resumes in response to ads that appeared in the Boston Globe and Chicago Tribune. The resumes were identical except the 2500 of them had “white-sounding” first names, such as Brett and Emily, whereas the other 2500 had “black-sounding” names such as Tamika and Rasheed. Resumes of the first type elicited 300 responses and resumes of the second type only 167 responses. Does this data support the theory that the proportion receiving positive responses is higher by more than 10% for those resumes with “white-sounding” first names? Use a significance level of .05.arrow_forwardThe readers and writers dilemma may be posed in a number of different ways, depending on the order in which different categories of activities might be initiated. Outline three distinct permutations of the issue, each of which favors (or does not favor) a different set of methods. The actions to take upon a reader's or writer's readiness to access the database and at the completion of a procedure need to be detailed for each variant.arrow_forward
- Johnson Filtration, Inc. provides maintenance service for water-filtration systems. Suppose that in addition to information on the number of months since the machine was serviced and whether a mechanical or an electrical repair was necessary, the managers obtained a list showing which repairperson performed the service. Repair Time(hours) Months SinceLast Service Type ofRepair Repairperson 2.9 2 electrical Dave Newton 3.0 6 mechanical Dave Newton 4.8 8 electrical Bob Jones 1.8 3 mechanical Dave Newton 2.9 2 electrical Dave Newton 4.9 7 electrical Bob Jones 4.2 9 mechanical Bob Jones 4.8 8 mechanical Bob Jones 4.4 4 electrical Bob Jones 4.5 6 electrical Dave Newton Ignore for now the months since the last maintenance service (x1 ) and the repairperson who performed the service. Develop the estimated simple linear regression equation to predict the repair time (y) given the…arrow_forwardDue to COVID19, airlines cut services, such as meals and snacks during flights, and started charging for luggage. However, they are still concerned about service. A group of four carriers hired Denny's Marketing Research Inc. to survey passengers regarding their level of satisfaction with a recent flight. The survey included questions on ticketing, boarding, in-flight service, baggage handling, pilot communication, and so forth. Twenty-five questions offered a range of possible answers: excellent, good, fair, or poor. A response of excellent was given a score of 4, good a 3, fair a 2, and poor a 1. These responses were then totaled, so the total score was an indication of the satisfaction with the flight. The greater the score, the higher the level of satisfaction with the service. The highest possible score was 100. Denny randomly selected and surveyed passengers from the four airlines. Below is the sample information. Is there a difference in the mean satisfaction level among the…arrow_forwardVisceral factors that require us to engage in self‐control (such as a filling bladder) can affect our inhibitory abilities in unrelated domains. In a fascinating study by Tuk, Trampe, and Warlop (2011), participants were given five cups of water: one group was asked to drink them all, whereas another was asked to take a sip from each. This manipulation led one group to have full bladders (high urgency group, coded 1 in the spreadsheet) and the other group relatively empty bladders (low urgency group coded 2 in the spreadsheet). The values for all individuals in these two groups are in the column Drink_Group. Later on, these participants were given eight trials in which they had to choose between a small financial reward that they would receive soon (SS) or a large financial reward for which they would wait longer (LL). They counted how many trials participants choose the LL reward as an indicator of inhibitory control. These values are available in the column LL_Sum. Conduct a…arrow_forward
- Elements Of Modern AlgebraAlgebraISBN:9781285463230Author:Gilbert, Linda, JimmiePublisher:Cengage Learning,