Solution Found!
Authorizing computer users. At high-technology industries,
Chapter 7, Problem 16E(choose chapter or problem)
Authorizing computer users. At high-technology industries, computer security is achieved by using a password—a collection of symbols (usually letters and numbers) that must be supplied by the user before the computer permits access to the account. The problem is that persistent hackers can create programs that enter millions of combinations of symbols into a target system until the correct password is found. The newest systems solve this problem by requiring authorized users to identify themselves by unique body characteristics. For example, a system developed by Palmguard, Inc. tests the hypothesis
\(H_0\): The proposed user is authorized
\(H_a\): The proposed user is unauthorized
by checking characteristics of the proposed user’s palm against those stored in the authorized users’ data bank.
a. Define a Type I error and Type II error for this test. Which is the more serious error? Why?
b. Palmguard reports that the Type I error rate for its system is less than 1%, whereas the Type II error rate is .00025%. Interpret these error rates.
c. Another successful security system, the EyeDentifyer, “spots authorized computer users by reading the one-of-a-kind patterns formed by the network of minute blood vessels across the retina at the back of the eye.” The EyeDentifyer reports Type I and II error rates of .01% (1 in 10,000) and .005% (5 in 100,000), respectively. Interpret these rates.
Questions & Answers
QUESTION:
Authorizing computer users. At high-technology industries, computer security is achieved by using a password—a collection of symbols (usually letters and numbers) that must be supplied by the user before the computer permits access to the account. The problem is that persistent hackers can create programs that enter millions of combinations of symbols into a target system until the correct password is found. The newest systems solve this problem by requiring authorized users to identify themselves by unique body characteristics. For example, a system developed by Palmguard, Inc. tests the hypothesis
\(H_0\): The proposed user is authorized
\(H_a\): The proposed user is unauthorized
by checking characteristics of the proposed user’s palm against those stored in the authorized users’ data bank.
a. Define a Type I error and Type II error for this test. Which is the more serious error? Why?
b. Palmguard reports that the Type I error rate for its system is less than 1%, whereas the Type II error rate is .00025%. Interpret these error rates.
c. Another successful security system, the EyeDentifyer, “spots authorized computer users by reading the one-of-a-kind patterns formed by the network of minute blood vessels across the retina at the back of the eye.” The EyeDentifyer reports Type I and II error rates of .01% (1 in 10,000) and .005% (5 in 100,000), respectively. Interpret these rates.
ANSWER:Step 1 of 5
a) We have to describe the population of interest
The population of interest is women who shop on black friday in the US