1. The document discusses probability and statistics, providing definitions and examples. It also includes a scenario about a terrorist planting a bomb that can only be defused by answering questions correctly.
2. The questions involve using Pascal's triangle to determine the number of routes between points on a map, avoiding enemy territory.
3. The answers are determined by applying the mathematical rules of Pascal's triangle to count the possible routes.
Dos monjas, la Hermana Matemática y la Hermana Lógica, se separaron para escapar de un hombre que las seguía mientras vendían galletas fuera del convento. La Hermana Lógica usó su lógica para distraer al hombre bajándose el hábito, lo que le permitió correr más rápido que él con sus pantalones abajo y escapar sin ser violada.
No tomes decisiones impulsivas cuando te sientes emocional. Piensa cuidadosamente antes de hablar o actuar para evitar arrepentimientos. Un padre ama a su hijo incondicionalmente.
La Unión Europea ha acordado un embargo petrolero contra Rusia en respuesta a la invasión de Ucrania. El embargo prohibirá las importaciones marítimas de petróleo ruso a la UE y pondrá fin a las entregas a través de oleoductos dentro de seis meses. Esta medida forma parte de un sexto paquete de sanciones de la UE destinadas a aumentar la presión económica sobre Moscú y privar al Kremlin de fondos para financiar su guerra.
Este documento ofrece consejos y reflexiones sobre cómo superar momentos difíciles en la vida, aprender de las experiencias pasadas y comenzar de nuevo con una mentalidad positiva. Aunque se pierden cosas valiosas, también se ganan lecciones y fortaleza. Es importante dejar ir el pasado doloroso, perdonar, y enfocarse en el presente y futuro con esperanza, confianza en uno mismo y metas elevadas. Cada día es una oportunidad para mejorar y amar.
La música es una forma de arte que utiliza el sonido de manera organizada. Es una parte importante de la cultura humana y existe en todas las sociedades del mundo. La música puede expresar una variedad de emociones y sentimientos.
El documento habla sobre el origen del grafiti en Nueva York en la década de 1970. Los primeros grafiteros se asignaban un número al nombre que habían escogido, generalmente relacionado con la calle donde vivían. En 1972, Phase 2 del Bronx fue el primero en desarrollar una obra maestra de grafiti con letras grandes, huecas y de colores, conocidas como Bubble Letters o Softies.
Dos monjas, la Hermana Matemática y la Hermana Lógica, se separaron para escapar de un hombre que las seguía mientras vendían galletas fuera del convento. La Hermana Lógica usó su lógica para distraer al hombre bajándose el hábito, lo que le permitió correr más rápido que él con sus pantalones abajo y escapar sin ser violada.
No tomes decisiones impulsivas cuando te sientes emocional. Piensa cuidadosamente antes de hablar o actuar para evitar arrepentimientos. Un padre ama a su hijo incondicionalmente.
La Unión Europea ha acordado un embargo petrolero contra Rusia en respuesta a la invasión de Ucrania. El embargo prohibirá las importaciones marítimas de petróleo ruso a la UE y pondrá fin a las entregas a través de oleoductos dentro de seis meses. Esta medida forma parte de un sexto paquete de sanciones de la UE destinadas a aumentar la presión económica sobre Moscú y privar al Kremlin de fondos para financiar su guerra.
Este documento ofrece consejos y reflexiones sobre cómo superar momentos difíciles en la vida, aprender de las experiencias pasadas y comenzar de nuevo con una mentalidad positiva. Aunque se pierden cosas valiosas, también se ganan lecciones y fortaleza. Es importante dejar ir el pasado doloroso, perdonar, y enfocarse en el presente y futuro con esperanza, confianza en uno mismo y metas elevadas. Cada día es una oportunidad para mejorar y amar.
La música es una forma de arte que utiliza el sonido de manera organizada. Es una parte importante de la cultura humana y existe en todas las sociedades del mundo. La música puede expresar una variedad de emociones y sentimientos.
El documento habla sobre el origen del grafiti en Nueva York en la década de 1970. Los primeros grafiteros se asignaban un número al nombre que habían escogido, generalmente relacionado con la calle donde vivían. En 1972, Phase 2 del Bronx fue el primero en desarrollar una obra maestra de grafiti con letras grandes, huecas y de colores, conocidas como Bubble Letters o Softies.
[Autor: Carlos de Saa para La Provincia] 3.000 vecinos tomaron sus calles para mostrar su rechazo a la instalación de la central térmica que pretende ubicar el Gobierno de Canarias en el Valle de Agando.
El documento habla sobre el diseño de un fasago1. No proporciona más detalles sobre el tema debido a que está compuesto por una serie de caracteres no alfabéticos y finaliza indicando el fin del fasago1.
Podcasting involves creating audio or video files and distributing them through RSS feeds so that they can be accessed and played on various devices. It requires compelling and authentic content published on a regular basis, as well as recording equipment, audio editing software, and hosting to publish the podcast. An example podcast called 123Hints provides short how-to segments twice a week that are casually narrated using a lapel mic, mixer, and GarageBand for recording and editing before publishing on iTunes, Libsyn and Blip.tv. Podcasting audiences are growing significantly, estimated to reach 65 million listeners by 2012 according to a report.
Honey New Slide is a web-based slide creation and sharing tool that allows users to create, view, share and present slides from any device with an internet connection in a platform independent manner without worrying about hardware glitches.
El documento explora las diferentes formas en que las letras pueden afectar o representar cosas, desde ser únicas o sobrias hasta ser explícitas o un alivio. También discute cómo la lectura puede comunicar, entretener e informar, y desarrollar habilidades como el vocabulario y el pensamiento crítico.
El documento describe los tres tipos de retenciones líquidas en columnas empacadas: retención total, retención estática y retención operativa. Explica cómo se determinan experimentalmente y cómo varían según factores como la densidad del empacado, la velocidad del líquido y el gas, y las características del empacado como el material y tamaño de las partículas. El objetivo es usar estos datos para explicar diferencias en la transferencia de masa durante procesos de vaporización y absorción.
O documento faz uma série de definições irônicas e humorísticas sobre vários temas como mulheres, chefes, homens, status, sexo, idosos, whisky, advogados, beijos, amor e casamento, geralmente de forma provocativa ou caricata.
El documento habla sobre describir y caracterizar diferentes temas como títulos, fotos, libros, paisajes y la historia. También menciona organizar la información observada de manera cronológica. El documento parece tratar sobre describir y analizar diferentes elementos para comunicar mensajes y caracterizarlos de forma organizada.
This document discusses Mayo Clinic's use of social media to engage key stakeholders. It describes Lee Aase, the manager of syndication and social media at Mayo Clinic, and outlines Mayo Clinic's social media plan to reach people directly through platforms like blogs and podcasts. The document also provides examples of Mayo Clinic's initial forays into social media, including blogs, YouTube, and Facebook, and encourages other organizations to practically use social media to meet their own goals.
El documento habla sobre describir y caracterizar diferentes temas como títulos, fotos, libros, paisajes y la historia. También menciona organizar la información observada de manera cronológica. El documento parece tratar sobre describir y analizar diferentes elementos para comunicar mensajes y caracterizarlos de forma organizada.
La Web 1.0 era estática y diseñada principalmente para la lectura, mientras que la Web 2.0 mejora conforme más personas la usan aprovechando la inteligencia colectiva. La Web 2.0 incluye herramientas como blogs, presentaciones multimedia, Flickr y YouTube que permiten publicar y compartir contenido de forma dinámica e interactiva.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help boost feelings of calmness, happiness and focus.
El documento compara las libertades y roles de género de las mujeres en Irán versus Venezuela, argumentando que las mujeres venezolanas tienen más libertades pero también mayores expectativas de sus parejas masculinas en términos de regalos, atención y satisfacción sexual. El autor concluye que a pesar de las quejas sobre el trato de las mujeres venezolanas, vale la pena estar con ellas debido a su belleza y personalidad única.
La Web 2.0 representa la evolución de las aplicaciones web tradicionales hacia aplicaciones enfocadas en el usuario final. Se basa en comunidades de usuarios y servicios como redes sociales, blogs, wikis y folksonomías que fomentan la colaboración y el intercambio de información entre usuarios. Algunos servicios populares de la Web 2.0 son Flickr, Myspace, YouTube y servicios de Google.
El documento pide que se toque a diferentes personas en diferentes situaciones de vida, como bebés, niños, adolescentes, amigos, parejas, hijos adultos, padres mayores y ancianos, para transmitirles seguridad, amor, consuelo y recordarles que son queridos.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving
What began over 115 years ago as a supplier of precision gauges to the automotive industry has evolved into being an industry leader in the manufacture of product branding, automotive cockpit trim and decorative appliance trim. Value-added services include in-house Design, Engineering, Program Management, Test Lab and Tool Shops.
[Autor: Carlos de Saa para La Provincia] 3.000 vecinos tomaron sus calles para mostrar su rechazo a la instalación de la central térmica que pretende ubicar el Gobierno de Canarias en el Valle de Agando.
El documento habla sobre el diseño de un fasago1. No proporciona más detalles sobre el tema debido a que está compuesto por una serie de caracteres no alfabéticos y finaliza indicando el fin del fasago1.
Podcasting involves creating audio or video files and distributing them through RSS feeds so that they can be accessed and played on various devices. It requires compelling and authentic content published on a regular basis, as well as recording equipment, audio editing software, and hosting to publish the podcast. An example podcast called 123Hints provides short how-to segments twice a week that are casually narrated using a lapel mic, mixer, and GarageBand for recording and editing before publishing on iTunes, Libsyn and Blip.tv. Podcasting audiences are growing significantly, estimated to reach 65 million listeners by 2012 according to a report.
Honey New Slide is a web-based slide creation and sharing tool that allows users to create, view, share and present slides from any device with an internet connection in a platform independent manner without worrying about hardware glitches.
El documento explora las diferentes formas en que las letras pueden afectar o representar cosas, desde ser únicas o sobrias hasta ser explícitas o un alivio. También discute cómo la lectura puede comunicar, entretener e informar, y desarrollar habilidades como el vocabulario y el pensamiento crítico.
El documento describe los tres tipos de retenciones líquidas en columnas empacadas: retención total, retención estática y retención operativa. Explica cómo se determinan experimentalmente y cómo varían según factores como la densidad del empacado, la velocidad del líquido y el gas, y las características del empacado como el material y tamaño de las partículas. El objetivo es usar estos datos para explicar diferencias en la transferencia de masa durante procesos de vaporización y absorción.
O documento faz uma série de definições irônicas e humorísticas sobre vários temas como mulheres, chefes, homens, status, sexo, idosos, whisky, advogados, beijos, amor e casamento, geralmente de forma provocativa ou caricata.
El documento habla sobre describir y caracterizar diferentes temas como títulos, fotos, libros, paisajes y la historia. También menciona organizar la información observada de manera cronológica. El documento parece tratar sobre describir y analizar diferentes elementos para comunicar mensajes y caracterizarlos de forma organizada.
This document discusses Mayo Clinic's use of social media to engage key stakeholders. It describes Lee Aase, the manager of syndication and social media at Mayo Clinic, and outlines Mayo Clinic's social media plan to reach people directly through platforms like blogs and podcasts. The document also provides examples of Mayo Clinic's initial forays into social media, including blogs, YouTube, and Facebook, and encourages other organizations to practically use social media to meet their own goals.
El documento habla sobre describir y caracterizar diferentes temas como títulos, fotos, libros, paisajes y la historia. También menciona organizar la información observada de manera cronológica. El documento parece tratar sobre describir y analizar diferentes elementos para comunicar mensajes y caracterizarlos de forma organizada.
La Web 1.0 era estática y diseñada principalmente para la lectura, mientras que la Web 2.0 mejora conforme más personas la usan aprovechando la inteligencia colectiva. La Web 2.0 incluye herramientas como blogs, presentaciones multimedia, Flickr y YouTube que permiten publicar y compartir contenido de forma dinámica e interactiva.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help boost feelings of calmness, happiness and focus.
El documento compara las libertades y roles de género de las mujeres en Irán versus Venezuela, argumentando que las mujeres venezolanas tienen más libertades pero también mayores expectativas de sus parejas masculinas en términos de regalos, atención y satisfacción sexual. El autor concluye que a pesar de las quejas sobre el trato de las mujeres venezolanas, vale la pena estar con ellas debido a su belleza y personalidad única.
La Web 2.0 representa la evolución de las aplicaciones web tradicionales hacia aplicaciones enfocadas en el usuario final. Se basa en comunidades de usuarios y servicios como redes sociales, blogs, wikis y folksonomías que fomentan la colaboración y el intercambio de información entre usuarios. Algunos servicios populares de la Web 2.0 son Flickr, Myspace, YouTube y servicios de Google.
El documento pide que se toque a diferentes personas en diferentes situaciones de vida, como bebés, niños, adolescentes, amigos, parejas, hijos adultos, padres mayores y ancianos, para transmitirles seguridad, amor, consuelo y recordarles que son queridos.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving
What began over 115 years ago as a supplier of precision gauges to the automotive industry has evolved into being an industry leader in the manufacture of product branding, automotive cockpit trim and decorative appliance trim. Value-added services include in-house Design, Engineering, Program Management, Test Lab and Tool Shops.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillLizaNolte
HERE IS YOUR WEBINAR CONTENT! 'Mastering Customer Journey Management with Dr. Graham Hill'. We hope you find the webinar recording both insightful and enjoyable.
In this webinar, we explored essential aspects of Customer Journey Management and personalization. Here’s a summary of the key insights and topics discussed:
Key Takeaways:
Understanding the Customer Journey: Dr. Hill emphasized the importance of mapping and understanding the complete customer journey to identify touchpoints and opportunities for improvement.
Personalization Strategies: We discussed how to leverage data and insights to create personalized experiences that resonate with customers.
Technology Integration: Insights were shared on how inQuba’s advanced technology can streamline customer interactions and drive operational efficiency.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...Fwdays
Direct losses from downtime in 1 minute = $5-$10 thousand dollars. Reputation is priceless.
As part of the talk, we will consider the architectural strategies necessary for the development of highly loaded fintech solutions. We will focus on using queues and streaming to efficiently work and manage large amounts of data in real-time and to minimize latency.
We will focus special attention on the architectural patterns used in the design of the fintech system, microservices and event-driven architecture, which ensure scalability, fault tolerance, and consistency of the entire system.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Session 1 - Intro to Robotic Process Automation.pdfUiPathCommunity
👉 Check out our full 'Africa Series - Automation Student Developers (EN)' page to register for the full program:
https://bit.ly/Automation_Student_Kickstart
In this session, we shall introduce you to the world of automation, the UiPath Platform, and guide you on how to install and setup UiPath Studio on your Windows PC.
📕 Detailed agenda:
What is RPA? Benefits of RPA?
RPA Applications
The UiPath End-to-End Automation Platform
UiPath Studio CE Installation and Setup
💻 Extra training through UiPath Academy:
Introduction to Automation
UiPath Business Automation Platform
Explore automation development with UiPath Studio
👉 Register here for our upcoming Session 2 on June 20: Introduction to UiPath Studio Fundamentals: https://community.uipath.com/events/details/uipath-lagos-presents-session-2-introduction-to-uipath-studio-fundamentals/
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
The Department of Veteran Affairs (VA) invited Taylor Paschal, Knowledge & Information Management Consultant at Enterprise Knowledge, to speak at a Knowledge Management Lunch and Learn hosted on June 12, 2024. All Office of Administration staff were invited to attend and received professional development credit for participating in the voluntary event.
The objectives of the Lunch and Learn presentation were to:
- Review what KM ‘is’ and ‘isn’t’
- Understand the value of KM and the benefits of engaging
- Define and reflect on your “what’s in it for me?”
- Share actionable ways you can participate in Knowledge - - Capture & Transfer
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
This talk will cover ScyllaDB Architecture from the cluster-level view and zoom in on data distribution and internal node architecture. In the process, we will learn the secret sauce used to get ScyllaDB's high availability and superior performance. We will also touch on the upcoming changes to ScyllaDB architecture, moving to strongly consistent metadata and tablets.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
2. DEVELOPING
EXPERT VOICES
2008
APPLIED MATH 40S
Please click on this link
http://youtube.com/watch?v=sSvE_dG7BGk
3. PROB
ABIL &
TIST ICS
ITY STA
Flickr by: bcsia Flickr by: mac steve
4. PR
OB
AB I CS
ILI I ST
TY A T
ST
&
What is Probability? What is Statistics?
a measure of how likely it is that a mathematical science relevant
some event will occur; a number to the collection, analysis,
expressing the ratio of favorable interpretation or explanation, and
cases to the whole number of presentation of data.
cases possible.
Flickr by: bcsia Flickr by: mac steve
6. http://www.onlinestopwatch.com/bombcountdown/fullscreen/
Good evening CounterTerrorist. I have
commanded my terrorist team to plant
a bomb somewhere in your training
facility. The only way to defuse the
bomb is to answer these 5 questions
that will help you figure out the 5 digit
codes.
Remember... if the bomb has been
successfully defused, then we will
surrender our weapons to you.
However, if you fail to defuse it, the
victory will be ours. You will
surrender the rest of your weapons
and you will be in our control.
Click on the link on top and set your timer
to 15 minutes only. When time runs out
then you're out of luck and the last laugh will be
mine.
8. 1. In the game of Counter Strike there are two teams
battling against each other. The Counter Terrorist and
the Terrorist. In this case the Terrorist need to plant the
bomb at the BOMBSITE. In order to do this they need
to take short routes to reach their destination and plant
the bomb. So now the terrorists need to find the
shortest route.
a.) How many ways can you go to T
SPAWN to the Bombsite?
b.)How many ways can you get to the
bombsite without going through the
enemies territory?
c.) What is the probability that you
will not walk through the enemy
territory?
10. a.) How many ways can you go from
T SPAWN to the Bombsite?
T SPAWN 1 1 1 1 1 1
The only way to 2 3 4 5 6 7
solve this 1
problem is by
using Pascal's
3
Triangle. 6 10 15 21 28
1
4 10 20 35 36 64
1
5 15 35 70 106 170
1
BOMBSITE
6 21 56 232 402
126
1
11. a.) How many ways can you go from
T SPAWN to the Bombsite?
T SPAWN 1 1 1 1 1 1
The only way to 2 3 4 5 6 7
solve this 1
problem is by
using Pascal's
Triangle. 3 10 15
6 21 28
1
Pascal's Triangle
works by
adding the top
4 10 20 35 36 64
square from the 1
square that you
want to figure
out by the left 5 15 35 70 106 170
side's number. 1
BOMBSITE
6 21 56 232 402
126
1
12. a.) How many ways can you go from
T SPAWN to the Bombsite?
T SPAWN 1 1 1 1 1 1
The only way to 2 3 4 5 6 7
solve this 1
problem is by
using Pascal's
Triangle. 3 10 15
6 21 28
1
Pascal's Triangle
works by
adding the top
4 10 20 35 36 64
square from the 1
square that you
want to figure
out by the left 5 15 35 70 106 170
side's number. 1
BOMBSITE
6 21 56 232 402
126
1
13. a.) How many ways can you go from
T SPAWN to the Bombsite?
T SPAWN 1 1 1 1 1 1
The only way to 2 3 4 5 6 7
solve this 1
problem is by
using Pascal's
Triangle. 3 10 15
6 21 28
1
Pascal's Triangle
works by
adding the top
4 10 20 35 36 64
square from the 1
square that you
want to figure
out by the left 5 15 35 70 106 170
side's number. 1
BOMBSITE
6 21 56 232 402
126
1
14. a.) How many ways can you go from
T SPAWN to the Bombsite?
T SPAWN 1 1 1 1 1 1
The only way to 2 3 4 5 6 7
solve this 1
problem is by
using Pascal's
Triangle. 3 10 15
6 21 28
1
Pascal's Triangle
works by
adding the top
4 10 20 35 36 64
square from the 1
square that you
want to figure
out by the left 5 15 35 70 106 170
side's number. 1
BOMBSITE
6 21 56 232 402
126
1
*You have 402 ways to get from T SPAWN to the
BOMBSITE
17. b.)How many ways can you get to the bombsite
without going in the enemy's territory?
1 1 1
T SPAWN 1 1 1
The enemy's territory is
in blue. To do this you
need to use the Pascal's 2 3 4 5 6 7
1
Triangle. This time we
got 10 in red font by just
copying the 10 below 3
6 11 18
the 6 1 5
4 10 10 15 26 44
1
5 15 25 40 66 110
1
BOMBSITE
6 21 51 152 262
86
1
18. b.)How many ways can you get to the bombsite
without going in the enemy's territory?
1 1 1
T SPAWN 1 1 1
The enemy's territory is
in blue. To do this you
need to use the Pascal's 2 3 4 5 6 7
1
Triangle. This time we
got 10 in red font by just
copying the 10 below 3
6 11 18
the 6 1 5
Now we do the same 15
thing for the number 5 1 4 10 10 26 44
since we're considering
this whole BLUE box as
one SQUARE so we 5 15 25 40 66 110
just add them up and 1
use the Pascal's triangle. BOMBSITE
6 21 51 152 262
86
1
19. b.)How many ways can you get to the bombsite
without going in the enemy's territory?
1 1 1
T SPAWN 1 1 1
The enemy's territory is
in blue. To do this you
need to use the Pascal's 2 3 4 5 6 7
1
Triangle. This time we
got 10 in red font by just
copying the 10 below 3
6 11 18
the 6 1 5
Now we do the same 15
thing for the number 5 1 4 10 10 26 44
since we're considering
this whole BLUE box
5 66 110
as one SQUARE so we 15 25 40
1
just add them up and
use the Pascal's triangle. BOMBSITE
6 21 51 152 262
86
1
* Therefore, after you use the Pascal's triangle
you should get an answer of 262 ways of going
to the BOMBSITE without going in the enemies
territory.
20. b.)How many ways can you get to the bombsite
without going in the enemy's territory?
CT SPAWN
1 1 1
T SPAWN 1 1 1
The enemy's territory is
in blue. To do this you
need to use the Pascal's 2 3 4 5 6 7
1
Triangle. This time we
got 10 in red font by just
copying the 10 below 3
6 11 18
the 6 1 5
Now we do the same 15
thing for the number 5 1 4 10 10 26 44
since we're considering
this whole BLUE box
5 66 110
as one SQUARE so we 15 25 40
1
just add them up and
use the Pascal's triangle. BOMBSITE
6 21 51 152 262
86
1
* Therefore, after you use the Pascal's triangle
you should get an answer of 262 ways of going
to the BOMBSITE without going in the enemies
territory.
21. c.) What is the probability that you will not walk in
the enemy's territory? 1 1 1 1 1 1
2 3 4 5 6 7
1
262 131 1
3
6 10 15 21 28
=
402 201 4 10 20 35 36 64
5 15 35 70 106 170
1
BOMBSITE
6 21 56 232 402
126
T SPAWN 1 1 1 1 1 1
262 131 1
2 3 4 5 6 7
= CT SPAWN
3
6 11 18
402 201
1 5
4 10 10 15 26 44
1
* For this problem you just need to 1
5 15 25 40 66 110
simplify 262 and 402 to get the probability
BOMBSITE
6 21 51 152 262
86
1
22. c.) What is the probability that you will not walk in
the enemy's territory? 1 1 1 1 1 1
2 3 4 5 6 7
1
262 131 1
3
6 10 15 21 28
=
402 201 4 10 20 35 36 64
5 15 35 70 106 170
1
BOMBSITE
6 21 56 232 402
126
T SPAWN 1 1 1 1 1 1
262 131 1
2 3 4 5 6 7
= CT SPAWN
3
6 11 18
402 201
1 5
4 10 10 15 26 44
1
* For this problem you just need to 1
5 15 25 40 66 110
simplify 262 and 402 to get the probability
BOMBSITE
6 21 51 152 262
86
1
24. 2. There are 20 CounterTerrorists all
around the map. 5 of them
carry a grenade, which is 25 percent,
and the rest of them do not have
enough money to buy some.
a.) Calculate the 95 percent confidence
interval for the number of people carrying
a grenade.
b.) Calculate the 95 percent confidence
interval for the percent of people carrying
a grenade.
c.) Calculate the percent margin of error.
25. 2. There are 20 CounterTerrorists all around the map. 5 of
them carry a grenade, which is 25 percent, and the rest
of them do not have enough money to buy some.
±1.95 = .9488
a.) Calculate the 95 percent confidence interval
for the number of people carrying a grenade.
±1.96 = .9500
n = 20 ±1.97 = .9505
p= .25
q= .75 N = Number of trials
m= np = 20 = 5 P= probability of success
nq= 15 Q= probability of failure
Dist. is approx. normal m= np= means number of trials x the probability
that they carry a grenade.
20(.25)(.75)
= 1.9364
Sigma sign (a.k.a)
Standard Deviation
±1.96 = .9500 The Magic Number for finding
the 95% confidence interval
26. 2. There are 20 CounterTerrorists all around the map. 5 of
them carry a grenade, which is 25 percent, and the rest
of them do not have enough money to buy some.
±1.95 = .9488
a.) Calculate the 95 percent confidence interval
for the number of people carrying a grenade. ±1.96 = .9500
n = 20 ±1.97 = .9505
p= .25
q= .75 5 1.96(1.94) = 1.2
m= np = 20 = 5 5 + 1.96 (1.94= 8.8
nq= 15
Dist. is approx. normal
20(.25)(.75) Remember: The magic number for
= 1.9364 finding the 95% confidence
interval is 1.96
27. 2. There are 20 CounterTerrorists all around the map. 5 of
them carry a grenade, which is 25 percent, and the rest
of them do not have enough money to buy some.
±1.95 = .9488
a.) Calculate the 95 percent confidence interval
for the number of people carrying a grenade.
±1.96 = .9500
n = 20 ±1.97 = .9505
p= .25
q= .75 5 1.96(1.94) = 1.2
m= np = 20 = 5 5 + 1.96 (1.94= 8.8
nq= 15
Dist. is approx. normal
20(.25)(.75) Remember: The magic number for
a 95% confidence interval is 1.96
= 1.9364
Therefore, confidence interval for the
number of people carrying a grenade is
1.2 to 8.8
28. 2. There are 20 CounterTerrorists all around the map. 5
of them
carry a grenade, which is 25 percent, and the rest of
them do not have enough money to buy some.
b.) Calculate the 95 percent confidence interval
for the percent of people carrying a grenade.
1.2 to 8.8 confidence interval in percent
1.2 = .06x100
20 = 6% (6 , 44) is the confidence
interval for the percent of
8.8 = .44x100 people carrying a grenade
20 = 44%
29. 2. There are 20 CounterTerrorists all around the map. 5
of them
carry a grenade, which is 25 percent, and the rest of
them do not have enough money to buy some.
c.) Calculate the number margin of error.
±1.96(1.94) = 3.80
* 3.80 is the number of margin error
73. a.) What is the probability that General Rad will win the bet?
Kyle
Allan
Kyle
Allan
Kyle
Rob
Kyle
Rob
Rob Allan
Rob
Allan Allan Rob
Kyle Kyle
Allan
Kyle Allan
Jason Jason Kyle
Kyle Jason
Allan
Kyle
Allan Jason
Jason Jason
Allan
Rob Kyle
Rob
Allan Kyle Rob
Kyle Jason Kyle
Jason
Rob Kyle
Jason
Kyle Rob Jason
Jason
Rob
Rob Allan
Jason Allan
Rob
Rob Jason
Allan
Allan Allan
Rob
Jason
Jason Jason
Rob
85. A pistol factory produces 42 pistols per month. Two percent of all
So how do we
the pistols are defective. What is the probability of getting four
answer now? I
need help...
defective pistols in one week?
'S' and 'F' (Success and Failure) are the possible outcomes of a
trial in a binomial experiment, and 'p' and 'q' represent the
probabilities for 'S' and 'F.'
• P(S) = p • P(F) = q = 1 p
• n = the number of trials
• x = the number of successes in n trials
• p = probability of success
• q = probability of failure
• P(x) = probability of getting exactly x successes in n trials
Remember that 'Success' in this case, is the probability of selecting a
defective pistol.
89. To find out what the 5 digit codes are, you will need to figure
out the riddle of the whole presentation. You must be able to
answer the codes correctly in order for the bomb to be defused.
FINAL CHALLENGE:(BOMB DEFUSING)
1. What is 8*8 divided by 2 five times?
90. To find out what the 5 digit codes are, you will need to figure
out the riddle of the whole presentation. You must be able to
answer the codes correctly in order for the bomb to be defused.
FINAL CHALLENGE:(BOMB DEFUSING)
2. What do you call the black ball in the game of billiards that is part of
the first question?
91. To find out what the 5 digit codes are, you will need to figure
out the riddle of the whole presentation. You must be able to
answer the codes correctly in order for the bomb to be defused.
FINAL CHALLENGE:(BOMB DEFUSING)
3. What is Mr. K's favourite number + add .5 and .5 five and you get
the third code?
92. To find out what the 5 digit codes are, you will need to figure
out the riddle of the whole presentation. You must be able to
answer the codes correctly in order for the bomb to be defused.
FINAL CHALLENGE:(BOMB DEFUSING)
4. Mr.K's cat passed away in 2004 by deleting the first 3 digits what do you get
as how many cats does Mr.K have left?
93. To find out what the 5 digit codes are, you will need to figure
out the riddle of the whole presentation. You must be able to
answer the codes correctly in order for the bomb to be defused.
FINAL CHALLENGE:(BOMB DEFUSING)
5. Mr.K's favourite number divide it by 3 and add one to it.
94. IF YOU GET THESE CODES CORRECTLY YOUR MISSION IS DONE
AND THERE WILL BE NO MORE TERRORISM IN THIS WORLD.
2 8 7 4 3