Analysis of a small publishing company

Assignment Help Computer Network Security
Reference no: EM1381218

A small magazine publisher wishes to determine the best combination of 2-possible magazines to print for the month of July. Backyard magazine, which he has published for years, is a steady seller. The publisher wants to make sure he prints at least 400 copies to meet his demand from the newsstands. Porch is a new venture, and has received the benefit of a great deal of advance publicity. The publisher is hoping that by positioning it near Backyard he will pick up some spill over demand from his regular readers. Also, he is hoping that the advertising campaign will bring in a new type of reader from a potentially very lucrative market. He wants to print at least 300 copies of Porch. The cover price for Backyard is $3.50; he is pricing Porch at $4.50, because of the magazines in this market seem to be able to command a higher price. The publisher has 50 hours of printing time available for this production run. He also has 30 hours in the collation department, where the magazines are actually assembled. Backyard requires 2.5 minutes per copy to print and 1.8 minutes per copy to collage. Because of its larger size, Porch will require 3 minutes to print and 2 minutes to collate. The publisher wants to maximize his revenues

1. Answer the following items concerning the Backyard case:
a. What is the publisher trying to optimize? Is he trying to maximize or minimize?
b. Write the objective function to support this analysis.
c. What inputs do you need to support your analysis?
d. Is there any extraneous data you have been given that you will not need?
e. What criteria has the publisher given you to support the analysis?
f. Create a spreadsheet model that supports your analysis.
g. Look carefully at your criteria. Surplus time is when you have extra time that is not being used. Is all of the printing time being used? What about the collation time? Describe what this may mean to you as the publisher.

 

Reference no: EM1381218

Questions Cloud

What would you do if you were in a position at nike : What would you do if you were in a position at Nike to decide whether to continue or revise your labor practices in a foreign country?
Question about program consistency : Please provide an example of a event where consistency has caused too many problems? Is there a program you have used in your own work environment where consistency has caused problems?
How do managers generally describe organizational authority : What five methods have traditionally been used to departmentalize work and workers? Give one advantage and one disadvantage of each. How do managers generally describe organizational authority?
Effective biometric systems : Discuss why are many of the reliable, effective biometric systems perceived as intrusive by users and what are stateful inspection firewalls and how do the tables track the state and context of each exchanged packet?
Analysis of a small publishing company : A small magazine publisher wishes to determine the best combination of 2-possible magazines to print for the month of July. Backyard magazine, which he has published for years, is a contant seller.
Increment value in one cell in excel : Discuss how to increment value in one cell in Excel if another cell is populated. or example, I have cell A that has values such as 1, 2, 3, 4 etc...
How will you personally balance this shift : how will you personally balance this shift in the organizations' direction, with your biblical worldview?
Soapscum window washing wants to keep track : Soapscum Window Washing wants to keep track of its employees and the projects to which they are assigned. They need to keep track of some basic employee contact information
Determine the optimal linear predictor : Determine the optimal linear predictor for a given order N and DPCM simulation and write a graphical user interface that has least the following functions

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  How adequate destruction of materials ensuring privacy

How will your company ensure adequate destruction of the materials thus ensuring an individual's privacy? Will any state-wide, national, or industry standards be met? If so, which ones and how?

  Demonstrate that hash value collides with original value

Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's original hash.

  Determine the value of the symmetric key

Discuss some of the attacks on the Diffie Hellman key exchange protocol we discussed in the lecture. Present your solution for avoiding such attacks.

  Increment value in one cell in excel

Discuss how to increment value in one cell in Excel if another cell is populated. or example, I have cell A that has values such as 1, 2, 3, 4 etc...

  Discretionary and mandatory access control

Logic bombs, War dialing, Ping of death attack, steganography, RSA scheme, digital signature, A chain of certificates, A certificate revocation list, A trust anchor, asymmetric algorithm used by PGP, IPSec mode, IP virtual Private Networks

  Security goal if someone modifies critical information

If an attacker breaks into a corporate database, modifies some information and deletes critical files, against what security goal or goals is this attack aimed?

  Certification and accreditation for commercial systems

Using Network Security Certification and Accreditation for commercial systems. Do you think a formal process like Certification & Accreditation is appropriate to use for commercial systems in private industry (Why or Why Not)?

  Intrusion detection system (ids)

concept of Data, information and knowledge in information warfare, politically motivated computer misdeeds, McClintock Manufacturing, Percentage of Windows systems that run antivirus software that is updated each day, network traffic that is evaluate..

  Computer forensics investigation

After a computer forensics investigation, you require to meet with your section or group of fellow investigators and critique the case in an effort to improve your work.

  Scenario-based project

Authentic Assessment:   The scenario will be a realistic, enterprise-level situation encompassing diverse networking components, including Microsoft Windows, Linux, VoIP, security, wireless, and Cisco technologies.

  Use prevention-detection and recovery to secure records

Iit is highly desirable that whoever treats you has access to your record. Using your justification how would you use prevention, detection and recovery to secure the records?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd