Reference no: EM13870209
1. You are a purchasing manager in charge of stocking a certain type of transformer for a large electric utility. Weekly demand among your field crews for these transformers is normally distributed, with a mean of 100 and a standard deviation of 50. Holding costs are 25 percent, and you must hold a level of inventory corresponding to a cycle service level of 95 percent. You are faced with two suppliers, Reliable Components and Value Electric, that offer the following terms. Reliable sells the transformer for $5,000 with a minimum order of 100, and a lead time of 1 week with a standard deviation of 0.1 week, value sells the transformer for $4,800, has a minimum batch of 1000 a lead time of 5 weeks, and a lead-time standard deviation of 4 weeks.
a. What is the annual cost of using reliable componets as a suppliers?
b. What is annual cost of using Value Electric as a supplier?
c. Which supplier would you choose?
d. If you could use both suppliers, how would you structure your order?
2. Consider a manufacturer selling DVDs to a retailer for $6 per OVD. The production cost of each DVD is $1 and the retailer prices each DVD at $1 0. Retail demand for DVDs is nor-mally distributed, with a mean of 1,000 and standard devia¬tion of 300. The manufacturer has offered the retailer a quantity flexibility contract with α = β = 0.2. The retailer places an order for 1,000 units. Assume that salvage value is zero for both the retailer and the manufacturer.
a. What is the expected profit for the retailer and manufacturer?
b. How much will profit increase for the retailer if α increases to 0.5?
c. How much will profit increase for the retailer if β increases to 0.5 (keeping α at 0.2)?
3. Stacks of paper arrive at a trimming process with interarrival times of EXPO (10); all time are in minutes and the first stack arrives at time 0. There are two trimmers, a primary and a secondary. All arrivals are sent to the primary trimmer. If the queue in front of the primary trimmer is shorter than five, the stack of paper enters that queue to wait to be trimmed by the primary trimmer, an operation of duration TRIA (9, 12, 15). If there are already five stacks in the primary queue, the stack is balked to the secondary trimmer (which has an infinite queue capacity) for trimming, of duration TRIA (17, 19, 22). Run your simulation for a single replication of 5,000 minutes. Collect information about cycle time, resource utilization, number in queue, and time in queue.
Describes the system administration task
: Your company is currently planning to automate many different system administration tasks. Your manager has asked you to research a system administration task and implement it using VBScript. In addition, your manager would like to see both a proposa..
|
Compute janice morgans 2014 federal income tax payable
: Compute Janice Morgans 2014 Federal income tax payable (or refund due). If you use tax forms for your computations, you will need Forms 1040 and 4562 and Schedules A, B, and C.
|
The largest available hole in the main memory
: In which of the storage placement strategies a program is placed in the largest available hole in the main memory?
|
Basic philosophies of the Phenomenological
: it is necessary for you to determine which two personality theories to apply to the character in your chosen film. Choose two of the following theories explored in this course:Psychodynamic,Phenomenological,Behavioral.
|
What is annual cost of using reliable componets as suppliers
: What is the annual cost of using reliable componets as a suppliers and what is annual cost of using Value Electric as a supplier?
|
outlining the origins of the mental health literacy paradigm
: ‘‘mental health literacy''. After outlining the origins of the mental health literacy paradigm, I shall do my best to explain why its application to eating-disordered behavior has merit and how research in this field might be progressed.
|
Find an article in the news regarding wireless hacking
: Research via the internet and find an article in the news regarding wireless hacking, hardware hacking, or other security breach.As security and IT change so rapidly, your article should be no older than 2007 (i.e. Less than 5 years old).Summarize th..
|
Write a program that takes an integer on the command line
: Write a program that takes an integer on the command line, checks that it is not negative or bigger than 200 (in which case a suitable message should be printed and no computation performed) and then prints it out followed by every number
|
Combines the separately compiled modules of a program
: Loader is a system program that combines the separately compiled modules of a program into a form suitable for execution
|