Identify the binding and non-binding constraints, Operating System

Assignment Help:

Crumbles Bakery needs to decide how many and what types of cupcakes to make today. Currently, they make two types of cupcakes: chocolate cupcakes and carrot cake cupcakes. Chocolate cupcakes sell for a profit of $1 per cupcake, while carrot cake cupcakes sell for a much higher profit of $4 per cupcake. There are two main ingredients in making their cupcakes: flour and sugar. Each chocolate cupcake requires 4 cups of flour and 2 cups of sugar. Each carrot cake cupcake requires 3 cups of flour and 4 cups of sugar. Crumbles has a total of 40 cups of flour and 36 cups of sugar to use. Also, they would like to make at least 3 carrot cake cupcakes. In order to determine how many of each type of cupcake to make, Crumbles has setup the linear program below. Find the optimal number of each type of cupcake to make and the optimal profit of Crumbles by solving the linear program. Use both (a) the enumerating the corner points method and (b) the iso-profit line method. Also identify the binding and non-binding constraints and the slack of each constraint.

Show all work.

maximize Xl + 4X2

subject to

4XI + 3X2 < 40

2XI + 4X2 < 36

X2 > 3

Xl, X2 > 0

 


Related Discussions:- Identify the binding and non-binding constraints

What is direct access, Normal 0 false false false EN-IN...

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

What is a resource-allocation graph, What is a resource-allocation graph? ...

What is a resource-allocation graph? Deadlocks can be explained more precisely in terms of a directed graph called a system resource allocation graph. This graph having of a se

Comparing, Compare 2 different operating systems.

Compare 2 different operating systems.

Define semaphore, Define semaphore A semaphore is a protected abstract ...

Define semaphore A semaphore is a protected abstract or variable data type that constitutes the classic method for restricting access to shared resources like shared memory in

Main advantage of the layered approach to system design, What is the main a...

What is the main advantage of the layered approach to system design? As in all cases of modular design, designing an operating system in a modular way has several benefits. Th

What is internal fragmentation?, What is internal fragmentation? Consid...

What is internal fragmentation? Consider holes of 20k assume the process requests 18 bites. If we allocate accurately the request block, we are left with a hole of 2k. The over

Bag of tasks, The producer-consumermodel above has a standard human analogy...

The producer-consumermodel above has a standard human analogy of an assembly line. Humans have specialized skills, however, whereas threads running the same program do not need to

Define computer system environment, Q. List three instances of deadlocks th...

Q. List three instances of deadlocks that aren't related to a computer system environment. Answer: Two cars passage a single-lane bridge from opposite directions.

What is a file path name, What is a file path name? A list of the subdi...

What is a file path name? A list of the subdirectories, directories, and files we must traverse to reach a file from the root directory.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd