### What is capacity with two shifts

Assignment Help Basic Computer Science
##### Reference no: EM1362961

Given the following data for Albert's fabricating production area:

Fixed costs for one shift = \$60,000
Unit variable cost = \$7
Selling price = \$12
Number of machines = 5
Number of working days in year= 340
Processing time per unit = 60 minutes

a. What is the capacity with a single 8-hour shift?
b. What is the capacity with two shifts? The additional fixed cost for a second shift is \$40,000.
c. What is the break-even volume with a single-shift operation?
d. What is the maximum revenue with a single shift?
e. What is the break-even volume with a two-shift operation?
f. Draw the break-even chart.

### Previous Q& A

#### Sales force management - chemgrow

Prepare a memo to Mr. Kee justifying your decisions and supporting the new computer report you are requesting. Respond to these questions using APA format.

#### Basics to food safety

Do you believe that the FDA, the USDA, and various local and state governments have this problem under control. In other words, are you concerned about food safety?

#### Calculate the dollar-weighted return

Veronica Madrid start the year with a portfolio valued at \$10,000 and made a contribution to and a withdrawal from this portfolio over the next three months.

#### Explain whopper brings suit for patent infringement

Explain Whopper brings suit for patent infringement and Bubble countersues to have Whopper's patent revoked and Who will win? Explain.

The fixed manufacturing overhead variance caused by actual activity being different from the estimated activity used in calculating the predetermined overhead application rate is called the:

#### Career development-self-awareness and career success

Explain why is understanding yourself important in your career development and How can you ensure that an employer will realize that you have a clear grasp of who you are and what you have to offer?

#### Write standalone program with recursive method string

Write a standalone program "TransformCharacters.java" with a recursive method String string changeCharacters(String string) that takes as an argument a string.

#### Calculating tax liability-marginal rate

Williams Inc reports total net income of \$130,000 during 2012. This includes \$10,000 of income from 5.5% Orange County municipal bonds. Thus the Corporation's taxable income is equal to \$120,000.

#### Population-based approach to prevent childhood obesity

Some authorities have indicated that children spend as much time watching television as they do in school, and studies indicate a correlation between high television viewing in children with obesity.

#### Explain and analyze the collective bargaining process

Explain and Analyze the collective bargaining process and negotiating labor agreements and resolving impasses

### Similar Q& A

#### Executing intrusion detection system

Your company is trying to decide whether to execute intrusion detection system (IDS), or intrusion prevention system (IPS).

#### System designer to make sure implementation went smoothly

In new system implementation, what would you do as lead system designer to make sure implementation went smoothly?

#### Creating cut-over plan for alternate processing site

Create cut-over plan for alternate processing site based on given below. Consider LAN for small 100-person business, Pixel Inc. Business occupies one floor in an office building.

#### Minimum-spanning-tree problem for lp formulation

The minimum-spanning-tree problem is to find an acyclic subset T + E that connects all of the vertices and whose total weight c(T ) = ce is minimized. Write down the dual of your LP formulation.

#### Identify all substrings to create one of five given words

Given a string of letters, identify all substrings that create one of five given words. For example, if the words (arguments) are: structure; such; system; blue.

#### Detection software automatically analyzes network traffic

What detection software automatically analyzes all network traffic. Assesses system vulnerabilities, recognizess any unauthorized access (intrusions).

#### Installation options for customer tracking system

Which installation options are available for the Customer Tracking System? Which would you recommend? How can you determine if implementation has been successful?

#### Explain how backups are taken using microsoft access

Explain how backups are taken using Microsoft Access. What are the issues that must be considered before starting the backup? When an Access database is restored from backup, what issues need to be considered regarding the data?

#### What techniques have greatest impact on website

What web design techniques would you use to help a user with these disabilities? What techniques might have the greatest impact on your website and why?

#### Ways to avoid communication pitfalls

Based on the section on "Watch out for communication pitfalls" in the Bateman and Snell text, describe some ways that Lei could have avoided this situation.

#### Training data from gaussian distribution of variance

Suppose we have training data from a Gaussian distribution of known covariance S but unknown mean Mu.

#### Explain two standard apis supported by jaxp

Explain two standard APIs supported by JAXP (Java API for XML processing) and give a comprison between two mechanism.