Description
There are two problems and solutions attached. I need an explanation on how the problem was solved. Thanks!
Unformatted Attachment Preview
1.)
(Page 114, exercise 3.26)
Write a program that prompts the user to enter
an integer and determines whether it is divisible by 5 and 6, whether it is divisible
by 5 or 6, and whether it is divisible by 5 or 6, but not both. Here is a sample run
of this program:
import java.util.Scanner;
public class Exercise_03_26 {
public static void main(String[] args) {
Scanner input = new Scanner(System.in); // Create Scanner object
// Prompt user to an integer
System.out.print("Enter an integer: ");
int number = input.nextInt();
// Determine whether it is divisible by 5 and 6
// Display results
System.out.println("Is 10 divisible by 5 and 6? " +
((number % 5 == 0) && (number % 6 == 0)));
System.out.println("Is 10 divisible by 5 or 6? " +
((number % 5 == 0) || (number % 6 == 0)));
System.out.println("Is 10 divisible by 5 of 6, but not both? " +
((number % 5 == 0) ^ (number % 6 == 0)));
}
}
2.)
(Page 284, exercise 7.28)
Write a program that prompts the user to enter 10 integers and displays all combinations of picking two numbers from the 10 numbers:
import java.util.ArrayList;
import java.util.Scanner;
public class combinations {
/**
* @param args
*/
public static void main(String[] args) {
System.out.println("Enter 10 integers");
Scanner sc = new Scanner(System.in);
String s = sc.next();
ArrayListints= new ArrayList();
ArrayListcombos = new ArrayList();
while(ints.size()
Purchase answer to see full attachment
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
I was having a hard time with this subject, and this was a great help.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
Southern New Hampshire Network Config Model Using Microsoft Visio Discussion
OverviewUnderstanding basic network terminology and the rationale for specific network configurations is a key skill for s ...
Southern New Hampshire Network Config Model Using Microsoft Visio Discussion
OverviewUnderstanding basic network terminology and the rationale for specific network configurations is a key skill for succeeding in the information technology field. In this activity, you will demonstrate your understanding of both network terminology and systems mapping to create a home network diagram and define common networking terms.PromptTo demonstrate your understanding of these concepts, address the following:Define the following IT concepts, and describe their role and importance within a network:IP address and DNSServer and clientVPNFirewallsLANs and WANsRead the following scenario and create a network configuration diagram in Microsoft Visio using either the Basic Network Diagram or Detailed Network Diagram symbol sets:Georgia Springer runs a small accounting firm with two partners and a secretary. Each employee has a personal workstation. Client information is stored on a central server shared between all workstations in the office. There is a single networked device that functions as a copier, printer, fax machine, and scanner. The office’s network has a firewall and connects to the internet through a cable modem.Compose a brief 100- to 200-word summary of the network configuration you modeled in Visio, including a description of the network configurations you would recommend. In your summary, use the vocabulary discussed in the first part of this assignment and describe how these components work together within the context of a network.Guidelines for SubmissionYour submission must include:A bulleted list that defines the identified key terms and concepts for network configurations.A model of a networked system using Microsoft Visio.Note: You may use either the Basic Network Diagram or Detailed Network Diagram symbol sets.A brief one- to two-paragraph summary of the home network configuration following your updates.please see RUBRIC attached
short paper 7
WEEK - PATCH MANAGEMENT STRATEGY RESEARCH PAPERThis research paper will focus on issues and concerns with Patch Management ...
short paper 7
WEEK - PATCH MANAGEMENT STRATEGY RESEARCH PAPERThis research paper will focus on issues and concerns with Patch Management. With the advent of many types of software and systems, patch management is major nightmare. Patching the system may cause the system to crash, and not patching it can leave it vulnerable to attacks. Please research the issues and concerns with patch management and provide your views on the topic. Please consider this at an enterprise level where the complexity is increased exponentially with the increase in the number of systems.Paper Requirements:APA FormatNumber of Pages: Minimum of 3 Pages not including Cover, Table of Contents and References.Safe – Assignment comparison will be donePatch Management methodology white paper in the SANS reading rooms would serve as a good start for your research.
HCS 465 UOPX Health Care Issues Concerns & Trends Annotated Bibliography
Use the University Library to locate peer-reviewed research articles related to a research study about health or health ca ...
HCS 465 UOPX Health Care Issues Concerns & Trends Annotated Bibliography
Use the University Library to locate peer-reviewed research articles related to a research study about health or health care issues, concerns, or trends.The research article must describe a research study, not an editorial or brief.The research study must be based in the United States from 2010 to the present.It is recommended that you select health topics of interest to you or your job, with no complex statistical analyses. Review the Researching Articles in the University Library Tutorial for help finding articles. Select at least 3 peer-reviewed* articles to use to complete an annotated bibliography. The 3 research articles can be based on the same or different topics. Topic ideas can include (but are not limited to):Adolescent obesity (select different geographic locales: urban vs rural)Infection rates among ICU patientsReadmission rates for congestive heart failure patientsPatient satisfaction or patient experience of carePopulation health management in diabetes careCare coordination or care continuumPatient safety or quality managementCancer screening compliance, such as mammography, colonoscopy, or Pap smearComplete the annotated bibliography based on the 3 articles you selected from the University Library.Review the sample annotated bibliography provided by the University Library. Be sure to do the following for each bibliography:Summarize the research study in your own words (at least 150 words).Include the major areas of the research study, such as the sample, geographic location, and the outcome.Bibliographies should not include any direct quotes or in-text citation.Discuss how you determined the selected articles are peer reviewed.*Note: One research article will be used in the Week 3 Learning Team assignment, Components of a Research Study. Format your assignment according to APA guidelines. Remember to alphabetize your annotated bibliography.Submit your assignment.
Calculate ARO, ALE, and CBA, computer science homework help
Q1. Calculate ARO, ALE, and CBAOne year ago, the Mesusa Corporation conducted a threat evaluation and created a ...
Calculate ARO, ALE, and CBA, computer science homework help
Q1. Calculate ARO, ALE, and CBAOne year ago, the Mesusa Corporation conducted a threat evaluation and created a list of threats, the cost per incident and the projected frequency of occurrence. During the year, Mesusa decided to implement controls designed to reduce the cost per incidence and the number of threats. The spreadsheet, MesusaControls.xls, indicates thepre-control cost and frequency of occurrence, the cost of controls for each type of threat, and the post-control cost and frequency of occurrence. Calculate the AROs, theALEs and the CBA for this initiative, and return the completed spreadsheet. You can use the websites linked above to help you out. Please include your name on your spreadsheet before submission.NOTE: The spreadsheet is provided below.Submission RequirementsFormat: Microsoft ExcelFont: Arial, 12-PointReference:Instructor NotesStudents usually have trouble with calculating ALE, SLE, and ARO. You may want to take another look at this before you start your homework.ALE is a common quantitative method for assessing risk.The first step in calculating ALE is to calculate Single Loss Expectancy (SLE). --> SLE = asset value * exposure factorALE is then calculated by multiplying SLE by Annualized Rate of Occurrence (ARO). --> ALE = SLE * AROFor example, to calculate the exposure factor, assume the asset value of a small office building and its contents is $2 million. Also assume that this building houses the call center for a business, and the complete loss of the center would take away about half of the capability of the company. Therefore, the exposure factor is 50 percent. The SLE is $2 million * 0.5 = $1 millionThe ALE is then calculated simply by multiplying the SLE by the number of times the event is expected to occur in a year, which is called the annualized rate of occurrence (ARO): --> ALE = SLE * ARO If the event is expected to occur once in 20 years, then the ARO is 1/20. Typically the ARO is defined by historical data, either from a company’s own experience or from industry surveys. Continuing our example, assume that a fire at this business’s location is expected to occur about once in 20 years. Given this information, the ALE is: $1 million * 1/20 = $50,000. Therefore, in order to protect the office building the company should spend no more than $50,000 on countermeasures protecting the building from complete loss. •Office building and contents = $2 million •Exposure factor 50% •SLE = $2 million * 0.5 = $1 million •ALE = SLE * ARO •ARO = 1/20 (One occurrence every 20 years) •ALE = $1 million * 1/20 = $50,000The Mesusa Controls.xls spreadsheet is needed for assignment.MesusaControls-yourname(1).xls Q2. Write about Importance of Firewall in Network Security ? and also Write about future Generation Firewalls.Requirement : One to One and Half Page. Please Note that it's Overall Two Page work and i am also Giving Two days time for this. So, $10 is the maximum that i can pay for this question. But, I promise that will assign 70% of my coming works to you. (I post 10 - 20 works every week).
Week 3: Access Controls and Security Mechanisms, computer science homework help
The case study company has provided you with the flexibility to identify many different information systems that are used ...
Week 3: Access Controls and Security Mechanisms, computer science homework help
The case study company has provided you with the flexibility to identify many different information systems that are used by the employees. Some systems need strict access control while others should be available to everyone. What access-control methods need to be employed for the various systems? How can the company protect the new consultant network while at the same time providing the protection of data that the stakeholders and customers require?In addition, you have been asked to describe 2 access control mechanisms and consider if they can be used in the organization. Describe single sign-on (SSO) and virtual private network (VPN) technology and if they can be used in the company.Complete the following section for Week 3:Week 3: Access Controls and Security MechanismsFor each of the applications and systems that were described in IP 2, describe the access control mechanisms that are needed for each.Describe how the new expanded network can be protected through access control.Describe SSO and VPN technology, and discuss whether they can be used in the company.Worked ExamplePlease refer to the following worked example of this assignment based on the problem-based learning (PBL) scenario. The worked example is not intended to be a complete example of the assignment, but it will illustrate the basic concepts that are required for completion of the assignment, and it can be used as a general guideline for your own project. Your assignment submission should be more detailed and specific, and it should reflect your own approach to the assignment rather than just following the same outline.
Use a DSS tool demonstrate proficiency with Visual DSS™ (a DSS development language/DSS generator).
QUESTION 1YourCloud Pty Ltd is a cloud-based software development company located in Brisbane. The company is planning to ...
Use a DSS tool demonstrate proficiency with Visual DSS™ (a DSS development language/DSS generator).
QUESTION 1YourCloud Pty Ltd is a cloud-based software development company located in Brisbane. The company is planning to introduce new responsive cloud based software application into the market. In recent times, the dynamic market competition has created some bad software investment decisions. Now senior management require a thorough analysis of every new product that is introduced to market. As a senior business analyst, you have been appointed to advise the senior management on the feasibility of the new product.An initial analysis conducted by other analysts for the product claim the anticipated net present value (NPV) for the new product line is over $2 millionand they have recommended the manufacture of the product based on this assessment.Your taskis to use a decision support system (DSS) and report to the senior management on whether the claim of the NPV being over $2 million is correct or incorrect using the relevant information given in Table 1.Table 1: Summarised product detailsCost of production: $25.00 per unitAnnual overhead cost: $210,000 (cloud hosting is outsourced)Initial investment needed: $1,750,000Estimated selling price: $55.00 per unit Market at time of introduction: 420,000 units per yearMarket growth: 15% per yearMarket share: Most likely 10%Assumed economically useful lifetime: 4 years, commencing 2018Discount rate used to analyse new product proposals is 12%You need to assume that the overhead and initial investment occurs at the START of the respective year, profit occurs at the END of the year and initial investment was only applicable to the first year.YOUR TASK:Develop a decision support model using Visual DSS using the variables described above. Include comments within your Visual DSS model to explain the variables and your calculations. Based on the result of your model, what is the net present value (NPV)? Explain whether the claim regarding the NPV being above $2 million is correct or incorrect.HINTSNote that overhead and initial investment both occur at the START of the respective year, and profit occurs at the END of the year.You should use the correct NPV formula in Visual DSS. Use the ‘Help’ feature within the Visual DSS application and Visual DSS tutorial to learn more about the correct NPV formula, which is applicable to the scenario, described in Question 1. Initial investment is a startup cost applicable to the first period only (i.e. 2018). The NPV is only relevant for the first period (i.e. 2018) for decision-making – so only report it for that period. Using NPV (0) in Visual DSS will allow you to achieve this.QUESTION 2You are now asked to analyse the variations on the impact of market share, cost of producing, overheads and initial investment on the NPV. You need to conduct a risk analysis based on the information below:a) Market share: could be as low as 5% or as high as 15%, but is most likely to be 10%. The distribution could be represented using a triangular distribution.b) Unit costs can be described by normal distribution – mean of $30.00 and standard deviation of $12.00.c) Overhead: could be as low as $150,000 per year or as high as $350,000 per year, but is most likely to be $215,000 per year. The distribution could be represented using a triangular distribution.d) Initial investment requirements can be uniformly distributed between $1,000,000 and $2,000,000.The senior management decided on the following decision criteria:Decision criteria: The company is unwilling to proceed if there is a 20% or greater chance that the net present value will be less than $1,000,000 (1 million).YOUR TASK:You are required to use Visual DSS to run a Monte Carlo simulation (a Risk Analysis).Produce a cumulative probabilities report and graph for the above question. Based on results and the decision criteria, explain whether the senior management should accept or rejectthe proposed production of the product.QUESTION 3When the above analysis reached the Chief Executive Officer (CEO) of your company, he became very concerned about the assumptions made in the model. His experience has taught him to consider the uncertainty associated with selling price and production costs more thoroughly. He required further analysis to be done by incorporating the following uncertainties to Question 1 model:He applied different decision criteria and was willing to go ahead with the product proposal if there was at least an 80% chance the net present value would be greater than $1,850,000.YOUR TASK:You are required to use Visual DSS to run a Monte Carlo simulation (a Risk Analysis). Based on your results determine whether the CEO will proceed under these uncertainties.Produce a cumulative probabilities report and graph for the question. Based on results and the decision criteria, will the CEO accept or rejectthe proposed production of the product?A word document with the answers to the questions for Part A, Part B and Part C. For the second question, the screenshots can be included in the word document. The three Visual DSS files created for Part A (Questions 1, 2 and 3). Please ensure that these files are named clearly as Agt1_PartA_1.dss, Agt1_PartA_2.dss and Agt1_PartA_3.dss respectively. No zipfile is allowed for the submission.
Similar Content
DSRT 736 University of the Cumberlands Framework SQL Modification & Analysis Paper
Discuss the annotated bibliography of two different research articles for your topic._____________________________________...
IT 1430 Georgia Northwestern Technical College Behavioral Analysis Essay
Some advocate for surveillance of WFH employees, such as counting keystrokes, as a means of ensuring productivity and secu...
EC Action Forensic Case Study
There are two separate networks in the Action Forensics facility. The first network, shown here, is the administrative net...
How risk management is perceived by stakeholders?, assignment help
Discuss how risk management is perceived by stakeholders?...
SEU Good Design vs Bad Design Amazon vs Flipkart Websites Discussion
Distinguishing between two devices/applications/websites in same field and also explain how to improve them.
Topic of the ...
517 WK 8 Assignment 4 Communication and Risk
In this
assignment you are to submit the PowerPoint Presentation for the term paper.
This is the first part of your term...
Multitenant
Multitenancy refers to a type of software architecture in which a single server serves multiple tenants. A software multit...
Enterprise Social Media 2 .edited
Enterprise Social Media is a vital tool when it comes to boosting various kinds of business in terms of knowledge sharing,...
Project Management
How many different estimating techniques were discussed in the case? There are two estimation techniques in this case stud...
Related Tags
Book Guides
The Secret Life of Bees
by Sue Monk Kidd
The Bell Jar
by Sylvia Plath
The Calcutta Chromosome
by Amitav Ghosh
A Brief History of Humankind Sapiens
by Yuval Noah Harari
Robinson Crusoe
by Daniel Defoe
The Sixth Extinction An Unnatural History
by Elizabeth Kolbert
100 Side Hustles
by Chris Guillebeau
To the Lighthouse
by Virginia Woolf
The Odyssey
by Homer
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
Southern New Hampshire Network Config Model Using Microsoft Visio Discussion
OverviewUnderstanding basic network terminology and the rationale for specific network configurations is a key skill for s ...
Southern New Hampshire Network Config Model Using Microsoft Visio Discussion
OverviewUnderstanding basic network terminology and the rationale for specific network configurations is a key skill for succeeding in the information technology field. In this activity, you will demonstrate your understanding of both network terminology and systems mapping to create a home network diagram and define common networking terms.PromptTo demonstrate your understanding of these concepts, address the following:Define the following IT concepts, and describe their role and importance within a network:IP address and DNSServer and clientVPNFirewallsLANs and WANsRead the following scenario and create a network configuration diagram in Microsoft Visio using either the Basic Network Diagram or Detailed Network Diagram symbol sets:Georgia Springer runs a small accounting firm with two partners and a secretary. Each employee has a personal workstation. Client information is stored on a central server shared between all workstations in the office. There is a single networked device that functions as a copier, printer, fax machine, and scanner. The office’s network has a firewall and connects to the internet through a cable modem.Compose a brief 100- to 200-word summary of the network configuration you modeled in Visio, including a description of the network configurations you would recommend. In your summary, use the vocabulary discussed in the first part of this assignment and describe how these components work together within the context of a network.Guidelines for SubmissionYour submission must include:A bulleted list that defines the identified key terms and concepts for network configurations.A model of a networked system using Microsoft Visio.Note: You may use either the Basic Network Diagram or Detailed Network Diagram symbol sets.A brief one- to two-paragraph summary of the home network configuration following your updates.please see RUBRIC attached
short paper 7
WEEK - PATCH MANAGEMENT STRATEGY RESEARCH PAPERThis research paper will focus on issues and concerns with Patch Management ...
short paper 7
WEEK - PATCH MANAGEMENT STRATEGY RESEARCH PAPERThis research paper will focus on issues and concerns with Patch Management. With the advent of many types of software and systems, patch management is major nightmare. Patching the system may cause the system to crash, and not patching it can leave it vulnerable to attacks. Please research the issues and concerns with patch management and provide your views on the topic. Please consider this at an enterprise level where the complexity is increased exponentially with the increase in the number of systems.Paper Requirements:APA FormatNumber of Pages: Minimum of 3 Pages not including Cover, Table of Contents and References.Safe – Assignment comparison will be donePatch Management methodology white paper in the SANS reading rooms would serve as a good start for your research.
HCS 465 UOPX Health Care Issues Concerns & Trends Annotated Bibliography
Use the University Library to locate peer-reviewed research articles related to a research study about health or health ca ...
HCS 465 UOPX Health Care Issues Concerns & Trends Annotated Bibliography
Use the University Library to locate peer-reviewed research articles related to a research study about health or health care issues, concerns, or trends.The research article must describe a research study, not an editorial or brief.The research study must be based in the United States from 2010 to the present.It is recommended that you select health topics of interest to you or your job, with no complex statistical analyses. Review the Researching Articles in the University Library Tutorial for help finding articles. Select at least 3 peer-reviewed* articles to use to complete an annotated bibliography. The 3 research articles can be based on the same or different topics. Topic ideas can include (but are not limited to):Adolescent obesity (select different geographic locales: urban vs rural)Infection rates among ICU patientsReadmission rates for congestive heart failure patientsPatient satisfaction or patient experience of carePopulation health management in diabetes careCare coordination or care continuumPatient safety or quality managementCancer screening compliance, such as mammography, colonoscopy, or Pap smearComplete the annotated bibliography based on the 3 articles you selected from the University Library.Review the sample annotated bibliography provided by the University Library. Be sure to do the following for each bibliography:Summarize the research study in your own words (at least 150 words).Include the major areas of the research study, such as the sample, geographic location, and the outcome.Bibliographies should not include any direct quotes or in-text citation.Discuss how you determined the selected articles are peer reviewed.*Note: One research article will be used in the Week 3 Learning Team assignment, Components of a Research Study. Format your assignment according to APA guidelines. Remember to alphabetize your annotated bibliography.Submit your assignment.
Calculate ARO, ALE, and CBA, computer science homework help
Q1. Calculate ARO, ALE, and CBAOne year ago, the Mesusa Corporation conducted a threat evaluation and created a ...
Calculate ARO, ALE, and CBA, computer science homework help
Q1. Calculate ARO, ALE, and CBAOne year ago, the Mesusa Corporation conducted a threat evaluation and created a list of threats, the cost per incident and the projected frequency of occurrence. During the year, Mesusa decided to implement controls designed to reduce the cost per incidence and the number of threats. The spreadsheet, MesusaControls.xls, indicates thepre-control cost and frequency of occurrence, the cost of controls for each type of threat, and the post-control cost and frequency of occurrence. Calculate the AROs, theALEs and the CBA for this initiative, and return the completed spreadsheet. You can use the websites linked above to help you out. Please include your name on your spreadsheet before submission.NOTE: The spreadsheet is provided below.Submission RequirementsFormat: Microsoft ExcelFont: Arial, 12-PointReference:Instructor NotesStudents usually have trouble with calculating ALE, SLE, and ARO. You may want to take another look at this before you start your homework.ALE is a common quantitative method for assessing risk.The first step in calculating ALE is to calculate Single Loss Expectancy (SLE). --> SLE = asset value * exposure factorALE is then calculated by multiplying SLE by Annualized Rate of Occurrence (ARO). --> ALE = SLE * AROFor example, to calculate the exposure factor, assume the asset value of a small office building and its contents is $2 million. Also assume that this building houses the call center for a business, and the complete loss of the center would take away about half of the capability of the company. Therefore, the exposure factor is 50 percent. The SLE is $2 million * 0.5 = $1 millionThe ALE is then calculated simply by multiplying the SLE by the number of times the event is expected to occur in a year, which is called the annualized rate of occurrence (ARO): --> ALE = SLE * ARO If the event is expected to occur once in 20 years, then the ARO is 1/20. Typically the ARO is defined by historical data, either from a company’s own experience or from industry surveys. Continuing our example, assume that a fire at this business’s location is expected to occur about once in 20 years. Given this information, the ALE is: $1 million * 1/20 = $50,000. Therefore, in order to protect the office building the company should spend no more than $50,000 on countermeasures protecting the building from complete loss. •Office building and contents = $2 million •Exposure factor 50% •SLE = $2 million * 0.5 = $1 million •ALE = SLE * ARO •ARO = 1/20 (One occurrence every 20 years) •ALE = $1 million * 1/20 = $50,000The Mesusa Controls.xls spreadsheet is needed for assignment.MesusaControls-yourname(1).xls Q2. Write about Importance of Firewall in Network Security ? and also Write about future Generation Firewalls.Requirement : One to One and Half Page. Please Note that it's Overall Two Page work and i am also Giving Two days time for this. So, $10 is the maximum that i can pay for this question. But, I promise that will assign 70% of my coming works to you. (I post 10 - 20 works every week).
Week 3: Access Controls and Security Mechanisms, computer science homework help
The case study company has provided you with the flexibility to identify many different information systems that are used ...
Week 3: Access Controls and Security Mechanisms, computer science homework help
The case study company has provided you with the flexibility to identify many different information systems that are used by the employees. Some systems need strict access control while others should be available to everyone. What access-control methods need to be employed for the various systems? How can the company protect the new consultant network while at the same time providing the protection of data that the stakeholders and customers require?In addition, you have been asked to describe 2 access control mechanisms and consider if they can be used in the organization. Describe single sign-on (SSO) and virtual private network (VPN) technology and if they can be used in the company.Complete the following section for Week 3:Week 3: Access Controls and Security MechanismsFor each of the applications and systems that were described in IP 2, describe the access control mechanisms that are needed for each.Describe how the new expanded network can be protected through access control.Describe SSO and VPN technology, and discuss whether they can be used in the company.Worked ExamplePlease refer to the following worked example of this assignment based on the problem-based learning (PBL) scenario. The worked example is not intended to be a complete example of the assignment, but it will illustrate the basic concepts that are required for completion of the assignment, and it can be used as a general guideline for your own project. Your assignment submission should be more detailed and specific, and it should reflect your own approach to the assignment rather than just following the same outline.
Use a DSS tool demonstrate proficiency with Visual DSS™ (a DSS development language/DSS generator).
QUESTION 1YourCloud Pty Ltd is a cloud-based software development company located in Brisbane. The company is planning to ...
Use a DSS tool demonstrate proficiency with Visual DSS™ (a DSS development language/DSS generator).
QUESTION 1YourCloud Pty Ltd is a cloud-based software development company located in Brisbane. The company is planning to introduce new responsive cloud based software application into the market. In recent times, the dynamic market competition has created some bad software investment decisions. Now senior management require a thorough analysis of every new product that is introduced to market. As a senior business analyst, you have been appointed to advise the senior management on the feasibility of the new product.An initial analysis conducted by other analysts for the product claim the anticipated net present value (NPV) for the new product line is over $2 millionand they have recommended the manufacture of the product based on this assessment.Your taskis to use a decision support system (DSS) and report to the senior management on whether the claim of the NPV being over $2 million is correct or incorrect using the relevant information given in Table 1.Table 1: Summarised product detailsCost of production: $25.00 per unitAnnual overhead cost: $210,000 (cloud hosting is outsourced)Initial investment needed: $1,750,000Estimated selling price: $55.00 per unit Market at time of introduction: 420,000 units per yearMarket growth: 15% per yearMarket share: Most likely 10%Assumed economically useful lifetime: 4 years, commencing 2018Discount rate used to analyse new product proposals is 12%You need to assume that the overhead and initial investment occurs at the START of the respective year, profit occurs at the END of the year and initial investment was only applicable to the first year.YOUR TASK:Develop a decision support model using Visual DSS using the variables described above. Include comments within your Visual DSS model to explain the variables and your calculations. Based on the result of your model, what is the net present value (NPV)? Explain whether the claim regarding the NPV being above $2 million is correct or incorrect.HINTSNote that overhead and initial investment both occur at the START of the respective year, and profit occurs at the END of the year.You should use the correct NPV formula in Visual DSS. Use the ‘Help’ feature within the Visual DSS application and Visual DSS tutorial to learn more about the correct NPV formula, which is applicable to the scenario, described in Question 1. Initial investment is a startup cost applicable to the first period only (i.e. 2018). The NPV is only relevant for the first period (i.e. 2018) for decision-making – so only report it for that period. Using NPV (0) in Visual DSS will allow you to achieve this.QUESTION 2You are now asked to analyse the variations on the impact of market share, cost of producing, overheads and initial investment on the NPV. You need to conduct a risk analysis based on the information below:a) Market share: could be as low as 5% or as high as 15%, but is most likely to be 10%. The distribution could be represented using a triangular distribution.b) Unit costs can be described by normal distribution – mean of $30.00 and standard deviation of $12.00.c) Overhead: could be as low as $150,000 per year or as high as $350,000 per year, but is most likely to be $215,000 per year. The distribution could be represented using a triangular distribution.d) Initial investment requirements can be uniformly distributed between $1,000,000 and $2,000,000.The senior management decided on the following decision criteria:Decision criteria: The company is unwilling to proceed if there is a 20% or greater chance that the net present value will be less than $1,000,000 (1 million).YOUR TASK:You are required to use Visual DSS to run a Monte Carlo simulation (a Risk Analysis).Produce a cumulative probabilities report and graph for the above question. Based on results and the decision criteria, explain whether the senior management should accept or rejectthe proposed production of the product.QUESTION 3When the above analysis reached the Chief Executive Officer (CEO) of your company, he became very concerned about the assumptions made in the model. His experience has taught him to consider the uncertainty associated with selling price and production costs more thoroughly. He required further analysis to be done by incorporating the following uncertainties to Question 1 model:He applied different decision criteria and was willing to go ahead with the product proposal if there was at least an 80% chance the net present value would be greater than $1,850,000.YOUR TASK:You are required to use Visual DSS to run a Monte Carlo simulation (a Risk Analysis). Based on your results determine whether the CEO will proceed under these uncertainties.Produce a cumulative probabilities report and graph for the question. Based on results and the decision criteria, will the CEO accept or rejectthe proposed production of the product?A word document with the answers to the questions for Part A, Part B and Part C. For the second question, the screenshots can be included in the word document. The three Visual DSS files created for Part A (Questions 1, 2 and 3). Please ensure that these files are named clearly as Agt1_PartA_1.dss, Agt1_PartA_2.dss and Agt1_PartA_3.dss respectively. No zipfile is allowed for the submission.
Earn money selling
your Study Documents