Compute the net expected value for the project

Assignment Help Operating System
Reference no: EM1379690

You are considering to make modifications to an existing application. You have identified:
30 percent probability of delay of receipt of resources - cost $50,000.

20 percent probability that the resources will be $10,000 cheaper than planned.

25 percent probability that there will be a problem integrating with existing software, cost to fix $3,500.

30 percent probability that the development may be simpler than expected, savings $2,500.
5 percent probability of a design defect causing $5,000 of rework.

Compute the net expected value for the project risks and opportunities cited above. How much should you plan for your contingency reserve budget based on the above? You must show all of your calculations. How much would you allocate for the management reserve? What are your assumptions about these reserves?

Reference no: EM1379690

Questions Cloud

Describe the concept of a signal : Assume when a child process is forked, a parent may wait for the successful completion of the child via the wait service so that return result of that application can be read from the procedure descriptor block.
Discuss mitigation strategies : It is determined that 3-out of 5-businesses that experience downtime of forty-eight hours or more will be out of business within three years.
Overview of multiprogramming mode : Member of coordinating a computer's activities is handling failure. This is called fault tolerance. Briefly explain about how a computer handles loss of power to limit the loss of all work
Write a very basic doubly-linked list : CptS 122 Lab #2: Linked Lists ,  Along with vectors, linked lists are one of the fundamental data structures in computer science. Unlike vectors, which store information in a contiguous block of computer memory, linked lists have the potential to sto..
Compute the net expected value for the project : You are considering to make modifications to an existing application. Compute the net expected value for the project risks and opportunities
Enable multimedia on a website : Few multimedia can be hard to watch on a mobile device due to screen size or bandwidth limitations. Determine two articles that discuss considerations and new developments that will enable multimedia on a site
Circuit switch and packet switch environment : Provide two examples of a circuit switch and packet switch environment. Base one example on a circuit switch and the other on a packet switch.
Determine the largest value : A soft real time system has 4-periodic events with periods of 50, 100, 200 and 250 msec each. Assume 4-events need 35, 20, 10 and X msec of CPU time, respectively.
Determine the utilization of the cpu : Two real time procedures are running on a computer. The 1st one runs every 25 msec for ten msec. The second one runs every 40 msec for fifteen msec.

Reviews

Write a Review

Operating System Questions & Answers

  Question about about telecommunications

Think about a simple telephone network consisting of two end offices and one intermediate switch with a 1-MHz full-duplex trunk in each end office and the intermediate switch.

  Compare and contrast guided versus wireless media

Imagine that you have been asked to prepare a paper that compares and contrasts guided vs. wireless media for inclusion in your corporation’s knowledge database.

  Opportunity to improve reputation

Determine what security hole was exploited through criminal hackers to illegally access LexisNexis network, what method was employed. How did they turn a bad situatin into an opportunity to improve its reputation?

  What is life cycle costing

What is Life Cycle Costing. Describe briefly the methodology for Life Cycle Costing. What are the criteria to consider when a procurement officer is faced with the decision of procuring a used equipment instead of a new one.

  Importance of maintaining security on a lan

Discuss what roles do firewalls and proxy servers play in network security? Determine the importance of maintaining security on a LAN?

  Potential security threats to managing information

Suppose that you have been asked to consult for a corporation that has branch offices in four continents. You have implemented a management data system that will enable its managers to exchange information.

  Question about throughput and capacity

Throughput and capacity are determining factors for effectiveness of a system more so than processor speed?

  Program to compute the signature

Assume Fred sees your RSA signaure on m1 and m2, (i.e., he sees (md1 mod n) and (md2 mod n).

  Write pseudocode of thread with and without semaphores

Assume we have two threads A and B A and B are to repeatedly print out ping and pong. Write down pseudocode of thread A and B How can this be solved with and without semaphores.

  Header fields in the ipv4 and ipv6 protocols

Compare the header fields in the IPv4 and IPv6 protocols. Explain strategies for converting IPv4 packets to IPv6 packets in a hybrid IP network.

  Program of law of total probability

Think about a system that generates ten million audit records every day. Also suppose that there are on average 10 attacks per day on this system and that each such attack is reflected in twenty records.

  Question about affiliate programs

Many companies are using affiliate programs to drive traffic to their Web sites. explain what an affiliate program is and how it works.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd