Decision tables and dependency diagrams

Assignment Help Basic Computer Science
Reference no: EM13165829

Decision Tables and Dependency Diagrams

An expert system is used to determine whether the recommended entry strategy into international markets should be Investment (I), Contractual (C), or Export (E).

This recommendation is based on internal factors as well as external factors. Both internal and external factors are rated as Strong (S), Average (A), or Weak (W).

As long as the external factors are weak the recommended strategy is export. As long as the external factors are strong the recommended strategy is investment. When the external factors are average the strategy should be Export if the internal factors are weak but contractual otherwise.

1.      Represent the above decision situation as a decision table.

Simplify the table as much as possible

2.      Express the results of the above decision table as IF ... THEN Rules. Avoid using ELSE statements. The outcome should not be affected by the ordering of the rules.

 

External Factors are determined by Foreign Country factors (S/A/W) and Home Country Factors (S/A/W). External factors are considered strong if both Foreign and Home Country factors are strong. If Foreign Country factor is weak then External Factor is considered weak. Otherwise External Factor is considered average.

3.      Construct a decision table to determine whether External Factors are S, A, or W. Simplify the table as much as possible.

 

Foreign Country Factors are determined by:

Target Country Market Factors, Target Country Environmental factors, and Target Country Production Factors.

Home Country Factors are determined by:

Market Size, Competition, Production Cost, and Government Regulations.

 

4.   Construct a dependency diagram to represent the entire decision process used to recommend strategies for International Market Entry.

 

 

Reference no: EM13165829

Questions Cloud

Write in c++ another overloaded operator : Write in C++ another overloaded operator to go in the program that has Treasury. Overload the forward slash /  so that in the main program, you can declare sale to be of type Treasury, and commission to be of type Treasury, and commispctage to be of ..
Consider a version of the bounded buffer problem : Consider a version of the bounded buffer problem in which there is two producer processes (P1and P2) and one consumer processes (P3) all sharing the same buffer. Assume that the size of the buffer is n=4, and that we start with a completely empty buf..
What is the infinite union of all context-sensitive language : What is the infinite union of all context-sensitive languages? Decidable languages? What is the infinite intersection of all context-sensitive languages? Decidable languages?
Match the os mechanisms on the left to the hardware support : Match the OS mechanisms on the left to the hardware support specific for each mechanism on the right.
Decision tables and dependency diagrams : Decision Tables and Dependency Diagrams
Stored procedure named spinsertcategory : Write a script that creates and calls a stored procedure named spInsertCategory. First, code a statement that creates a procedure that adds a new row to the Categories table. To do that
Script that creates and calls a stored : Write a script that creates and calls a stored procedure named spInsertProduct that inserts a row into the Products table. This stored procedure should accept five parameters
Management has asked you to create a report : Management has asked you to create a report that details how the windows 7 operating system works. describe the fundamental and generic components of the OS. discuss how the os would handel the following, process and threads, memory management, pr..
Design a nine-step counter to count : Design a nine-step counter to count in the following sequence using D flip-flops (TTL 74704) on a breadboard

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Drawing decision table for type of treatment of customer

Draw a decision table to represent the type of treatment to be given to a customer of the EyeTunes Music Club.

  How will decision meet accessibility guidelines

Knowing that this violates Redundancy Principle, but wanting to accommodate employees with disabilities, what would you suggest instead? How would your decision meet accessibility guidelines?

  How to stop process-freeze its memory image in process

Some multicomputers permit running processes to be migrated from one node to another. Is it adequate to stop process, freeze its memory image, and just ship that off to different node?

  Explain main points to write in the communications plan

Recognize the main points you would write in the communications plan at this point in project. What suggestions would you give your project team to aid it manage user expectations?

  Explaining framework software architecture

Terms architectural style, architectural pattern, and framework are frequently encountered in discussions of software architecture.

  Variety of web-based applications of google account

Google presents a variety of web-based applications/products through accessing Google account from any computer with internet connection.

  How many instructions can be executed during waiting period

f the machine is capable of executing ten instructions each microsecond, how many instructions can be executed during this waiting period? Show the details of all calculations.

  Describe valid advice for naming variables

Which of the given is valid advice for naming variables? To save typing, make most variable names one or two letters. to avoid conflict with names which others are using , utilize unusual or unpronounceable names.

  Basic forms of conducting international business

Discuss the basic forms of conducting international business, and basic international business strategies.

  Explaining organization management responsibilities

Describe in scholarly detail common organization management responsibilities.

  Develop an interface evaluation questionnaire

Develop an interface evaluation questionnaire that contains 20 generic questions that would apply to most interfaces.

  Explain how that characteristic may be exploited

Describe how top-down and bottom-up methods of threat/fault analysis can be used in identifying assets relevant to a scenario. You do not need to be exhaustive but do enough of the analysis to demonstrate you understand the processes.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd