Describe break-even analysis to inform your recommendation

Assignment Help Computer Network Security
Reference no: EM133784488

Assignment: Cyber Security

Choose Alternatives with Break-Even Analysis

Books and Resources

1. Blank, L., & Tarquin, A. (2018). Engineering economy (8th ed.). McGraw Hill.
Read Chapter 13, pp. 354-376.

2. Vernimmen, P., Quiry, P., Dallocchio, M., Le, F. Y., & Salvi, A. (2017). Corporate finance: Theory and practice (5th ed.). Wiley.
Read Chapter 10, pp. 167-172.

Instructions

The Googolplex CEO wants to develop and sell a new outpatient heart-rate monitoring system. Engineers expect the new heart-rate monitoring system to have a profitable life between 1 and 5 years. Help the CEO to determine the break-even number of units that must be sold annually (without any return) to realize the break-even payback. The cost and revenue estimates are as follows:

Fixed costs: Initial investment of $800,000 with $10,000 annual operating cost.

Variable cost: $80 per unit

Revenue: Twice the variable cost for the first 5 years and 50% of the variable cost thereafter. In addition, assume a 5% credit to total revenue calculation based on savings associated with detecting heart problems before they become life-threatening.

Based on these inputs, write a paper describing the break-even analysis to inform your recommendation on the heart-rate monitoring system to the CEO. Use the graphical break-even analysis figure provided in the introduction as a template. Ensure the graphical break-even analysis and paper capture the following:

1. Variable costs

2. Fixed costs

3. Total costs (Variable and Fixed costs combined)

4. Revenues

5. Credit due to early heart problem detection

6. Clearly identified break-even point

7. Clearly identified X-axis (# units) and Y-axis (costs in dollars)

8. Discussion on why break-even analysis is important and necessary for this problem.

9. Recommendation based on break-even analysis findings.

Reference no: EM133784488

Questions Cloud

How your finding from relevant research literature can shape : Describe how your findings from the relevant research literature can shape, inform and improve current business and professional practice related to your topic.
Define precondition and postcondition as part of description : Describe each possibility in your own words. Define precondition and postcondition as part of your description.
Discuss specific quotes that affected your opinion : Discuss specific quotes that affected your opinion and how you will practice differently because of this reading.
Briefly describe the trends in global food security : Briefly describe the trends in global food security, including Australia and OzHarvest business strategy and its business model architecture
Describe break-even analysis to inform your recommendation : Based on these inputs, write a paper describing the break-even analysis to inform your recommendation on the heart-rate monitoring system to the CEO.
Discuss scenarios where ethical dilemmas might arise : Discuss scenarios where ethical dilemmas might arise, such as issues of consent, confidentiality, and the best interest of the child.
Describe the size of your organization and the skills needed : Describe the size of your organization and the skills needed in effective management of supply chain logistics in your organization of this size.
Create infographic related to your emerging healthcare issue : Create a 1-3-page infographic related to your emerging healthcare issue using a combination of images and evidence in the form of an infographic.
To acquire knowledge about various intervention strategies : To acquire knowledge about various intervention strategies and critically evaluate their applicability and effectiveness.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd