Determine the inverse demand function

Assignment Help Basic Computer Science
Reference no: EM131716853

Copy and paste the following data into Excel:

P. Q

$4.80 1170

$4.53 1235

$3.98 1337

$3.72 1442

$3.49 1548

a. Run OLS to determine the inverse demand function (P = f(Q)); how much confidence do you have in this estimated equation? Use algebra to then find the direct demand function (Q = f(P)).

b. Using calculus to determine dQ/dP, construct a column which calculates the point-price elasticity for each (P,Q) combination.

c. What is the point price elasticity of demand when P=$3.98? What is the point price elasticity of demand when P=$3.81?

d. To maximize total revenue, what would you recommend if the company was currently charging P=$4.53? If it was charging P=$3.81?

e. Use your indirect demand function to determine an equation for TR and MR as a function of Q, and make a graph of P and MR on the vertical and Q on the horizontal axis.

f. What is the total-revenue maximizing price and quantity, and how much revenue is earned there? Compare that to the TR when P = $4.80 and P = $3.81.

Reference no: EM131716853

Questions Cloud

What is the cost of producing one more unit of output : a. What is your average cost? b. What is the cost of producing one more unit of output?
What is the firm average cost function : Suppose your firm's long-run total cost function (in a perfectly competitive market) is given by: C(q) = 12 + 3q^2 - 2q.
Advantages of hiring freelancers to do short-term projects : Odesk, Elance, and Guru: Platforms That Facilitate the Forming of Partnerships with Freelancers a freelancer is an independent contractor that has skills.
Discuss major mental disorders that include major depression : some scholarly articles to contribute to my paper, anyone willing to help a little here
Determine the inverse demand function : Run OLS to determine the inverse demand function (P = f(Q)); how much confidence do you have in this estimated equation? Use algebra to then find the direct.
Prepare a critical analysis of the disease of your choice : You are required to prepare a critical analysis of the disease of your choice. Research must include 6 different sources - not more than 3 internet sources.
Research to assess the feasibility of proposed business : When visiting with the banker about the loan application, she was asked if she had conducted any primary research to assess the feasibility of her proposed.
How to conduct successful library and internet searches : If Linda asked you about this, what advice would you give to her about how to conduct successful library and Internet searches?
Evaluate the criteria for commitment to prison : Examine how budgetary factors affect prison treatment for mentally ill, Evaluate the criteria for commitment to prison

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Early start of an activity on a pert chart

Under what circumstances would each of the figures in Chapter 13 be applicable for customer reporting? In-house reporting? Reporting to top-level management?

  Proportion of the population

A species of frog has mean weight 32 g and standard dilation 3g. to one decimal place, what proportion of the population must be contained in the rage 23g to 41g?

  Security code review for a system

Discuss how a security code review for a system written in C would be similar to and different from a security code review of a system written in Python or Ruby.

  Create a simple social network

create a simple social network. Use a graph to track the friend relationships among members of the network. Add a feature to enable people to see a list of their friends' friends.

  Perform a large number of experiments easily

Automate the process so that you can specify and perform a large number of experiments easily.

  Electronic mail represents a technology

Electronic mail represents a technology that is integrally woven in our daily lives as a means of communication. In two to three pages, provide an overview of this technology detailing among other things its implementation and the components n..

  Can this internet still benefit from services of udp or tcp

UDP is a message-oriented protocol. TCP is a byte-oriented protocol. If an application needs to protect the boundaries of its message, which protocol should be used, UDP or TCP?

  Sequences of n integers

Let A and B be two sequences of n integers each, in range [1, n^4]. Given an integer x, describe an O(n) time algorithm for determining if there is an integer a in A and an integer b in N such that x = a+b.

  How does a database system generate xml document

1. How does a database system generate XML document from database data? What is the importance of the order of tables in a SQL statement that uses FOR XML? (at least 200 words)

  Brief comments that will push the characters

The characters of a word are stored in a character array A1 of dimension 10. Assuming a stack data structure S and push(S, char c) and char pop(S) procedures on S are available, write a program in pseudocode or C with brief comments that will push..

  Explaining regular language and context-free language

Let L1 be a regular language and L2 be a context-free language, both defined over the same alphabet Σ.

  Develop a tool that helps companies in assessing

Develop a tool that helps companies in assessing the suitability of different operating systems for their businesses. This tool is a table with multiple rows and columns. Table 1 is a simple and incomplete example of this table. Your table should hav..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd