Employed to minimize total cost of loom room

Assignment Help Basic Computer Science
Reference no: EM133294873

Problem A room has 10 cotton spinning looms. Once the looms are set up, they run automatically. The setup time is exponentially distributed, with mean 10 minutes. The machines run for an average of 40 minutes, also exponentially distributed. Loom operators are paid $10 an hour, and looms not running incur a cost of $40 an hour.

1. How many loom operators should be employed to minimize the total cost of the loom room?

2. How many people should be employed so that no loom waits more than 1 minute for an operator?

3. How many operators should be employed to ensure that, on average, at least 7.5 looms are running at all times?

Reference no: EM133294873

Questions Cloud

Trade secrets and intellectual property : A federal information system is used to collect, process, and store information about businesses which may include trade secrets and other intellectual property
What is obscene : Your assignment is to A) construct a revised test for identifying what is obscene, and therefore not protected by the First Amendment.
Combinational circuit design procedure : Using the combinational circuit design procedure discussed in the notes, design with a truth-table, simplify with K-maps, and draw combinational circuit
Discuss the globalisation strategy adopted by toyogo : BUSINESS 101 University of Oxford discuss the type of competitive strategy that TOYOGO has adopted for its plastic products
Employed to minimize total cost of loom room : How many loom operators should be employed to minimize the total cost of the loom room?
Impact the decisions hr managers company insurance coverage : How might the Hobby Lobby case impact the decisions HR Managers make regarding their own company's insurance coverage?
Cyber intersection between nation state intelligence : The cyber intersection between nation state intelligence agencies, nation state militaries, nation state law enforcement.
Describe the different methods that your airline may use : Describe the different methods that your airline may use to promote this new route - Explain some of the key advantages and disadvantages of distributing
How are mobile phones being used to buy things : UGBA 164 University of California, Berkeley How are mobile phones being used to buy things in the country for your group project? How does that compare

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Producing the largest amount of greenhouse gas

Name the 2 sectors responsible for producing the largest amount of greenhouse gas in the U.S

  Describe disaster recovery

Define and describe business continuity. Define and describe disaster recovery.

  Resistance to change is normal everyday

Resistance to change is a normal everyday aspect in the workplace.

  What activities does a user do on the site

Describe the cons of online social network sites. Do not do this for each site; but, in general, describe them for any site.

  Display salesorderid-orderdate-totaldue

Display salesorderid, orderdate, totaldue, and territory name from salesorderheader and salesterritory for all totaldue that are greater

  Search for information on how to maintain a trumpet

List three different sets of keywords that could be used to search for information on how to maintain a trumpet.

  Acquiring and maintaining intellectual property rights

Discuss the advantage of acquiring and maintaining intellectual property rights. What separates "vanity metrics" and real, actionable metrics.

  Display the average of the test results for each experiment

Write, compile, and run a C++ program using a nested loop to compute and display the average of the test results for each experiment.

  Write security policy for company-owned cell phones

Write security policy for company-owned cell phones that use Bluetooth protocol. why sensitive information should not be sent over Wireless Application Protocol

  Physical security controls

New England College of Business and Finance-Many business environments have both visible and invisible physical security controls.

  Write a java for file processing according to rules

The file is read into memory, all of it in one buffer, and the buffer is reversed, then the file is overwritten. For simplicity, we may assume that the maximum size of the file is 200000 bytes. If no file was selected an error message is displayed..

  Review protocols for streaming services

What residual risk to the target company's assets and IP remain?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd