Identify the main decision problem

Assignment Help Basic Computer Science
Reference no: EM131549854

1. From each of the following examples, identify the main decision problem. Develop at least 2 research problems with the variables identified and named for each example. Can you propose one survey question for each of those variables?

a) Geico, an Insurance firm, wants to know the driving habits of young consumers. Based on such understanding, a researcher may divide its target groups in potential segments based on risk profile of drivers. Also, the researcher may try to find out the driving history and the mileage driven for each driver in those segments. 

b) Facebook is partnering with a small gaming company which develops web-based, multi person action games. Facebook wants to assess consumers' interest to play such games. Facebook's internal market research team wants to further break down the problem such that they can find information on length of Facebook membership, average usage of facebook, consumers' web behaviors, etc.

Reference no: EM131549854

Questions Cloud

Find the decision regions as a function of the lrt threshold : Derive a likelihood ratio test for the following case. Under hypothesis HI, the observation Z is Gaussian with mean m, and variance cri.
What is wrong with this practice : In "George Orwell, Meet Mark Zuckerberg," what is wrong with this practice? Explain the reference to Orwell and discuss the uses and misuses of data mining
What are core competencies as it relates to your selections : What are the core competencies as it relates to your selections? Why is outsourcing becoming increasingly common in the firms you selected?
Analyze the strengths and capabilities of potential supplier : Analyze the strengths and capabilities of potential suppliers. Provide a list of criteria you use when assessing and analyzing strengths of potential suppliers.
Identify the main decision problem : From each of the following examples, identify the main decision problem. Develop at least 2 research problems with the variables identified
Elections decided by purely random factors : In the Australian 2016 federal election, the seat of Herbert was won by 37 votes out of 88,337 cast. This problem explores the likelihood that a close election.
Leader through life experiences : Do you think leaders are born that way or do they become a leader through life experiences?
Communication has on international marketing : Summarize the impact (both good and bad) that communication has on international marketing.
Write a paper on what attracts someone to another person : Write a paper on what attracts someone to another person. Include a discussion of why attraction is different from person to person.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Variable types for pseudocode

THERE is NO need to declare variable types for your pseudocode. This will save you some time. Write a pseudocode (NOT a computer program) for a program that has a loop to continuously ask the user for a number,

  Anti-virus software and ruled out worms or a virus

Your machine begins to randomly reboot. You have run your anti-virus software and ruled out worms or a virus. You suspect it may be a memory issue. What detailed steps will you take to confirm that this is the culprit? Start from the physical steps a..

  Specifying the data rate and bucket size

Design a leaky bucket system for this user by specifying the data rate and bucket size.

  Target for your e-commerce implementation plan

The first step will be to select an organization as the target for your e-commerce implementation plan.

  The key advantages and disadvantages of placing

Compare and contrast the key advantages and disadvantages of placing the following system types on a DMZ: Directory services (i.e. Microsoft AD), Web server, FTP server, File server, printer, and Domain Controller.

  Network components with access to the user database

As your network grows and security items are assessed, other network components need to access the same database of users. What strategies can you employ to provide the other network components with access to the user database?

  Design it so that an initial scan of the database

Comment on the processing cost of mining multilevel associations with this method in comparison to mining single-level associations.

  How many orders of the lock, unlock, read, and write action

For each of the transactions described below, suppose that we insert one lock and one unlock action for each database element that is accessed.

  Addressing mode and immediate addressing mode

You are asked to add a multiply instruction to LC3, making use of the unused opcode. Give the format of the instruction with support for both register addressing mode and immediate addressing mode for its second source operand.

  Application-jurisdictional aspects of cybercrime

You are using your wireless device to locate a restaurant. Suddenly, a large flashing skull-and-crossbones appears on your screen and a menacing laugh plays. Seconds later your device has been wiped clean. You are the victim of a cybercrime. If ca..

  Residual distribution policy

Harris Company must set its investment and dividend policies for the coming year. It has three independent projects from which to choose, each of which requires a $3 million investment. These projects have different levels of risk, and therefore d..

  Define the sequence number of a segment

In TCP, how do we define the sequence number of a segment (in each direction)? Consider two cases: the first segment and other segments.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd