Data Analysis, Database Management System

Assignment Help:
A buyer for a large department store chain must place orders with an athletic shoe manufacturer six months prior to the time the shoes will be sold in the department stores. In particular, the buyer must decide on November 1 how many pairs of the manufacturer’s newest model of tennis shoes to order for sale during the coming summer season. Assume that each pair of this new brand of tennis shoes costs the department store chain $45 per pair. Furthermore, assume that each pair of these shoes can then be sold to the chain’s customers for $70 per pair. Any pairs of these shoes remaining unsold at the end of the summer season will be sold in a closeout sale next fall for $35 each. The probability distribution of consumer demand for these tennis shoes during the coming summer season has been assessed by market research specialists and is provided
Consumer Demand Probability
1 0.05
2 0.15
3 0.25
4 0.30
5 0.15
6 0.10
. Finally, assume that the department store chain must purchase these tennis shoes from the manufacturer in lots of 100 pairs. a. Create a payoff table that specifies the contribution to profit (in dollars) from the sale of the tennis shoes by this department store chain for each possible purchase decision and each outcome with respect to consumer demand. Build the payoff matrix model in each case. In displayed comment boxes or textboxes, show one or two typical formulae used to compute the payoffs. To enable the interpretation of formulae, your model needs to display row and column headings. As we have discussed, this is easy using the Snipping tool. For problem 42 only, apply the following decision criteria: maximin (pessimist’s criterion), minimax regret (doesn’t use probabilities), EMV and EOL. Write a sentence stating the optimal solution for each of the 4 criteria. The statement should contain the recommended strategy and the value of the payoff. Hint for 42: The optimal EMV solution is to order 700 pairs.

Related Discussions:- Data Analysis

Hashing, how to implement mid square hashing?

how to implement mid square hashing?

What is meant by mean time to failure, What is meant by mean time to failur...

What is meant by mean time to failure? The mean time to failure is the amount of time that the system could run continuously without failure.

What is known as heap file organization, What is known as heap file organiz...

What is known as heap file organization? In the heap file organization, any record can be placed anywhere in the file where there is space for the record. There is no ordering

Improved reliability, Improved Reliability: In a centralised DBMS, a server...

Improved Reliability: In a centralised DBMS, a server failure stops the operations of the DBMS. Though, a failure at single site of a DDBMS, or a failure of a communication link cr

Database integrity and database security, Question : (a) Differentiate ...

Question : (a) Differentiate between database integrity and database security (b) Database security involves measures to avoid loss of privacy and loss of confidentiality. D

ER-diagram, The State of NewYork certifies firefighters throughout state an...

The State of NewYork certifies firefighters throughout state and keep track all of them, as well as of the state’s fire departments. Each fire department has unique department numb

Explain different types of keys and relational model., Relational Model: T...

Relational Model: The relational model uses a collection of tables to represent both data and the relationships among those data. Each table has multiple columns and each column h

Secondary indexes, Secondary Indexes Let consider the student database ...

Secondary Indexes Let consider the student database and its clustering index and primary (only one will be applicable at a time). Now consider the state when the database is to

Why were functional methods fashionable in early days, Why were functional ...

Why were functional methods fashionable in early days? These are inspired directly by computer architecture and thus popular among computer scientist in early days. The divisio

Security-data fragmentation, Security: Data not needed by local applicatio...

Security: Data not needed by local applications is not stored at the site, therefore no unnecessary security violations may exist. But how can we carry out fragmentation? Fragm

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd