Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Prepare a spreadsheet to compute your projected total costs, total revenues, and total profits for giving seminar on cost estimating. Below are some of your assumptions:

You will charge $600 per person for a two - day class.

You estimate that 30 people will register for and attend the class, but you want to change this input.

Your fixed costs include $500 total to rent a room for both days , setup fees of $400 for registration, and $300 designing a postcard for advertising.

You will not include your any of your labor costs for this estimate, but you estimate you will spend at least 150 hours developing materials, managing the project, and giving the actual class. You would like to know what your time is worth given different scenarios.

You will order 5,000 postcards, mail 4,000 and distribute the rest to friends and colleagues.

Your variable costs include the following:

a. $5 per person for registration plus four percent of the class fee per person to handle credit card processing; assume everyone pays by credit card

b. $.40 per postcard for printing if you order 5,000 or more

c. $. 25 per postcard for mailing and postage

d. $25 per person for beverages and lunch

e. $30 per person for class handouts

Be sure to have input cells for any variables that might change, such as the cost of postage, handouts, and so on. find out your profits based on the following number of people who attend: 10, 20, 30, 40, 50, and 60. In addition, find out what your time would be worth per hour based on the number of students. Try to use the Excel data table features showing the profits based on the number of students. If you are unfamiliar with data tables, just repeat the calculations for each possibility of 10, 20, 30, 40, 50, and 60 students. Print your results on one page, highlighting the profits fro each scenario and what your time is worth.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M938010

Have any Question? 


Related Questions in Computer Engineering

1 what is a hash function and what can it be used for2 why

1. What is a hash function, and what can it be used for? 2. Why is it important to exchange keys out of band in symmetric encryption? 3. What is the fundamental difference between symmetric and asymmetric encryption?

Data structures using java mid termq1 software engineers

Data structures using JAVA mid term Q1. Software engineers typically break the software development process into the following four phases: analysis, ____, implementation, testing and debugging. a. design b. requirements ...

1 fill in the blanks the 835 mhz bandwidth in bluetooth is

1. Fill in the blanks. The 83.5 MHz bandwidth in Bluetooth is divided into_____ channels, each of ______ MHz. 2. What is the spread spectrum technique used by Bluetooth? 3. What is the modulation technique in the radio l ...

1 what are the source and destination ip addresses in a

1. What are the source and destination IP addresses in a datagram that carries the ICMPv4 message reported by a router? 2. Explain why the registration request and reply are not directly encapsulated in an IP datagram. W ...

Project - programming projecttopic - the indexing algorithm

Project - (Programming Project) Topic - The indexing algorithm design for processor cache. Goal: i. Study and implement least recently used replacement policy (LRU). ii. Design a cache indexing scheme to minimize cache c ...

What functions does the internal security consultant

What functions does the internal security consultant perform, and what are the key qualifications and requirements for the position? What is the rationale for acquiring professional credentials? List and describe the cer ...

For this discussion use the pest and porter 5-forces model

For this discussion, use the PEST and Porter 5-Forces Model to respond to the following: Identify environmental and industry influences that should be a concern or present an opportunity to Ford Motor Company. Provide a ...

1nbspa methodology describes how things should be done

1:  A methodology describes how things should be done , design a table showing how you can map the main activities of " Hospital  Management Project  "into the knowledge areas ? Q 2: Using Microsoft Project 2007/2010 too ...

1 using the resources available in your library find out

1. Using the resources available in your library, find out what laws your state has passed to prosecute computer crime. 2. Using a Web browser go to www.eff.org. What are the current top concerns of this organization?

Using the kronecker product recursion 5104 prove that a 2n

Using the Kronecker product recursion (5.104), prove that a 2n x 2n Hadamard transform is orthogonal.  Calculate and plot the energy packed in the first 1, 2, 4, 8, 16 sequency ordered samples of the Hadamard transform o ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro