Ask Question, Ask an Expert


Ask Computer Engineering Expert

Prepare a spreadsheet to compute your projected total costs, total revenues, and total profits for giving seminar on cost estimating. Below are some of your assumptions:

You will charge $600 per person for a two - day class.

You estimate that 30 people will register for and attend the class, but you want to change this input.

Your fixed costs include $500 total to rent a room for both days , setup fees of $400 for registration, and $300 designing a postcard for advertising.

You will not include your any of your labor costs for this estimate, but you estimate you will spend at least 150 hours developing materials, managing the project, and giving the actual class. You would like to know what your time is worth given different scenarios.

You will order 5,000 postcards, mail 4,000 and distribute the rest to friends and colleagues.

Your variable costs include the following:

a. $5 per person for registration plus four percent of the class fee per person to handle credit card processing; assume everyone pays by credit card

b. $.40 per postcard for printing if you order 5,000 or more

c. $. 25 per postcard for mailing and postage

d. $25 per person for beverages and lunch

e. $30 per person for class handouts

Be sure to have input cells for any variables that might change, such as the cost of postage, handouts, and so on. find out your profits based on the following number of people who attend: 10, 20, 30, 40, 50, and 60. In addition, find out what your time would be worth per hour based on the number of students. Try to use the Excel data table features showing the profits based on the number of students. If you are unfamiliar with data tables, just repeat the calculations for each possibility of 10, 20, 30, 40, 50, and 60 students. Print your results on one page, highlighting the profits fro each scenario and what your time is worth.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M938010

Have any Question? 

Related Questions in Computer Engineering

1 what are cryptography and cryptanalysis2 what were some

1. What are cryptography and cryptanalysis? 2. What were some of the first uses of cryptography? 3. What is a key, and what is it used for? 4. What are the three basic operations in cryptography?

Programmingnbsp write the following programs using c

Programming:  Write the following programs using C language. Each program shoulddate of creation on the top (use comments). Write a clear and properly indented code and use comments properly. 1. Simple if statement progr ...

1 a client uses udp to send data to a server the data

1. A client uses UDP to send data to a server. The data length is 16 bytes. Calculate the efficiency of this transmission at the UDP level (ratio of useful bytes to total bytes). 2. The following is a dump (contents) of ...

1 write a program that can read an indefinite number of

1. Write a program that can read an indefinite number of lines of VB.NET code and store reserved words in one linked list and identifiers and literals in another linked list. When the program has finished reading input, ...

1 on average how many requests are being processed at any

1. On average, how many requests are being processed at any given instant? 2. If move to an 8-core system, ideally, what will happen to the system throughput (i.e., how many queries/second will the computer process)? 3. ...

Internetwrite one paragraph for each of the following

Internet Write one paragraph for each of the following questions: 1- What do you use the Internet for the most? What has the Internet made easier or more convenient for you in your lifetime? Can you identify some cons to ...

1 if we use no forwarding what fraction of cycles are we

1. If we use no forwarding, what fraction of cycles are we stalling due to data hazards? 2. If we use full forwarding (forward all results that can be forwarded), what fraction of cycles are we staling due to data hazard ...

Assignment computer forensic toolsyou have been recently

Assignment: Computer Forensic Tools You have been recently hired to assist with purchasing computer forensics tools and resources for a major corporation. Using the concepts that you learned in chapters nine through twel ...

Circle intersection write a program that computes the

Circle Intersection. Write a program that computes the intersection of a circle with a horizontal line and displays the information textually and graphically. Input: Radius of the circle and the y-intercept of the line O ...

The work of an it department is never finished the wvcc

The work of an IT department is never finished. The WVCC network administrators and student assistants have many plans for the next network upgrade. Their main concern at this point is availability. Although the hierarch ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro