Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Scheduling and capacity planning

Here is the data and the answers to those questions.

Month

Average # of Telemedicine callsreceived per day for each month the center was open in year 1

Jan

37

Feb

28

Mar

42

Apr

48

May

63

Jun

71

Jul

75

Aug

74

Sep

88

Oct

93

Nov

95

Dec

102

a. Using Excel, create a linear regression equation to model the number of calls per month.
y = 6.6853x + 24.545

b. At the current rate of growth, how many telemedicine calls does the regression equation predict for June of year 2?

At June of year 2, x = 18. Plugging this into linear regression equation we get:
# calls / day = 6.6853(18) + 24.545, which is 145 calls per day on average.

c. Given your prediction for June of year 2, how many telemedicine nurses do you forecast will be needed per 12 hour shift to handle the load?

At 145 calls per day, that is 12 calls on average per hour. Since a single nurse can handle 4 calls an hour, we need 3 nurses minimum manning the telemedicine center for the 12 hour shift.

You are to come up the minimum number of nurses required for the telemedicine unit. Here are your assumptions / constraints:
1. The Telemedicine Unit is open 7 days a week from 7am - 7pm. This is one 12-hour shift.

2. There will be 4 telemedicine nurses on a shift, and they work 4 days on and 3 off. Four nurses are required due to breaks and meals. This leaves 3 nurses to staff the telemedicine consoles at all times.

3. All nurses earn 4 weeks of vacation a year. A week is 7 days for planning purposes.

4. You can assume the nurses are unavailable 1 week of the year for professional development.

5. On average the nurses are only sick 3 days a year.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92055186

Have any Question?


Related Questions in Management Information System

Question how are authentication and authorization alike and

Question : How are authentication and authorization alike and how are they different? What is the relationship, if any, between the two? Please write minimum of 200 words with 0 % plagiarism.

The format of your paper will need to follow the following

The format of your paper will need to follow the following outline in APA format (include title page, abstract page, content pages, and reference page): INTRODUCTION State the topic you are attempting to cover State the ...

This assignment consists of two 2 sections a project

This assignment consists of two (2) sections: a project introduction and a project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the sectio ...

Project title security lapses and data breaches an

Project Title: "Security Lapses and Data Breaches: An Examination of the Failures to Protect Business Data and their Consequences" Instruction of creating the Background: Background information expands upon the key point ...

Problem i answer each piece in 75-150 words with reference

Problem I (Answer each piece in 75-150 words with reference but do not quote) What is data mining? In your answer, address the following: - Is it another fad? - Out of the three pre-requisite data science skills (databas ...

Please discuss what you believe is the relationship of ea

Please discuss what you believe is the relationship of EA and enterprise systems. In particular, please discuss: 1. How enterprise architecture and enterprise systems influence, support, and enable an organization's abil ...

Question how does the role of operations vary across the

Question : How does the role of operations vary across the four types of e-Businesses namely e-marketplace, e-service, e-retailers and wholesalers, and e-producers? Suggest some possible performance measures that could b ...

Discussion question what do you perceive to be some of the

Discussion Question : What do you perceive to be some of the Modern Network Security Threats? How do today's Threats differ from threats 10 years ago? Post Requirements: Your post must use at least two (2) sources of inf ...

Assessment instructionspreparationuse the organization and

Assessment Instructions Preparation Use the organization and characteristics, described in the Mega-Corp Case Study as the context in which to answer the bullet points in this assessment. Additional Background Mega-Corp ...

Question suppose dr smart has designed a 4des cipher which

Question : Suppose Dr. Smart has designed a 4DES cipher which encrypts data m in the following way: c= Dk4(Dk3(Ek2(Ek1(m)))), where E and D denote the encryption and decryption operation of DES. To break this cipher and ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As