Tuesday, February 18, 2020

Costing, Budgeting for Projects Accounting Essay

Costing, Budgeting for Projects Accounting - Essay Example 9018088 0.000842049 12 8 13 9 7.703656443 1.680506618 13 9 14 7 7.414185094 0.171549292 14 7 15 4.791208791 44.00883114 -1.008791209 19.92307692 0.247845443 2.110327908 0.57993311 3.738278384 16.56687898 12 231.5175824 167.6967033 Estimating Learning-Curve Functions 2 2) I used the formula approach and forecast approach to estimate non-linear functions such as the learning-curve function. The predicted value for 15 units is 4.791209. Note: When I used the forecast approach, either there was an error in the formula or the predicted value is wrong. The formula on p.209 is =FORECAST(15,B1:B14,A1:A14), but I came up with a predicted value of 4.32967. But since I must arrive at the value 4.791209, I figured the formula should’ve been =FORECAST(15,B2:B15,A2:A15). I finally succeeded at having the same value 4.791209. I think my formula is more accurate because for 14 units of outputs, the DLH value is already given with a value of 7. The formula for regression analysis is Y = a + bX where a is the constant term and b is the slope. When estimating LCR, I used Solver routine in Excel. I started with an estimated LCR of .80 and entered that figure in cell D2. For getting the predicted DLHs, I used Excel learning-curve formula which is =$B$2*A2^(LN($D$2)/LN(2)). For unit 1 (X), the predicted value is an exact match. It is the same as the actual DLH, 29. The rest of the predicted DLHs for outputs 2-14 were a close match except for 9 and 11 units (in thousands) of outputs. Next, I calculated the â€Å"squared-error.† The obvious answer is 0, since there is no error. The predicted DLH is exactly the same as the actual DLH. The formula for â€Å"squared-error† in Excel is =(C2-B2)^2 for 1 unit (in thousands). The rest can be calculated in Solver routine by dragging the cells when copying the formula for 1 unit of output. Estimating Learning-Curve Functions 3 3) Shown on the graph with the downward slope, as the total outputs increased, the cumulative uni ts produced decreased. In other words, the more experience there is in producing outputs, the amount of time to perform the task decreases. The plot is consistent with the data given for units produced and DLHs. 4) I estimated the LCR with the â€Å"incremental unit-time learning-curve model† using Solver routine and I arrived at 0.69 or .70. In the Solver routine window, I entered the â€Å"target cell† as $E$2 which is the â€Å"squared error† contained in E2 and the â€Å"changing cell† as $D$2 which is the Estimating Learning-Curve Functions 4 LCR contained in D2. The exponent in learning-curve model, b, is -0.51681. So for DLH 29, the incremental unit-time learning-curve model is Y = 29.0*X^-0.51681. 5) The formula for cumulative average time per unit to produce x units is Y = ax^b; where Y = cumulative average time per unit to produce x units, a = the time taken for the first unit of output, x = the cumulative number of units, and b = the index of l earning (log LR/log 2). Using the calculation in Excel spreadsheet, I entered the formula =$B$2*A2^(Ln($D2$/Ln(2)) for cumulative av

Monday, February 3, 2020

Challenges and security issues Research Paper Example | Topics and Well Written Essays - 1000 words

Challenges and security issues - Research Paper Example Therefore, the organization failed to follow the standards laid down in testing the product before releasing it to the market. That led to the soft ware problem. Laudon (2011) says that in regard to technology, MacAfee’s system failed to detect possible dangers the product was posing to consumers using the windows XP and Service Pack 3, which was widely used in desktop PC configuration. In this case, technological factors played a significant role in MacAfee’s soft ware problem. Question 2 MacAfee lost a significant number of its customers as a result of the software problem. Actually, the company lost loyalty of its key clients after their computers crushed as a result of antivirus updates. According to Laudon (2011), the company lost most of its customers as a result of management’s sluggish response to the crisis, and the company’s initial effort to ignore the issue’s impact to the consumers. MacAfee’s reputation in the corporate business environment was dented as a result of its misleading reaction to the technical hitches on its systems. On the other hand, consumers’ businesses were affected as a result of their computers being crippled. According to Laudon (2011), this slowed down the normal operation of consumers’ businesses; hence leading to loses and idle time in labor. ... This was contrary to the fact that a significant number of clients were affected. Question 4 MacAfee’s management should come up with a set of standards meant to ensure adherence to testing procedures. This will facilitate efforts meant to determining a product’s quality before being released into the market. According to Laudon (2011), this will help to curb any deterrent effect a product may have on consumers. Chapter 8: How Secure is the Cloud Question 1 With respect to the security problem of tracking unauthorized activity, this can be controlled using a cloud vendor. According to Laudon (2011), this is a public company whose mandatory requirement by law is to disclose how it manages information. On the other hand, the problem can be controlled by use of cloud vendor that allow subscribers to choose where their cloud computing work takes place. Question 2 People who contribute to security problems in the cloud include those who hack into data bases and try to access companies’ information. They do this despite the fact that information stored within the subject databases is unauthorized to them. According to Laudon (2011), these people pose a security threat to companies’ information as they subject them to unauthorized alterations. In addition, organizations contribute to unauthorized access as they fail to pay attention to their security practices. Laudon (2011) agrees that they fail to secure their infrastructure. Lastly, the high cost of technology contributes to security problems. That is because of the dynamics and high costs associated with advanced technology. Most firms cannot afford secure systems for them to store and back