Free Essay

Project 1 - Avis / Enter. Project

In:

Submitted By needmegahelp
Words 361
Pages 2
February 2016

Project #1

1. Avis – $64.99 per day (flat rate) therefore A= x + 64.99

2. Enterprise- $45.87 per day, plus $0.25 per mile above 150.

a) x is less than or equal to 150 (miles)
45.87 + ((x-150)(.25))
= 45.87 + .25x + (-37.50)
= 8.37 + .25x b) x is greater than 150 (miles) 45.87 + ((x+150)(.25)) = 45.87 + .25x +37.50 = 83.37 + .25x

3. (see attached graph)

4. x and y intercept of A = x + 64.99 and y = 83.37 + .25x
(24.51 , 89.49)

5. To decide which car rental is more economical, estimate the number of miles you would drive in one day, and apply to x and y. The lowest value will equal the most economical choice.

6. Auto Saver - $38.59 per day, plus $0.25 per mile above 100.

a) x is more than 100 (miles) 38.59 + ((x+100)(.25)) = 38.59 + 25 + .25x = 63.59 + .25x

b) x is less than 100 (miles) 38.59 + ((x-100)(.25)) = 38.59 – 25 + .25x = 13.59 + .25x
If x is less than or equal to 100, then S=38.59
If x is more than 100, then S=38.59 + ((x-100)(.25))

7. (see attached graph)

8. Avis – $64.99
Auto Saver – $38.59
64.99 – 38.59 = $26.40

26.40 / .25 = 105.6 miles

If miles driven are less than 105.6, then Avis is a better deal.

9. USave - $34.99 per day, plus $0.25 per mile over 200 miles.

U = x + 34.99

x is more than 200 (miles)
= 34.99 + ((x+200)(.25))
= 34.99 + .25x + 50
= 84.99 +25.x

(see attached graph)

10. 125 miles 175 miles
Avis 64.99 64.99
Enterprise 45.87 52.12**
Auto Saver 44.84* 57.34***

* ((.25)(25)) = 6.25 + 38.59
**((.25)(25)) = 6.25 + 45.87
***((.25)(75)) = 18.75 + 38.59

At 100 miles, Auto Saver would be the best choice ($38.59)
At 129 miles, Enterprise would be the best choice ($45.87)
At 227 miles, Avis would be the best choice ($64.99)

Similar Documents

Premium Essay

Case Study of Cleanedison

...Running head: CASE STUDY OF CLEANEDISON 1 Case Study of CleanEdison Green Technology Training and Certification Courses Kaplan University CASE STUDY OF CLEANEDISON 2 Abstract This paper is a case study that was conducted with Avi Yashchin, owner and founder of CleanEdison LLC, where he gave details on his business and accounting department. During the interview he spoke about the clean technology training industry, products, services, markets, customer base, and competitors that he has had since opening the business in 2009. After this detailed introduction he answered specific questions from Chapter 1 BTN 1-8 and Chapter 3 BTN 3-8 Beyond the Numbers sections in the accounting textbook Financial Accounting Information for Decisions 6th Edition (Wild, 2012). This paper is a very good introduction to the green or clean technology training field and gives some insight on how someone that was very passionate about the field started and ran a profitable company in this space for 5 years. CASE STUDY OF CLEANEDISON 3 Case Study of CleanEdison Green Technology Training and Certification Courses There are many ways that our modern day society is more conscious of the environment and does their part to reduce the wasting of our resources and looks for other ways of creating alternative energy. For Avi Yashchin, his contribution in trying to reduce the United...

Words: 1722 - Pages: 7

Free Essay

Systems Planning and Selection

...i: 154 Part II Systems Planning and Selection d. Jim 'Woo would like to investigate how other online stores are targeting the business furni­ ture market. Identify and evaluate t\\OOonline leases apartments, sells condominiums, a provides housekeeping, basic utilities, cab television, and recreational activities for its re stores that sell business furniture, Briefly sum­ marize your findings. idents. The retirement village is locally owne and managed; however, a residents' advisor board has Significant input when changes ~~o. /::5:h. :2. Hoosier Burger The Hoosier Burger project development team recommendations to the retirement village a contemplated. has met several times with Bob and Thelma Mellankamp. During these meetings, Bob has stressed the importance of improving Hoosier Golden Age Retirement Center's manager Mary Lou Tobias, has recently approached y for help with the retirement center's outdate Burger's inventory control, customer ordering, and management reporting systems. Demand for information system. Currently, the retirement office has five employees, including Ms. Tobia Hoosier Burger food is at an all-time high, and She explains that all data concerning residents this increased demand is creating problems for financial ...

Words: 1384 - Pages: 6

Free Essay

Tourism Planning

...Introduction Robinson and Novelli (2005) note ‘niche tourism’ has become a growing trend occurring in current years in contrast to what is frequently related to as ‘mass tourism’. Cusack and Dixon (2006) add niche tourism is known to present diversity and provide opportunities with a form of tourism that aims towards sustainability alongside considering expenditure from tourists. Furthermore, it suggests a more practical set of strategies that distinguishes tourists. Gartner (1996) demonstrates how niche tourism consists of distinct interests, culture and/or activity built tourism including small proportion of tourist in authentic surroundings. Moreover, niche tourism can fall into more specific categories where cultural, environmental, rural and urban sectors are different components to consider when understanding the concept niche tourism (Robinson and Novelli, 2005). Drawing on key literature about eco-tourism planning and how ecotourism is marketed, this report studies the ecotourism prospects in Costa Rica. It also examines elements impacting this specific type of niche which considers the consistent alterations to make the destination more sustainable for tourists. This report will firstly focus on understanding the concept of ecotourism and the principles implemented. This leads on to discussion for focusing on the case study of Costa Rica and how it has developed into an ecotourism destination. Furthermore, a critical discussion of the approaches undertaken by the...

Words: 5855 - Pages: 24

Premium Essay

Marvel

...character-based entertainment company that is worldwide. The have a collection of 5,000 characters that cover a 70-year company span and sever media types (comics, toys, movies, et cetera). “Marvel’s strategy is to leverage its franchises in a growing array of opportunities around the world, including feature films, consumer products, toys, video games, animated television, direct-to-DVD and online” (Viacom). Marvel Studios mission is to “develop and manage entertainment projects that leverage Marvel’s vast universe of creative content” (Marvel.com). Throughout the 1970s and 1980s, Marvel had licensed out a number of their characters for movies and direct-to-TV productions. Very few of these are remembered today. One that you might recall is Howard the Duck; it didn’t do so well in the box office. The reasoning behind such failures was the lack of research the company put into it’s licensing (Stax). Marvel Studios was created in the 1990s and it run by Avi Arad (President and CEO). Prior to heading Marvel Studios, Avi Arad had become one of the world’s most predominant toy designers, he produced children’s programming and had created dozens of successful products. Arad is titled with Producer and or Executive Producer in all of the Marvel films (Stax). With the creation of Marvel Studios and the...

Words: 1975 - Pages: 8

Free Essay

Voice Chat System

...Voice Chat & Video Conferencing INDEX Title of Project……………………………………………………. i Certificate………………………………………………………… ii Acknowledgements……………………………………………… iii 1 Introduction 2 Design & Implementation 2.1 Why Java Platform 2.2 Java Media Framework Streaming Media Architecture Presentation Processing Capture Media Data Storage & Transmission 2.3 Real-time Transport Protocol Streaming Media RTP Architecture RTP Application 2.4 JMF RTP Application Programming Interface RTP API Architecture Reception Transmission 2.5 Requirements & Specification Feasibility Analysis Requirements Functionality Specification 2.6 Diagrams 3 Results 3.1 Snapshots 3.2 Future Offshoots 3.3 Conclusion References CHAPTER 1 INTRODUCTION Introduction To sum up, the at most priority must be given to the definition of the problem statement of the project to be undertaken. So the project is a set of file related with each other developed by the creators of the system to accomplish a specific purpose. Our purpose is to design project for “VOICE CHATTING & VIDEO CONFERENCING”. As the name suggests, our project is based on audio/video transmission & reception. Through our application two or more persons in an intranet can Chat with one another & they can have Video Conferencing...

Words: 5465 - Pages: 22

Premium Essay

User Authentication for Network Environment

...CHAPTER ONE INTRODUCTION 1. BACKGROUND OF THE STUDY User authentication for network or internet based environment posed a challenging task for system and network administrator. This statement is true and is still very much applicable till these days as it is a well known fact that authentication is being widely incorporated as part of access control for most systems. Authentication has been the catalyst for business organization in information protection and security. Implementation of access control policies, standards or procedures involves the identification of appropriate authentication mechanism whereby the criticality of the information being protected are being used as justification for having a more refined authentication mechanism as compared to a more simple approach. Without the appropriate authentication mechanism in place, attacker could easily gain access to systems or applications by utilizing personal information, gained through various means, including but not limited to social engineering. Conventional textual passwords are the most common mechanism used in authentication. This method requires a user to enter their username and password, either in alphabet or numeric, or more commonly, a mixture of both forms as authentication tokens to gain access to systems or applications. Two recent surveys have shown that users choose short, simple passwords that are easily guessable, for example, “password”, personal names of family members, names...

Words: 17307 - Pages: 70

Free Essay

Computer Fundamentel Practical

...JESSORE Department of computer Engineering & technology Subject Name: Computer Fundamentals Subject Code: 6611 |Submitted To | |Engr.Md.Shaheen akter | |Asstt. Professor & Head | |Department | |Of | |Computer engineering & technology | |BCMC college of engineering &Technology | |Submitted By | |Name: | |Class Roll: | |Technology: computer | |Board Roll: | |Reg No: | |Session: | Date of Submission: Index |Job No. |Name of Job |Date | |01 |Identify the major unit and their interconnection of a computer. | | |02 |Identify different types of memory and storages devices. | | |03 |Demonstrate the overview of a modern keyboard and the operations of different keys. ...

Words: 4363 - Pages: 18

Free Essay

Assignment on Principles of Marketing

...presents Index Main Features of AndreaMosaic...............................................................................................3 1. Create a Tile Images List.......................................................................................................4 2. Set the parameters of the Mosaic..........................................................................................6 3. Select the Main Image...........................................................................................................7 4. Create the Mosaic..................................................................................................................7 User Interface Language .........................................................................................................9 Different Program versions ......................................................................................................9 Load/Save Settings...................................................................................................................9 Main Image to reproduce as a Mosaic.....................................................................................9 Size Parameters.......................................................................................................................9 Mosaic Size ............................................................................................................................10 Mosaic Resolution..................

Words: 9232 - Pages: 37

Premium Essay

Hbr Project Managemet

...O N www.hbr.org Do your most demanding projects contribute least to your company’s strategy? Project Management: The View from 30,000 Feet Included with this collection: 2 Creating Project Plans to Focus Product Development by Steven C. Wheelwright and Kim B. Clark 18 Getting the Most out of Your Product Development Process by Paul S. Adler, Avi Mandelbaum, Viên Nguyen, and Elizabeth Schwerer 34 Why Good Projects Fail Anyway by Nadim F. Matta and Ronald N. Ashkenas Product 4864 Collection Overview COPYRIGHT © 2003 HARVARD BUSINESS SCHOOL PUBLISHING CORPORATION. ALL RIGHTS RESERVED. Has your company’s project management run amok? Are more than half your biggest projects failing outright? And are other large initiatives running months behind schedule, stuck in seemingly permanent logjams? Are you particularly frustrated by projects whose myriad tasks were executed flawlessly—but still don’t deliver the expected results? Worse, do you suspect that projects consuming the most resources have the least connection to your company’s strategy? Such chaos describes many companies— but that’s little comfort. The key is to understand the myopia causing these disasters. Most companies deal with projects individually—pushing each through the pipeline as quickly and cost-effectively as possible. But this approach doesn’t help you make vital big-picture decisions: “What mix of projects would be best for our organization?”“How do we allocate...

Words: 21989 - Pages: 88

Free Essay

Hello

...information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book. Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information. First published: April 2013 Production Reference: 1160413 Published by Packt Publishing Ltd. Livery Place 35 Livery Street Birmingham B3 2PB, UK. ISBN 978-1-78216-392-3 www.packtpub.com Cover Image by Suresh Mogre (suresh.mogre.99@gmail.com) www.it-ebooks.info Credits Author Project Coordinator Joseph Howse Sneha Modi Reviewer(s) Proofreader David Millán Escrivá Lauren Tobon Abid K. Indexer Rekha Nair Acquisition Editor Erol Staveley Production Coordinator Commissioning Editor Arvindkumar Gupta Neha Nagvekar Cover Work Technical Editors Arvindkumar Gupta Ankita Meshram Veena Pagare www.it-ebooks.info...

Words: 28138 - Pages: 113

Premium Essay

Help Friends by Sending a Gift!

...CHAPTER 2 In this chapter, you will learn: • About the various operating systems and the differences between them • About the components of Windows operating systems • How operating systems interface with users, files and folders, applications, and hardware Introducing Operating Systems I n Chapter 1, you were introduced to the different hardware devices. In this chapter, you’ll learn about the different operating systems, how they are designed and work, and what they do. You’ll learn about the different components of an OS and see how an OS provides the interface that users and applications need to command and use hardware devices. You’ll learn to use several Windows tools and utilities that are useful to examine a system, change desktop settings, and view and manage some hardware devices. As you work through this chapter, you’ll learn that computer systems contain both hardware and software and that it’s important for you as a computer technician to understand how they work together. Although the physical hardware is the visible part of a computer system, the software is the intelligence of the system that makes it possible for hardware components to work. 35 9781133726890, A+ Guide to Managing and Maintaining Your PC, Jean Andrews - © Cengage Learning. All rights reserved. No distribution allowed without express authorization 36 CHAPTER 2 Introducing Operating Systems OPERATING SYSTEMS PAST AND PRESENT An operating system (OS) is software that...

Words: 16220 - Pages: 65

Free Essay

Magix 2013 Premium Manual

...2 Copyright This documentation is protected by law. All rights, especially the right to duplicate, circulate, and translate, are reserved. No part of this publication may be reproduced in the form of copies, microfilms or other processes, or transmitted into a language used for machines, especially data processing machines, without the express written consent of the publisher. All copyrights reserved. All other product names are trademarks of the corresponding manufacturers. Errors in and changes to the contents as well as program modifications reserved. Copyright © MAGIX Software GmbH, 1994 - 2012. All rights reserved. MAGIX and Music Maker are registered trademarks of MAGIX Software GmbH. VST and ASIO are registered trademarks of Steinberg Media Technologies GmbH. This product uses MAGIX patented technology (USP 6,518,492; USP 6,888,999) and MAGIX patent pending technology. Other named product names may be registered trademarks of their respective owners. www.magix.com Preface 3 Preface MAGIX Music Maker 2013 offers an easy start and the option to dive deeper into the world of music production. A giant, high-quality sound archive, an especially intuitive approach to creating original music, plus many useful functions result in an unbeatable complete package for making your own songs. The handling is especially easy and consistent. The included sound files can be combined with the software synthesizers easily. MP3 songs can be used with audio CD tracks, your...

Words: 69747 - Pages: 279

Premium Essay

Cup of Joe Marketing Analysis

...“Cup of Joe” Marketing Research Analysis Table of Contents Executive Summary Introduction and Research Design Secondary Research Qualitative Research: Interviews Data Analysis Frequency Analysis Limitations Conclusions and Recommendations Executive Summary The purpose of this marketing research report is to analyze the coffee shop market in the Greater Houston area to give Joe Brown a better understanding of the industry before investing in Cup of Joe coffee shops. Mr. Brown has 4 specific marketing research questions he is wanting answered through this analysis: What consumer segments can be identified in the Houston area coffee-drinkers market? What are the attitudes and behaviors of each segment with respect to coffee and coffee shop visits? How do the segments above evaluate the 4 potential competitors (Starbucks, Dunkin’ Donuts, McDonalds, and Burger King)? Is there a segment that is currently underserved by the existing 4 competitors and what type of coffee shop would this segment most likely demand? Before building a competitive national coffee shop brand, Mr. Brown needs information from primary, secondary, and qualitative research in order to be successful. Starting research in the Greater Houston area is a convenience for Mr. Brown since he is from Sugarland, TX which allows him to supervise operations of the business. Secondary research indicated that 54% of Americans over the age of 18 drink coffee daily. Research has found that coffee purchases are...

Words: 2446 - Pages: 10

Free Essay

Dsfsd

...CHAPTER 1 INTRODUCTION 1. INTRODUCTION There is an increasing need of network storage system in today’s world. Also, nowadays the files are stored over the network. This system provides an easy way to retrieve any file which is stored over the network. The IP address of any system which is connected to the network can be found out just by selecting the name of the system. Therefore the range of IP address where the search has to be done can be found by that. The required file can be searched easily when this IP address range is known. The name of the file to be searched is given as input. If possible the file format is also given along with it. The IP address range where the search has to be performed is also selected. If there is any particular system outside that particular range they also can be selected for search operation to be performed. The search is done in each working and connected system in the shared drive and the search results are displayed in the grid view which is the output. The file can be accessed just by clicking the result that appears. Thus this provides a easy way to search a file over a number of systems connected to a network simultaneously. Thus it is very effective since the search is done in a number of systems simultaneously. CHAPTER 2 LITERATURE REVIEW 2. LITERATURE REVIEW 2.1 Existing System: When a particular file has...

Words: 4829 - Pages: 20

Premium Essay

None

...managerial situation. The authors may have disguised certain names and other identifying information to protect confidentiality. Richard Ivey School of Business Foundation prohibits any form of reproduction, storage or transmission without its written permission. Reproduction of this material is not covered under authorization by any reproduction rights organization. To order copies or request permission to reproduce materials, contact Ivey Publishing, Richard Ivey School of Business Foundation, The University of Western Ontario, London, Ontario, Canada, N6A 3K7; phone (519) 661-3208; fax (519) 661-3882; e-mail cases@ivey.uwo.ca. Copyright © 2010, Richard Ivey School of Business Foundation Version: (A) 2010-11-01 It was August 1, 2008, and Maggie Fox, chief executive officer (CEO) of the Social Media Group (SMG), sat at her desk in Dundas, Ontario to review her internal creative team’s initial response to a request from her newest client, ING Direct Canada (ING). After the tremendous success of the Superstar Saver Search YouTube campaign, ING wanted to respond to the recent economic crisis and launch a second, complementary social media campaign. ING was looking for SMG to help them increase the bank’s online presence. No tC Fox had a meeting scheduled for August 15 with ING’s senior management. Prior to the meeting, Fox needed to work with her team to make a number of key recommendations, including defining the goals of the campaign, choosing a social...

Words: 4427 - Pages: 18