1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jeyben [28]
3 years ago
3

Tanner Wright is a manager for a McDonald's restaurant. Many of his key responsibilities include analyzing data and making key d

ecisions for the success of his store. Tanner’s store has been experiencing decreased sales for breakfast services over the past three months. Tanner is unsure why breakfast revenues are down while lunch and dinner revenues remain unchanged. Tanner believes that he can drive revenue up by implementing a few different breakfast promotions such as free coffee or hash browns with the purchase of a meal. Tanner performs an extensive analysis of how continuous changes in breakfast promotions could impact his daily revenue. What type of DSS analysis is Tanner performing?
Computers and Technology
1 answer:
Bad White [126]3 years ago
7 0

Answer:

The type of DSS analysis is Tanner performing is sensitivity analysis (what-if analysis)

Explanation:

Sensitivity analysis can be referred to as the study of how the variability and doubts in the results of a model or can be distributed to different sources of variability and doubts in its inputs.

The model mentioned above is expected to be a mathematical model as it deals with numerals and figures.

Tanner's analysis has to do with sales and revenue generation (mathematical model)

Also, the sensitivity model an analytical technique by performing logical reasoning to influence the expected results when certain changes are applied to the parameters of or the activities in a process.

You might be interested in
My friend Leo wants to have an emergency plan for his final exams on University of Southern Algorithmville. He has N subjects to
leonid [27]

Answer:

Greedy is an algorithmic paradigm that builds up a solution piece by piece, always choosing the next piece that offers the most obvious and immediate benefit. Greedy algorithms are used for optimization problems. An optimization problem can be solved using Greedy if the problem has the following property: At every step, we can make a choice that looks best at the moment, and we get the optimal solution of the complete problem.

If a Greedy Algorithm can solve a problem, then it generally becomes the best method to solve that problem as the Greedy algorithms are in general more efficient than other techniques like Dynamic Programming. But Greedy algorithms cannot always be applied. For example, the Fractional Knapsack problem (See this) can be solved using Greedy, but 0-1 Knapsack cannot be solved using Greedy.

The following are some standard algorithms that are Greedy algorithms.

1) Kruskal’s Minimum Spanning Tree (MST): In Kruskal’s algorithm, we create an MST by picking edges one by one. The Greedy Choice is to pick the smallest weight edge that doesn’t cause a cycle in the MST constructed so far.

2) Prim’s Minimum Spanning Tree: In Prim’s algorithm also, we create an MST by picking edges one by one. We maintain two sets: a set of the vertices already included in MST and the set of the vertices not yet included. The Greedy Choice is to pick the smallest weight edge that connects the two sets.

3) Dijkstra’s Shortest Path: Dijkstra’s algorithm is very similar to Prim’s algorithm. The shortest-path tree is built up, edge by edge. We maintain two sets: a set of the vertices already included in the tree and the set of the vertices not yet included. The Greedy Choice is to pick the edge that connects the two sets and is on the smallest weight path from source to the set that contains not yet included vertices.

4) Huffman Coding: Huffman Coding is a loss-less compression technique. It assigns variable-length bit codes to different characters. The Greedy Choice is to assign the least bit length code to the most frequent character. The greedy algorithms are sometimes also used to get an approximation for Hard optimization problems. For example, the Traveling Salesman Problem is an NP-Hard problem. A Greedy choice for this problem is to pick the nearest unvisited city from the current city at every step. These solutions don’t always produce the best optimal solution but can be used to get an approximately optimal solution.

6 0
3 years ago
What should you do to help prepare yourself for the delivery of your presentation? you can chose more then one
Lubov Fominskaja [6]
1 makes sense for somewhere you haven't been before. 2 could be interesting, but it's a bit superfluous if not required. 3 is the most important and essential. Some teachers don't want presenters to look at the board/read their slides word for word when they present, so it might be a good idea to have note cards instead.

Hope this helps!
4 0
3 years ago
Explain the danger leaks pose when operating a tractor.
Romashka [77]
Read and follow procedures as outlined in the operator's manual. By being familiar with the operating features of a tractor, the operator will develop confidence when the tractor is driven under adverse conditions. Learn the location and purpose of all of the guages and controls as well as other indicators. Knowing where the controls are by memory can allow you to react more quickly in an emergency situation. There have been accident situations where individuals have become entangled in machinery or the power takeoff shaft and rescuers or family did not know how to disengage the equipment. Family members should be showed how to shut down equipment or disengage the PTO in case of emergency.
Study the various decals on your equipment. They may point out DANGER, WARNING and CAUTION for various points on the tractor. Have an experienced tractor operator with you as you review the various decals and ask questions!
5 0
3 years ago
Suppose testcircle1 and circle1 in listing 9.1 are in two separate files named testcircle1.java and circle1.java, respectively.
zlopas [31]
What is "listing 9.1"?

Stop copying and pasting, or provide us with the resources to answer your question.
8 0
3 years ago
Need help please will mark brainliest
aleksklad [387]

Answer:

intranet

Explanation:

An intranet is a private network that you can't access outside the physical boundary of an organization

7 0
3 years ago
Other questions:
  • How do networks help protect data? -by preventing access by more than one person at a time -by restricting access to department
    11·2 answers
  • Should i buy the Samsung s10+ or wait for s11 or any other phones you guys suggest?
    6·2 answers
  • what is the opportunity cost of buying a $.75 soda everyday at school for 3 years instead of drinking water ? assume you are in
    10·2 answers
  • Help me with this please, it is for tech
    11·1 answer
  • Difference between server and a client computer
    7·1 answer
  • Check ALL of the correct answers.
    13·1 answer
  • (1101101)2 − (1001)2
    15·1 answer
  • Could some please answer the question in the pictures? Thank you!! I will also give your brainliest if you give me the right ans
    11·1 answer
  • When a derived class method has the same name as a base class method, it is often said that the derived class method ________ th
    13·1 answer
  • What is science worksheet answers name the three features that make science different from other human endeavors?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!