This process that would be considered in the above scenario is Data mining.
<h3>What is data mining?</h3>
Data mining is known to be the act or method of knowing more about data via;
- Leaning raw data.
- Finding patterns.
- Forming models.
- Testing those models.
Note that It is a method that uses statistics, machine learning, and database systems and it will be good tool to be used in the scenario above.
Learn more about Data mining from
brainly.com/question/14776357
Answer:
- Divide the resources into three parts using the corresponding process 1, process 1, and process 2 formats to maximize the use of the resources.
- Get the expected revenue by calculating the product of the total perfume in ounce and the price of an ounce of perfume.
- Increase the advertisement hours of the product.
- subtract the advert fee from the generated revenue to get the actual revenue.
- subtract the cost of production from the actual revenue to get the actual profit.
Explanation:
The get maximum profit, all the resources must be exhausted in production. The labor is divided into a ratio of 1:1:2 ( which is 5000, 5000, 1000), while the chemical units are in the ratio of 2:2:3 (10000,10000,15000). This would produce in each individual processes; 15000, 15000 and 25000 oz, which is a total of 55000 oz of perfume.
The expected revenue is $275000. If 1000oz from the 55000oz of perfume is sold without advertisement, model Jenny's awareness of the perfume increases the demand by 200oz per hour, therefore, 24hours would field 4800oz demanded, which would only take 270 hours to distribute all remaining perfumes.
The cost of production would be $130000 for labor and chemical resources plus the advert cost of $27000 ( 270 hours by 100) which is a total cost of $157000. The actual profit is $118000 ( $275000 - $157000).
Bluetooth wifi and cell tower
Answer:
The answer is "Option a".
Explanation:
Privacy is a set of rules, which limiting access to the data, and integrity ensures impartiality, accuracy, and reliability is assured to ensure, which authorized persons can have secure access to the data.
The system needs no access for everyone to achieve its secrecy and integrity contained in a completely safe data system, that's why the given statement is "true".