The Burger Doodle restaurant chain purchases ingredients from four different food suppliers. The

company wants to construct a new central distribution center to process and package the ingredients it uses in its menu items before shipping them to their various restaurants. The suppliers

transport the food items in 40-foot tractor-trailer trucks. The coordinates of the four suppliers and the annual number of truckloads that will be transported to the distribution center are as follows:

Coordinates

Supplier x y Annual Truckloads

A 200 200 65

B 100 500 120

C 250 600 90

D 500 300 75

Determine the set of coordinates for the new distribution center that will minimize the total miles traveled from the suppliers

Answers

Answer 1

Answer :

Given Information:

Site 1: x1 = 360 , y1 = 180

Site 2: x2 = 420 , y2 = 450

Site 3: x3 = 250 , y3 = 400

Solution:

Xa = 200, Ya = 200, Wa = 75

Xb = 100, Yb = 500, Wb = 105

Xc = 250, Yc = 600, Wc = 135

Xd = 500, Yd = 300, Wd = 60

If centre of gravity is (x,y)

then x = (200*75+100*105+250*135+500*60)/(75+105+135+60)        

x = 238

then y = (200*75+500*105+600*135+300*60)/(75+105+135+60)        

 y = 444

Using centre-of-gravity method, location of distribution centre = (238,444) Using rectilinear distance,

Load distance score of Site 1: 75*(abs(360-200)+abs(180-200))+105*(abs(360-100)+abs(180-500))+135*(abs(360-250)+abs(180-600))+60*(abs(360-500)+abs(180-300)) = 161550

Load distance score of Site 2: 75*(abs(420-200)+abs(450-200))+105*(abs(420-100)+abs(450-500))+135*(abs(420-250)+abs(450-600))+60*(abs(420-500)+abs(450-300)) = 131100

Load distance score of Site 3: 75*(abs(250-200)+abs(400-200))+105*(abs(250-100)+abs(400-500))+135*(abs(250-250)+abs(400-600))+60*(abs(250-500)+abs(400-300)) = 93000

Site 3 tends to be optimal as it offers a lower distance ranking.

I HOPE THIS IS RIGHT AND IT HELPS !!!!!

Answer 2

The coordinates of the new distribution center that will minimize the total miles traveled from the suppliers are (178.171, 483.181).

What does this location do?

This location minimizes the total distance traveled by 68,171.951 miles. The suppliers will travel the following distances to the new distribution center:

Supplier A: 284.021 milesSupplier B: 79.959 milesSupplier C: 137.136 milesSupplier D: 370.310 miles

The coordinates were determined using a linear programming model that minimizes the total distance traveled by the suppliers. The model takes into account the coordinates of the suppliers and the annual number of truckloads that will be transported to the distribution center.

Read more about coordinates here:

https://brainly.com/question/31293074
#SPJ2


Related Questions

A security analyst recommends implementing SSL for an existing web service. A technician installs the SSL certificate and successfully tests the connection on the server. Soon after, the help desk begins receiving calls from users who are unable to log in. After further investigation, it becomes clear that no users have successfully connected to the web server since the certificate installation. Which of the following is MOST likely the issue?
A. DA Incorrect firewall rules are blocking HTTPS traffic.
B. Users are still accessing the IP address and not the HTTPS address.
C. DC Workstations need an updated trusted sites list.
D Users are not using tokens to log on.

Answers

C- I think. I hope this helps you.

https://ref.surveyj.co/Oware111​

Answers

What is the link?

IS IT A HACKING LINK

Write an algorithm for a vending machine that sells just one product. The machine flashes a yellow light when the quantity inside is below 40% of capacity​

Answers

Answer:

The algorithm is as follows:

1. Start

2. Capacity = 100%

3. Input Status (True/False)

4. While Status == True

    4.1. Read Quantity (%)

    4.2. Capacity = Capacity - Quantity

    4.3. If Capacity < 40%

          4.3.1 Display Yellow Flash

    4.4. Input Status (True/False)

5. Stop

Explanation:

This starts the algorithm

1. Start

The capacity of the machine is initialized to 100%

2. Capacity = 100%

This gets the status of the sales

3. Input Status (True/False)

The following iteration is repeated until the status is false

4. While Status == True

Read current sales quantity from the user

    4.1. Read Quantity (%)

Remove the quantity from the capacity

    4.2. Capacity = Capacity - Quantity

Check is capacity is below 40%

    4.3. If Capacity < 40%

If yes, display yellow flashes

          4.3.1 Display Yellow Flash

This gets the status of the sales

    4.4. Input Status (True/False)

End algorithm

5. Stop

A company is deploying NAFDs in its office to improve employee productivity when dealing with paperwork. Which of the following concerns is MOST likely to be raised as a possible security issue in relation to these devices?
A. Sensitive scanned materials being saved on the local hard drive
B. Faulty printer drivers causing PC performance degradation
C. Improperly configured NIC settings interfering with network security
D. Excessive disk space consumption due to storing large documents

Answers

Answer:

D. Excessive disk space consumption due to storing large documents.

Explanation:

When a company is planning to use NAFDs in its office rather than paper work, the efficiency of employees will increase as unnecessary paper work takes time in handling and printing. When data is stored on disks there is a risk that employees store large or irrelevant files in the disk which will create storage issues.

A network administrator needs 10 prevent users from accessing the accounting department records. All users are connected to the same Layer 2 device and access the internal through the same router. Which of the following should be Implemented to segment me accounting department from the rest of the users?

a. Implement VLANs and an ACL.
b. Install a firewall and create a DMZ.
c. Create a site-to-site VPN.
d. Enable MAC address filtering.

Answers

Answer:

C

Explanation:

definitely C you’re welcome

Irene llegó tarde al colegio_______________
ayúdenme


^_^^_^^_^^_^^_^^_^^_^^_^^_^​

Answers

Answer:

Explanation:

Absconding

An engineer is configuring AMP for endpoints and wants to block certain files from executing. Which outbreak control method is used to accomplish this task

Answers

Question Completion with Options:

A. device flow correlation

B. simple detections

C. application blocking list

D. advanced custom detections

Answer:

The outbreak control method that is used to accomplish the task of configuring AMP for endpoints and to block certain files from executing is:

C. application blocking list

Explanation:

The application blocking list creates a list of application files, which the AMP continuously tracks and analyzes to compare the file activities with previous cyber attacks.  Specifically, the AMP for Endpoints is a cloud-managed endpoint security solution, which provides a retrospective alert to prevent cyber-security threats, and rapidly detects, contains, and remediates malicious files on the endpoints.

continuously tracks and analyzes files and file activities across your systems, and compares these events to what preceded or happened in past attacks. If a file exhibits malicious behavior, the AMP provides you with a retrospective alert which enables you to stop a potential threat from succeeding.

The term __________ denotes data that is being stored on devices like a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server. The term __________ denotes data that exists in a mobile state on the network, such as data on the Internet, wireless networks, or a private network. A. data in transit, data on record B. data at rest, data in transit C. data in transit, data at rest D. data on record, data in motion

Answers

Answer:

B. data at rest, data in transit

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.

Data at rest refers to a form of data that is stored on devices such as; a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server.

Data in transit is simply any data that exists in a mobile or dynamic state on the network, such as data on the Internet, wireless networks, or a private network.

how to not addUse methods to: 1. Get a String from the user at the command line 2. Populate an ArrayList of Character data (the wrapper class), with each char in the String represented as a separate Character element in the ArrayList 3. Output each Character to the command line, each on a separate line space into my array list

Answers

Answer:

Explanation:

The following code is written in Java. It asks the user to enter a string. Then the program loops through the string and separates the string into an ArrayList of characters. Finally, it outputs each character separately on a its own line.

import java.util.ArrayList;

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Enter a String: ");

       String answer = in.nextLine();

       ArrayList<Character> charsList = new ArrayList<>();

       for (int i = 0; i < answer.length(); i++) {

           charsList.add(answer.charAt(i));

       }

       for (char x: charsList) {

           System.out.println(x);

       }

   }

}

Consider an Erlang loss system. The average processing time is 3 minutes. The average inter-arrival time is 3 minutes. The number of servers is 3. What is r (sometimes referred to as the offered load)

Answers

Answer:

r = 1

Explanation:

Average processing time ( p ) = 3 minutes

Average inter-arrival time ( a ) = 3 minutes

number of servers ( m ) = 3

Determine the value of r

r ( offered load ) = p/a

                          = 3 / 3  = 1

∴ value of r ( offered load ) = 1

What Internet access method would be suitable for a business requiring a high bandwidth connection where no cabled options exist?

Answers

Answer:

Fiber Optic, it allows for speeds up to 1200 mbps

Explanation:

Write a program get_price.py with a function get_price() that takes a dictionary of fruits as an argument and returns the name of the most expensive fruit. Each item of the dictionary includes: A key: the name of the fruit A value: the price of the fruit.

Answers

Answer:

The program is as follows:

def get_price(fruits):

   AllPrice = fruits.values()

   value_iterator = iter(AllPrice)

   mostExpensive = next(value_iterator)  

   for item in fruits:

       if fruits[item]>=mostExpensive:

           mostExpensive = fruits[item]

           fruitName = item

   print(fruitName)

fruits = {}

n = int(input("Number of Fruits: "))

for i in range(n):

   name = input("Fruit name: ")

   price = int(input("Fruit price: "))

   fruits[name] = price

get_price(fruits)

Explanation:

This defines the get_price function

def get_price(fruits):

This gets all price in the dictionary fruit

   AllPrice = fruits.values()

This passes the values to a value iterator

   value_iterator = iter(AllPrice)

This initializes mostExpensive to the first price in the dictionary

   mostExpensive = next(value_iterator)

This iterates through the elements of the dictionary  

   for item in fruits:

If current element is greater than or equals most expensive

       if fruits[item]>=mostExpensive:

Set most expensive to the current element

           mostExpensive = fruits[item]

Get the corresponding fruit name

           fruitName = item

Print fruit name

   print(fruitName)

The main begins here

This initializes the fruit dictionary

fruits = {}

This gets input for the number of fruits

n = int(input("Number of Fruits: "))

This is repeated for every inputs

for i in range(n):

Get fruit name

   name = input("Fruit name: ")

Get fruit price

   price = int(input("Fruit price: "))

Append name and price to dictionary

   fruits[name] = price

Call the get_price function

get_price(fruits)

what is the python ?​

Answers

Answer:

Python is an interpreted high-level general-purpose programming language. Python's design philosophy emphasizes code readability with its notable use of significant indentation. 

This is my Opinion.

Python is an interpreted high-level general-purpose programming language. Python's design philosophy emphasizes code readability with its notable use of significant indentation.

Hope this helps you :)

Write a recursive function named is_decreasing that takes as its parameter a list of numbers. It should return True if the elements of the list are strictly decreasing (each element in the array is strictly less than the previous one), but return False otherwise.

Answers

Answer:

c

Explanation:

Consider the following JavaScript code fragment:var greeting = function ( name ) {console.log ( name )}The best answer for what is wrong with this code is:Group of answer choices

Answers

Answer:

name is a reserved word in JS and cannot be used as an identifier

Explanation:

From the group of answer choices provided the only one that may be a problem would be using the word name as a parameter. Although name is not a reserved word per say in JS it is in HTML, and since JS targets HTML it could cause some errors. This however does not prevent this code from running correctly. JS does not require semicolons anymore, and the opening and closing braces for a body of code does not need to be on their own lines. Also, variable names are not Strings and do not need to be inside quotes, even for console.log()

AWS's EC2 is primarily considered which type? OA OB. Maas O Claas O D. None of the above O E. Serverless​

Answers

Answer:

IaaS (Infrastructure as a Service)

"Amazon takes the responsibility of networking, storage, server and virtualization and the user is responsible for managing the Operating System, middleware, runtime, data and application."

Give three reasons to use a hard drive as mass storage.

Answers

Answer:

With that in mind, let's take a look at five places where hard drives shine.

Backups and Archives. ...

Media Libraries. ...

Large Capacity Storage. ...

NAS Drives and Security. ...

RAID Arrays. ...

Other Uses.

11111 Power 2 sovle ​

Answers

123,454,321. you just multiply 11111 by itself

__________ makes the hardware usable, while __________ commands it to perform specific tasks. a.) The operating system, RAM b.) The CPU, RAM c.) The application software, the hard disk d.) The operating system, the application software

Answers

Answer:

a then c

Explanation:

Without an operating system you just have a pile of metal, and the program contains code, which is just a series of commands

Answer:

d.) The operating system, the application software

Which statement is accurate to describe a spreadsheet versus an Excel workbook?
a) worksheets have one or more workbooks.
b) workbooks have one or more worksheets.
c) workbooks are the same as word documents.
d) worksheets always refer to real paper.

Answers

C is the correct answer

Draw AND, OR, XOR and XNOR gates with truth table and logic gates.

.​

Answers

Answer:

see picture. let me know if you have questions.

Identify the statement about Windows tasks that is FALSE.


To launch an application, click the Windows icon, select "All Programs," and then click an application.


The boot process is the process for powering off a computer.


A common way to shut down the computer’s operating system is by using the Start menu.


Users log into their accounts on the Welcome screen, before Windows is ready to use.

Answers

The statement about Windows tasks that is FALSE is

The boot process is the process for powering off a computer.

According to the question, we are to discuss about Windows tasks and how it works as regards to the computer.

As a result of this we can see that  in launching an application;

we need to click on Windows iconselect "All Programs," click an application.

Therefore, The boot process is not the process for powering off a computer.

Learn more about Windows tasks .

https://brainly.com/question/1594289

The statement that is false is: The boot process is the process for powering off a computer, which is the second option. The boot process is actually the process of starting or powering on a computer, not powering it off.

The boot process refers to the sequence of events that occur when a computer is powered on or restarted. It is the process of starting up the computer's hardware and loading the operating system into memory so that it is ready for use. During the boot process, the computer's firmware (such as the BIOS or UEFI) performs a series of checks and tests to ensure that the hardware components are functioning correctly. It then searches for the operating system on connected storage devices, such as the hard drive or solid-state drive, and loads it into memory.

Learn more about the boot process here.

https://brainly.com/question/24355262

#SPJ6

Can someone compress this ipv6 address? 558c:0000:0000:d367:7c8e:1216:0000:66be

Answers

558c::d367:7c8e:1216:0:66be

At the Greene City Interiors branch office, you have been asked to implement an IP network. Your network ID is currently192.168.1.0/24. You need to divide this in half network (two subnets) to accommodate hosts on two separate floors of the building, each of which is served by managed switches. The whole network is served by a single router.
Based on the above scenario, answer the following questions:
1. To divide the network in half, what subnet mask do you need to use?
2. What are the subnet IDs for each network?
3. Your manager is not satisfied with the new subnet scheme and wants to reduce the number of subnets to make more hosts and addresses available in each subnet. Is there a way to use the same subnet for the two floors of the office?

Answers

Answer:

3 is your correct answer

Output is the act of is the act of entering the data to the computer?​

Answers

Answer:

Output is the act of the computer display information based on your input

Explanation:

Funny thing is that output is the exact opposite of what you just described

If every company is now a technology company, then what does this mean for every student attending a business college

Answers

Answer:

Explanation:

There are all sorts of possibilities for, say, inserting new technologies into existing processes. But most of these improvements are incremental. They are worth doing; in fact, they may be necessary for survival. No self-respecting airline, for instance, could do without an application that lets you download your boarding pass to your mobile telephone. It saves paper, can't get lost and customers want it.

But while it's essential to offer applications like the electronic boarding pass, those will not distinguish a company. Electronic boarding passes have already been replicated by nearly every airline. In fact, we've already forgotten who was first.

How do i connect WiFi on windows xp without icon?

Answers

Right click anywhere on your taskbar, and then click Properties. Step 2: Find and click the Notification Area tab on the top bar, and then find the section labeled with System icons, check the checkbox for Network. Last, click OK to finish it.

Answer:

Right click anywhere on your taskbar, and then click Properties. Step 2: Find and click the Notification Area tab on the top bar, and then find the section labeled with System icons, check the checkbox for Network. Last, click OK to finish it.

7. Which control is used to display multiple records in List Form
a) Data Grid View b) Textbox c) Label d) Button

Answers

Answer:

I think a is correct answer.

Answer:

A

Explanation:

To nest one structure within another structure, you a. define both structures and then create a data member of the nested structure type within the other structure b. create a container that holds objects of the nested structure type and then include the container within another structure c. define the nested structure within another structure

Answers

Answer:

Hence the correct option is option a) define both structures and then create a data member of the nested structure type within the other structure.

Explanation:

To make Address nested to Employee, we've to define Address structure before and out of doors Employee structure and make an object of Address structure inside Employee structure.

For example, we may need to store the address of an entity employee in a structure.

A technique that uses data that is labeled to train or teach a machine.
Reinforcement
Unsupervised
Supervised

Answers

Answer:

computer.

Explanation:

it uses data that is labeled to train.

Other Questions
Consider the probability that at most 85 out of 136 DVDs will work correctly. Assume the probability that a given DVD will work correctly is 52%. Specify whether the normal curve can be used as an approximation to the binomial probability by verifying the necessary conditions. IF CHILDREN BEHAVE BADLY, SHOULD THEIR PARENTS PUNISH THEM .Write a passage about 200-250 words to justify your answer. Use the quadratic formula to find the solution to the quadratic equation givenbelow.x2-3x+3x + = 0 Please hurry I will mark you brainliest 1. Explain a situation where you would expect to have a partial variation.What makes this example a partial variation?2. Explain a situation where you would expect to have a direct variation.What makes this example a direct variation?You can include a diagram/graph in your explanation if you wish. why do you think "on my way song by Alan Walker" stand-out compared to other song?give the reason\_()_/ When did the CIAwrite this brief? What was going on in the U.S. atthis time? Unknown # 21Flame Test Color: LilacAddition of HCl(aq)= NR (No Reaction)Addition of HCl(aq) and BaCl2(aq)= White precipitateAddition of HNO3(aq) and AgNO3(aq)= NR (No Reaction) What is the unknown ionic compund molecular formula? Find the length of x. Assume the triangles are similar. A. 25B. 12C. 20D. 19 what is the bond energy required to break one mole of carbon-carbon bonds If a, b, c are in A.P. show thata (b + c)/bc,b(c + a) /ca, c(a-b )/bcare in A.P. what efforts have been undertaken in Nepal to develop skilled human resource for bringing social and economic development? What happened to the American communist party in the decade following world war 1 HELLPP ASAP PLS, FIRST PERSON TO ANSWER CORRECTLY GETS BRAINLIEST Draw the image of quadrilateral ABCD when translated by the directed line segment v. Label the image of A as A', the image of B as B', the image of C as C' and the image of D as D'. Can you help me please Long-term disability insurance _____. a. pays for temporary living expenses and moving expenses incurred by disabled employees b. pays a flat fee for a fixed number of hours of legal assistance each month for disabled employees c. provides continuing income protection for employees who become disabled and are unable to work Which of the lists of letters all have rotational symmetry?1, (C, H, N, X)2, (N, O, S, Z)3, (H, J, N, S)4, (F, H, X, Z)(No explanation is needed but it would be helpful) 3. What was the main purpose of the Neutrality Acts of the 1930s?A. to encourage the United States to support the Allies during the warB. to prevent incidents that would force the United States into a conflictC. to ensure the Allies were able to trade with merchants from the United StatesD. to send a message that the United States would retaliate against German attacks Question 5 of 10What must be the same for two resistors that are connected in parallel? 34 ProportionsMathematics, Pre-AlgebraQuestion 2A boat can travel 21 miles on 7 gallons of gasoline. How far can it travel on 17 gallons? The cost of wire sold by the Thor Company is shown in the graph. What is the cost of wire per foot? 1. $0.202. $1.253. $4.004. $5.00