FE Workshop
.pdf
keyboard_arrow_up
School
Boston University *
*We aren’t endorsed by this school
Course
323
Subject
Computer Science
Date
Jan 9, 2024
Type
Pages
18
Uploaded by GeneralWhale2068
BASE CASE
WORKSHOP
TEAM 3 C3
1
Presented By: Evani, Sophie, Felipe, Krishay, Lauren, Sebastian, Andy, Aman, Jordy
GEM GUARD
GEM BOX
Feature 3: Anti-tarnish fabric lining infused with
chemical a compound that delays tarnishing of
silver and metals to protect your jewelry
Feature 1: Refillable sponge
placed underneath holes
where you insert earrings
comes soaked in
Benzalkonium Chloride (BZK)
solution to clean tarnish and
built-up skin cells off of the
hook of the earring
Feature 2: UV lights
around the edge help
disinfect the surface of
ojewelry by inactivating
99% of infectious
bacteria in less than 6
minutes.
The BlingBox is a self-sanitizing anti-tarnish jewelry box that cleans
your earrings to prevent piercing irritation.
OUR VISION
Consumer Benefits:
1) The BZK sponge prevents piercing
infections and calms irritation
2) The UV Lights eliminate bacteria
that exacerbates inflammation in
eczema-prone skin
3) The anti-tarnish fabric protects
consumer’s jewelry
TEAM 3 C3
3
Our Total Startup Investment Includes Over $720,000 in Net
Working Capital and Capital Expenditures
We invested
2 months worth of NWC expenses
, assuming
Operations must begin 2 months prior to launch:
Cash:
calculated as 2 months worth of Year 1 Direct
Labor from Operations
Raw Materials and WIP
: 2 months worth of Year 1 RM
and WIP Inventory
Finished Goods:
2 months worth of Year 1 Finished
Goods Inventory
We invested
2 months worth of Operating expenses:
Premarketing Expenses:
15% of Year 1 Integrated
Marketing Communications Expenses
All Other:
2 months worth of Year 1 Manufacturing
Overhead
TEAM 3 C3
3
Our initial capital expenditures includes investment in production
line and factory equipment
We
invested $420,062 total in initial Capital
Expenditures
and Information Systems Expenses
Production Line Capex
includes:
Liquid Mixer Machines, etc.
Conveyer Belt Table
Ventilator
Warehouse Capex
includes:
Pallet racks, trolleys, etc.
Office Capex
includes:
desks, chairs, etc.
Factory Build Out Cost
was calculated using the given
assumption $20 per square foot for our 16,000 sq ft.
rental in Springfield, MO
$250,000 will be raised from
Friends and Family
The remaining amount will be raised from
External
Investors
All Shares are sold a $1.00 each
TEAM 3 C3
3
Our business will be funded solely by equity in the amount of the
peak paid in capital before NPV turns positive
The
total funding amount will be peak Paid In Capital,
the maximum amount of PIC on the
pro-forma Balance Sheet just before our project becomes cash-flow positive
Because we are still cash-flow negative, we do not yet know the exact number
TEAM 3 C3
3
Although our profit margins are healthier than the industry
average, our operating margins are unusually low
https://pages.stern.nyu.edu/~adamodar/New_Home_Page/datafile/margin.html
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Countermeasures: Describe specific ways to address and mitigate risks associated with one slide.
arrow_forward
Define Toolbar, layout
arrow_forward
– Ethical HackingLab #2 – Legal and Ethical
Overview
Write up a case that pertains to one of the laws mentioned in the course content or another law that is relevant to the cybersecurity landscape. Make sure to include your references. You should use what you learned about Google Hacking to find actual court documents that detail the case, the charges levied, and results of the case. Finding pertinent primary sources of information in this field can be quite a challenge.
Pick a case that has occurred in the last 7 years and summarize the main points of the case.
Explain which laws were cited in the case and go into detail about why they were applied. You may need to take a closer look at the law in question to describe this.
Explain the verdict of the case and your opinion of the ruling based on the law.
In your opinion, does the law need reform or will it still apply in the future. Why or why
arrow_forward
Extreme Sports Web SiteExtreme sports encompasses certain activities perceived as having a high level of inherent danger such as BMX racing, skate boarding, mountain biking, ice climbing, and base jumping. You’ve always been a major fan and began selling caps and t-shirts with extreme sport themes, personalities, and inspirational sayings. As a result, over the past two years you have enjoyed traveling to many exotic venues around the world to sell your highly popular products at various events and competitions. You are thinking of starting a Web site to sell your products to extreme sports fans around the globe.
What information do you need to capture from a customer in order to accurately and completely fill an order?
arrow_forward
Add a research method
Research MethodsHere you should describe the methodologies that you are employed in your project and the sources that you used. Basic to most projects will be online searches for materials such as web pages, articles, videos, and blogs. Social media such as Twitter or Facebook may play a role. Personal interviews with important people knowledgeable in your topic may be included. In some cases, it may be a good idea to do a survey. Include information on matchups between your sources and the stakeholders that you have identified and whose viewpoints are represented. Describe specifically how the researchmethods tie in with how you are advancing your project.
arrow_forward
USER INTERFERENCE QUESTIONImagine that you’ve been tasked with redesigning (you being a redesigner) (edits) a website contents, text, image or documents. The website isn't for profit, only has knowledge.
please report 4 reasons of: What is the user (you, the redesigner) trying to accomplish? please report 4 reasons of: What specific actions is the user (you, the redesigner) taking to try and reach that goal? please report 4 reasons of: What pain points do they encounter; that is, what actions seem to be difficult or inefficient?
arrow_forward
Explain the use of additional mouse buttons in gaming and productivity scenarios.
arrow_forward
It is not possible to exchange photos. You're attempting to email images of a house for sale to a real estate
partner. Each time you attempt to send an email message, you get an automatic response stating that the files
are too large. What are your long-term goals?
arrow_forward
Describe the role of mouse acceleration and sensitivity settings in customizing mouse behavior.
arrow_forward
System Support for Safety There are three ways you may improve the quality of your products. Provide an overview of the steps involved in creating an application, such as coding, testing, and product deployment strategy. Differentiate between programmer documentation, system documentation, operation documentation, and user documentation.
arrow_forward
Explain the role of mouse drivers and how they can be updated or customized to optimize mouse performance.
arrow_forward
Explain the use of mouse DPI (dots per inch) settings in gaming and its impact on aiming accuracy.
arrow_forward
Strict Warning ⚠️ don't you dare useany AI tool otherwise I'll report your account
arrow_forward
Full explan please
arrow_forward
Describe how to avoid bugs by avoiding patches.
arrow_forward
What exceptional handling have you found in apps, programs, or websites?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Microsoft Windows 10 Comprehensive 2019
Computer Science
ISBN:9780357392607
Author:FREUND
Publisher:Cengage
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Related Questions
- Countermeasures: Describe specific ways to address and mitigate risks associated with one slide.arrow_forwardDefine Toolbar, layoutarrow_forward– Ethical HackingLab #2 – Legal and Ethical Overview Write up a case that pertains to one of the laws mentioned in the course content or another law that is relevant to the cybersecurity landscape. Make sure to include your references. You should use what you learned about Google Hacking to find actual court documents that detail the case, the charges levied, and results of the case. Finding pertinent primary sources of information in this field can be quite a challenge. Pick a case that has occurred in the last 7 years and summarize the main points of the case. Explain which laws were cited in the case and go into detail about why they were applied. You may need to take a closer look at the law in question to describe this. Explain the verdict of the case and your opinion of the ruling based on the law. In your opinion, does the law need reform or will it still apply in the future. Why or whyarrow_forward
- Extreme Sports Web SiteExtreme sports encompasses certain activities perceived as having a high level of inherent danger such as BMX racing, skate boarding, mountain biking, ice climbing, and base jumping. You’ve always been a major fan and began selling caps and t-shirts with extreme sport themes, personalities, and inspirational sayings. As a result, over the past two years you have enjoyed traveling to many exotic venues around the world to sell your highly popular products at various events and competitions. You are thinking of starting a Web site to sell your products to extreme sports fans around the globe. What information do you need to capture from a customer in order to accurately and completely fill an order?arrow_forwardAdd a research method Research MethodsHere you should describe the methodologies that you are employed in your project and the sources that you used. Basic to most projects will be online searches for materials such as web pages, articles, videos, and blogs. Social media such as Twitter or Facebook may play a role. Personal interviews with important people knowledgeable in your topic may be included. In some cases, it may be a good idea to do a survey. Include information on matchups between your sources and the stakeholders that you have identified and whose viewpoints are represented. Describe specifically how the researchmethods tie in with how you are advancing your project.arrow_forwardUSER INTERFERENCE QUESTIONImagine that you’ve been tasked with redesigning (you being a redesigner) (edits) a website contents, text, image or documents. The website isn't for profit, only has knowledge. please report 4 reasons of: What is the user (you, the redesigner) trying to accomplish? please report 4 reasons of: What specific actions is the user (you, the redesigner) taking to try and reach that goal? please report 4 reasons of: What pain points do they encounter; that is, what actions seem to be difficult or inefficient?arrow_forward
- Explain the use of additional mouse buttons in gaming and productivity scenarios.arrow_forwardIt is not possible to exchange photos. You're attempting to email images of a house for sale to a real estate partner. Each time you attempt to send an email message, you get an automatic response stating that the files are too large. What are your long-term goals?arrow_forwardDescribe the role of mouse acceleration and sensitivity settings in customizing mouse behavior.arrow_forward
- System Support for Safety There are three ways you may improve the quality of your products. Provide an overview of the steps involved in creating an application, such as coding, testing, and product deployment strategy. Differentiate between programmer documentation, system documentation, operation documentation, and user documentation.arrow_forwardExplain the role of mouse drivers and how they can be updated or customized to optimize mouse performance.arrow_forwardExplain the use of mouse DPI (dots per inch) settings in gaming and its impact on aiming accuracy.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Microsoft Windows 10 Comprehensive 2019Computer ScienceISBN:9780357392607Author:FREUNDPublisher:CengageEnhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning
Microsoft Windows 10 Comprehensive 2019
Computer Science
ISBN:9780357392607
Author:FREUND
Publisher:Cengage
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning