Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

PRACTICAL EXAM

PART 1: BUYING A COMPUTER

PROBLEM

Logan is having a horrible week. On Monday she set her laptop case on the trunk on her car while she put away her books in the back seat and you guessed it, she drove off and it went flying. Needless to say, it didn't survive. Then to add insult to injury, on Wednesday, she accidentally spilled a Diet Pepsi on her desk wiping out her cell phone, PC and desktop printer. She desperately needs to figure out a new technology solution but only has $3,000 to spend. She is looking to you to help her shop on-line and figure out what solution will work best for her. Logan's income fluctuates based on her work schedule, so she uses a no-contract cell phone service but would like to investigate other no-contract cell phone service options. She is a frequent gamer and plays both role playing games (RPG) on her PC as well as multiplayer games online. She is going to be starting college in the fall and needs a solution that will meet the requirements of a typical college student living in a dorm. She is combining her love of Photography and Art and plans to major in Studio Arts and Art History so she will have to write (and print out) a lot of her homework. She will also need a significant amount of storage (the average song about 5MB and a photograph is about 400K) because she needs to store her music and a lot of photographs. Oh and of course she wants to be able to watch streaming videos from Netflix and Hulu.

TASK

The first step is to analyze the problem - what are Logan's needs versus her wants. Compare this to buying a car. Cars come with various packages and the buyer decides if all they need is a get around town kind of car or one with better gas mileage capable of driving cross country. You may want the shiny red Lexus or Lamborghini, but maybe what you need is good reliable transportation with few maintenance issues and low gas mileage.

Computers can be evaluated the same way. There are lots of different features like physical characteristics (height, weight, and display size), processor and processor speed, system memory, expansion memory, the list goes on. They can also be placed into categories based on usage.

• Desktop/Gaming Desktop: This is best if you need a device capable of editing videos, importing and manipulating photographs, playing videos and interactive games, creating documents, sending email etc.

• Laptop: This is best if you need to travel with your device for work or school, create documents and spreadsheets and send email but still want to use this for entertainment, playing the occasional video or surfing the web

• Tablet: This is a great choice if you just need basic capabilities with heavy usage of cloud technology for things like email, word processing and spreadsheets with some basic entertainment features like app based games or streaming video.

Requirements Definition

Requirements are statements of need: re-read the Problem Statement at the beginning of this document and think about what Logan needs to use technology to accomplish. Then identify five requirements in the table below (one has been done for you as an example):

#

Requirement Description

0

Logan needs to be able to store a lot of images(note: this entry is an example).

1

 

2

 

3

 

4

 

5

 

Technology Analysis

Computing Devices

Decide what you want to propose as a solution to Logan's dilemma. Use the following tables to compare and contrast different alternative computers to help you decide what you would recommend. Make sure you compare two different computers by inputting in both columns of the table.

Computing Device

Specification

Computer #1

Computer #2

What type of computer is this (Desktop, Laptop, etc.)?

 

 

What is the computer make and model?

 

 

How much memory (RAM) does the computer have?

 

 

What type of processor (CPU) does the computer have?

 

 

What type of graphics card does the computer have?

 

 

What type of hard disk does the computer have?

 

 

What size is the computer's hard disk?

 

 

How much does the computer cost?

 

 

What is the URL to the webpage where you found this information?

 

 


Printers

Review your options for printers and decide what type you will compare. Use the following tables to compare and contrast two different printers to help you device what you recommend. Make sure you compare two different printers by inputting input data in both columns of the table.

Printer

Specification

Printer #1

Printer #2

What is the printer make and model?

 

 

Does the printer offer duplex printing?

 

 

Does the printer support multiple functions such as scanning or faxing?

 

 

How many pages does the printer print per minute (in black and white)?

 

 

Is the printer color or black and white?

 

 

How much does the printer cost?

 

 

What is the URL to the webpage where you found this information?

 

 

Mobile Communication

Review your options for communication devices and a vendor that would be providing the service. Decide what type you will compare (smart phone, plain cell phone, etc.). Keep in mind, Logan wants to use a no-contract provider for mobile communications. In this exercise, Logan cannot take advantage of any subsidies that would reduce the cost of her mobile device - she will have to pay for the device in full. Make sure you compare two different communication options by inputting data into both columns of the table.

Mobile Communication Device

Specification

Device #1

Device #2

What company will provide service?

 

 

What is the mobile device's make and model?

 

 

How much does this device cost?

 

 

What is the URL to the webpage where you found this information?

 

 

Software

As part of your recommendation, you should also think about the software required to make your solution work. Don't assume an operating system or office solution software (word processing, spreadsheets, etc.) is included. Make sure you review the requirements and get the software she will need as an Art History major.

If the software is included in the purchase, indicate what operating system comes with the purchase, and list at least two software applications that should be purchased.

Accessories

As you begin to think through your recommendations, you may find you need additional items to meet the requirements or for ease of use (a mouse for example or maybe a keyboard for a tablet). List these requirements in the table below, the device selected and the cost. You must list at least two external storage device.

Recommended Technical Solution

Written Summary

Review the data you've collected in Part 1 of this project and decide on a technical solution that you think would best suit Logan's needs.

Use the area text box below to provide a technical solution summary and the rationale for the selections. Your summary should be at least three sentences and should:

1. Address all of Logan's requirements; and
2. Provide justification for each of your recommendations.

Cost Summary

In the table below, document all of the different items you have recommended for Logan. Each recommended item should be entered on a single line in the item column. For each entry in the item column, provide the item's cost in the cost column. Once all your data has been entered, use a calculator to add up all the entry's costs. Enter the total cost of all the items next to Total Cost at the bottom of the table.

PART 2: SECURITY

PROBLEM

Lately, Logan has noticed some problems; she calls you for advice. It seems her web browser is displaying the wrong home page and frequently skips between different web sites. When she clicks on links in email, she gets taken to sites that offer her great deals on things but despite leaving her account number, nothing has shown up in her mail box. She also noticed that her computer is running much slower than it used to and she is receiving a lot of email from companies that she never heard of. Logan needs help fast!

Analyze the problem. When you helped Logan select a computer system, did you include any security software? If you did, great - you are ahead of the game. Regardless, now is the time to analyze what's going on with Logan's computer. Logan has been all over the Internet. She frequently uses Public Wi-Fi Hot Spots. She often opens email attachments sent by people she has never heard of. Help Logan out - do a little research, then review what security is already in place on Logan's computer. Decide what Logan can do to make her computer more secure. Your job is to research potential security concerns and identify a security addition to the technical solution you developed in Part I of this project.

SECURITY THREAT ANALYSIS

Use the following table to document your investigations into potential security threats. You should analyze the information you find and write it in your own words (do not just copy and paste, points will be deducted if it's a straight copy and paste). For each identify the source or sources of your information by entering the URL(s) in the box labeled source (none of your sources should be Wikipedia, or a search engine). Some useful websites to get you started include the following (note: the URL's listed below should be used as a starting point - you may have to perform additional research):

• http://www.devry.edu/know-how/top-5-cyber-security-threats-that-could-affectyour-life/
• https://www.stanford.edu/group/security/securecomputing/mobile_devices.html
• http://www.symantec-norton.com/11-most-common-computer-securitythreats_k13.aspx
• http://home.mcafee.com/virusinfo/glossary
• http://blog.emsisoft.com/2012/08/22/tec120822/

 

Phishing

What is this threat?

 

How is this a security threat?

 

How can this threat be prevented?

 

Paste the URL to your source(s)

 

Social Engineering

What is this threat?

 

How is this a security threat?

 

How can this threat be prevented?

 

Paste the URL to your source(s)

 

Dumpster Diving

What is this threat?

 

How is this a security threat?

 

How can this threat be prevented?

 

Paste the URL to your source(s)

 

Computer Virus (Trojan Horse, Worms, Etc.)

What is this threat?

 

How is this a security threat?

 

How can this threat be prevented?

 

Paste the URL to your source(s)

 

Tailgating/Piggybacking

What is this threat?

 

How is this a security threat?

 

How can this threat be prevented?

 

Paste the URL to your source(s)

 

Card Skimmers

What is this threat?

 

How is this a security threat?

 

How can this threat be prevented?

 

Paste the URL to your source(s)

 

Internet Hoax

What is this threat?

 

How is this a security threat?

 

How can this threat be prevented?

 

Paste the URL to your source(s)

 

Shoulder Surfing

What is this threat?

 

How is this a security threat?

 

How can this threat be prevented?

 

Paste the URL to your source(s)

 

Key logger

What is this threat?

 

How is this a security threat?

 

How can this threat be prevented?

 

Paste the URL to your source(s)

 

Zero Day

What is this threat?

 

How is this a security threat?

 

How can this threat be prevented?

 

Paste the URL to your source(s)

 

Recommended Security Solution

Written Summary

Review the data you have collected in Part 2 of this project and decide on a security solution that you think would best suit Logan's needs.
Use the area text box below to provide a technical solution summary and the rationale for the selections. Your summary should be at least three sentences discussing what Logan can do to establish or improve her security plan.

Cost Summary

In the table below, document any additional items Logan needs to purchase to establish or improve her security plan. This table should include all the items you listed in the Cost Summary in Part 1 of this project plus anything else Logan will need to purchase for her security plan. Enter the total cost of all the items next to Total Cost at the bottom of the table.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91880413
  • Price:- $60

Guranteed 36 Hours Delivery, In Price:- $60

Have any Question?


Related Questions in Computer Engineering

Determine whether or not the following claim is true for

Determine whether or not the following claim is true for all regular expressions r 1  and r 2 . The symbol ≡ stands for equivalence regular expressions in the sense that both expressions denote the same language.  (a) (r ...

What are some of the skill sets required for the various

What are some of the skill sets required for the various aspects of cloud administration. Are there any certifications related to cloud computing? Is there value in obtaining one of these certifications?

Question having a strong statistical picture of data is

Question : Having a strong statistical picture of data is important to being able to properly identify trends in statistical analysis. In R, how can an analyst identify appropriate sample distributions and test for norma ...

Scenario upon logging into the centos7 server you notice

Scenario: Upon logging into the CentOS7 server you notice that the system seems sluggish. You suspect that a runaway process is causing the problem, so you open the top utility and notice that there are numerous "cat bom ...

Qion leadership paradox and inter-team relationsa

Question: Leadership Paradox and Inter-team Relations A. What is the leadership paradox? Give some reasons why a leader can encounter difficulty in newly formed teams or groups using a participative management system. Su ...

Suppose in equilibrium and in a closed economy at the point

Suppose, in equilibrium and in a closed economy, at the point of tangency between the iso-value line and the ppf, we observe that MPLf= 8 MPLm= 2 and PM=1 what is Pf? what is the wage?

Need a use case diagram for a case studythe case studypaul

Need a use case diagram for a case study: The case study Paul is the Director of IT Services for a consulting firm Avant. The firm has been growing fast since it was launched in 2010. With over 100 employees and hundreds ...

Jeff decides to start saving some money from this upcoming

Jeff decides to start saving some money from this upcoming month onwards. He decides to save only $500 at first, but each month he will increase the amount invested by $100. He will do it for 60 months (including the fir ...

Imposing a tariff leads to the existence of two deadweight

Imposing a tariff leads to the existence of two deadweight triangles, which are the Consumption distortion and Production distortion losses. It is easy to understand why consumption distortion constitutes a loss for soci ...

How do you make a java program that reads two diagonal

How do you make a Java program that reads two diagonal points, say p1 and p2, of an up-right rectangle and finds both the smallest circle containing the rectangle and the largest circle that can be contained in the recta ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As