Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

SEGIUNI Sdn Bhd is a company which specializes in corporate training courses. SEGIUNI has decided to introduce a training course for VIDEO EDITING starting in August 2013. You have been appointed as an IT consultant for SEGIUNI. You first role is to prepare a report to compare the architectures of the computers to use for the training. The requirements for the computers are as follows:

• appropriate computers must be installed in the computer lab

• the PCs must have sufficient storage capacity for software and data

• the network could be either a wired or a wireless network.

Task 1

Research several computers (minimum two computers) and prepare a report which compares the architecture of each computer, which can be used to implement the required solution. Your reports should compare:

a. the model and architecture of mother boards

b. the model and architecture of the processors

c. the speed and type of memory

Task 2

Prepare another report which contains your specification of the computers required for the lab. Discuss motherboard architecture; processor architecture; compare the processors functions; cost benefits and pros and cons of any suggested computers.

Task 3

Prepare a report to justifies and concludes with your proposed solution such as why you proposed the computer for the lab.

Instructions:

• A single word processed document containing all reports and other documentation. Total word count not to exceed 3000 words.

• The document should be properly structured in the order of the tasks with a table of contents, bibliography

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91910

Have any Question? 


Related Questions in Computer Engineering

1 discuss two security mechanisms applied at the

1. Discuss two security mechanisms applied at the application layer. Are they safer than those applied at the lower network layer? Support your response. 2. Are there security mechanisms applicable at transport layer? Is ...

1 who is ultimately responsible for managing a technology

1. Who is ultimately responsible for managing a technology? Who is responsible for enforcing policy that affects the use of a technology? 2. What is contingency planning? How is it different from routine management plann ...

Define the group of each of the following multicast

Define the group of each of the following multicast addresses (local network control block, internetwork control block, SSM block, Glop block, or administratively scoped block): a. 224.0.1.7 b. 232.7.14.8 c. 239.14.10.12

In programming project 41 you implemented the sparse life

In Programming Project 4.1, you implemented the Sparse Life Grid ADT that creates a game grid of unlimited size for use with the game of Life. That implementation used a single Python list to store the individual live ce ...

1 in a tcp connection the window size fluctuates between

1. In a TCP connection, the window size fluctuates between 60,000 bytes and 30,000 bytes. If the average RTT is 30 ms, what is the throughput of the connection? 2. If originally RTTS = 14 ms and α is set to 0.2, calculat ...

1 we said that tcp provides a connection-oriented service

1. We said that TCP provides a connection-oriented service between the two application programs. A connection in this case needs a connection identifier that distinguishes one connection from another. What do you think t ...

Program assignment -for this assignment we are expanding on

Program Assignment - For this assignment we are expanding on assignment 3.  Now that we have parsed input, we will execute the code. As a reminder, the language has the following rules: 1. An empty string is a semantic e ...

In computer science when we encounter an algorithm we often

In computer science, when we encounter an algorithm, we often need to ask about the complexity of that algorithm (how many computations we need to do). To find the complexity of the distance vector's algorithm, find the ...

1 what do you think would happen if the control connection

1. What do you think would happen if the control connection were severed before the end of an FTP session? Would it affect the data connection? 2. In FTP, if the client needs to retrieve one file from the server site and ...

Using the floor plan of a building you are familiar with

Using the floor plan of a building you are familiar with, design an electronic monitoring plan that includes closed-circuit television, burglar alarms with appropriate sensors, fire detectors, and fire suppression and ph ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro