Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

SEGIUNI Sdn Bhd is a company which specializes in corporate training courses. SEGIUNI has decided to introduce a training course for VIDEO EDITING starting in August 2013. You have been appointed as an IT consultant for SEGIUNI. You first role is to prepare a report to compare the architectures of the computers to use for the training. The requirements for the computers are as follows:

• appropriate computers must be installed in the computer lab

• the PCs must have sufficient storage capacity for software and data

• the network could be either a wired or a wireless network.

Task 1

Research several computers (minimum two computers) and prepare a report which compares the architecture of each computer, which can be used to implement the required solution. Your reports should compare:

a. the model and architecture of mother boards

b. the model and architecture of the processors

c. the speed and type of memory

Task 2

Prepare another report which contains your specification of the computers required for the lab. Discuss motherboard architecture; processor architecture; compare the processors functions; cost benefits and pros and cons of any suggested computers.

Task 3

Prepare a report to justifies and concludes with your proposed solution such as why you proposed the computer for the lab.

Instructions:

• A single word processed document containing all reports and other documentation. Total word count not to exceed 3000 words.

• The document should be properly structured in the order of the tasks with a table of contents, bibliography

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91910

Have any Question? 


Related Questions in Computer Engineering

Create 1 webpage that lays out the attached design using

Create 1 webpage that lays out the attached design using CSS. You may use any font you want.  You can get the pictures from the Word document by right clicking on each picture and choosing "Save as picture". Zip all your ...

1 determine the worst case time complexity for each method

1. Determine the worst case time complexity for each method of the Map ADT implemented in Section 3.2. 2. Modify the binary search algorithm to find the position of the first occurrence of a value that can occur multiple ...

1 we say that a router in dvmrp creates a shortest-path

1. We say that a router in DVMRP creates a shortest-path tree on demand. What is the meaning of this statement? What is the advantage of creating shortest path trees only on demand? 2. Does RPF actually create a shortest ...

In this assignment you will model the game of bulgarian

In this assignment, you will model the game of Bulgarian Solitaire. The game starts with 45 cards. (They need not be playing cards. Unmarked index cards work just as well.) Randomly divide them into some number of piles ...

The work of an it department is never finished the wvcc

The work of an IT department is never finished. The WVCC network administrators and student assistants have many plans for the next network upgrade. Their main concern at this point is availability. Although the hierarch ...

1 show that the approximate diffusion equations derived for

1. Show that the approximate diffusion equations derived for a constant electric field, (750.3A) and (750.4A), are also valid if E is not spatially constant but the region is quasi-neutral. This enables a derivation of a ...

After being fired an employee becomes disgruntled the

After being fired, an employee becomes disgruntled. The managers never disabled his login information, and his best friend still works at the company. The disgruntled employee gives his friend his login information for t ...

For a network with about 150 people what network devices ie

For a network with about 150 people. What network devices (i.e router, switches, APs), security devices (i.e Firewall), network services (i.e DHCP, file, active directory) would you recommend using and why?

It is sometimes necessary to perform stack operations with

It is sometimes necessary to perform stack operations with variable length strings. Implement push and pop procedures that manipulate such strings stored on a stack consisting of a fixed length character array.

1 consider proposed implementations of a systolic array you

1. Consider proposed implementations of a systolic array (you can find these in on the Internet or in technical publications). Then attempt to program the loop provided in Exercise 6.11 using this MISD model. Discuss any ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen