Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

SEGIUNI Sdn Bhd is a company which specializes in corporate training courses. SEGIUNI has decided to introduce a training course for VIDEO EDITING starting in August 2013. You have been appointed as an IT consultant for SEGIUNI. You first role is to prepare a report to compare the architectures of the computers to use for the training. The requirements for the computers are as follows:

• appropriate computers must be installed in the computer lab

• the PCs must have sufficient storage capacity for software and data

• the network could be either a wired or a wireless network.

Task 1

Research several computers (minimum two computers) and prepare a report which compares the architecture of each computer, which can be used to implement the required solution. Your reports should compare:

a. the model and architecture of mother boards

b. the model and architecture of the processors

c. the speed and type of memory

Task 2

Prepare another report which contains your specification of the computers required for the lab. Discuss motherboard architecture; processor architecture; compare the processors functions; cost benefits and pros and cons of any suggested computers.

Task 3

Prepare a report to justifies and concludes with your proposed solution such as why you proposed the computer for the lab.

Instructions:

• A single word processed document containing all reports and other documentation. Total word count not to exceed 3000 words.

• The document should be properly structured in the order of the tasks with a table of contents, bibliography

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91910

Have any Question? 


Related Questions in Computer Engineering

Your group is working for a global organization that

Your group is working for a global organization that handles highly classified intellectual property. In many situations and scenarios, the implementation and operations teams have been creating and setting up environmen ...

1 which management groups are responsible for implementing

1. Which management groups are responsible for implementing information security to protect the organization's ability to function? 2. Has the implementation of networking technology created more or less risk for busines ...

Assignment expenses worksheet in excelbefore beginning this

Assignment: Expenses Worksheet in Excel Before beginning this assignment, you should thoroughly review Excel Worksheets, Charts, Formulas, Functions, and Tables from your course textbook, Go! All in one: Computer concept ...

Describe the function of each of the following types of

Describe the function of each of the following types of database keys: primary, alternate, secondary, and foreign.

1 explain the difference between an object and an object

1. Explain the difference between an object and an object reference. 2. Explain the difference between an object and an object variable. 3. Explain the difference between an object and a class. 4. Give the Java code for ...

Search the web for security education and training programs

Search the Web for security education and training programs in your area. Keep a list and see which category has the most examples. See if you can determine the costs associated with each example. Which do you think woul ...

1 show the encoding for the integer 1456 using ber2 show

1. Show the encoding for the INTEGER 1456 using BER. 2. Show the encoding for the OCTET STRING "Hello world." using BER. 3. Show the encoding for the IPAddress 112.56.23.78 using BER. 4. Show the encoding for the object ...

1 comment on the reasons for the rapid growth of the

1. Comment on the reasons for the rapid growth of the Android operating system. 2. Recently Apple's iOS4 encryption was hacked by a Russian; compare and discuss the weaknesses in the iOS4 disclosed by the Russian company ...

1 compare the authorization model used by the network

1. Compare the authorization model used by the network operating systems (NOS) to that used by the old stand-alone operating systems. 2. List and discuss the most common access privileges in a computing system. 3. Discus ...

1 assume a client sends a syn segment to a server when the

1. Assume a client sends a SYN segment to a server. When the server checks the well-known port number, it finds that no process defined by the port number is running. What is the server supposed to do in this case? 2. Ca ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen