Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

SEGIUNI Sdn Bhd is a company which specializes in corporate training courses. SEGIUNI has decided to introduce a training course for VIDEO EDITING starting in August 2013. You have been appointed as an IT consultant for SEGIUNI. You first role is to prepare a report to compare the architectures of the computers to use for the training. The requirements for the computers are as follows:

• appropriate computers must be installed in the computer lab

• the PCs must have sufficient storage capacity for software and data

• the network could be either a wired or a wireless network.

Task 1

Research several computers (minimum two computers) and prepare a report which compares the architecture of each computer, which can be used to implement the required solution. Your reports should compare:

a. the model and architecture of mother boards

b. the model and architecture of the processors

c. the speed and type of memory

Task 2

Prepare another report which contains your specification of the computers required for the lab. Discuss motherboard architecture; processor architecture; compare the processors functions; cost benefits and pros and cons of any suggested computers.

Task 3

Prepare a report to justifies and concludes with your proposed solution such as why you proposed the computer for the lab.

Instructions:

• A single word processed document containing all reports and other documentation. Total word count not to exceed 3000 words.

• The document should be properly structured in the order of the tasks with a table of contents, bibliography

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91910

Have any Question? 


Related Questions in Computer Engineering

Security programas you build your model and plan you have

Security Program As you build your model and plan, you have requested assistance from various organizations to identify their data and system requirements. To assist them, you have created a data classification scheme, a ...

Consider our implementation of the stack adt using the

Consider our implementation of the Stack ADT using the Python list, and suppose we had used the front of the list as the top of the stack and the end of the list as the base. What impact, if any, would this have on the r ...

1 discuss the differences between a firewall and a packet

1. Discuss the differences between a firewall and a packet filter. 2. Give reasons why firewalls do not give total security. 3. Discuss the advantages of using an application-level firewall over a network level firewall. ...

Add a feature to the cashregister class for computing sales

Add a feature to the CashRegister class for computing sales tax. The tax rate should be supplied when constructing a CashRegister object. Add recordTaxablePurchase and getTotalTax methods. (Amounts added with recordPurch ...

1 in http draw a figure to show the application of cookies

1. In HTTP, draw a figure to show the application of cookies in a scenario in which the server allows only the registered customer to access the server. 2. In HTTP, draw a figure to show the application of cookies in a w ...

We have sampled a low-pass signal with a bandwidth of 200

We have sampled a low-pass signal with a bandwidth of 200 KHz using 1024 levels of quantization. a. Calculate the bit rate of the digitized signal. b. Calculate the SNRdB for this signal. c. Calculate the PCM bandwidth o ...

Flapper dumplings a local store that sells baby clothes and

Flapper Dumplings, a local store that sells baby clothes and accessories, has a baby registry. This registry keeps information about customers (the expectant mother and father) prior to the baby shower and for a time lon ...

Programming assignment linker you are to implement a

Programming Assignment: Linker You are to implement a two-pass linker and submit the source code, which we will compile and run. Submit your source code together with a Makefile as a ZIP file with directory through NYU C ...

The prolog interpreter as described in this chapter

The PROLOG interpreter, as described in this chapter, performs a prescribed resolution at each step. If all of the statements in a PROLOG program were con-verted to disjunction of literals, describe a control strategy fo ...

Implement a recursive algorithm to compute the n

Implement a recursive algorithm to compute the n! permutations of the first n integers. In your implementation, the internal recursive call should be of the form permutations (n -1) rather than permutations (k + 1) as we ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro