+1-415-670-9189
info@expertsmind.com
Identifies the cost of computer
Course:- Basic Computer Science
Reference No.:- EM13452




Assignment Help
Assignment Help >> Basic Computer Science

Task 1:

Go to http://pricespy.co.nz/, http://www.buildtoorderpc.com or any another source that identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

1. Home users – (but not gamers)

2. Game Systems

3. Office users – (but not servers)

4. Small business servers

Your objective is to:

Choose THREE of the above four categories. Design a system for each category you choose, with the best possible performance, and the lowest cost, within the cost limits shown below:

Cost Limits (i.e., UP TO this amount):

1) Home user: $1500;

2) Game System: $4500;

3) Office user: $2500;

4) Small business server: $3500

Note: These costs are the maximum cost you can use for that system; however you must try to design for the best performance for lowest cost (ie., best cost/performance ratio).

- Create a spreadsheet listing all of the components, their prices, the place where you could purchase, and the total cost,

- Explain why your choices are suitable for this type of computer.

Below is a list of the kinds of components you may come up with. Note: This list is JUST TO GIVE YOU AN IDEA – you might need to include more components, or less depending on the type of system you’ve chosen.

- Case

- Power Supply

- Motherboard

- Processor

- Memory

- Hard Drive

- Video Card

- DVD Drive

- Audio Card

- Modem

- Network Card

- Backup medium

- Operating System

- Office Software

- Warranty

- Keyboard

- Mouse

- Speakers

- Monitor

- Printer

NOTE: The “Store” where you can purchase components and computers can be an online store also, but MUST be located in New Zealand, and the products MUST be available for purchase at the time.

Task 2:

Find 2 laptop computers – one for a home user and the other for a game user, listing all the specifications of each laptop, and the advantages and disadvantages (listed in a table) of a laptop vs. a desktop for these two categories.

Task 3:

Research the phrase “RAID Hard Drive Arrays”, and write one paragraph (200 – 300 words) on what a “RAID Hard Drive” configuration is, giving a brief description of these 4 common RAID configurations:

- RAID 0

- RAID 1

- RAID 5

- RAID 10

Part 2

Write a brief report for the user (or business) on Preventive maintenance for this machine.

Explain why it is necessary to apply these instructions for this computer. Include in your explanations and instructions the following:

PC preventive maintenance:

1. List 2 types of PC preventive maintenance.

2. What precaution you must take while undertaking preventive maintenance-

3. Describe in brief why do we require preventive maintenance of PCs-

4. List two software preventive maintenance tasks.

5. Describe two methods of software preventive maintenance.

6. What are software upgrades- Why do you require them-

7. What are computer viruses and what you need to do to keep your PC virus free-

8. Describe in brief different types of backup. Why do we require backups-

9. Describe what is a backup- List three backup media.

10. Discuss the different types of backup media.

11. Discuss what you understand by PC hardware maintenance.

12. Describe the purpose of hardware maintenance of PCs.

13. Describe why you require an antistatic strap while undertaking hardware maintenance.

14. List any 4 PC components that require hardware maintenance.

15. Describe in brief any two PC hardware maintenance tasks.

16. Describe preventive maintenance of: keyboard, mouse, monitor




Put your comment
 
Minimize


Ask Question & Get Answers from Experts
Browse some more (Basic Computer Science) Materials
In this assessment, you will analyze and use the concepts of market segmentation, targeting, and positioning to develop a product strategy for your selected product. This an
Hackers and their companion viruses are an increasing problem, especially on the Internet. What are the most important measures for a firm to take to protect itself from
If you look at the LDAP Authentication Types, you will find that LDAP specifies three authentication types: (1) No Authentication (2) Basic Authentication (3) Simple Authentic
1.  Let L be a list of nonnegative integers, where min is the smallest element and max is the largest element. Write an expression that specifies a new tuple consisting of max
The characters of a word are stored in a character array A1 of dimension 10. Assuming a stack data structure S and push(S, char c) and char pop(S) procedures on S are availa
If you find the point is too small to show on the screen, obtain help to find out how to make it larger. When you have completed the grid, turn AutoCAD's grid on and off to
Explain why negotiators prefer information over any other form of power in the negotiation process. Provide an example of how power of information can be used in negotiation.
Many resources will suggest that in the next few coming years, smartphones will become the one of the most important digital devices we own. Explain the implications of thi