Identify a specific operating system and version

Assignment Help Computer Engineering
Reference no: EM131010869

Below is my assignment feedback for case study part 1 ( which is what needs to be fixed. )

1 - Document-name and title page: Both your title page and your file name are not as specified in the instructions.

2 - Footer. Use a footer to create page numbers for all pages except the title page: Your page numbers appear on the title page. See the instructions.

3 - Input Devices. Identify each input device type and show which specific user requirements are met: What about a webcam for video conferencing?

Did you overlook the need for a mouse? Not everyone likes to do all input via the keyboard.

4 - Output Devices. Identify each output device type and show which specific user requirements are met: The size of the monitor should be listed here. I know you have it in your first table, but this is a critical piece of information for the user reviewing the tables.

To do high quality audio editing, a headset/mic would be needed. Using built-in mic and speakers will not be sufficient in an office setting.

5 - Other Peripheral Devices. Identify other peripheral devices by type and show which specific user requirements are met: What about the required surge protection?

6 - Adapter Cards. Identify each type of adapter card and show which specific user requirements are met: The San disk is a storage device, not an adapter card. What about graphics and audio cards?

7 - Productivity Software. Identify types of software, recommended specific product names, and how this software meets specific user requirements.: MsAccess is not compatible with a Mac unless you are installing a parallel MS OS.

Kaspersky is a system utility, not a productivity package.

8 - Operating System. Identify a specific operating system and version: MS Office is NOT an operating system. It is an application suite for productivity. Remember, you are recommending a Mac and MS Office itself is not able to be loaded on a Mac.

9 - Web services. Identify the specific Web services that should be used: HTTP is not a web service. Think of programs you use only when connected to the internet - email, chat, instant messaging, video conference calls, etc. UDDI listed here by itself needs explanation. It is an XML-based registry for businesses worldwide to list themselves on the Internet.

10 - Executive Summary. A brief two-paragraph narrative that categorizes the user type, identifies the category of PC required, and summarizes recommendations .: At least two errors in grammar or spelling.

Attachment:- Assignment.rar

Reference no: EM131010869

Questions Cloud

Average cost of capital be at the optimal capital structure : Pierce Products Inc. is considering changing its capital structure. F. Pierce currently has no debt and no preferred stock, but would like to add some debt to take advantage of low interest rates and the tax shield. what is the firm's optimal capital..
Considering a significant expansion to its product line : Shonrock International is considering a significant expansion to its product line. The sales force is excited about the opportunities that the new products will bring.
How long will the project take in days and weeks : Implement the above project scope into MS Project 2013 (or appropriate software). The following table forms an idea of the tasks/subtasks to be implemented. Remember the staffing, cost and timeframe constraints you have been provided with.
Which loan terms should business book publishing take : Which loan terms should Business Book publishing take?
Identify a specific operating system and version : Operating System. Identify a specific operating system and version: MS Office is NOT an operating system. It is an application suite for productivity. Remember, you are recommending a Mac and MS Office itself is not able to be loaded on a Mac
Describe the product characteristics : Describe the product characteristics (i.e., core benefit, basic product, expected product, and augmented product) of two of the companies below.
Prepare the 2013 journal entry to record pension expense : Prepare the 2013 journal entries to record the cash contribution to plan assets and payment of retiree benefits.
Determine the recursive relation : Let y= n=0Σ∞ cn (r) xn+r. Determine the recursive relation for cn(r), i.e., relation between cn+1(r) and cn(r). Take c0(r) = 1. Find two linearly independent solutions y1 and y2 which are valid for x>0 near x0 =0.
How is it different from traditional marketing : Identify and explain in detail the six forms of direct response marketing. What is guerrilla marketing? How is it different from traditional marketing?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Question1 what are three goals of safety in computing for

question1. what are three goals of safety in computing? for each goal list two controls that be able to be implemented

  Program that reads a set of scores from the file scores

plan and write a C++ program that reads a set of scores from the file scores.dat and outputs their mean and standard deviation on standard output. Use the following sets of input for testing the program.

  Factors in selecting suitable data type

Explain the factors in selecting the suitable data type for some value? Which of these is most significant?

  Give the pseudocode for the flowchart

make a flowchart and give the pseudocode for searching an array for a specified value.

  How the adoption of the technology affects

Your mandate as VP of Technology is to keep the regular projects strong and growing, plan for TechnoSeniors, and overhaul the AllTechComm intranet. Your must make the intranet one in which volunteers could sign up and manage their schedules, profi..

  Software engineering and microprocessor systems

Software is required for a simple house burglar alarm system.

  Description of the purpose of each layer in brief

description of the purpose of each layer in brief. A report to describe the different layers of SOA and the need for each layer. Examples of three Web services. An annotated diagram showing the layers.

  Write one exception class that includes multiple exceptions

How would you write one exception class that includes multiple exceptions, for example, if a file is not found and if an array is not dynamically allocated properly. (C++)

  Information has many facets value confidentiality integrity

information has many facets value confidentiality integrity privacy legality and so on. all information is not the same

  Use a bubble sort algorithm in c++

use a Bubble Sort algorithm in C++ that generates a list of 10 random integers.

  Explain topic enterprisecontinuity and incidentmanagement

Explain the topic Enterprisecontinuity, Personnelsecurity, Physical and environmental security, Procurement and Incidentmanagement.

  Question1 define defense in depth and explain the different

question1. define defense in depth and explain the different layers.2. what is leading security principle in

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd