Define virtualisation and explain computer architecture, Computer Engineering

Assignment Help:

Rentrag has decided to replace all of the computers currently being used by all of the business and office staff. He has asked you to recommend a set of specification for computers for each the business and its office staff. In appendix 1 and 2he has provided a list of minimum software applications expected to be used by each business and the specification for three desktop comps and two laptops.

What do you need to do?

Address the following requirements in a word processed document :

1) Create a table with seven columns with the following headings and complete the table for each application:

SOFTWARE APPLICATION

OPERATING SYSTEM

MINIMUM CPU MHZ

MINIMUM RAM

 MINIMUM RESOLUTION

MINIMUM DISK SPACE

OTHER REQUIREMENTS

 

 

 

 

 

 

 

2) For each of the desktops and notebook, assess the suitability of that computer for each department. Marks will be allocted according to how well you allign your choice of computers with the tasks required of the machine.

3) Give 3 reasons why organisations such as Rentrag Holdings pty ltd purchase computers that exceed the minimum specifications for the applications software?

4) It has been suggested that it would be simpler to upgrade the CPUs in the curent computers rather than buying new computer systems. What are the 3 possible implications of this action for other hardware components?

5) Describe eight main function of an operating sstem. Although windows is by far the most commonly installed Operating Systems on PCs, Linux is an alternative and comparatively cheaper. Discuss why it is not more commonly used.

6) Provide a definition and explanations of multi-core CPUs and explain why these may be more efficient than single core processors with a higher clock speed.

7) What is a front side bus (FSB) and why is its clock speed mportant in terms of the fetch- execute cycle?

8) Define  virtualisation and explain this term in relation to computer architecture. Name 6 benefits it may provide for computer systems.

9) Create a correctly referenced list that details all resources used including any web sites that you have accessed to answer the questions.


Related Discussions:- Define virtualisation and explain computer architecture

Explain the design reusability of verilog, Explain the Design reusability o...

Explain the Design reusability of Verilog There is no concept of packages in Verilog. Functions and procedures used within a model should be  defined  in  the  module.  To  mak

How to use data validation function in vba, Data validation is a significan...

Data validation is a significant concept in VBA. Application process and a custom dialog box can be used to accurate input errors. You can assign an application process to the fram

What is relational database, What is relational database? Relational da...

What is relational database? Relational database has data that is perceived as tables. A relational DBMS manages tables of data and associated structures that enhances the func

Define file record length, Define File record length ? File record leng...

Define File record length ? File record length must be selected to match the data characteristics.

Multithreaded architecture, Multithreaded Architecture:  It is clear now th...

Multithreaded Architecture:  It is clear now that if we give many contexts to multiple threads, then processors with multiple contexts are known as multithreaded systems. These sys

List the acid properties, a. List the ACID properties. Describe the usefuln...

a. List the ACID properties. Describe the usefulness of each. b. During its implementation, a transaction passes by several states, until it finally commits or aborts. List all

When the get cursor command used in interactive lists, When the get cursor ...

When the get cursor command used in interactive lists? If the hidden information is not enough to uniquely recognize the selected line, the command GET CURSOR is used.  The GET

Explain the use of ssl to secure the network, Explain the use of SSL to sec...

Explain the use of SSL to secure the network.  SSL (Secure Sockets Layer) is a protocol developed by Netscape for transferring private documents by the Internet. SSL works by u

How can you pass a struct by reference in e, How can you pass a struct by r...

How can you pass a struct by reference in e?   The question is phrased in a tricky way because passing by reference is the default and only possible way to pass structs in e. I

What is meant by latch, Latch is a D- type flip-flop used as a temporary st...

Latch is a D- type flip-flop used as a temporary storage device controlled by a timing signal, which can kept 0 or 1. The primary function of a Latch is data storage. It is used in

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd