Define virtualisation and explain computer architecture, Computer Engineering

Assignment Help:

Rentrag has decided to replace all of the computers currently being used by all of the business and office staff. He has asked you to recommend a set of specification for computers for each the business and its office staff. In appendix 1 and 2he has provided a list of minimum software applications expected to be used by each business and the specification for three desktop comps and two laptops.

What do you need to do?

Address the following requirements in a word processed document :

1) Create a table with seven columns with the following headings and complete the table for each application:

SOFTWARE APPLICATION

OPERATING SYSTEM

MINIMUM CPU MHZ

MINIMUM RAM

 MINIMUM RESOLUTION

MINIMUM DISK SPACE

OTHER REQUIREMENTS

 

 

 

 

 

 

 

2) For each of the desktops and notebook, assess the suitability of that computer for each department. Marks will be allocted according to how well you allign your choice of computers with the tasks required of the machine.

3) Give 3 reasons why organisations such as Rentrag Holdings pty ltd purchase computers that exceed the minimum specifications for the applications software?

4) It has been suggested that it would be simpler to upgrade the CPUs in the curent computers rather than buying new computer systems. What are the 3 possible implications of this action for other hardware components?

5) Describe eight main function of an operating sstem. Although windows is by far the most commonly installed Operating Systems on PCs, Linux is an alternative and comparatively cheaper. Discuss why it is not more commonly used.

6) Provide a definition and explanations of multi-core CPUs and explain why these may be more efficient than single core processors with a higher clock speed.

7) What is a front side bus (FSB) and why is its clock speed mportant in terms of the fetch- execute cycle?

8) Define  virtualisation and explain this term in relation to computer architecture. Name 6 benefits it may provide for computer systems.

9) Create a correctly referenced list that details all resources used including any web sites that you have accessed to answer the questions.


Related Discussions:- Define virtualisation and explain computer architecture

Program for encoding ASCII alpha numeric, Q. Program for encoding ASCII Alp...

Q. Program for encoding ASCII Alpha numeric? ; A program for encoding ASCII Alpha numeric. ; ALGORITHM:             ; create the code table             ; read an input

What is page-stealer process, What is Page-Stealer process? This is the...

What is Page-Stealer process? This is the Kernel process that makes rooms for the incoming pages, by swapping the memory pages that are not the part of the working set of a pro

Implementing protection with virtual memory, Implementing Protection with V...

Implementing Protection with Virtual Memory - computer architecture: To enable the operating system to implement protection in the VM system, the HW have to: I. Support at

What is the maximum frequency of operation, For the circuit demonstrated be...

For the circuit demonstrated below, what is the Maximum Frequency of Operation? Are there any hold time violations for FF2? When yes, how do you modify the circuit to ignore them?

Illustrate arithmetic shifts with example, Q. Illustrate Arithmetic shifts ...

Q. Illustrate Arithmetic shifts with example? Arithmetic shifts ARITHMETIC SHIFT LEFT and ARITHMETIC SHIFT RIGHT are same as LOGICAL SHIFT LEFT and LOGICAL SHIFT RIGHTexcept th

What is register set, What is Register Set Register Set:  Register set ...

What is Register Set Register Set:  Register set is used to keep immediate data during the implementation of instruction. This area of processor having of various registers.

Explain working neural network work, Q. Explain working neural network work...

Q. Explain working neural network work? ANSWER: A neural network has an input layer with the factors under consideration, a middle or hidden layer that assigns and adjusts weig

What methods can be overridden in java, In C++ terminology, all public meth...

In C++ terminology, all public methods in Java are virtual. Thus, all Java methods can be overwritten in subclasses except those that are declared final, private and static.

The components of i-way infrastructure, What are the components of I-way In...

What are the components of I-way Infrastructure? There are three mechanism of the I-way infrastructure: Consumer access equipment Local on-Ramps Global informa

By which all systems are identified, In a LAN network every system is ident...

In a LAN network every system is identified by? In a LAN network all systems are identified through IP Address.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd