Define virtualisation and explain computer architecture, Computer Engineering

Rentrag has decided to replace all of the computers currently being used by all of the business and office staff. He has asked you to recommend a set of specification for computers for each the business and its office staff. In appendix 1 and 2he has provided a list of minimum software applications expected to be used by each business and the specification for three desktop comps and two laptops.

What do you need to do?

Address the following requirements in a word processed document :

1) Create a table with seven columns with the following headings and complete the table for each application:

SOFTWARE APPLICATION

OPERATING SYSTEM

MINIMUM CPU MHZ

MINIMUM RAM

 MINIMUM RESOLUTION

MINIMUM DISK SPACE

OTHER REQUIREMENTS

 

 

 

 

 

 

 

2) For each of the desktops and notebook, assess the suitability of that computer for each department. Marks will be allocted according to how well you allign your choice of computers with the tasks required of the machine.

3) Give 3 reasons why organisations such as Rentrag Holdings pty ltd purchase computers that exceed the minimum specifications for the applications software?

4) It has been suggested that it would be simpler to upgrade the CPUs in the curent computers rather than buying new computer systems. What are the 3 possible implications of this action for other hardware components?

5) Describe eight main function of an operating sstem. Although windows is by far the most commonly installed Operating Systems on PCs, Linux is an alternative and comparatively cheaper. Discuss why it is not more commonly used.

6) Provide a definition and explanations of multi-core CPUs and explain why these may be more efficient than single core processors with a higher clock speed.

7) What is a front side bus (FSB) and why is its clock speed mportant in terms of the fetch- execute cycle?

8) Define  virtualisation and explain this term in relation to computer architecture. Name 6 benefits it may provide for computer systems.

9) Create a correctly referenced list that details all resources used including any web sites that you have accessed to answer the questions.

Posted Date: 3/21/2013 5:50:13 AM | Location : United States







Related Discussions:- Define virtualisation and explain computer architecture, Assignment Help, Ask Question on Define virtualisation and explain computer architecture, Get Answer, Expert's Help, Define virtualisation and explain computer architecture Discussions

Write discussion on Define virtualisation and explain computer architecture
Your posts are moderated
Related Questions
Convert binary number in two's compliment form 0100 1000. Converting the binary number into 2's compliment from 0100 1000 is given below: 01001000 => 10111000

Define Micro operation. The operations implemented on data stored in the registers are called Micro operation. A microperation is an elementary operation performed on the infor

nfa significance

Hashing collision resolution techniques are a) Chaining, b) Bucket addressing

What do you understand by stepwise refinement of the program? The method of "Stepwise refinement" means to take an object and move it from a general perspective to a exact leve

Bit Slice ALUs It was possible to manufacture smaller like 4 or 8 bits fixed point ALUs on a single IC chip. If these chips are constructed as expendable types then employing

What is Indexed addressing The location of data is calculated as sum of an address specified by one of previous methods, and value of an index register. This allows an array of

Elements are given 3,14,7,1,8,5,11,17,,6,23,12,20,26,4,16,18,24,25,19 We will construct b tree and avl tree And after that delete some integers

Explain about Behavioral Notations These notations contain dynamic elements of the model.  Their elements comprise interaction and the state machine. It also comprise classe

What are the exceptions encountered for FP operation? The exceptions encountered for FP operation are overflow, underflow. /0, inexact and invalid values.