Comprehensive and secure solution

Assignment Help Basic Computer Science
Reference no: EM13843515

Comprehensive and Secure Solution

Assume you are a consultant to a local business that has asked you to propose an enterprise-wide solution that includes computers, peripherals, and networking solutions such that the entire system is secure.

The business is a small publishing company that has 50 employees. The office is located on one floor of a single story dwelling. There are only pillars holding up the roof and no walls. Each "office" is a single glass cubicle.

Detailed specifications are as follow. Addressing each should comprise a separate section of the body of your proposal.

PC Selection

a. The company for which you wish to be hired as a contractor needs to purchase new personal computers. The company requires clarification regarding all technical specifications for the PC's with justifications for each attribute. (Note: specify hard drive capacity, speed, RAM, etc., and also recommend an operating system.)

b. The company is looking for at least 20 business-class machines. Brand is not mandated. The company will eventually network all of the computers. The company is looking for you to explain what internal and external networking components are required (explaining each and justifying WHY you chose the machines you did).

c. All proposals should include cost elements.

Peripherals

a. The company has asked that you provide details regarding the different types of peripheral equipment that can be connected to the computers proposed in the PC Selection section. Include descriptions of the types of connections needed for monitors, storage devices, printers, and any other devices you feel would be appropriate for the scenario described.

b. All proposals should include cost elements.

Networking

a. You are required to provide a solution that can connect all users in a manner that will allow them to manage and share files in a central location. These are the basic requirements, but you are encouraged to be creative in proposed solutions, keeping in mind that while the organization is growing quickly, it remains relatively small.

Security
a. In this section be sure to discuss how the individual PCs and network would be secured.

Your draft proposal should include each of the following sections, with each preceded by an appropriate heading:

Introduction/overview

Table of Contents

Body, including a separate section for each numbered item in the specifications above

Conclusion

APA References

Any appendices you feel appropriate

Reference no: EM13843515

Questions Cloud

Converging evidence that stereotype threat reduces working : What you have to do is to do a presentation about the article that I posted and you have to connect between the article and the chapter. Article- Converging Evidence That Stereotype Threat Reduces Working Memory Capacity and Chapter- Learning, Cogni..
One of poetry''s key features is the way it sounds : One of poetry's key features is the way it sounds. Most poets pay close attention to not just the words they choose to use but how those words sound in combination with each other. This is why many poems rhyme and have rhythm (or "meter" as we call i..
Write a short essay 1-2 page about love/ or love and money : Write a short essay 1-2 page about LOVE/ Or Love and Money.
What is katiniss'' (and peeta''s) response to the capital : What is Katiniss' (and Peeta's) response to the Capital (i.e. the luxury, the fashions, their prep teams, and Cinna)?
Comprehensive and secure solution : Comprehensive and Secure Solution
How do you define a good day : How do you define a "good day"? What does a "good day" mean to you? In other words, what should your "good day" constitute of? What emotions would you have when you have a "good day"? What might you do the things differently than usual if you are hav..
Use a prewriting technique to brainstorm : Choose a topic for your persuasive essay. Keep in mind that your topic should be one that you can fully cover in a five-paragraph essay (approximately 500 words).Use a prewriting technique to brainstorm your topic you learned at the beginning of the ..
Planning and completion of a group adventure : The project consists of three distinct parts: The planning and completion of a group adventure, The individual project portfolio, The group oral presentation, including a group outline
Determining the velocity of student : 1. What is the velocity of student B's pebble as falls past the point of its release? 2. Just before striking the water, is the velocity of student A's pebble greater than, less than or equal to that of student B?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Capabilities of wimax

Using any source of your choosing, research ADO.NET and in your own words, in about one paragraph, describe your understanding of it. Also, list your sources by providing links and/or printed book/article names.

  Perform four unconstrained optimizations

Perform four unconstrained optimizations using the following values for the penalty parameter: R = 1 , 0 . 1 , 0 . 01, and 0 . 001.

  What is the order of the public key?

the weaknesses that arise in Elgamal encryption if a public key of small order is used. We look at the following example. Assume Bob uses the group Z ? 29 with the primitive element ?= 2. His public key is ?= 28.

  Explain cause and effect transition happen

One process could cause another process to make a transition. Under what circumstance, if any, would the following. Cause and effect transition happen ?

  Write a matlab program

write a matlab program that asks the user to enter a positive number a between 2 and 10. Then create x and y vectors from -a and +a with spacing 0.05.

  Write down a 3- to 5-page paper describing marketing plan

mcbride marketing paperresource virtual organization for mcbride financial servicesmcbride financial services wants to

  Select a real or hypothetical business engaged in e-busines

Step 1: Establish a target audience and scope for your presentation. Select a real or hypothetical business engaged in e-business and outline its central offerings and/or services. Next, outline the categories of information that may require c..

  Types of systems that benefit from dhcp

Consider the types of systems that benefit from DHCP reservations and/or from having manually-configured (static) IP addresses, including servers, networked printers, and other networked devices (e.g., network-connected HVAC controllers, IP camera..

  Generate profits often referred to as creating

When the output of some units can be used as inputs to othe units, or if two organizations pools markets and expertise that results in lower costs and generate profits it is often referred to as creating?

  Process improves the network design and user satisfaction

Identify specific tools that can be used to assist in determining performance requirements as part of the analysis. Identify the appropriate stakeholders that should be included in developing each section.

  Identify the communication protocols

Identify the communication protocols used in a large hospital organization.

  What is the future of human-computer interactions

What makes today's technological environment a Digital World? What is the future of human-computer interactions

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd