How would you recommend addressing dave’s backup concerns

Assignment Help Basic Computer Science
Reference no: EM131404814

Dormitory Networking

Mikel, Dylan, Sanjay, and Harrison were sitting in the common room of their campus suite and complaining about their wireless network. They inherited the equipment from the last residents of the suite, and unfortunately their router uses the outdated 802.11g standard. They all have notebooks that have 802.11n network adapters, but their throughput is poor. Since they are often all surfing the Internet at the same time and trying to download movies, their network's performance has become unacceptable. Since they all just sold last semester's books back to the bookstore for a total of $600, they decided this would be a good time to upgrade their network and peripherals. Dylan has an inkjet printer that gobbles up expensive cartridges, and Phil has a laser printer that just broke. The guys figure one good networked all-in-one printer should meet their needs since it would also provide them with photocopying capabilities. Mikel is concerned about backups for his computer. His external hard drive fell on the floor and no longer works reliably. He has a tremendous amount of photos and schoolwork on his computer that he is concerned about losing if his hard drive fails. Since the guys don't know much about networking, the four roommates have asked for your guidance. Consider the following keeping in mind their $600 budget:

a. Research network-ready laser printers on sites such as hp.com, epson.com, and brother.com. What network-ready all-in-one printer would you recommend? Why?

b. Research 802.11n wireless routers at sites such as netgear.com, linksys.com, and dlink.com. What router do you think will meet the roommates' needs? Why?

c. How would you recommend addressing Dave's backup concerns? Would you recommend a NAS device for the network, or do they have enough money left in their budget for a home network server? Research these devices and make an affordable recommendation. Check sites such as tigerdirect.com and newegg.com for competitive pricing.

Reference no: EM131404814

Questions Cloud

What is the residual for given person : What is the residual for this person? Explain what the residual tells you about this person's body temperature in comparison to the average body temperature for someone his age.
Sketch an approximate facsimile of your resulting graph : Make the plot such that if the outlier were removed, the correlation for the remaining points would be between -0.2 and +0.2. Sketch an approximate facsimile of your resulting graph.
Explain a history on the organization to include key factors : why you have chosen the organization, the organization's significance in your life, a brief history on the organization to include key factors that are relevant in future sections of the paper
Create a plot for the target correlation r : Using the applet, create a plot for the target correlation r = +0.5 in which one point is an outlier that decreases the correlation.
How would you recommend addressing dave’s backup concerns : Research 802.11n wireless routers at sites such as netgear.com, linksys.com, and dlink.com. What router do you think will meet the roommates' needs? Why?
What are some other possible explanations : Does this mean that sleeping with a light on as an infant causes nearsightedness? What are some other possible explanations?
What is organizational culture and why is it important : What is Organizational Culture and Why is it Important? Relationship Between Organization Culture and Structure. Aligning Organization Culture and Structure. HBO's CEO Says Culture Trumps Strategy Every Day.
What is the volume of shared media that you need to store : Research home network servers using sites such as hp.com, acer.com, and lenovo.com or use the term "home server" in a search engine. Select a server that is appropriate for your home network. Prepare a summary of your findings and include the reas..
What future technologies that would be on your wish list : How will these technologies and devices change entertainment and how people interact with information? What future technologies that would be on your wish list?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the purpose of this algorithm

Figure 1-4 shows an alternative way to represent an algorithm. (Note: we introduce this construct in detail later on. If it looks too intimidating, skip it until after you've read Chapter 4.)

  Write a c++ program that reverses the bits in an integer

For example, if the bit pattern 11100101, corresponding to the octal number 0345, is assigned to okay, the bit pattern 10100111, corresponding to the octal number 0247, should be produced and stored in revokay.

  Sra in 2006 a small business was created in the financial

in 2006 a small business was created in the financial sector. the main purpose of the business was to provide customers

  How much power is present at the carrier frequency

What is the bandwidth of the signal, ignoring all components which have less than 1% of the total signal voltage?

  Show that the method terminates

Show that the method terminates and that each node visits the candidate list at most once.

  Write code to handle the attachments in the message

Write code to handle the attachments in the message

  At most how high can the probability of a major security

At most how high can the probability of a major security breach be with the IDS in place for a risk-neutral rational decision maker to purchase the IDS?

  Java class library collections framework

What support exists for linked lists in the Java Class Library Collections Framework? Do you think this support is easy to understand and use? Why or why not?

  Use symmetric cryptography in current applications

As we have seen in this chapter, public-key cryptography can be used for encryption and key exchange. Furthermore, it has some properties (such as nonrepudiation) which are not offered by secret key cryptography. So why do we still use symmetric c..

  Statistical analysis approaches

The Portfolio Project, due at the end of Week 8, is a statistical analysis using one or more of the statistical analysis approaches presented in Modules 4 and 5. These various approaches are designed to produce business intelligence to resolve pro..

  Interpretations of the nessus report

For this Assignment, write a 4- to 6-page paper that summarizes your interpretations of the Nessus report and your recommendations to address the reported vulnerabilities. Cover the following points in your paper:

  Show using a state diagram the maca protocol

Show using a state diagram the MACA Protocol

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd