Obtain a suitable configuration and a price

Assignment Help Management Information Sys
Reference no: EM13835809

You work for a company that is about to replace its 3-year old desk-top computers. The machines are principally used for desktop processing and for accessing information from the Internet. Most of the data is stored on the network so the machines do not require to have very large hard drives.

The staff takes work home routinely using USB keys so the USB ports should be easily accessible. Existing printers and scanners will also be connected to each machine.

The firm has traditionally used Dell computers and wishes to stay with Dell unless there is a considerable saving by going to another computer (they will be buying 75 machines.)

Because of the sensitive nature of the data on these machines, the company wished to have a fingerprint scanner on each machine. Corporate firewalls are in place and so a local firewall is not needed. Antivirus software is, however as well as an operating systems and the Office suite of programs.

Research the Internet, beginning with the Dell site and obtain a suitable configuration and a price. The machine should not be too large or too small in capacity.

Go to a second supplier and identify a similar machine from that location.

Write a memo to the CEO listing the specifications and prices for each option and give him a recommendation.

Reference no: EM13835809

Questions Cloud

Identify and discuss vulnerabilities and threats : Identify and discuss vulnerabilities and threats - develop a prioritized strategy to deal with the 3 or 4 most serious threats and vulnerabilities
Explain the concept of subsystem coupling and decoupling : Explain the concept of subsystem coupling and decoupling using just in time and convectional store control system as examples.
Discuss advantages and disadvantages of using pert cpm : Discuss the use of PERT/CPM techniques for managing projects. Describe what PERT/CPM does. Discuss advantages and disadvantages of using it. What other techniques might you choose to manage your project?
How organizations can best use differences in creative think : how organizations can best use differences in creative thinking
Obtain a suitable configuration and a price : Research the Internet, beginning with the Dell site and obtain a suitable configuration and a price. The machine should not be too large or too small in capacity
Alternative approaches to strategic management : This assessment is designed to allow students to research current alternative theoretical approaches in strategic management, and evaluate them in terms of suggested benefits, but also identify and explain their limitations.
Formulate an lp to minimize steelcos costs : Demand may be backlogged at a cost of $70 per ton month. That is, if 1 ton of month 1 demand is met during month 3, then a backlogging cost of $140 is incurred. At the beginning of month 1, Steelco has 8 workers. During any month, at most 2 workers c..
Convert the concentrations to parts per million : Convert the following concentrations to parts per million. Consider the density of water at 20°C
Identify four of the typical group dependecies : Identify four of the typical group dependecies that project managers must manage

Reviews

Write a Review

Management Information Sys Questions & Answers

  What negative can you see about buying microsoftit used to

what negative can you see about buying microsoft?it used to be said no one was ever fired for buying ibm. in the 1990s

  Explain activities required to develop the tracking system

Explain the activities required to develop the tracking system

  Development of an er diagram

Development of an ER Diagram and Database Implementation Weight 20%, Aim: To give you practical experience in using Entity-Relationship and Relational Database modelling techniques

  Step-wise answer to business analysis

Step-wise answer to Business Analysis - Who is responsible--you, your manager, or your employee? What action are you going to take?

  Differences between white hat and gray hat hackers

Research the art and science of ethical hacking. Provide a plain English summary of your research in which you answer the following: What are the primary differences between white hat and gray hat hackers? Is it possible for hacking to be conducted ..

  Case study - gap filler

What are the main activities that the business undertakes and where in the business are the crucial decisions made and what types of information does the business require to operate successfully?

  How do enterprise applications collaboration and

how do enterprise applications collaboration and communication systems and intranets improve organizational

  Name and describe two safeguard utilized for system security

Name and describe two safeguard utilized for system security and Explain why health IT privacy and security standards are important

  Supply chain managementwhat are some of functional

supply chain managementwhat are some of functional strategies that affect the supply chain? meaning what functional

  Software development lifecycle

Learn how to analyze and model the requirements, and develop a requirements traceability matrix that spans the software development lifecycle

  What is the name of the process used in user''s identity

What is the name of the process that is used to establish whether or not a user's identity is legitimate

  Internet and the technologythe future of the internet phone

internet and the technologythe future of the internet phone. i do not want to discuss the history of the internet phone

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd