What type of processor does the computer have

Assignment Help Basic Computer Science
Reference no: EM131123851

PRACTICAL EXAM

PART 1: BUYING A COMPUTER

PROBLEM

Logan is having a horrible week. On Monday she set her laptop case on the trunk on her car while she put away her books in the back seat and you guessed it, she drove off and it went flying. Needless to say, it didn't survive. Then to add insult to injury, on Wednesday, she accidentally spilled a Diet Pepsi on her desk wiping out her cell phone, PC and desktop printer. She desperately needs to figure out a new technology solution but only has $3,000 to spend. She is looking to you to help her shop on-line and figure out what solution will work best for her. Logan's income fluctuates based on her work schedule, so she uses a no-contract cell phone service but would like to investigate other no-contract cell phone service options. She is a frequent gamer and plays both role playing games (RPG) on her PC as well as multiplayer games online. She is going to be starting college in the fall and needs a solution that will meet the requirements of a typical college student living in a dorm. She is combining her love of Photography and Art and plans to major in Studio Arts and Art History so she will have to write (and print out) a lot of her homework. She will also need a significant amount of storage (the average song about 5MB and a photograph is about 400K) because she needs to store her music and a lot of photographs. Oh and of course she wants to be able to watch streaming videos from Netflix and Hulu.

TASK

The first step is to analyze the problem - what are Logan's needs versus her wants. Compare this to buying a car. Cars come with various packages and the buyer decides if all they need is a get around town kind of car or one with better gas mileage capable of driving cross country. You may want the shiny red Lexus or Lamborghini, but maybe what you need is good reliable transportation with few maintenance issues and low gas mileage.

Computers can be evaluated the same way. There are lots of different features like physical characteristics (height, weight, and display size), processor and processor speed, system memory, expansion memory, the list goes on. They can also be placed into categories based on usage.

• Desktop/Gaming Desktop: This is best if you need a device capable of editing videos, importing and manipulating photographs, playing videos and interactive games, creating documents, sending email etc.

• Laptop: This is best if you need to travel with your device for work or school, create documents and spreadsheets and send email but still want to use this for entertainment, playing the occasional video or surfing the web

• Tablet: This is a great choice if you just need basic capabilities with heavy usage of cloud technology for things like email, word processing and spreadsheets with some basic entertainment features like app based games or streaming video.

Requirements Definition

Requirements are statements of need: re-read the Problem Statement at the beginning of this document and think about what Logan needs to use technology to accomplish. Then identify five requirements in the table below (one has been done for you as an example):

#

Requirement Description

0

Logan needs to be able to store a lot of images(note: this entry is an example).

1

 

2

 

3

 

4

 

5

 

Technology Analysis

Computing Devices

Decide what you want to propose as a solution to Logan's dilemma. Use the following tables to compare and contrast different alternative computers to help you decide what you would recommend. Make sure you compare two different computers by inputting in both columns of the table.

Computing Device

Specification

Computer #1

Computer #2

What type of computer is this (Desktop, Laptop, etc.)?

 

 

What is the computer make and model?

 

 

How much memory (RAM) does the computer have?

 

 

What type of processor (CPU) does the computer have?

 

 

What type of graphics card does the computer have?

 

 

What type of hard disk does the computer have?

 

 

What size is the computer's hard disk?

 

 

How much does the computer cost?

 

 

What is the URL to the webpage where you found this information?

 

 


Printers

Review your options for printers and decide what type you will compare. Use the following tables to compare and contrast two different printers to help you device what you recommend. Make sure you compare two different printers by inputting input data in both columns of the table.

Printer

Specification

Printer #1

Printer #2

What is the printer make and model?

 

 

Does the printer offer duplex printing?

 

 

Does the printer support multiple functions such as scanning or faxing?

 

 

How many pages does the printer print per minute (in black and white)?

 

 

Is the printer color or black and white?

 

 

How much does the printer cost?

 

 

What is the URL to the webpage where you found this information?

 

 

Mobile Communication

Review your options for communication devices and a vendor that would be providing the service. Decide what type you will compare (smart phone, plain cell phone, etc.). Keep in mind, Logan wants to use a no-contract provider for mobile communications. In this exercise, Logan cannot take advantage of any subsidies that would reduce the cost of her mobile device - she will have to pay for the device in full. Make sure you compare two different communication options by inputting data into both columns of the table.

Mobile Communication Device

Specification

Device #1

Device #2

What company will provide service?

 

 

What is the mobile device's make and model?

 

 

How much does this device cost?

 

 

What is the URL to the webpage where you found this information?

 

 

Software

As part of your recommendation, you should also think about the software required to make your solution work. Don't assume an operating system or office solution software (word processing, spreadsheets, etc.) is included. Make sure you review the requirements and get the software she will need as an Art History major.

If the software is included in the purchase, indicate what operating system comes with the purchase, and list at least two software applications that should be purchased.

Accessories

As you begin to think through your recommendations, you may find you need additional items to meet the requirements or for ease of use (a mouse for example or maybe a keyboard for a tablet). List these requirements in the table below, the device selected and the cost. You must list at least two external storage device.

Recommended Technical Solution

Written Summary

Review the data you've collected in Part 1 of this project and decide on a technical solution that you think would best suit Logan's needs.

Use the area text box below to provide a technical solution summary and the rationale for the selections. Your summary should be at least three sentences and should:

1. Address all of Logan's requirements; and
2. Provide justification for each of your recommendations.

Cost Summary

In the table below, document all of the different items you have recommended for Logan. Each recommended item should be entered on a single line in the item column. For each entry in the item column, provide the item's cost in the cost column. Once all your data has been entered, use a calculator to add up all the entry's costs. Enter the total cost of all the items next to Total Cost at the bottom of the table.

PART 2: SECURITY

PROBLEM

Lately, Logan has noticed some problems; she calls you for advice. It seems her web browser is displaying the wrong home page and frequently skips between different web sites. When she clicks on links in email, she gets taken to sites that offer her great deals on things but despite leaving her account number, nothing has shown up in her mail box. She also noticed that her computer is running much slower than it used to and she is receiving a lot of email from companies that she never heard of. Logan needs help fast!

Analyze the problem. When you helped Logan select a computer system, did you include any security software? If you did, great - you are ahead of the game. Regardless, now is the time to analyze what's going on with Logan's computer. Logan has been all over the Internet. She frequently uses Public Wi-Fi Hot Spots. She often opens email attachments sent by people she has never heard of. Help Logan out - do a little research, then review what security is already in place on Logan's computer. Decide what Logan can do to make her computer more secure. Your job is to research potential security concerns and identify a security addition to the technical solution you developed in Part I of this project.

SECURITY THREAT ANALYSIS

Use the following table to document your investigations into potential security threats. You should analyze the information you find and write it in your own words (do not just copy and paste, points will be deducted if it's a straight copy and paste). For each identify the source or sources of your information by entering the URL(s) in the box labeled source (none of your sources should be Wikipedia, or a search engine). Some useful websites to get you started include the following (note: the URL's listed below should be used as a starting point - you may have to perform additional research):

• https://www.devry.edu/know-how/top-5-cyber-security-threats-that-could-affectyour-life/
• https://www.stanford.edu/group/security/securecomputing/mobile_devices.html
• https://www.symantec-norton.com/11-most-common-computer-securitythreats_k13.aspx
• https://home.mcafee.com/virusinfo/glossary
• https://blog.emsisoft.com/2012/08/22/tec120822/

 

Phishing

What is this threat?

 

How is this a security threat?

 

How can this threat be prevented?

 

Paste the URL to your source(s)

 

Social Engineering

What is this threat?

 

How is this a security threat?

 

How can this threat be prevented?

 

Paste the URL to your source(s)

 

Dumpster Diving

What is this threat?

 

How is this a security threat?

 

How can this threat be prevented?

 

Paste the URL to your source(s)

 

Computer Virus (Trojan Horse, Worms, Etc.)

What is this threat?

 

How is this a security threat?

 

How can this threat be prevented?

 

Paste the URL to your source(s)

 

Tailgating/Piggybacking

What is this threat?

 

How is this a security threat?

 

How can this threat be prevented?

 

Paste the URL to your source(s)

 

Card Skimmers

What is this threat?

 

How is this a security threat?

 

How can this threat be prevented?

 

Paste the URL to your source(s)

 

Internet Hoax

What is this threat?

 

How is this a security threat?

 

How can this threat be prevented?

 

Paste the URL to your source(s)

 

Shoulder Surfing

What is this threat?

 

How is this a security threat?

 

How can this threat be prevented?

 

Paste the URL to your source(s)

 

Key logger

What is this threat?

 

How is this a security threat?

 

How can this threat be prevented?

 

Paste the URL to your source(s)

 

Zero Day

What is this threat?

 

How is this a security threat?

 

How can this threat be prevented?

 

Paste the URL to your source(s)

 

Recommended Security Solution

Written Summary

Review the data you have collected in Part 2 of this project and decide on a security solution that you think would best suit Logan's needs.
Use the area text box below to provide a technical solution summary and the rationale for the selections. Your summary should be at least three sentences discussing what Logan can do to establish or improve her security plan.

Cost Summary

In the table below, document any additional items Logan needs to purchase to establish or improve her security plan. This table should include all the items you listed in the Cost Summary in Part 1 of this project plus anything else Logan will need to purchase for her security plan. Enter the total cost of all the items next to Total Cost at the bottom of the table.

Reference no: EM131123851

Questions Cloud

What do you see in terms of parenting : What are some of the strengths of the parent(s) do you see in regards to the parent(s) or their relationship with their partner? Children? Family? Work? Social Life?
Difference between sacral foramina and sacral canal : What is the difference between the posterior sacral foramina and sacral canal
Difference in the position between humans and cats : When referring to anatomical position, what is he major difference in the position between humans and cats
Provide a synopsis of the clotting cascade : Provide a synopsis of the clotting cascade as well as how 2 anticoagulant medications affect it. Provide a discussion regarding 2 ways the cardiovascular system works to control blood pressure
What type of processor does the computer have : How much memory (RAM) does the computer have? What type of processor (CPU) does the computer have? What type of graphics card does the computer have? What type of hard disk does the computer have? What size is the computer's hard disk?
What was period of stability called during the han dynasty : During the Han Dynasty, there was a period of time that was called a period of stability. What was this period of stability called during the Han Dynasty?
Describe the structures and events of sliding filament model : Describe the structures and events of the Sliding Filament Model of muscle cell contraction. What is meant by brain plasticity? Relate this to the anatomy of the brain including lobes and major functional regions. Give examples
How did the neo-freudians address ethics in their research : How did the neo-Freudians address ethics in their research? Do you feel that the studies of the neo-Freudians were in each case conducted ethically? Why or why not?
Garden of happiness : What is the name of the world-famous garden in Shanghai that were completed in 1577 and whose name translated to "Garden of Happiness?"

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Finds the five smallest and five largest numbers in the list

Write a function that, given a list of five or more numbers, finds the five smallest and five largest numbers in the list withoutsorting the entire list & plot the smallest vs. the largest.

  Create the word alice with the letters

When the user types a letter key on the keyboard that matches the letter on the screen, the letter on the screen should perform its spin method. Also include an additional method, spin Word, which spins all the letters when the user presses the sp..

  Create application to declares array of ten houseplant

Design an application that declares an array of 10 HousePlants. Prompt the user for data for each of the HousePlants, then display all values.

  How might the client become aware this had happened

Give a scenario involving server reboot in which an RPC request is sent twice by the client and is executed twice by the server, with only a single ACK.

  Construct a program such that the inputs are a prime integer

The program returns 15 distinct x such that a x mod p is a multiple of numbers in the set B.

  Write a program to manage a dictionary

Then ask whether the user wants to add this new word to the dictionary. If the answer is yes, do so and go back to request the next word.

  Who swallowed a cat, imagine that to swallow a cat.

There was an old woman who swallowed a fly. I don't know why she swallowed that fly, Perhaps she'll die. There was an old woman who swallowed a spider, That wriggled and wiggled and jiggled inside he She swallowed the spider to catch the fly, I do..

  Determine complement of sum of these eight-bit bytes

UDP and TCP use 1s complement their checksums. Assume you have following three 8-bit bytes: 01010011, 01010100, 01110100. Determine 1s complement of sum of these eight-bit bytes?

  Consultant to work on the system installation

A company hired a consultant to work on the system installation. The consultant hires your group as a subcontractor to do the work of creating and moving files, deleting files and listing the date/time to a file name. Instead of creating each with..

  Organize your thought in a structured format.

symbol such as an open square or heavy dot that precedes a line of text when the text warrants special emphasis

  How far could it transmit a signal

A step-index multimode fiber has a modal dispersion of about 30 ns/km. Using the formula for maximum data rate for a given dispersion, about how far could it transmit a signal at 1Gbit/s?

  Determine whether jeremy should lease or buy plant in china

Determine whether Jeremy should lease or buy the plant in China

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd