Define virtualisation and explain computer architecture, Computer Engineering

Assignment Help:

Rentrag has decided to replace all of the computers currently being used by all of the business and office staff. He has asked you to recommend a set of specification for computers for each the business and its office staff. In appendix 1 and 2he has provided a list of minimum software applications expected to be used by each business and the specification for three desktop comps and two laptops.

What do you need to do?

Address the following requirements in a word processed document :

1) Create a table with seven columns with the following headings and complete the table for each application:

SOFTWARE APPLICATION

OPERATING SYSTEM

MINIMUM CPU MHZ

MINIMUM RAM

 MINIMUM RESOLUTION

MINIMUM DISK SPACE

OTHER REQUIREMENTS

 

 

 

 

 

 

 

2) For each of the desktops and notebook, assess the suitability of that computer for each department. Marks will be allocted according to how well you allign your choice of computers with the tasks required of the machine.

3) Give 3 reasons why organisations such as Rentrag Holdings pty ltd purchase computers that exceed the minimum specifications for the applications software?

4) It has been suggested that it would be simpler to upgrade the CPUs in the curent computers rather than buying new computer systems. What are the 3 possible implications of this action for other hardware components?

5) Describe eight main function of an operating sstem. Although windows is by far the most commonly installed Operating Systems on PCs, Linux is an alternative and comparatively cheaper. Discuss why it is not more commonly used.

6) Provide a definition and explanations of multi-core CPUs and explain why these may be more efficient than single core processors with a higher clock speed.

7) What is a front side bus (FSB) and why is its clock speed mportant in terms of the fetch- execute cycle?

8) Define  virtualisation and explain this term in relation to computer architecture. Name 6 benefits it may provide for computer systems.

9) Create a correctly referenced list that details all resources used including any web sites that you have accessed to answer the questions.


Related Discussions:- Define virtualisation and explain computer architecture

What are digital signatures and its uses, What are Digital Signatures and i...

What are Digital Signatures and its uses? A digital signature is an electronic quite than a written signature which can be used through someone to authenticate the identity of

What is an i/o buffer, What is an I/O buffer? I/O buffer: One ty...

What is an I/O buffer? I/O buffer: One type of input-output requirement arises from devices which have a very high character density as disks and tapes. With these chara

Persuasive communication , 1)   Discuss various types of persuasive communi...

1)   Discuss various types of persuasive communication you might be needed to write or present in your professional and personal life. 2)    Describe two ways to organize a resume

Give examples of different parameter-passing mechanisms, Explain different ...

Explain different parameter passing mechanisms to a function with the help of example? The different parameter-passing mechanisms are given below: 1.   Call by value 2.

Extjs, tell some thing about htmleditor in extjs whether it contains attach...

tell some thing about htmleditor in extjs whether it contains attachment button or not

A variable number of input arguments, Write a function that will get a vari...

Write a function that will get a variable number of input arguments: the length and width of a rectangle, and possibly also the height of a box that has this rectangle as its base.

Recursive procedures are implemented, Recursive procedures are implemented ...

Recursive procedures are implemented by using Recursive procedures are executed by using stacks due to stacks are LIFO data structure and we require this feature to store retur

Over fitting considerations, Over fitting Considerations : Hence in le...

Over fitting Considerations : Hence in left unchecked there backpropagation in multi-layer networks can be highly susceptible to overfitting itself to the training examples. B

Two different ways of building a match code object, What are the two differ...

What are the two different ways of building a match code object? A match code can be built in two dissimilar ways: Logical structure: The matchcode data is set up not pe

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd