Wednesday, May 6, 2020

Recommending a Computer System - 997 Words

m Recommending a computer system By Mark Woods Contents Page Page 1: Title Page Page 2: Contents Page Page 3: Introduction Computer Systems Page 4: Computer Systems Cont. Page 5: Specification Comparison Table Internet and e-mail Conclusion 2 Introduction This is a report written for Sharon Woods. Sharon is a self-employed beautician who is in need of a computer system to use in her business and for personal use and so came to I for advice. Sharon has a beauticians in the city centre, But will also be using her computer system at home in her study. The computer system†¦show more content†¦And the 500GB hard drives on all of the laptops in this report are more than up to the task of storing all of Sharon’s music. To use internet in her beauticians, I would recommend Sharon would be best to look at some sort of USB dongle. However I would recommend she downloaded all of her music at home so as she didn’t eat into her data allowance. As for e-mail Sharon could create two separate e-mail accounts with windows hotmail as she could personalise her e-mail addresses to her liking. Conclusion The laptop I am going to recommend is the ACER Aspire S3-391 Ultrabook.Overall it is the best laptop for Sharon’s business and personal needs.It provides her with the software she needs to create her own advertisements, invoices, letters and to keep track of her accounts for her business. It also provides her with the ability to surf the internet and go shopping online as well as download music and due to the Acer having a DVD re-writer allow her to create her own CDs through windows media player. The Acer also is the lightest laptop in this comparison and therefore will be easy for Sharon to transport between her beauticians and home. 5 Mark Woods Recommending a computer system Acer Lenovo Sony VAIO RAM 4GB 4GB 4GB Hard drive 500GB 500GB 500GB Cd/DVD Drive DVD Re-Writer DVD Re-Writer SupermultiShow MoreRelatedFunctional Status Of The Client s Laptop Essay1126 Words   |  5 Pagesprocessing, reading comprehension, reading, executive function and the writing process. Functional Limitations and Potential Assistive/Rehabilitation Technology Solutions: Genevieve is familiar with using a computer. She currently purchased an ASUS, Windows 10 laptop with 8GB of RAM, 64 Bit operating system. She has a cell phone with 4GB of RAM., and she does not have an All in One printer. Reading: Genevieve states so she can read, but reads at a slow rate. She continued to say so she loses her placeRead MoreAlternative Options For Securing Family Foods Grocery Store Essay1244 Words   |  5 Pagesplan to upgrade the security system to perform at an optimal level. In addition to maintaining the budget requirements set, the weakest points among the organization will be addressed. Upgrading the system software and physical security, creating an information security policy, improving the employment hiring process, and controlling access to the system are primary priorities. The current operating system is a major vulnerability to the company’s assets. Every computer in the store needs an anti-virusRead MoreAccountability And Responsibility Of An Organization1009 Words   |  5 Pagesmatters? Who assists who? Who make decisions in absence of who? These are crucial questions that describe responsibilities and accountabilities in an organisation. The Zoo must have clear job description, decision-making process and communication system for all office holders. The Board of Directors The Board of Directors is responsible for the organisation’s governance. It sets the organisation’s mission, vision, objectives, policies and strategic plan. It also oversees the management ofRead MoreDrawbacks Of Collaborative And Content Based Filtering Methods1178 Words   |  5 PagesDrawbacks of Collaborative and Content-Based Filtering Methods and the Advantages of Deep Belief Networks in Recommender Systems Sayali Borkar*, Girija Godbole*, Amruta Kulkarni* and Shruti Palaskar* *Computer Engineering Department, Pune Institute of Computer Technology, India Abstract—A large number of modern businesses are based on core idea of users consuming content in a physical or digital form, from a catalogue. The catalogue is available for browsing through a web site or mobile applicationRead MoreComplications Of Formulas And Soldations In A Business982 Words   |  4 Pagespurchasing computers. With this you are required to create a networking system that would be most suited for your company. I am recommending two Networking options; they are the Peer-to-Peer Network and the Client Server Network, for the daily running of the office. With the Peer-to-Peer Network it is decentralized and can connect up to ten computers at once, each computer is plugged into a hub or a switch. Each worker who is an administrator, each has a local account, each computer has a name toRead MoreArtificial Intelligence ( Ai ) Is Intelligence Offered By Machines1716 Words   |  7 Pages Artificial intelligence In e -commerce What is artificial intelligence : Artificial intelligence (AI) is intelligence offered by machines. In computer science, an ideal intelligent machine is a flexible rational agent that recognize its environment and takes actions that increase its chance of success at some goal. also, the term artificial intelligence is applied when a machine performs cognitive functions, such as learning and problem solving. SiteZeus is a great example of usingRead MorePersonal Narrative : Choosing A Computer1049 Words   |  5 Pages– CHOOSING A COMPUTER 1.Will you be using the computer mainly to check email and browse the web? A. Computer is a multi tasking device we can use it as a different kinds of ways. But present days almost every computer is interlinked with the WEB for example we need to develop a research paper on particular subject or we need to update latest software versions in to our computer we definitely have to have a WEB. Yes according to my personnel experience I will be using the computer to check my dailyRead MoreTop Five Security Threats And Infrastructure776 Words   |  4 Pagesinformation systems; and aid with any security challenges to the operating environment and infrastructure. For a start, C3J will use the NIST SP 800-14: Generally Accepted Principles and Practices for Securing Information Technology Systems and NIST SP 800-53: Recommended Security Controls for Federal Information Systems standards to outline the top five threats to the server, the workstations, and the website. Following are the top identified threats against AMI information systems, the likelihoodRead More Assignment 1: Computer Forensics Overview1397 Words   |  6 PagesAssignment 1: Computer Forensics Overview CIS 417 Computer Forensics Computer forensics is the process of investigating and analyzing techniques to gather and preserve information and evidence from a particular computing device in a way it can be presented in a court of law. The main role of computer analyst is to recover data including photos, files/documents, and e-mails from computer storage devices that were deleted, damaged and otherwise manipulated. The forensics expert’s work on casesRead MoreThe Impact Of Contemporary Trends On Data Science1625 Words   |  7 PagesAnalysis of Contemporary Trends in Data Science Introduction It can be said that Big Data is one of the hottest topics in the contemporary information technology. Hot topics in IT comes out every 1 or 2 decades, such as personal computer, internet, become the compulsory transformation choice to organisations. However, big data seems different from the above, partly because big data is not about technology as much organisation transformation. By utilizing the big data, organisations should transform

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.