Preview

It190 Final Project

Better Essays
Open Document
Open Document
1561 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It190 Final Project
Running Head: Final Project

Unit 9 Final Project
Cynthia Martinez
Kaplan University

IT 190-01
Rachel Franklin
July 16, 2012

Remember to give your justification for each of your decisions. Don’t just provide a list of your final recommendations. Assume that your audience has only basic computer knowledge.

A. Computers for each employee (Marketing has indicated a preference for Macs due to their graphic capability)
B. Be sure to include the hardware requirements for each model and why you are making the recommendations that you are

MUST BE PURCHASED SYSTEM from Brand Name NO custom Built computers
Computers for Accountants Hardware | Item description | Why you are making the recommendations | CPU | Integrated AMD E2-1800 duel-core Processor(1.7GHZ,512KBx2 L2 cache | Because when I was in Medical Billing this was what we used and it was able to handle what needed to be done. | RAM | 6GB DDR3-1333MHz SODIMM 92DIMMs) | Because Accounts do not need that much memory and the computer comes with 4GB and a free upgrade to 6GB | Hard Drive | 500GB 7200rpm SATA hard drive | This Hard drive can be upgraded to 2TB 7200 rpm SATA if needed at a later time | Optical Drive | Slim-tray SuperMulti DVD Burner | There is two DVD drives so you do not have to take it out to copy you can just transfer it in one shot | Video Card | Intel 256MB | They are just making tables and do not need to use a high tech video and it can be upgraded to 1GB later if needed | Sound Card | Integrated sound | You just need a good clear sound | Network Card | Wireless-N LAN card | This is good for if you move the office around you do not have to worry about plugging it in to modem | Monitors | 20” diagonal HD widescreen LED-backlit | This is a

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    The following outline presents the fundamental solutions for the safety of data and information that belongs to Richman Investments. As part of the general security plan of the organization the IT department puts together a proposal to provide multi-layered security strategies that can be applied at every level of the IT structure. The plan will lay out the importance of improving and safeguarding the levels of each domain and the process of protecting the information of the organization.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Capstone Project It331

    • 3189 Words
    • 13 Pages

    Five doctor offices have decided to join each of their buildings to a network. With this, each office will have access to each of the other four offices’ information. This would greatly benefit them and their patients, allowing them to pull up a patient’s medical and billing information from a central server for easy access. However the central, east and west offices are each on their own LAN. The three LANs are similar in design for connecting each workstation and for hardware and software. The eastern and western offices have already been in a partnership with their own peer-to-peer with remote access network along with shared billing and insurance management software. The north and south locations are running standalone workstations that are various ages. Each office has no kind of network compatible hardware and runs the billing and insurance software on one dedicated computer, each with its own attached printer. Patient information is stored on several computers throughout the offices and patient records are filed manually on paper.…

    • 3189 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    It 242 Final Project

    • 1213 Words
    • 5 Pages

    ACME Manufacturing will best benefit from a Wide Area Network by the use of a VOIP. ACME currently has a headquarter in Atlanta that has a corporate operation, accounting, marketing, and an administrative staff. They also have a sales office and engineering office in Atlanta as well. In Chicago, New York, and Phoenix they have their distribution office. I find that ACME will benefit from subnets, routers, packaging, and VLAN’s and security to make sure that the WAN network is successful for WAN network…

    • 1213 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    It 210 Final Project

    • 733 Words
    • 3 Pages

    1. Application has interface with title and direction to accept data form user and convert foreign currency to US currency…

    • 733 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Based on the researched value of goods and services provided by the individual laptop computer vendors, an assessment can be made to layout vendor procurement consideration in reference to evaluation criteria and respective weight to the requirements. In this Benchmark, five vendors were reviewed and an individual value was determined as a raw score to each evaluation criteria entry. Vendors were evaluated based on product quality, product capabilities, known business experience, reputation and history, length of time the company has been in business, warranty terms, and estimated cost. Scores were based on a scale of one to five, with one being not very good and five being very good. Based on data collected, vendor consideration should be shown in order of preference in the following diagram.…

    • 979 Words
    • 4 Pages
    Good Essays
  • Good Essays

    IT205 Week 4 Assignment

    • 641 Words
    • 2 Pages

    The way the system is installed where I work is Internet is set with a LAN to WAN. I have a space where I utilize email trade, server controls enact registry. Now with the LAN server with a activate directory set permission control for user and the system administrator is responsible for the performance and operation. Are Administrator sign me to a computer this is one form of security here. Another way to prevent people from coming to the server or network, For example if we have important information it will go through a router then you will have a firewall this will prevent people from interring are network. Also every employee in the company as a CAT card, A CAT card as a pin number associate with every employee. This pin number allow you access the computer and also getting in the building but the mean point with the CAT card allow you to access computer and emails. By this will let the company know whom using the computer and access the web and emails. It prevents dishonesty with the company. Now getting that out the way I will explain what I do for work.…

    • 641 Words
    • 2 Pages
    Good Essays
  • Good Essays

    FOSS (Free and Open Source Software) had some trouble in 2006 when Microsoft submitted 235 patents that were allegedly violated by FOSS. Microsoft created these patents in order to collect royalties from companies in the “free world” (companies/people using free software). Eben Moglen of the Free Software Foundation contended that software is a mathematical algorithm and is not patentable. Moglen wrote, “It’s a tinderbox. As the commercial confrontation between free software and software-that’s-a-product becomes more fierce, patent law’s going to be the terrain on which a big piece of the war’s going to be fought.” FOSS has powerful corporate patrons and allies. So if Microsoft ever tried to sue Linux distributor Red Hat for patent infringement, for instance, OIN might sue Microsoft in retaliation, trying to enjoin distribution of Windows.…

    • 705 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    It 210 Final Project

    • 1033 Words
    • 5 Pages

    Write, “Select international currency type: Canadian dollars, Mexican pesos, English pounds, Japanese yen, French francs.”…

    • 1033 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 1 Problem Set 1

    • 750 Words
    • 3 Pages

    10. The maximum amount of system memory supported by Windows 7 Enterprise is 192 GB.…

    • 750 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    It/205 Syllabus

    • 2230 Words
    • 9 Pages

    | |List the major computer hardware, data storage, and input and output technologies used in | |…

    • 2230 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Final project it255

    • 1631 Words
    • 5 Pages

    System security has been very important ever since the beginning of the computer age. Security is setup for a number of reason whether it be to protect data from those who are not supposed to see it or hide it from those who are supposed to security at any point is important. Security can be physical, virtual or a mixture of the two, but in this day and age it is definitely needed. In the following I will give my opinion on how to increase or the steps I would use to implement security to a certain situation.…

    • 1631 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Choose two or three decisions and list the criteria that you will use to make these decisions.…

    • 964 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Nt1210 Yardi Research

    • 616 Words
    • 3 Pages

    Phone: (509)555-5555 Yardi File Server Plan Date Yardi Software- Hardware Requirements Genesis 5.3 as of May 2013 Customer Software Yardi Software Recommended Networking Server Proposed Processor Intel Core Pentium 2.4GHZ or faster Intel® Xeon® E5-2420 More Power Memory 2GB RAM or more 16 GB RAM Better Performance Operating System Windows Server 2003,2008, or 2012 Standard or Small Business (SBS) Windows Server 2008R2 Standard Recommend Windows SBS Server 2011 Hard Drive 10GB Available after install 500GB 7.2K RPM SATA 3Gbps 3.5in Cabled Hard Drive…

    • 616 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    G22 health and safety

    • 266 Words
    • 2 Pages

    c. Detail the lists and reports available within the workplace, and state the information they give…

    • 266 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Miss

    • 713 Words
    • 4 Pages

    You should consider a good range of reasons, to justify your choice of methods for your project, and present your arguments logically and clearly.…

    • 713 Words
    • 4 Pages
    Satisfactory Essays