This website uses cookies to ensure you have the best experience. Learn more

It 205 Computer Systems Scenarios Essay

789 words - 4 pages

Scenarios 1
Computer Systems Scenarios

Computer Systems Scenarios
Axia College of University of Phoenix

Scenarios 2
Computer Systems Scenarios
I will recommend what type of computer system would be the best fit for the scenarios in Appendix C. I will use what I have learned in chapter two to determine which system would be best for each individual or organization.
Scenario One
Sarah’s Flower Designs would benefit the most from a minicomputer. A minicomputer is powerful enough to serve Sarah’s home-based business in Madison, Wisconsin, house client information and order histories, and keep up with the growing demand of her customers. I would recommend at ...view middle of the document...

Each of the
desktop computers would also have a monitor, keyboard, mouse, and printer to accommodate the employees daily workplace needs. I would recommend split keyboards for use on the desktop computers to reduce the risk of lost productivity and medical expenses from potential RSI occurrences to SBI Corporation employees. I would also recommend laptop computers for the 20 employees that travel to various locations so these employees have access to emails and company programs that may be needed and get that information immediately. I would recommend that all the desktop and laptop computers have CD-RW capabilities to read, write, and rewrite information to share with clients, potential clients, venders, or whomever.
Scenario Three
The Helping Hands League would benefit most from a desktop computer. A desktop computer would fit into the budget of a nonprofit organization. Desktop computers have the storage capacity to handle the information of volunteers and clients in need of extra help with chores, errands, or various other household needs. To stay within budget, just one monitor and key board would be sufficient. A monitor and keyboard would be necessary to view and input data such as tax information and schedule needs for clients. If The Helping Hands League’s budget allows a mouse I would recommend one for this system. A mouse would decrease the time spent maneuvering...

Other Essays Like It 205 Computer Systems Scenarios

Network Research Proposal Essay

1693 words - 7 pages knowledge to the growing student population UMUC has recently purchased an building and is moving forward with the plan to utilize it as a computer education and lab facility. The building is named as “ Library and Communication Center”. Establishment of this facility will provide the current and future students and faculty members to gain and impart computer knowledge in an environment that is technologically proficient in meeting the demands of

Software Applications Essay

557 words - 3 pages 2007 is the ability to pinpoint the sources of potential issues, it allows to see the impact of changes to the project and allows the user to experiment with what-if scenarios. MS Project can be purchased separately or packaged in Microsoft Office Ultimate. Auto CAD Auto CAD is the industry standard software used in manufacturing, architecture, and construction. Auto CAD is a computer aided design software used by designers, and drafters to

Case Prestige

1379 words - 6 pages can be viewed as a way to buffer expenses for internal data services, instead of a way to profit. • PTC must keep its subsidiary, because the alternative is worse. However, PDS must change the way it does its business to change from being a buffer to becoming something profitable. Case Question 2 2. Assuming the company demand for service will average 205 hours per month, what level of commercial sales of computer use would be

Application Virtualization Market: Segmentation, Trends and Forecast 2016 – 2024

668 words - 3 pages environment at the client computer. The application files, settings and configuration is copied to the target device and the execution of the application is undertaken by the application virtualization layer. Virtualization layer replaces the part of runtime environment provided by operating system and captures all the disk operation from the client side redirecting it over the target system. During application execution process there exists a

Checkpoint: Tjx Companies

772 words - 4 pages and Exchange Commission filing that it transmitted credit card data to banks without encryption, violating credit card company guidelines. TJX also retained cardholder data in its systems much longer than stipulated by industry rules for storing such data. The tools and technologies that could have been used to fix the weaknesses are some of the following: General controls govern the design, security, and use of computer programs and the

Information Technology Support

750 words - 3 pages Information Systems Support Arnulfo Miranda May 6, 2010 CIS/205 Eric L. Brown Abstract Computers have become an essential part to any small business in order for the business to be successful. Information technology plays a vital role from providing customer service, keeping customers information, to the most important part of a business, which is to do billing. This paper I will discuss how information technology supports small business

Virtual Machine Market - Global Industry Analysis Trends and Forecast 2016 – 2024

644 words - 3 pages refers to the creation of simulated version of computer or operating system through embedding virtual machine software into the hardware component of the end-user system. Get more Information: The virtual machine is cost effective way which reduces time and hardware installation cost. It also helps the end-user to increase the size of storage and speed as per

Is3110 Capstone R

1539 words - 7 pages associated with the Calexico Unified School District Computer Lab project will be identified, analyzed, and managed. It outlines how risk management activities will be performed, recorded, and monitored throughout the lifecycle of the project and provides templates and practices for recording and prioritizing risks. The Risk Management Plan is created by the project manager in the Planning Phase of the Impact Zone Communications Unified Process and is

Computer Security

630 words - 3 pages procedure call service in which it makes a copy of itself and sent to another computer. A worm can have malicious effects which could cause loss of data or even causes the computer to crash. As you can see there are many types of security threats to a personal computer and the ones that are listed are just a few. Computer security must be taken serious and the user must be educated to the possible threats to their systems and the personal

Refining Ideas

761 words - 4 pages original issue seen on week two was a computer malfunction. The problem with this is that it prevents me from completing my work on time. Many possible reasons are possible for the malfunction: it can be overload, an out- of- date computer or a person deleted vital programs in error causing the malfunction. Some initial solutions: can be to consult with the competition, Google the challenge presented and follow instructions on how to fix

Sdlc Phases Rrordan Manufacturing

712 words - 3 pages maintenance portion of the project. It is important for all of Riordan Manufacturing Human Resources department to work close with the Information Systems department to have a successful testing and implementation of the new HRIS. The following will provide the various stages that will be part of implementing the new integrated HR system. Coding Coding is the process through which the physical design specifications created earlier in the SDLC are now

Related Papers

Computer Systems Scenarios Essay

903 words - 4 pages Computer Systems Scenarios Brandon Graham University of Phoenix Scenario 1 Sarah's Flower Designs is a growing business with growing needs for customer lists and information storage. Because of this the business needs to obtain at least one new desktop computer with stronger memory and faster processing speeds than offered in the older model they have now, which must be replaced. If there are budget constraints Sarah and Mark can

Salem Telephone Company Essay

1006 words - 5 pages ) = 180 (205 × 400 + 180 × 800) – 28.7 × (205 + 180) – 212,939 =$2,012 From the data presented, Salem Data Services appears to be a problem for STC. It is not generating income as expected because of its high operating leverage. As the company’s Summary of Computer Utilization shows, over the last quarter SDS has not been serving the 177.39 hours required to break even. Additionally, even with the suggestions made by Flores in scenarios (a

Information Systems Essay

783 words - 4 pages Running Head: Information Systems Information Systems Derek Smith University Of Phoenix CIS/205 Steven Schulman September 27, 2010 Information Systems Businesses today need information systems to support the functions of their company. Whether it is a Fortune 500 company or a small mom and pop, having the proper information systems for a particular business can make or break a company

Information System About Accounting Essay

1127 words - 5 pages managerial-level employees to have access to advanced reporting and statistical analysis. The systems can be used to gather information, to develop various scenarios, and to choose an optimal answer among alternative scenarios. Information system about fraud There is one way to categorize computer fraud is to use the data processing model. Input fraud— The simplest and most common way to commit a fraud is to alter or falsify computer input. For