subject

Adepartment store plans to upgrade its it infrastructure to support a new order-processing application with rich features. the store currently uses eight stand-alone computers when customers check out. the specifications of these computers are:
•quad core processors
•minimum of one terabyte hard drives
•minimum of 5 gb ram
•windows xp, linux, or mac osx
the management of the store wants to upgrade four of the computers and use them to process client orders. the initial study done by the management reveals that the computers will perform the following tasks:
•run an order-processing application that requires a multiprocessing operating system. the application will take orders from customers over the internet, process the orders, and create invoices.
•communicate with customers using e-mail to resolve customer queries.
•store customer data on the local computer. the store will use this data to promote new products.
the department store needs you to upgrade the four computers. find the necessary equipment from online vendors to upgrade the computers

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 11:00
The great length of north america causes the climate to be varied. true false
Answers: 2
question
Computers and Technology, 22.06.2019 12:50
You have just been hired as an information security engineer for a large, multi-international corporation. unfortunately, your company has suffered multiple security breaches that have threatened customers' trust in the fact that their confidential data and financial assets are private and secured. credit-card information was compromised by an attack that infiltrated the network through a vulnerable wireless connection within the organization. the other breach was an inside job where personal data was stolen because of weak access-control policies within the organization that allowed an unauthorized individual access to valuable data. your job is to develop a risk-management policy that addresses the two security breaches and how to mitigate these risks.requirementswrite a brief description of the case study. it requires two to three pages, based upon the apa style of writing. use transition words; a thesis statement; an introduction, body, and conclusion; and a reference page with at least two references. use a double-spaced, arial font, size 12.
Answers: 1
question
Computers and Technology, 22.06.2019 15:30
What is a costume plot? why is it important to a film or theater production?
Answers: 2
question
Computers and Technology, 22.06.2019 19:40
Solve the following javafx application: write a javafx application that analyzes a word. the user would type the word in a text field, and the application provides three buttons for the following: - one button, when clicked, displays the length of the word.- another button, when clicked, displays the number of vowels in the word.- another button, when clicked, displays the number of uppercase letters in the word(use the gridpane or hbox and vbox to organize the gui controls).
Answers: 1
You know the right answer?
Adepartment store plans to upgrade its it infrastructure to support a new order-processing applicati...
Questions
question
Mathematics, 19.05.2020 14:17
question
Mathematics, 19.05.2020 14:17
question
Mathematics, 19.05.2020 14:17
question
Mathematics, 19.05.2020 14:17
question
Mathematics, 19.05.2020 14:17
question
Mathematics, 19.05.2020 14:17
Questions on the website: 13722359