A department store plans to upgrade its IT infrastructure to support a new order-processing application with rich features. The store currently uses eight stand-alone computers when customers check out. The specifications of these computers are:•Quad core processors
•Minimum of one terabyte hard drives
•Minimum of 5 GB RAM
•Windows XP, Linux, or Mac OSX

The management of the store wants to upgrade four of the computers and use them to process client orders. The initial study done by the management reveals that the computers will perform the following tasks:
•Run an order-processing application that requires a multiprocessing operating system. The application will take orders from customers over the Internet, process the orders, and create invoices.
•Communicate with customers using e-mail to resolve customer queries.
•Store customer data on the local computer. The store will use this data to promote new products.

The department store needs you to upgrade the four computers. Find the necessary equipment from online vendors to upgrade the computers

Answers

Answer 1
Answer: Assuming price doesn't matter:

Processor: 
I'd recommend Intel Core i7 or similar
Hard Drive: An SSD with at least 2TB will do
RAM: I'd recommend around 8GB or more
Operating System: Linux is one of the best OSes out there, I'd recommend using that.

Related Questions

Harry makes pizzas to sell in his café. He buys packets of grated cheese and boxes of mushrooms and then uses them for the pizza toppings. For example, a bag of grated cheese is divided into 4 portions and used to top 4 pizzas. What formula is in cell D3?​
During which phase of a hacker's five-step approach does the hacker scan a network to identify IP hosts, open ports, and services enabled on servers and workstations?
Which of these contains information about the elements?a. data chart b. formula chart c. periodic table d. conversion table
Which one these describe the use of the word wall technique?
The maximum speed limit on a rural interstate highway is ___ mph. A. 70 B. 55 C. 60

Which of the following is defined in terms of their activities related to denial-of-service attacks? Cracker Script kiddie White hat Gray hat

Answers

The second option,Script Kiddie.

What inventor patented the first american movie projector

Answers

 Woodville Latham and his sons, Otway and Gray.
Woodville Latham and his two sons, Otway and Grey demonstrated the first movie projector in the US 

A website that sells high-end ties notices that its ads are showing up for searches that include "cheap". Because its ties are expensive, it does not want its ads to show up for searchers using the word "cheap". What should this advertiser do?

Answers

Answer: Add "cheap" to the negative keyword list.

Explanation: Pretty self explanatory, by adding a negative keyword It should not use that word if searched to find people to advertise to.

Search engines enable you to:A. talk to people via the computer.

B. locate Web pages related to a specific subject.

C. connect to a better ISP.

D. find and replace a certain item in Word.

Answers

B. locate Web pages related to a specific subject.

Not A because currently no search engine has an in-built option to talk to other people, and even if it did it wouldn't be it's core functionality.
Not C, as there is no way to change ISP (internet service provider) using your search engine.
Not D as search engines have no connection to MS Word.

Answer: what he said B

Explanation:

Which of the following correctly identifies a voltage source and its method of developing electric potential? A. Dry cell—chemical action
B. Generator—genetic action
C. Thermocouple—chemical action
D. Primary cell—heat action on a device

Answers

dry cell chemical action is how it works
Dry cell- Chemical action

If your program throws an IndexOutOfRangeException, and the only available catch block catches an Exception, ______________________. A. the Exception catch block executes the Exception B. an IndexOutOfRangeException catch block is generated automatically the IndexOutOfRangeC. catch block is bypassedD. Exception is thrown to the operating system

Answers

Answer:

Option A is the correct answer for the above question.

Explanation:

The Index Out Of Range exception is a type of Run exception which is generated on run time. It means when any user executes the software or program, then that program gives some error on the execution time by some coding problem or some value problem.

So this type of exception can be handle by the Catch block which is also stated by the option A. Hence A is the correct answer but the other is not because:-

  • Option B states that this exception is generated by the catch block which is not correct.
  • Option C states that the catch block passes the exception which is also not the correct.
  • Option D states that the exception is passed for the operating system, but it is passed to the catch block only.