Wednesday, February 5, 2020

MIS computer assignment Example | Topics and Well Written Essays - 750 words

MIS computer - Assignment Example On the other hand, the following hardwares were purchased: a computer desktop PC whose feature is described as precision T7910; input devices such as mouse inclusive of a mouse pad and keyboard; output devices such as monitor and external speakers; secondary hard devices such as hard disks and optical storage device; a sound card; and Ethernet network card. The above preferred operating system-OS (window 7 64 bit) is ideal since it does not experience issues related to compatibility that was a thorn in the flesh for the earlier versions such widow XP and Vista. Moreover, its drivers are readily available except the Ethernet drivers which are usually available through the internet platforms (Emdadekh, 2010). The other required softwares such as word processor, spreadsheets, publisher, PowerPoint can be easily installed into the above specified OS as a package inform of office software. The latest version of office (office 2013) is of preference due to the fact that it is not only easier to use but also facilitates easier input techniques and analysis especially when using the spreadsheets. On the other hand, the program for creating PDF files is also easily installed from the internet inclusive of the PDF converter that enables one to convert the PDF script into other forms contained in the office 2013 especially when editing is required. It is prudent to comprehend that the data base management program is part of the office package and once installed one can easily create a data base. For the e-mail program, the provisions such internet browsers such as the Mozilla Firefox, the Google Chrome, and the internet explorer among others enable one to manipulate the e-mailing components of th e program (Emdadekh, 2010). Furthermore, Window 7 readily accepts installation of the latest versions of these browsers. In addition, the computer security system can be enhanced by installing internet security softwares

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.