Overview: Basic knowledge of computers is practically essential for productively engaging in twenty-first-century life. Working knowledge of computer platform technologies impacts everyone from help desk personnel and field technicians to project managers and business executives. In order to make sound business decisions, one must have the ability to analyze business needs and compare available computer technology options for effectively meeting those needs.
Scenario: You have been hired as an IT consultant by an entrepreneur starting a small advertising company called MilleniAds. As a start-up, your client’s company is relatively small and has a limited budget. There are only 10 employees, including a few creative directors, graphic designers, sales staff, a financial accountant, and an office administrator, with the entrepreneur acting as CEO. The current IT budget cannot exceed $25,000 and ideally should come in as far under that number as possible. MilleniAds will produce customized sales flyers, brochures, and other branded items, such as letterhead and business cards, that apply a youthful, fresh perspective targeting millennial demographics. Therefore, the company needs the ability to store and manipulate digital images and to produce physical copies of their products for their clients. The CEO wants to keep track of inventory, sales, and expenses digitally, but she does not anticipate having very complex records for the first year. She projects having only a dozen or so accounts but hopes to scale up in the coming years. It would be ideal to have a simple and user-friendly system for sharing information and files between employees. Many of the employees are millennials themselves who have indicated that their current desktop PCs are limiting their capabilities and that they prefer using their phones and other mobile devices for their professional and personal responsibilities. Two of the 10 employees will operate primarily outside of the office, soliciting business from regional firms, and they will need to access company information while on the road, in their home offices, and at customer sites.
Prompt: Given the scenario above, what are the best hardware, software, networking, and information security options for addressing your client’s business needs?
Specifically, the following critical elements must be addressed:
III. Software Applications ( 1-2 PAGES for questions A, B, C ! ) **Consider how the software will integrate with the hardware I’ve chosen
A. Examine the business’s issues to determine specific software requirements. What are the types of software applications that should be considered? Identify multiple possible options within each category, being sure to cite specific examples wherever appropriate.
B. Then, compare and contrast the options you have listed. Be sure to cite specific evidence that supports your evaluation. What are their functional strengths and weaknesses? How do they compare in terms of cost, vendor credibility, multiuser access, technical support, and integration?
C. Compose a final list detailing all of your specific software recommendations for your client. Be sure to logically justify your proposal as the best possible choice for meeting the business requirements.
ALSO Consider how the software will integrate with the hardware I’ve chosen in my essay. ( Look under “II Hardware Components” in my Milleniads word document attached to this assignment post to see what hardware i chosed. )
{{{{{ THE FOLLOWING IS INFORMATION THAT MAY BE HELPFUL FOR THIS ASSIGNMENT —
– Applications Management Facts
Be aware of the following facts about managing applications.
Application installation involves more than just copying the executable files to the computer. Installation typically modifies the registry, creates shortcuts, and configures other settings required by the application.
Installation of an application usually creates a tile on the Start menu and may also create a shortcut on the desktop. A shortcut is a pointer file that identifies the location of the executable file that runs the application.
Shortcuts that point to removable drives (such as CD/DVD drives) or network drives could become unavailable if the referenced drive is disconnected.
During install, you can often choose to add shortcuts for only the current user or all users.
The shortcut also identifies a directory that the application uses or references when it first starts. You can modify the directory by changing the Start in property for the shortcut or executable file.
A 64-bit operating system can run both 32-bit and 64-bit applications. However, a 32-bit operating system can run only 32-bit applications.
By default, applications are installed into the Program Files directory on the root of the system drive.
During installation, you typically can specify an alternate install location.
64-bit operating system versions include an additional folder named Program Files (x86). 32-bit applications are installed into this folder.
Users must have the correct permissions or rights to install applications. The ability to install applications depends on the user’s group membership and the operating system:
• Group
• Permissions
• Users
• Users who are members of only the Users group are not able to install applications. If you’re signed into a limited account, you see a dialog box asking you to enter an administrative password.
• Administrators
• Only people with administrative privileges can install programs in Windows 10. If you’re already logged on with an administrative account, Windows 10 asks you if you want to allow the program to make changes to the computer.
In some cases, users require special privileges or rights to run applications. For example, legacy applications that access the system in certain ways may require running the application as an administrator.
Copying an application’s shortcut to the C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup folder will cause that application to be automatically launched every time the system is booted. You can also use Task Scheduler to configure an application to run automatically based upon event triggers that you define.
Many applications as they run create data files (such as documents or video files), and might also require creating temporary files. The user must have sufficient permissions to the directories where the data and temporary files are created.
– Digital Content
PC administrators need to be familiar with the following digital content management issues:
Software licensing
Digital Rights Management (DRM)
Software Licensing
It is important to understand how software licensing works because violating software license agreements could potentially expose your organization to litigation. There are two general software licensing models that you need to be familiar with:
License Type
Description
Proprietary
The proprietary licensing model is used by many software vendors. Each vendor you purchase a proprietary license from should provide an End User License Agreement (EULA) that dictates the specific terms for that particular software title.
There are several key facts that you need to remember about proprietary software licensing:
• When you purchase this type of software, you are not purchasing the software itself. Instead, you are purchasing a license to use the software.
• You are not allowed to access the software’s source code and make modifications. Usually, the source code is not made available to customers. A EULA does not typically allow you to reverse engineer the software to recreate the source code.
• The license usually permits you to install the software only on a fixed number of computers. Installation limits are commonly enforced by the software vendor using online software activation. If you try to use the same activation code too many times, the software will not activate and can’t be used.
Two different, general types of licenses are usually offered by software vendors:
• Personal licenses are intended for home and small business customers. Usually, they allow the software to be installed on only one to three systems. Because they are limited in the number of allowed installs, personal licenses are usually less expensive than other alternatives. However, personal licenses many not be the best choice for large organizations, which may need to purchase hundreds or even thousands of licenses for a given software title.
• Enterprise licenses (which are also sometimes called volume licenses) are intended for medium and large organizations. Enterprise licenses allow the customer to install the software without restriction using the same activation code (typically until a maximum cap is reached). Because of the volume involved, the customer is usually able to purchase an enterprise license for much less than the cost of purchasing individual personal licenses. Enterprise licenses are usually too expensive for most home or small business users.
Open Source
Open source software used to be exclusive to Linux and Unix operating systems. However, many open source applications are now available for Windows and Mac operating systems. Open source licensing is very different from proprietary licensing:
• Open source software is usually freely distributed. You can typically download, install, and use the software without paying a license fee.
• Most open source software is distributed under the GNU General Public License (GPL), which requires that the source code for the software to be freely distributable to anyone who wants it. This means you can download the source code for an application, modify it, recompile it, and then use the modified version of the software. In fact, you could even post it for others to use as long as you make your source code freely available as well.
Organizations that release open source applications typically use a variety of means to generate revenue so they can keep developing new products:
• Contributions. Some open source projects ask you to contribute financially if you use their software.
• Added functionality. Some open source projects release a base version of their software for free, but then charge a fee for highly desirable add-ons.
• Support contracts. Some open source projects release their software for free, but then charge a fee for technical support.
• Training contracts. Like support contracts, some open source projects also provide training for a fee.
• Partnerships. Sometimes an open source project will partner with a commercial organization. In this situation, two versions of an application will be created, one that is proprietary and one that is open source. The proprietary version is typically used to finance the development of the free version.
• Subscriptions. Sometimes an open source project will sell subscriptions for online accounts or server access.
Digital Rights Management
System administrators are frequently responsible for ensuring that intellectual property rights are observed on the computers and mobile devices they are responsible for. To protect the intellectual property rights of publishers, several Digital Rights Management (DRM) technologies have been implemented over the years. The goal of these technologies is to restrict the use of copyrighted works to only those who have paid the necessary licensing fees:
DRM Technology
Description
Software Activation
Many proprietary software vendors use online software activation. Before the user can run a newly installed application, it must be activated online with the software vendor. The software vendor tracks how many times each license code is activated and will block further activations after the license limit has been met. For personal software licenses, the limit is usually one to three activations. Enterprise license limits are governed by the enterprise license agreement. For example, an organization may purchase a 100-user license from the software vendor.
Two different forms of online software activation are used by software vendors:
• One-time activation. With one-time activation, the license is activated once, usually right after the product is installed. Once activated, the product remains activated.
• Persistent activation. With persistent activation, the license is continuously re-activated online at a preconfigured interval. This allows the software vendor to deactivate installations if the conditions of the license agreement have been violated.
Using online activation helps software vendors ensure their products are used in compliance with the license agreement. However, it also has several drawbacks:
• Online activation mechanisms can fail if an internet connection isn’t available.
• A small system change can deactivate the software. For example, adding RAM to the system or upgrading the CPU could cause the activation system to think the application has been illegally copied to a new computer system. The customer typically has to contact the vendor to reactive the software.
• Operating system upgrades or migrations can deactivate the software.
Media DRM
DRM has commonly been used with digital media files, including books, music, and videos. In the late 2000’s most online digital media vendors implemented DRM to encrypt media files. Without the appropriate key, the files couldn’t be decrypted and played by the customer.
In recent years, however, there has been a movement away from DRM on the part of many large digital media vendors. This has occurred because of several key shortcomings of DRM, including:
• A lack of portability. For example, DRM-protected digital files from a given vendor would play only using software or hardware from that same vendor.
• A lack of backup support. DRM protection frequently made it such that protected digital files could not be backed up.
• Weak encryption. Many applications are available on the internet that can strip DRM protection from digital files.
• Obsolescence could cause older digital files to no longer be playable on newer hardware.
• Excessive management overhead. Trying to manage DRM for legally purchased digital files required an excessive amount of management overhead on the part of the digital media vendor. Small system errors on the vendor’s network could cause customers to lose access to digital files that were legally purchased.
To address these shortcomings, many vendors have adopted DRM alternatives such as:
• Encouraging customers to not illegally share digital files
• Making digital files so inexpensive and easy to access that it doesn’t make sense to make illegal copies
– https://search-proquest-com.ezproxy.snhu.edu/docview/234269362?accountid=3783
– https://www.google.com/amp/s/www.networkworld.com/article/3153042/your-new-pc-needs-these-22-free-programs.amp.html
}}}}}}
I’VE ATTACHED MY ESSAY SO YOU CAN BE ABLE TO RECALL THE MATERIAL THAT IS ALREADY COMPLETED !!! (Milleniads file below )
I’VE ATTACHED AN EXAMPLE OF SOMEONE ELSES COMPLETED ESSAY ON THE SAME ASSIGNMENT TO THIS POST !!! YOU CAN USE THIS TO HELP GUIDE YOURSELF THROUGH THE ASSIGNMENT !!! (201_milestone file below )
Be that as it may, considering the composition’s support, imagery and aesthetic style it turns out to be evident that The Arnolfini Double Portrait is a model of the Renaissance period masterful shows and isn’t as hard to parse as certain pundits would accept. So as to talk about the canvas completely, it is important to investigate the setting of the work of art’s creation.
The imagery in The Arnolfini Double Portrait is the most significant viewpoint to consider while analyzing the work of art. It is the way to characterizing the composition’s motivation and objective, just as an important methods for giving a top to bottom elaborate analysis of the work. The main image worth investigating in this artistic creation relates back to the motivation behind the work. Most pundits accept that this work portrays the wedding of a rich individual, and the imagery absolutely underpins this understanding of the work. Both of the painter’s subjects are wearing garments produced using colored textures, and are fixed with hides. These are not the garments of poor people, and positively not those of the church; the main different class that would have been managed such materials as of now. While this could likewise be demonstrative of a highborn couple, Sarah Buchholz deduces “In spite of the fact that the lady’s plain gold accessory and the plain rings both wear are the main gems noticeable, the two outfits would have been hugely costly, and acknowledged as such by a contemporary watcher. Be that as it may, particularly on account of the man, there might be a component of limitation in their garments befitting their vendor status – representations of privileged people will in general show gold chains and increasingly designed fabric”. Clearly, this fits the translation that this artistic creation portrays Arnolfini who was a well off dealer and was delineated as such in the work.
One of the minor, yet not entirely obvious, images inside this artistic creation is the little canine. It might have all the earmarks of being a superfluous detail from the start, since most women of unmistakable quality had a lapdog that they took with them, similar to the style of the time.
Since Arnolfini was a trader, he would have been distinctly mindful of the most stylish trends in garments and society, along these lines all things considered, the pet was a real nearness inside the home of the Arnolfini family. Presently, the imagery identified with hounds is basic however is commonly comprehended to be two distinct things. To begin with, the pooch speaks to dedication in this image. Since the canine is looking towards the lady, with its back to the man, the unwaveringness can be deciphered as being from the man to his significant other. In other words that the man has committed himself to the spouse, and their relationship. Another healthy portrayal of the canine that is commonly comprehended is that the pooch is the image of constancy and love in the marriage. This relates back to the idea of youngsters, where an honorable man couldn’t stand to be made a cuckold, in case the kid be deserted or more awful. Another translation of the pooch is that it is a portrayal of desire inside the marriage. Positively, this desire would be that felt by Giovanni’s towards his new spouse. Nonetheless, understand that this desire isn’t the transgression commendable inclination that it is identified with in present day times, in spite of the fact that the association with sexuality is certain. The desire would be licentious commonly, yet would be a result of a craving to begin a family with one’s new spouse. As opposed to prevalent thinking, sexual relations were not disapproved of by the congregation or any others, as long as they happened inside the bounds of a marriage; which the work of art appears to derive as the case.