This week, you will submit the second project, the Desktop Migration Proposal. Using the requirements analysis your manager provided and the Internet

This week, you will submit the second project, the Desktop Migration Proposal. Using the requirements analysis your manager provided and the Internet research you conducted, submit your recommendation to the assignment folder. As you are writing your recommendation, ensure your analysis and recommendations align with your manager’s priorities and concerns.

You should carefully document any assumptions made (e.g., how you analyzed the requirement for upgrading monitors, peripherals devices, etc.).

Refer to the HFA Desktop Migration: Corporate PC Refresh Documentation for the company’s needs (requirements). Your justification should clearly indicate how you bridge the gap between the existing desktop specifications and the new machines you recommend.

How Will My Work Be Evaluated?

For this assignment, you are asked by your manager to research the replacement of 50 aging desktop machines with new laptops. Review the business needs from your manager carefully so that you fully appreciate the requirements you must address in selecting the new laptops.

For example, what is significant about the need for “multiple external monitors”? Ask yourself what it takes to connect a laptop to external monitors. What ports are included on your recommended laptop? What kind of cables are required? Can those ports/cables be used with the external monitors? Does the laptop have sufficient graphics capabilities to drive external displays and if so, how many and at what resolution? Follow this same process for all the business needs.

By documenting your choices and the overall recommendation in an effective background report, you are showing how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express your findings using the right mix of technical detail in a business context is an important workplace skill.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

1.1.3: Present ideas in a clear, logical order appropriate to the task.

1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.

1.4.3: Write concise and logical sentences in standard academic English that clarify relationships among concepts and ideas.

2.1.2: Describe the context surrounding the issue or problem.

2.3.3: Explain inferences and deductions that follow logically from the evidence provided.

10.1.3: Define the specifications of required technologies.

13.1.1: Create documentation appropriate to the stakeholder.

13.2.1: Evaluate vendor recommendations in the context of organization requirements.

This project is a three- to four-page business-oriented proposal should contain the following:

  • at least one high-quality graphic
  • one or more tables to present information
  • at least one online configurator
  • your purchase recommendations, specifications, and justification for your choice
  • one to two IEEE references

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Creating and Submitting your Portfolio Overview Creating a professional cybersecurity portfolio is essential for showcasing your skills, achievements, an

Creating and Submitting your Portfolio Overview Creating a professional cybersecurity portfolio is essential for showcasing your skills, achievements, and growth. This portfolio will serve as a valuable tool for presenting yourself to universities, scholarship committees, employers, and beyond. Objective:: To design a professional cybersecurity portfolio that markets your academic and

Hello Students, As discussed in class, the Workspaces and Challenges are now active. Required Challenges for Full Credit To earn full credit (30% of the

Hello Students, As discussed in class, the Workspaces and Challenges are now active. Required Challenges for Full Credit To earn full credit (30% of the assignment), you must complete 8 challenges from the following list: Interns & HR on the Domain Controller Help Desk Fun: User Workstation Nightmares Dangerous Drives Preventative Protection: Thwarting the Imminent Threat Security

Please read the instructions below carefully. Required Challenges for Full Credit Vulnerability Scan Complete, Begin System Hardening [NG] Volatile

Please read the instructions below carefully. Required Challenges for Full Credit Vulnerability Scan Complete, Begin System Hardening [NG] Volatile Vulnerabilities [NG] The Network is Down! Internal Issues Edition [NG] The Network is Down! Contractor Edition [NG] (Complexity 1) The Network is Down! Contractor Edition [NG] Systems Security Analyst Crash Course

Hello Students, Please pay attention to the instructions below. Required Challenges for Full Credit To earn full credit (30% of the assignment), you must

Hello Students, Please pay attention to the instructions below. Required Challenges for Full Credit To earn full credit (30% of the assignment), you must complete 6 challenges from the following list: Interns & HR on the Domain Controller Help Desk Fun: User Workstation Nightmares Dangerous Drives Preventative Protection: Thwarting the Imminent Threat Security