Additional funds in budget to upgrade

Assignment Help Basic Computer Science
Reference no: EM132603808

You have 70 network clients using older versions of Office, and 2 using Office 365 (CEO and VP of Sales). The other Office clients cannot open the files saved by the Office 365 users. Your manager tells you that there are no funds available to pay for the upgrade and the Office 365 clients will not downgrade. How will you make it possible for them to share files?

Your manager did not price the upgrade but knows there are not additional funds in the budget to upgrade until 2010. You should plan for the upgrade in the future. Please provide a pricing quote to bring all these clients to the same version and use 365.

Remember, do not assume that all options have previously been considered.

Considerations:

Executive preference

Budgetary limitations

Compatibility

Upgrade pricing

New license costs - New pricing and MS license model

Rollout plan

Testing and implementation

User Training

Reference no: EM132603808

Questions Cloud

What is the observed gene frequency : What is the observed gene frequency based on your first trial? How does it compare with the expected gene frequency (the starting number of beads in the beaker)
About MS Windows and troubleshooting : What would you have done differently now that you are becoming more informed about MS Windows and troubleshooting?
Lessen the intensity of negative feelings : How can "Distress Tolerance Skills" be applied to lessen the intensity of negative feelings? Furnish all the steps with examples?
What annual contribution should he make : Morris intends to retire in 10 years' time. What annual contribution should he make to his superannuation fund, starting at the end of the current year
Additional funds in budget to upgrade : Your manager did not price the upgrade but knows there are not additional funds in the budget to upgrade until 2010.
Degeneration of the corpus luteum : Trace the steps in follicle development, beginning with the primary oocyte and ending with the degeneration of the corpus luteum.
Explain geraniums mosquito repellent plants indoor : Explain Geraniums Mosquito Repellent Plants Indoor.
How much should she deposit in here account : How much should she deposit in here account at the end of each month, for the next two years, if her holiday will cost $12,000
Explain peppermint as a repellent plants indoor : Explain Peppermint as a Repellent Plants Indoor.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Industry experts believe blockchain is technology

Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years.

  Use of a decision tree

Please provide an example of an event where the use of a decision tree might help with making a decision and explain whether this process is useful.

  Purpose of the logical network perimeter mechanism

Describe the purpose of the logical network perimeter mechanism and how it establishes a logical boundary. Further, list the components commonly used to create a logical network perimeter. How does this get implemented?

  Analysis during software testing

Describe how to perform Risk analysis during software testing?

  Maximum number of non zero elements

A lower triangular matrix is an nxn array in which has a[i][j] = = 0 if i

  Organizational policy development and implementation

"The Value of Information Technology and Stakeholder Engagement in Organizational Policy Development and Implementation"

  Decide whether or not software-generated reports

Determine what you perceive to be the most difficult task in writing a system forensics report and explain why you believe this is the case. Decide whether or not software-generated reports assist with this specific portion of the report writing proc..

  Deposit liability and non-deposit liability

What is the difference of the cost of funds/risks/market factors between deposit liability and non-deposit liability.

  Prevent spoofing attacks by your own employees

(a) Your company will be held liable for any spoofing attacks that originate from within your network (i.e., packets leaving your network with spoofed IP header informa- tion). What can you do to prevent spoofing attacks by your own e..

  Role of business ethics in relationships with customers

1. Read the Forbes article, "The Role of Business Ethics in Relationships with Customers." Based on the content presented in the article, describe the strategic importance of Customer Relationship Management (CRM) and discuss how CRM business ethi..

  Technical architecture document

Hardware platform: Describe the hardware environment to support the development and production of this system. Network connections between the stores and headquarters: A network diagram is required.

  Assess a risk from a quantitative perspective

Explain the steps taken to assess a risk from a quantitative perspective where monetary and numeric values are assigned and discuss the formulas used to quantify risk.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd