Payroll pc, Computer Engineering

Assignment Help:

Purpose: Payroll processing and storage for the client database (accessed from the Reception-PCover the network),word processing (reports etc.) and spreadsheets.

Software: .
• Windows Vista Home Premium
• AutoManager.
o This used to work on the old computer, and still works fine on the Reception-PC, but sometimes hangs up or says it can't do things since Jo brought this new PC in
• MYOB.
• Microsoft Office XP.

Comments:
• When asked about irritating security pop-ups, Jo said that they hadn't noticed any
• The external door to the room is normally locked. Unauthorised access is possible but would be in plain view of the mechanics.
• Seems to be running extremely slow.
• Pentium 4, 1G RAM (used to be Jo's personal PC, upgraded at one stage for kids to play games).
• 120GB hard drive. Seems that a 90GB partition is full of the kids' old games.
• Bill complains of "risqué" pop-ups that keep appearing.
• AutoManager files are kept on this PC
o This used to work on the old computer, but sometimes hangs up or says it can't do things since Jo brought this new PC in
• MYOB files contain all payroll and accounting info for the business.


Related Discussions:- Payroll pc

Explain metadata, What is metadata? Metadata is data that explains anot...

What is metadata? Metadata is data that explains another data. Class definition is metadata. Models are inherently metadata as they explain the things being modeled.

Computer data storage, Computer data storage: Computer data storage, f...

Computer data storage: Computer data storage, frequently called memory or storage refers to computer recording media and components, devices that received digital data used fo

Conversion of data types done between abap/4 & db layer, How is conversion ...

How is conversion of data types done between ABAP/4 & DB layer? Conversion among ABAP/4 data types and the database layer is complete within the database interface

How many types of keys used to encrypt and decrypt data, How many types of ...

How many types of keys used to encrypt and decrypt data in Secure Sockets Layer? Two forms of keys are used as ciphers to decrypt and encrypt data. Private keys are referred to

Sets and bags, Task: Sets and bags In mathematics, the notion of multis...

Task: Sets and bags In mathematics, the notion of multiset (or bag) is a generalisation of the notion of set. A bag is a special kind of container in which the items may be

Approaches for development of information systems, Q. Approaches for develo...

Q. Approaches for development of information systems? Numerous approaches are available for development of Information Systems. They are as below: • Model Driven: It put e

Explain briefly the generic framework for e-commerce, Explain briefly the g...

Explain briefly the generic framework for e-commerce.  Generic framework of e-commerce contains the Applications of EC   (like as banking, shopping in online stores and malls,

Adding xml files to your page, Step 1: Choose File -> Import XML into Templ...

Step 1: Choose File -> Import XML into Template Step 2: Select the XML file & click Open When an XML file is imported, Dreamweaver merges XML content in Template, which is be

What are the basic components of an expert system, Q. What are the basic co...

Q. What are the basic components of an expert system? ANSWER: There are three components of components: Information, people, and IT components. Information kinds are domain exp

What is dhcp and how it works, Full form of is DHCP: Dynamic Host Control P...

Full form of is DHCP: Dynamic Host Control Protocol. It is mainly used to bound MAC Addresses of system. Especially for Wireless System.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd