Need help with your Discussion

Get a timely done, PLAGIARISM-FREE paper
from our highly-qualified writers!

glass
pen
clip
papers
heaphones

​7-1 Final Project Submission: IT Consultation Report

​7-1 Final Project Submission: IT Consultation Report

​7-1 Final Project Submission: IT Consultation Report

Question Description

page1image3622657472

IT 201 Final Project Guidelines and Rubric

Overview

Basic knowledge of computers is practically essential for productively engaging in twenty-first-century life. Working knowledge of computer platform technologies impacts everyone from help desk personnel and field technicians to project managers and business executives. In order to make sound business decisions, one must have the ability to analyze business needs and compare available computer technology options for effectively meeting those needs.

In this final project, you will assume the role of a tech consultant hired by an entrepreneur trying to start a small business. As a part of opening her business, she needs help identifying the business’s information technology needs, weighing options for meeting those needs, and making final decisions that, together, create a sound IT infrastructure for her small business. The major areas for evaluation and selection include hardware components, software applications, networking options, and information security. This document contains a table that will help you find the resources needed to address each critical element successfully; this table is located below the critical elements of the final project. Your decision-making process and specific selections will come together in a final IT Consultation Report.

This assessment addresses the following course outcomes:

  •  Assess common hardware and software issues by logically applying fundamental IT tools and methods
  •  Determine basic hardware and software options that meet general technology needs for organizations
  •  Illustrate appropriate network and multi-user operating system methods that support key business objectives
  •  Identify information security procedures that reflect best practices for managing access and reducing risk to digital information storesScenario: You have been hired as an IT consultant by an entrepreneur starting a small advertising company called MilleniAds. As a start-up, your client’s company is relatively small and has a limited budget. There are only 10 employees, including a few creative directors, graphic designers, sales staff, a financial accountant, and an office administrator, with the entrepreneur acting as CEO. The current IT budget cannot exceed $25,000 and ideally should come in as far under that number as possible. MilleniAds will produce customized sales flyers, brochures, and other branded items, such as letterhead and business cards, that apply a youthful, fresh perspective targeting millennial demographics. Therefore, the company needs the ability to store and manipulate digital images and to produce physical copies of their products for their clients. The CEO wants to keep track of inventory, sales, and expenses digitally, but she does not anticipate having very complex records for the first year. She projects having only a dozen or so accounts but hopes to scale up in the coming years. It would be ideal to have a simple and user-friendly system for sharing information and files between employees. Many of the employees are millennials themselves who have indicated that their current desktop PCs are limiting their capabilities and that they prefer using their phones and other mobile devices for their professional and personal responsibilities. Two of the ten employees will operate primarily outside of the office, soliciting business from regional firms, and they will need to access company information while on the road, in their home offices, and at customer sites.

page2image3664089920

Beyond the specific information given above, you have the ability to fill in the gaps with assumptions or additional details that will make your final project unique and meaningful to you. If you have any questions, reach out to your instructor for guidance, and use the milestone assignments to ensure that you are completing your project within reasonable parameters for the course.

Prompt

Given the scenario above, what are the best hardware, software, networking, and information security options for addressing your client’s business needs? Specifically, the following critical elements must be addressed:

  1. Business Needs: In this section, list and describe all of the business needs that you have been able to determine given the information in the provided scenario and your own choices for filling in the gaps. Be sure that you provide enough detail to fully support the rest of yourreport.
  2. Hardware Components
    1. Examine the business’s issues to determine specific hardware requirements. Based on these issues, what are the major categories andcomponents of hardware that should be considered? Identify each of the applicable requirements (hard drive storage, video cards, etc.), beingsure to cite specific examples wherever appropriate.
    2. Then, compare and contrast the various options for meeting the requirements. Be sure to cite specific evidence from the componentspecification fact sheets to support your evaluation. What are their functional strengths and weaknesses? How do they compare in terms of costand maintainability?
    3. Compose a final list detailing all of your specific hardware recommendations for your client. Be sure to logically justify your proposal as the bestpossible choice for meeting the business requirements.
  3. Software Applications
    1. Examine the business’s issues to determine specific software requirements. What are the types of software applications that should beconsidered? Identify multiple possible options within each category, being sure to cite specific examples wherever appropriate.
    2. Then, compare and contrast the options you have listed. Be sure to cite specific evidence that supports your evaluation. What are theirfunctional strengths and weaknesses? How do they compare in terms of cost, vendor credibility, multi-user access, technical support, andintegration?
    3. Compose a final list detailing all of your specific software recommendations for your client. Be sure to logically justify your proposal as the bestpossible choice for meeting the business requirements.
  4. Networking Options
    1. Examine the business’s issues to determine network requirements. Illustrate your response with specific examples. For example, to what extentshould there be access inside the business for mobile devices and remote personnel?
    2. Then, compare and contrast the options for meeting the requirements. Be sure to cite specific evidence that supports your conclusions. How

would you ensure security of information over the network? Which type of network connection is preferable?

page3image3664518752

C. Make final recommendations for network solutions based on your evaluation of the options. Be sure to logically justify your proposal as the best possible choice for meeting the business requirements.

  1. Maintenance and Security
    1. Interpret the business’s needs to determine specific information regarding security requirements. Illustrate your response with specificexamples. To what extent should unauthorized individuals be prevented from making changes, copying, or deleting files or data on the system?Is there sensitive data for which access must be controlled? What sort of information should be backed up?
    2. Then, compare and contrast the options for managing user access to company information. Evaluate each option for its strengths andweaknesses, citing specific evidence that supports your conclusions. Is there a need to have password setups for files? What type of naming conventions should the client use for files and directories? Should individual computer accounts be created? Should everyone have read access to all files?
    3. Finally, compare and contrast the options for backing up and storing information, including how often to back up information, storage location, and who should have access to backing up the data. Evaluate each option for its strengths and weaknesses, citing specific evidence that supports your evaluation.
  2. Future Considerations: Imagine that your client may need to add a new branch or otherwise scale up her business. How would that change your hardware and software recommendations? Illustrate your response with specific examples and evidence.

The table below will help you find the resources you need to address the critical elements of the final project.

page3image3683133808

Critical Element Section

TestOut Support (or Website)

page3image3683008912

I

page3image3683007616

None: Read the Scenario

II

page3image3665727280 page3image3665725552 page3image3665722416 page3image3665723008 page3image3665724768 page3image3665723584 page3image3665720928 page3image3665721344

1.2.2 Computing Facts

1.3.2 Windows Systems Facts

page3image3665719504

3.2.2 Power Supply Facts

3.3.2 Motherboard Facts

3.4.2 CPU Facts

page3image3664635968

3.4.3 CPU Performance Facts

3.7.3 RAM Facts

page3image3683689232

3.12.2 Video Card Fact

3.13.3 Sound Card Facts

5.1.2 Storage Device Facts

III

page3image3664651648 page3image3664653024

Visions of the Future: Two Success Strategies for Software Selection

Your New PC Needs These 15 Free, Excellent Programs

12.7.3 Applications Management Facts

12.9.3 Digital Content Management Facts

page4image3665761792

IV

page4image3684707760 page4image3684718368 page4image3683750224 page4image3683750896 page4image3683751440 page4image3683751984

6.1.4 Networking Facts

7.1.3 Wireless Networking Facts

6.8.2 Internet Connection Facts

6.13.2 HomeGroup Facts

9.6.2 Mobile Device Connection Facts

12.6.3 Remote Desktop Facts

V

page4image3664332128 page4image3664332672 page4image3664333280 page4image3664334208 page4image3664334816 page4image3664335360 page4image3664335904 page4image3664336448

12.5.3 User and Group Facts

12.5.8 Manage UAC Facts

7.1.4 Wireless Security

13.9.2 Wired Network Security Facts

12.11.2 Backup Facts

12.12.8 System Recovery Facts

11.1.2 File Location Facts

11.4.5 Shared Folder Facts

page4image3664756592

13.1.2 Workstation Security Facts

page4image3685749920

VI

page4image3665756720

None

You will need to incorporate all instructor feedback that you have received for your final project. Note that you will complete milestones related to most of the final project’s critical elements, but there are two sections (V and VI) that you will submit only once as part of your final project submission in Module Seven.

Milestones
In Module Two, you will submit a list and description of all of the business needs that you have been able to determine given the information in the provided

scenario and your own choices for filling in the gaps. This milestone will be graded with the Milestone One Rubric.

Milestone Two: Hardware Components
In Module Three, you will submit an examination of the business’s issues to determine specific hardware requirements. This milestone will be graded with the Milestone Two Rubric.

Milestone Three: Software Applications
In Module Four, you will submit an examination of the business’s issues to determine specific software requirements. This milestone will be graded with the Milestone Three Rubric.

Milestone One: Identify Business Needs

page4image3684739392 page4image3684739664 page4image3684740000

Milestone Four: Networking

page4image3684742880

page5image3664290880

In Module Five, you will submit an examination of the business’s issues to determine specific network requirements. This milestone will be graded with the Milestone Four Rubric.

Final Submission: IT Consultation Report
In Module Seven, you will submit your final project. It should be a complete, polished artifact containing all of the critical elements of the final product. It should reflect the incorporation of feedback gained throughout the course. This submission will be graded with the Final Project Rubric.

Deliverables

page5image3685769888

Milestone

Deliverable

Module Due

Grading

One

Identify Business Needs

page5image3683028816 page5image3683029408

Two

page5image3683031696 page5image3663693744

Graded separately; Milestone One Rubric

Two

Hardware Components

Three

Graded separately; Milestone Two Rubric

Three

Software Applications

Four

page5image3685803936 page5image3685804464

Graded separately; Milestone Three Rubric

Four

Networking

Five

page5image3685816720 page5image3685818400

Graded separately; Milestone Four Rubric

Final Submission: IT Consultation Report

page5image3685831648 page5image3685832192

Seven

Graded separately; Final Project Rubric

page6image3683749024

Final Project Rubric
Guidelines for Submission: Your IT Consultation Report should be 5–10 pages in length (plus a cover page and references) and double spaced, with 12-point

Times New Roman font and one-inch margins.

Critical Elements

Exemplary (100%)

page6image3683877696

Proficient (85%)

Needs Improvement (55%)

page6image3683885744

Not Evident (0%)

Value

Business Needs

Meets “Proficient” criteria and fully qualifies the business needs to create a strong foundation for the report

Lists and describes all of the business needs based on the scenario and choices for filling in the gaps, with enough detail to fully support the rest of the report

Lists and describes the business needs, but there are gaps in necessary detail or issues of accuracy or plausibility

Does not list and describe the business needs

4.75

Hardware Components: Requirements

page6image3662500640

Meets “Proficient” criteria and demonstrates an advanced ability to apply fundamental IT problem-solving methods

page6image3685976016

Examines the business’s issues to determine specific hardware requirements and cites relevant examples

page6image3685917600

Examines the business’s issues, but fails to determine specific hardware requirements using relevant examples

page6image3685950160

Does not examine thebusiness’s issues to determine hardware requirements

4.75

Hardware Components: Compare and Contrast

page6image3685939184 page6image3685939792

Meets “Proficient” criteria and demonstrates an advanced ability to apply fundamental IT problem-solving methods

Compares and contrasts the various options for meeting the requirements and cites specific evidence from the component specification fact sheets to support their evaluation

Compares and contrasts the options for meeting the requirements, but there are gaps in necessary detail, or submission fails to fully support the evaluation with specific evidence

Does not compare and contrast the options for meeting the requirements

4.75

Hardware Components: Recommendations

Meets “Proficient” criteria and demonstrates a nuanced understanding of basic hardware options

Composes a final list detailing all of the specific hardware recommendations and logically justifies the proposal as the best possible choice for meeting the business requirements

Composes a final list of the specific hardware recommendations, but list is incomplete, contains inappropriate recommendations, or is not fully justified given the business requirements

Does not compose a final list of the hardware recommendations for meeting the business requirements

7.92

page6image3682974944 page6image3682975424

Software Applications: Requirements

page6image3682974064 page6image3682978016

Meets “Proficient” criteria and demonstrates an advanced ability to apply fundamental IT problem-solving methods

Examines the business’s issues to determine specific software requirements and cites relevant examples

Examines the business’s issues but fails to determine specific software requirements using relevant examples

Does not examine thebusiness’s issues to determine software requirements

4.75

page7image3684023104

Software Applications: Compare and Contrast

Meets “Proficient” criteria and demonstrates an advanced ability to apply fundamental IT problem-solving methods

page7image3684076512

Compares and contrasts the various options for meeting the requirements and cites specific evidence that supports the evaluation

Compares and contrasts the options for meeting the requirements, but there are gaps in necessary detail, or submission fails to fully support the evaluation with specific evidence

page7image3684052720

Does not compare and contrast the options for meeting the requirements

4.75

Software Applications: Recommendations

Meets “Proficient” criteria and demonstrates a nuanced understanding of basic software options

Composes a final list detailing all of the specific software recommendations and logically justifies the proposal as the best possible choice for meeting the business requirements

Composes a final list of the specific software recommendations, but list is incomplete, contains inappropriate recommendations, or is not fully justified given the business requirements

Does not compose a final list of the software recommendations for meeting the business requirements

7.92

Networking Options: Requirements

page7image3684170240

Meets “Proficient” criteria and demonstrates advanced knowledge of network and multiuser operating system methods

page7image3684180176

Examines the business’s issues to determine specific networking requirements and cites relevant examples

page7image3685024752

Examines the business’s issues but fails to determine specific networking requirements using relevant examples

page7image3685044256

Does not examine thebusiness’s issues to determine networking requirements

7.92

Networking Options: Compare and Contrast

page7image3685061360 page7image3685061968

Meets “Proficient” criteria and demonstrates advanced knowledge of network and multiuser operating system methods

Compares and contrasts the various options for meeting the requirements and cites specific evidence that supports the evaluation

Compares and contrasts the options for meeting the requirements, but there are gaps in necessary detail, or submission fails to fully support the evaluation with specific evidence

Does not compare and contrast the options for meeting the requirements

7.92

Networking Options: Recommendations

Meets “Proficient” criteria and demonstrates advanced knowledge of network and multiuser operating system methods

Composes a final list detailing all of the specific networking solution recommendations and logically justifies the proposal as the best possible choice for meeting the business requirements

Composes a final list of the specific networking solution recommendations, but list is incomplete, contains inappropriate recommendations, or is not fully justified given the business requirements

Does not compose a final list of the networking solution recommendations for meeting the business requirements

7.92

page7image3684194016 page7image3684191648

Maintenance and Security: Requirements

Meets “Proficient” criteria and demonstrates deep knowledge of best practices for managing access and reducing risk to digital information stores

Interprets the business’s needs to determine specific information security requirements and cites relevant examples

Interprets the business’s needs but fails to determine specific information security requirements using relevant examples to illustrate

Does not interpret thebusiness’s needs to determine information security requirements

7.92

page8image3662369440

Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."

Order Solution Now

Our Service Charter


1. Professional & Expert Writers: Eminence Papers only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Eminence Papers are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Eminence Papers are known for the timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Eminence Papers, we have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.

We Can Write It for You! Enjoy 20% OFF on This Order. Use Code SAVE20

Stuck with your Assignment?

Enjoy 20% OFF Today
Use code SAVE20

Maintenance and Security: Managing User Access

Meets “Proficient” criteria and demonstrates deep knowledge of best practices for managing access and reducing risk to digital information stores

page8image3683294960

Compares and contrasts the various options for meeting the requirements and cites specific evidence that supports the evaluation

Compares and contrasts the options for meeting the requirements, but there are gaps in necessary detail, or submission fails to fully support the evaluation with specific evidence

page8image3684289328

Does not compare and contrast the options for meeting the requirements

7.92

Maintenance Security: Backing Up and Storing Information

Meets “Proficient” criteria and demonstrates deep knowledge of best practices for managing access and reducing risk to digital information stores

page8image3684324208

Compares and contrasts the various options for meeting the requirements and cites specific evidence that supports the evaluation

Compares and contrasts the options for meeting the requirements, but there are gaps in necessary detail, or submission fails to fully support the evaluation with specific evidence

page8image3684353936

Does not compare and contrast the options for meeting the requirements

7.92

Future Considerations

Meets “Proficient” criteria and demonstrates a nuanced understanding of basic hardware and software options

Proposes reasonable future considerations for the hardware and software recommendations and cites specific examples and evidence to illustrate

Proposes future considerations for the hardware and software recommendations, but proposal is missing necessary detail or does not include specific and reasonable examples or evidence to illustrate

Does not propose future hardware and software considerations

7.92

Articulation of Response

page8image3683298096 page8image3683298640

page8image3683299104

Submission is free of errors related to citations, grammar, spelling, syntax, and organization and is presented in a professional and easy-to- read format

Submission has no major errors related to citations, grammar, spelling, syntax, or organization

page8image3685839872

Submission has major errors related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideas

Submission has critical errors related to citations, grammar, spelling, syntax, or organization that prevent understanding of ideas