How To Purchase A Computer Essay

PAGES
4
WORDS
1397
Cite

I am purchasing a computer because I need something to do my work on at home and also it would be nice to be able to access the Internet on something other than my phone. Having a personal computer makes the experience of browsing the Internet more enjoyable and having an actual keyboard will help me to do the typing I need to do much more easily. The category of computer I am looking at is a laptop, because I want this computer to be easily portable so that I can move it from room to room or even take it with me on the go if I want to work in another environment. The manufacturer I am looking at is Dell because this brand has a very good reputation among computer users. After comparing brands and looking at what users have had to say, I am settled on purchasing a Dell Latitude, which is an older model, but it comes with Windows 7 already installed on it—and though this version of Windows is soon to stop receiving support and updates from Windows, I prefer it to Windows 10, which to me feels like software that is too counter-intuitive. I would rather stick with the older edition as long as I can reasonably do so. I will need my computer to have Internet access capability mainly for work but also for pleasure, as I enjoy streaming a movie or sports game from time to time. The capabilities my computer will require to access the Internet from anywhere will be Wi-Fi and the services that I will need to have access to the Internet from my home will include having an Internet provider who can install a connection to my home. So this will require me to have a modem and I will also need a router so that my computer can wirelessly connect to the Internet wherever I am in the home.

The type of software I am looking to install on my computer is already on there and is Windows 7 which is made by Microsoft. I could buy and install Windows 10 but I do not like its interface and I have a feeling that Microsoft is just using this latest version to harvest data from its users much like Facebook and Google have recently been in the news for doing. I would rather therefore stick with an older model of software that I know works well and that I am familiar with and that has an interface that I enjoy using on a daily basis. When the software stops being supported I will probably have to do an upgrade at some point, but at the moment I want to stay with what I like and what I am familiar with, which is Windows 7.

The system components that I will buy will be to upgrade the RAM (memory capabilities) in the computer from 2 GB to 16 GB. I like to store a lot of information on my computer so this will help with keeping the computer from becoming slow while processing information. Another thing that will help is to upgrade to a better system processor,...

...

I will discuss each of these separately in terms of inputs, outputs, storage devices, and utility programs.
The input devices I will purchase include a digital writing and graphics tablet that I can plug into the laptop using the USB port in the side. The digital writing and graphics tablet that I am looking to purchase is Dell Canvas 27, which retails for roughly $1500 and will be more expensive than the laptop I am buying (which I can purchase refurbished for $300). The Dell Canvas 27 is a very good drawing tablet that comes with an electronic stylus that you can use to sketch, write, draw and animate and of the various graphics tablets available for purchase this is one of the best out there. I will also be looking to buy a webcam so that I can shoot videos and upload them to my YouTube channel or share them with friends while using Skype. The webcam I am looking to purchase is the Logitech C930e HD Webcam by Dell. This retails for around one hundred dollars so is a very affordable model. I want this one because it shoots in high definition and is the Dell brand, which I believe is among the best in tech products that one can buy today. Another input device that I will purchase is a scanner, so I can scan documents into my computer and then edit them using my graphics tablet. The scanner I will purchase is the Epson Perfection V600 Photo Scanner. Epson has always pleased me in the past and their products have never given me any trouble, so I would like to continue with this brand and use this model scanner as its attributes meet my needs: it has a low power consumption and a 6400 dpi optical resolution which is about as good as you can get when scanning images—so I won’t have to worry about images that I scan coming out pixilated or blurry.

The output devices that I will purchase will be a set of speakers so that I can enjoy good sound when I am watching something on my computer. The speakers I will purchase will be the Dell USB SoundBar AC511, which is a very inexpensive and portable speaker that can be easily transported along with my computer should I choose to move from one room to another. I would also like to purchase a projector so that I can project onto the wall of a room in my home the video that I am streaming on my computer. This gives me the pleasure of having a kind of home theater in my house an the projector will seem like my very own movie reel. The projector I will purchase is the Epson V11H612520W, which comes with a wall mount. My computer will connect to…

Cite this Document:

"How To Purchase A Computer" (2018, March 31) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/how-to-purchase-a-computer-essay-2169522

"How To Purchase A Computer" 31 March 2018. Web.19 April. 2024. <
https://www.paperdue.com/essay/how-to-purchase-a-computer-essay-2169522>

"How To Purchase A Computer", 31 March 2018, Accessed.19 April. 2024,
https://www.paperdue.com/essay/how-to-purchase-a-computer-essay-2169522

Related Documents

Computer Security: Corporate Security Documentation Suitable for a Large Corporation Item (I) in-Depth Defense Measures (II) Firewall Design (III) Intrusion Detection System (IV) Operating System Security (V) Database Security (VI) Corporate Contingency of Operation (VII) Corporate Disaster Recovery Plan (VIII) Team Members and Roles of Each (IX) Timeline with Goal Description (X) Data Schema (XI) Graphical Interface Design (XII) Testing Plan (XIII) Support Plan (XIV) Schematics Computer Security: Corporate Security Documentation Suitable for a Large Corporation (I) In-Depth Defense Measures Information Technology (IT) Acceptable Use Policy The intentions of

To some users of personal computers, who state, never trust a computer that you cannot lift; the IBM has been viewed, more often than not, as an enemy, and according to Byte, the computer magazine, this was because of the fact that the IBM company rose to fame mainly on the basis of its mainframe computers, that were large and forbidding, and overwhelmingly bulky. This was probably why, when

Comparison of Product Suitability The Inspiron Mini 10 (1018) Netbook (http://www.dell.com/us/p/inspiron-mini1018/pd) meets all of my needs for a portable computer as described. However, for full computer functions that include a 40 GB hard-drive, 1.86 Gigahertz microprocessor speed, 512 MB RAM, with Windows XP Pro Business Suite, CDRW and DVD burner, I use an IBM Thinkpad Model-Year 2005 T-43 (http://www.amazon.com/Thinkpad-T43-1-86GHz-Laptop-Notebook/dp/B000979258/ref=sr_1_1?s=electronics&ie=UTF8&qid=1287825031&sr=1-1). The full-feature capabilities of this IBM Thinkpad are equivalent to a basic desktop computer

Unfortunately, many consumers may not be aware of their photographic image being used in this fashion and even if they were, existing privacy laws fail to provide any substantive protections. For example, in response to these trends, the Harvard Law Review published an essay entitled, "In the Face of Danger: Facial Recognition and Privacy Law," with a majority of the article describing how "privacy law, in its current form, is

Studies suggest that even "more "omniscient" technology is likely to be developed" in the near future (Lyon, 2002). Cookies were perhaps the first form of internet surveillance, developed in 1994 as a means for websites to track visitors logging in so they could provide more optimal service (Lyon, 2002). Now cookies have transformed the shape of communication and have further advanced the ability of criminals to survey individual user functions

The public-key cryptography approach also creates a more efficient means of cryptographic security by ensuring RSA-compliant encryption and decryption throughout the secured network (Sarkar, Maitra, 2010). As a result the use of public-key cryptography hardens and makes more secure each connection and node on a network (Chevalier, Rusinowitch, 2010). C3. What will help you trust a public-key that belongs to an unfamiliar person or Web site, and why does it