Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1. Consider the following scenario: an IT department at a large company must kee

ID: 3875915 • Letter: 1

Question

1. Consider the following scenario: an IT department at a large company must keep information about workstations deployed throughout the company. For each workstation, the following information must be kept: inventory number (This is uniquely assignment by the IT department to each workstation it purchases and is etched onto the workstation.) product serial number (This is uniquely assigned by the workstation vendor and is on a panel in the rear of the workstation. Serial numbers of different vendors may overlap; that is, workstations of two different vendors could have the same serial number.) workstation vendor (This is the name of the vendor of the workstation. All vendors have different names.) date purchased purchase price amount of RAM size of disk storage Solid state drive or hard drive location (A room number, which is a three digit number.) a. Write a a relational table schema for this information. Include a table name along with the column names and column domains as part of your schema. Use this format: Table_name(col1: domain1; col2:domain2: ... ; coln:domainn) b. Which column or set of columns can be used to uniquely identify the tuples in the table? Use this information to identify the candidate keys for the table. c. Identify all of the superkeys derived from the candidate keys from part b. d. Identify the one primary key and any alternate keys from the candidate keys from part b.

Explanation / Answer

Presentation and Purpose

This standard layouts the base particulars required for the buy of Workstation equipment. With the end goal of this archive, a Workstation is characterized as any Desktop, VDI Thin Client, Laptop, or Mobile Tablet sort gadget.

This standard is not proposed to be a total detail of framework necessities, yet rather feature the required components Workstation arrangements.

Extension

This standard applies to all workstations bought by operational-finance, self-support, and helper units of the University.

Workstation Hardware Standard

All Workstation buys took care of by the University Purchasing Office might be coordinated through the IT Services, Workstation Refresh Program.

Design

PC Computers

PC's obtained for all reasons ought to be venture models (i.e Dell Optiplex) instead of shopper models (i.e. Dell Inspiron). Workstations should not be gathered from singular segments for the motivations behind University business. Required components for PC buys are as per the following:

• Capable of running the most recent arrival of the Microsoft Windows Operating System

• Implement the most recent forms of grounds Antivirus/Antimalware programming, fix administration programming, and weakness administration programming.

• Computers putting away secret (Level 1 and Level 2) must help Trusted Platform Module (TPM 2.0 or higher)

• 8GB of slam or higher

• Dual-Core Intel i3 or higher processor, Intel Core2Duo 1.2Ghz or better

• 128GB or bigger hard/streak drive

• 10/100/1000 Network Card

• Optional Wireless cards must help 802.1x Wireless Network get to by means of WPA2 Enterprise encryption

• Must help Audio yield and Video yield

Mac Computers

Required components for Apple buys are as per the following:

• Capable of running the most recent arrival of the OSX Operating System

• Implement the most recent adaptations of grounds Antivirus/Antimalware programming, fix administration programming, and helplessness administration programming.

• 8GB of slam or higher

• Dual-Core or higher processor, Intel Core2Duo 1.2Ghz or better

• 128GB or bigger hard/streak drive

• Optional Wireless cards must help 802.1x Wireless Network get to by means of WPA2 Enterprise encryption

• Must help Audio yield and Video input

VDI Thin Clients

Required components for VDI Thin Client buys are as per the following:

• Must help PC Over IP

• Must be obtained alongside Microsoft Windows VDA License

• Must help no less than 2 screens

• Minimum 512MB On-Board Memory

Tablets

Smart phones endorsement from Department Management. Portable workstations must take after the prerequisites for PC/Apple Computers.

Extra required components for Laptop buys are as per the following:

• PC's must help Trusted Platform Module (TPM 2.0)

• Wi-Fi Wireless Networking Card which underpins 802.1x Wireless Network get to by means of WPA2 Enterprise encryption

Versatile Tablets

Extra required components for Tablet buys are as per the following:

• Must be perfect with current IT Services Mobile Device Management programming and guidelines. (Get in touch with IT Services for more data)

• Must store all information on the gadget encoded when not being used

• Must help 802.1x Wireless Network get to by means of WPA2 Enterprise encryption

• Must help complex passwords ( > 4 characters)

• Must help remote following and wiping (I.E. Discover my iPad)

Resource Management

Per ICSUAM 8065.0 SJSU is in charge of keeping up a stock of data resources containing level 1 or level 2 information (University Technology Asset Inventory). Because of the broad accessibility of touchy information (passwords, medical coverage data, restorative records, street numbers, library flow data, offers, offices outlines, levels, understudy information, and so on.) all workstations must be followed. Isolate from University Property Office methods, all Department Information Technology groups will make a record for and appoint an IT Services or University Property Office issued property tag for every gadget equipped for putting away touchy information. No gadget fit for putting away delicate data might be utilized without legitimate ID and resource administration.

Endless supply of the gadget, the getting division might accept accountability for the following of the data resource. Per ICSUAM 8065.0, divisions must have the capacity to write about current area, current proprietor, information demeanor status, and study status.

Every gadget will be surveyed once consistently as a feature of the grounds hostile to burglary program. Every gadget will be supplanted like clockwork as a major aspect of the grounds invigorate/reuse/study process. Every division will get a Physical Inventory Discrepancy notice taking note of any missing hardware. Every division will be given 10 days to find the property. On the off chance that the division is as yet unfit to find the property after the 10-day effortlessness period, the office will take note of that the property is lost on a Missing Equipment Report which will be sent to the San Jose State Police Department for examination

Definitions

Workstation

Any Desktop PC, VDI Thin Client, Laptop Computer, or Mobile Tablet sort gadget.

Desktop

A PC sufficiently little to fit in an individual workspace. Does not need to be fit for putting away information.

Cases:

• Acer Aspire

• Apple Mac Mini, iMac, and Mac Pro

• Asus E-Box and Essentio

• Dell Alienware, Dimension, Optiplex, Precision and XPS

• Gateway SX Series

• HP Pavilion, 110, and Compaq

• Lenovo Erazer, C, H and K Series

• Sony VAIO

VDI Thin Client

A PC sufficiently little to fit in an individual workspace unequipped for independent operation, and prepared to do "essentially" performing Desktop exercises on a unified server. These gadgets are basically terminal gadgets which give console, USB, and mouse data sources and sound/video yields to the client.

Illustrations:

• Acer Veriton

• Dell C, D, R, T, V, Z Series and Wyse

• HP MultiSeat, T Series, and Smart Client

Portable PC

A PC that is compact. Does not need to be fit for putting away information. Incorporates Touchscreen and Traditional Screen Tablets, and Convertible gadgets which are equipped for running a Desktop Operating System (i.e. Microsoft Windows, Apple OSX)

Illustrations:

• Acer Aspire

• Asus VivoBook

• Apple MacBook and MacBook Air

• Dell Alieneware, Inspiron, Latitude, Precision, NB, Slate (ST), Venue (Windows Models) and XPS

• HP Envy, Pavilio, and Spli

• Google Chromebook

• Lenovo Ideapad and Yoga

• Samsung ATIV

• Sony VAIO

• Toshiba Satellite

Versatile Tablet

An individualized computing gadget that is compact. Does not need to be fit for putting away information. Incorporates Touchschreen and Traditional Screen gadgets, Tablets, and Readers which keep running on adevice-particular versatile working framework (i.e. Apple iOS, Android, Nook, Kindle). Does exclude Cellular Phones

Illustrations:

• Acer Iconia

• Amazon Kindle and Kindle Fire

• Apple iPad, iPad Mini, and iPod

• Asus MemoTab, VioTab, and Transformer

• Barnes and Noble Nook

• BlackBerry Playbook

• Dell Venue (Android Models)

• Google Nexus

• HP Slate and Split

• Microsoft Surface and Surface Pro

• Samsung Galaxy

• Sony Xperia

Information Encryption

All SJSU PCs including desktops, portable PCs, tablets, cell phones and server putting away level one information must actualize an ISO affirmed information encryption instrument. SJSU clients can't scramble their own particular PCs, encryption should be actualized by their Department Technician. Clients should not intentionally take activities which keep grounds specialists from getting to University PCs. For more data on Data Classifications, please allude to the Information Classification and Handling standard.

Managerial Privileges

Managerial benefits are the most elevated amount of authorization that can be allowed to a PC client, and with this consent comes a larger amount of obligation. Levels of consents are essential in arranged situations to guarantee framework security and avoid harm to PC equipment and programming. A client with managerial benefits can perform undertakings, for example, introduce and uninstall programming and change a PC's designs. A client with manager benefits must know s/he will approach classified, individual data, control boards, registry settings and different segments that could hopelessly hurt their framework. The client may get to just those capacities important to finish his/her errand. For more data on managerial benefits please allude to the Access Control Standard. For ask for workstation managerial benefits, please round out the Request for Workstation Administrative Privileges shape.

Data Security

This standard is not planned to supplant any prior SJSU, CSU, nearby, state, or government law, standard strategy or practice. All Workstations obtained might submit to all appropriate data security approaches.

Standard Management

As per CSU approaches, the San José State University Director of Desktop Support Services regulates a yearly audit of this Standard and conveys any progressions or increases to proper SJSU partners. The SJSU Workstation Hardware Standard should be refreshed as important to reflect changes in CSU arrangements, SJSU's scholarly, authoritative, or specialized situations, or relevant laws and directions. The Information Technology Management Advisory council might play out a half-yearly audit of this standard.

The standard might be enlarged, however neither supplanted nor reduced, by extra arrangements and gauges.