- In your own words, explain the differences between SSDs (Solid State Drives) and the traditional hard drive.
300 words
300 words
Please use ERDPlus (free online) to create your relational schema (use the relational diagram). ERDPlus will draw in your Referential Integrity. You may either Hand Draw the functional dependencies (FDs) or you can copy and paste into PowerPoint and use PPT to draw in your FDs. Make sure you show functional dependencies and referential integrity on the same diagram.
The attachment below has 8 questions. Please use ErdPlus to create relational schema for each problems (Logical Model) and then draw the functional dependencies.
Deer Creek ski resort was for many years a small, family-owned resort serving day skiers from nearby towns. Deer Creek was recently acquired by Mountain Associates, a major ski resort operator with destination resorts in several western states. The new owners have plans to upgrade the resort into a destination resort for vacationers staying for a week or more. As part of this plan, the new owners would like to make major improvements in the Lynx Lair Lodge, the resort’s on-the-hill fast-food restaurant. The menu at the Lodge is very limited—hamburgers, hot dogs, chili, tuna fish sandwiches, French fries, and packaged snacks. The previous owners of the resort had felt no urgency to upgrade the food service at the Lodge since there is little competition. If skiers want lunch on the mountain, the only alternatives are the Lynx Lair Lodge or a brown bag lunch brought from home.
As part of the deal when acquiring Deer Creek, Mountain Associates agreed to retain all of the current employees of the resort. The manager of the Lodge, while hardworking and enthusiastic, has very little experience in the restaurant business. The manager is responsible for selecting the menu, finding and training employees, and overseeing daily operations. The kitchen staff prepares food and washes dishes. The dining room staff takes orders, serves as cashiers, and cleans the dining room area.
Shortly after taking over Deer Creek, management of Mountain Associates held a day-long meeting with all of the employees of the Lynx Lair Lodge to discuss the future of the ski resort and management’s plans for the Lodge. At the end of this meeting, top management and Lodge employees created a balanced scorecard for the Lodge that would help guide operations for the coming ski season.
Almost everyone who participated in the meeting seemed to be enthusiastic about the scorecard and management’s plans for the Lodge.
The following performance measures were included on the balanced scorecard for the Lynx Lair Lodge:
• Customer satisfaction with service, as measured by customer surveys.
• Total Lynx Lair Lodge profit.
• Dining area cleanliness, as rated by a representative from Mountain Associates management.
• Average time to prepare an order.
• Customer satisfaction with menu choices, as measured by surveys.
• Average time to take an order.
• Percentage of kitchen staff completing institutional cooking course at the local community college.
• Sales.
• Percentage of dining room staff completing hospitality course at the local community college.
• Number of menu items.
Mountain Associates will pay for the costs of staff attending courses at the local community college.
Required:
1. Using the above performance measures, construct a balanced scorecard for the Lynx Lair Lodge. Use Exhibit 10–12 as a guide. Use arrows to show causal links and indicate with a + or – whether the performance measure should increase or decrease.
2. What hypotheses are built into the balanced scorecard for the Lynx Lair Lodge? Which of these hypotheses do you believe are most questionable? Why?
3. How will management know if one of the hypotheses underlying the balanced scorecard is false?
Project Description:
You are an account manager for Inland Jewelers, a regional company that makes custom class rings for graduating seniors. Your supervisor requested a workbook to report on new accounts created on payment plans. The report should provide details on total costs to the student as well as payment information. Each ring financed has a base price that can fluctuate based on ring personalization.
There is a cyber attack against Company X and you are the only digital forensics analyst for the company. You think the attack is coming from an insider. You have a good idea that employee Kevin is not happy at the company and launched a cyber attack. Kevin is in IT department. He uses Linux computer and has an iPhone. The attack is against HR database. Database is an SQL database. All social security numbers are being deleted. You find that the attacker uses phishing email to capture a database password. Phishing e-mail has following body lines: “Your password is expired, please click the link to reset your password”. You will get his computer and iPhone to analyze. Please describe steps you will take from taking his computer and iPhone and doing digital forensics analysis. Describe tools you will use, methodology you will follow.
Conclusion on challenges faced Detecting Cryptocurrency Fraud with Neo4j in the Coinbase organization and How secure is cryptocurrency and blockchain technology? Security benefits and issues of DLT
Need 1 to 2 pages of conclusion
How innovation in business-level strategy can change the competitive game in an industry, giving the innovator a sustained competitive advantage
Directions: Use the internet to find the following information about peripheral devices for sale. Put the information into the provided table on the next page. Here are more details about the kinds of peripherals you will need to identify and what information is needed. Each letter below corresponds to a column in the table on page 2.
A. Ten (10) examples of peripheral devices. The devices should be of different types (i.e. no more than two should come from the same category, e.g. printers.)
B. Identify each device listed as:
1. An internal device only (I)
2. An external device only (E)
3. Either an internal or external device (B)
C. Identify if the device is primarily used for
1. Input
2. Output
3. Storage
D. If device would mostly be used by
1. Business only (B)
2. Industry only (I)
3. Personal (individual, family, home use) only (P)
4. Any combination of the above (C)
E. Manufacture’s Suggested Retail Price (MSRP) of each device
1. Find price for one brand and model only
2. Look for name brand devices and models known for quality
3. Best to use the manufacturer’s website
4. Round the price to the nearest dollar ($1.98 rounds to $2.00)
Check Attach File for Chart
As a security administrator for Always Fresh, you have been instructed to ensure that Windows authentication, networking, and data access are hardened. This will help to provide a high level of security.
The following are issues to be addressed through hardening techniques:
Previous attempts to protect user accounts have resulted in users writing long passwords down and placing them near their workstations. Users should not write down passwords or create passwords that attackers could easily guess, such as words founds in the dictionary.
Every user, regardless of role, must have at least one unique user account. A user who operates in multiple roles may have multiple unique user accounts. Users should use the account for its intended role only.
Anonymous users of the web server applications should only be able to access servers located in the demilitarized zone (DMZ). No anonymous web application users should be able to access any protected resources in the Always Fresh IT infrastructure.
To protect servers from attack, each server should authenticate connections based on the source computer and user.
Create a summary report to management that describes a hardening technique that addresses each issue listed above. Provide rationale for each selection.
Format: Microsoft Word (or compatible)
Font: Times New Roman, size 12, double-space
Citation Style: APA
Length: 2 to 4 pages
Discuss, in your own words using 500 words or more, how virtualization may create it’s own security vulnerabilities.