System Analysis and design

All the question are attached below 

Just put answer below the question

Designing database under the name of group Survey System

Vivi bubble tea is a name of the store so its legit store. if you google it it is located in st cloud mn  usa 

please design a data base under this saying this store needs a survey system.

this is just three file there is more 

it is due by april 5 so i will give you rest of the file that day and may be you can email me too for other question [email protected] so that this email might benefit for both of us

Facebook's Career Page

Company Name: Facebook, INC

 Facebook, Inc. is an American online social media and social networking service company based in Menlo Park, California. It was founded by Mark Zuckerberg along with other fellow Harvard College students. As of the end of 2018, the number of Facebook employees reached 35,587 full-time staff. It is considered one of the Big Four technology companies along with Amazon, Apple, and Google. From our Thompson text, read Chapter 10 Assurance of Learning Exercise #3 related to Facebook’s Career page and click on the website link to provide you with information to use in your response to the following:

  • How do Facebook’s internal management training programs integrate the traits and stated goals on the Careers page into specific and tangible construction of employee capabilities?  How does this apply to our reading of the week?
  • How does the internal training Boot Camp program prepare Facebook employees of all types to “move fast and break things”?  How does this apply to our readings of the week?
  • What does this case have to do with overall organizational Strategy?

Submission Details: 

  • Your analysis should be between 1000 and 1500 words.
  • Incorporate a minimum of at least our course text and one non-course scholarly/peer reviewed source in your paper.  All written assignments must include a coverage page, introductory and concluding paragraphs, reference page, be double-spaced, and proper in-text citations using APA guidelines.

Website Link: https://www.facebookcareers.com/

References link: 

Professor last week feedback:

This is not a numbered exercise.  Please review APA for propper formating.  

C# Programming (Array Manipulations)

Write statements that perform the following one-dimensional-array operations:

a) Set the three elements of integer array counts to 0.

b) Add 1 to each of the four elements of integer array bonus.

c) Display the five values of integer array bestScores in column format.

Please use C# language and submit as a zip file.

Web Design & Development -2

 “Hands-On” Exercises 

  1. Write the HTML to display your name with the largest heading element. Provide Screenshot for output.
  2. Think of a favorite quotation by someone you admire. Write the HTML code to display the person’s name in a heading and the quotation in a blockquote element. Provide Screenshot for output.

Culminating Assignment Concept Paper: Red Team Assessment Strategies in Cybersecurity

 

Culminating Assignment

Concept Paper:   Red Team Assessment Strategies in Cybersecurity

Directions:

1.  Read the scenario, access the resources, and review the rubric below to help you understand the assignment.  The final paper will be due in Week 7.  You should begin working on the assignment right away, and you will share your progress in Week 6.  

2.  Write a paper that follows the listed parameters, addresses the important concepts, and includes the required sections:

Parameters:  

  • Ranges from 4 – 5 double-spaced pages and use IEEE formatting style. 
  • Uses Times New Roman font (size 12), with one-inch margins on all sides.
  • Includes at least three (3) quality resources to support your ideas.  You may use the resources provided and/or others of your choosing.  They must be cited appropriately.

Important Concepts:

  • Compare and contrast red teaming versus penetration testing based on the presented case.
  • Describe the approach to red team assessment.
  • Discuss how different types of organizations are utilizing red teaming.

Required Sections:

  • Title 
  • Introduction:  Clear description of the topic, including a summary of what is already known about that topic.
  • Body:  
    • Address important concepts.  
    • What evidence do you have to support your topic?  
  • Conclusion:  Why is it important to study this topic? Why is this worth investigating further?
  • Reference Page:  IEEE style

3.  Your paper should enable a casual reader to understand this topic and its importance.  Please make sure the following outcomes are addressed within your paper:

  • Explain the common tools and tactics used in red teaming.
  • Use technology and information resources to research the evolution of red team assessment techniques.

Due:  In week 7 with the specific date posted in Blackboard.  You will be directed to complete and share parts of this assignment in Week 6.  

Scenario:  A large multinational fintech wanted to conduct a Red Team Assessment to evaluate its ability to detect and respond to a real-world cybersecurity attack.

The read team started their assessment by sending a phishing email that persuaded the victim to log in to a fake portal hosted on a server to obtain valid credentials. While a small number of users clicked on the malicious link sent in the email, none of them submitted their credentials. This could be attributed to the regular social engineering tests and security awareness training delivered to staff.

After the failed phishing campaign, the team went back to the drawing board to come up with a new plan of attack.  Reviewing the company’s Twitter account, the team discovered that they host a monthly community event at one of their buildings. The team registered for the event to deploy a purpose-built device into their internal network. The device will allow the team to gain remote access to the network using either an independent wireless connection or a 3G/4G mobile connection.

Two members of the red team attended the event. They managed to slip away from the main event to see if there were any unlocked offices or conference rooms. Once a room had been found. One team member acted as a lookout while the other plugged the device and checked that he could reach it from his mobile phone. Shortly afterward the testers left the event and joined the rest of the team in a coffee shop down the road.  Once connected to the network, the team started mapping the internal network and gathering additional information. Over the next couple of days, the team captured several password hashes, which were achieved by exploiting a weakness in Windows’ broadcast protocols. However, users appeared to be using strong complex passwords and it was not possible to crack the hashes to recover clear-text passwords. The team then decided to relay a captured hash belonging to a user and use it to log in into a workstation where they had local administrative privileges. This allowed them to extract the clear-text password of the currently logged-in users from memory.

Resources to help you complete this assignment:

Rubric:

Points: 

Assignment: Red Team Assessment Strategies in Cybersecurity

Criteria

Needs Improvement

Below 60-70 F

Fair

70-79 C

Proficient

80-89 B

Exemplary

90-100 A

1. Compare and contrast red teaming versus penetration testing based on the presented case. Met outcomes.

Weight: 25%

Did not submit or incompletely compared and contrasted red teaming versus penetration testing based on the presented case.  Did not meet outcomes.

Partially compared and contrasted red teaming versus penetration testing based on the presented case.  Partially met outcomes.

Satisfactorily compared and contrasted red teaming versus penetration testing based on the presented case.  Met outcomes.

Thoroughly compared and contrasted red teaming versus penetration testing based on the presented case. Exceeded outcomes.

2. Describe the approach to red team assessment.

Weight: 30%

Did not submit or incompletely described the approach to red team assessment.

Partially described the approach to red team assessment.

Satisfactorily described the approach to red team assessment.

Thoroughly described the approach to red team assessment.

3. Discuss how different types of organizations are utilizing red teaming.

Weight: 30%

Did not submit or incompletely discussed how different types of organizations are utilizing red teaming.

Partially discussed how different types of organizations are utilizing red teaming.

Satisfactorily discussed how different types of organizations are utilizing red teaming.

Thoroughly discussed how different types of organizations are utilizing red teaming.

5. 3 References

Weight: 5%

No references were provided.

Does not meet the required number of references; some or all references poor quality choices.

Meets the number of required references; all references high-quality choices.

Exceeds the number of required references; all references high-quality choices.

6. Clarity, writing mechanics,  formatting.

Weight: 10%

More than 6 errors present

Portfolio Assignment

 This week discuss a current business process in a specific industry.  Note the following:-The current business process itself.-The industry the business process is utilized in.After explaining the current situation, take the current learning from the course and:

  • Explain a new technology that the business should deploy.  Be specific, don’t only note the type of technology but the specific instance of technology.  (For example, a type of technology is smart automation a specific type of automation is automated light-dimming technology).
  • Note the pros and cons of the technology selected.
  • Note various factors the business should consider prior to deploying the new technology

The above submission should be three pages in length.  Remember the total length does not include the APA approved cover page or the references.  There should be at least three APA approved references to support your work. 

database project

Hi, I have a simple project for the database material. The attached file contains the solution, but I want another solution

Internship part 2

Prepare a professional cover letter

Articulate effective interview strategies

Explain the difference between a “good” interview and a “bad” interview

Lecture Notes:
There are 3 sections of a cover letter that are required when writing a professional cover letter to include with your resume:
Introductory paragraph (to attract the potential employer’s attention)
Main Body (to highlight and draw attention to your skills)
Closing paragraph (to ask for an interview

Week 2 assignment #1—related to cover letter  

Using the lecture notes above, the video in this week’s discussion forum, and sources from the internet, write and submit a cover letter for a job you are interested in applying for. You can use indeed.com, careerbuilder.com, LinkedIn, or look for job opening on a company’s website to find a job opportunity that interest you. Be sure to include a copy of the job posting with your cover letter.

Week 2 Assignment #2—interview prep—good interview vs. bad interview (interviewing techniques

https://www.youtube.com/watch?v=HG68Ymazo18 [Title: Top Interview Tips: Common Questions, Nonverbal Communication & More] 

https://www.youtube.com/watch?v=rAIXkf8WOlk [Title: Good interview, bad interview]

After watching both video, write a one to two paragraph reflection of what you will do differently in an interview as a result of what your learned. Explain what you did wrong prior to watching this video. If you have never interviewed for a job, then write about your interview for admission into the  Graduate School.