Just need my worked checked

I need my SQL assignment looked over. I’m currently using MS management studio

  

1. List the employee whose employee number is 100.

Select * from Employee where employee_Num=100;

2.  List the Employee whose salary is between 50 K to 100k.

Select * from Employee where salary between 50000 and 100000;

Select * from Employee where salary >= 50000 and salary <= 100000;

3.  List the Employees whose name starts with ‘Ami’.

Select * from Employees where name like ‘Ami%’;

4. List the Employees whose name starts with A and surname starts with S.

Select * from Employees where name like ‘A%’ and surname like ‘S%’;

5.  List the Employees whos surname contains kar word.

Select * from Employees where  surname like ‘%kar%’;

6.  List the Employees whose name starts with P,B,R characters.

Select * from Employees where name like ‘[PBR]%’;

7. List the Employees whose name not starts with P,B,R characters.

Not Operator Symbol

Select * from Employees where name like ‘[!PBR]%’;

Not Operator

Select * from Employees where name not like ‘[PBR]%’;

8. Write a query to fetch first record from Employee table?

Select * from Employees where rownum=1;

9. Write a query to fetch the last record from Employees table?

Select * from Employees where rowid = select max(rowid) from Employee; 

10. Write a query to find the 2nd highest salary of Employees using Self Join

Select * from Employees a where 2 = select count (distinct salary) from Employee where a.salary <= b.salary;

11. Write a query to display odd rows from the Employees table 

Select * from(select rownum as rno,E.*from Employees E) where Mod(rno,2)=1;

12. Write a query to display even rows from the Employees table 

Select * from(Select rownum as rno,E.* from Employees) where Mod(rno,2)=0;

13. Write a query to show the max salary and min salary together form Employees table

Select max (salary) from Employees

Union

Select min (salary) from Employees;

14. Write a query to fetch all the record from Employee whose joining year is 2018 

Select * from Employees where substr(convert(varchar,joining_date, 103),7,4)= ’2018′

15. Write a SQL Query to find maximum salary of each department 

Select Dept_id,max(salary) from Employees group by Dept_id;

16. Write a query to find all Employees and their managers (Consider there is manager id also in Employee table). 

Select e.employee_name,m.employee name from Employees e,Employees m where e.Employee_id=m.Manager_id;

17. Write a query to display 3 to 7 records from Employee table 

Select * from (Select rownum as ‘No_of_Row’,E.* from Employee E)

18. Write a query to fetch common records from two different tables Employees and Employees1 which has not any joining conditions 

Select * from Employees 

Intersect 

Select * from Employees1;

19. Write a query to validate Email of Employee 

SELECT

EMAIL 

FROM

EMPLOYEE

Where NOT REGEXP_LIKE(Email, ‘[A-Z0-9._%+-]+@[A-Z0-9.-]+.[A-Z]{2,4}’, ‘i’);

20. Write a query to remove duplicate rows from Employees table 

Select Employee_No FROM Employees WHERE ROWID < >

(Select max (rowid) form Employees b where Employee_No =b.Employee_No);

Discussion on data mining with a business problem

In this assignment, submit your topic and references, in APA format of preliminary references.

Discussion posts will include:

  1. Provide the title of the paper (note: you may change the wording in the official title in the final version however, you cannot change the topic once you select one).  the paper is on a business problem you are going to solve with analytics.
  2. Include an introduction on the topic
  3. A minimum of 3-5 references in proper APA format

Business process redesign

If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.

• Be approximately 4-6 pages in length, not including the required cover page and reference page.

Operational Excellence

APA format with headings

Strictly plagiarism free.

Assignments 1,2,3 each should have 2 references 

total – 5 pages

Assignment 1 (discussion – 1 page)

Discussion: This week we focus on some additional terms for IT users.  This week lets discuss what a community of practice is.   Why are they important and how can they impact the culture within an organization?

Assignment 2 (Exercise – 1 page)

Chapter 13- Exercise 1 (2, 4) (Information Systems for Business and Beyond)

Assignment 3 (Essay – 1 page)

Chapter 11 – Review the employment challenge in the digital era (as well as the entire chapter). Reflect on the various challenges are present in the digital era. Will things get better or more complicated as times goes on? Explain. What are some methods to assimilate new generations into the workforce to think about competitive advantage? (Information Technology and Organizational Learning)

Assignment 4 (Practical assignment – 2 pages)

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

NOTE: Do not submit a paper you wrote for another class. This paper must be written specifically for this class.

NOTE: Do not include a job description from your current or previous job. This paper must be written to describe how this course would apply to your job.

Week 9 Assignment

Do a bit of research on File Inclusion Vulnerability and answer below questions.

  • 1. What is it?
  • 2. Why is is dangerous?
  • 3. What is the difference of low and remote inclusion?
  • 4. What methods can me employed to prevent a security breach?
  • 5. What programming languages are vulnerable to this type of attack.

Note: Answer to each of these above questions should be around 75 words.

Write your answer using a WORD document in total about 350 words for all 5 questions. Do your own work and use your own words. Note your Safe Assign score. Score must be less than 25 for full credit.

Payroll(casestudy)

  

Case Study:

You work for a large multinational technology organization. The company has determined they need to create a disaster recovery plan.

As a team, pick one of the following department in your organization: 

· Computer Operations 

· Accounting 

· Marketing 

· Payroll 

· Sales 

· Distribution

· Human Resources

· Purchasing 

· Service (i.e., Vehicle Maintenance)

· Administration (i.e., Executive Branch)

Requirements: 

Describe the services that your department provides to the organization, the types of disasters will most affect your department, and what you and your department can do to prepare for a disaster situation. Perform a limited risk analysis for your department (because any given department in an organization can be considered an organization on its own) for the types of disasters that will most affect your department.

After you conducted your limited risk analysis for your department, the company decided to make you the captain for your company’s disaster recovery team. You know that working as a team is important and therefore you’re trying to figure out how to build both the team and friendships within the new team. As a team, you should discuss why you need to create a contingency policy and plan. You should describe what you need to start the contingency planning process and finally, define business impact analysis and describe each of its components.

Now that you know what goes into making up your plan, you should discuss the relationships between the overall use of contingency planning and the subordinate elements of incident response, business resumption, disaster recovery, and business continuity planning. Additionally, you will describe the techniques used for data and application backup and recovery.

To conclude the project, you are going to describe the process you will use to organize the incident response planning process, explain the techniques that can be employed when formatting a security incident response team, and describe the processes used in making decisions about incident detection and escalation.

Deliverables:

Prepare a report to address all aspects of the case study. This report should be no less than 20 pages of content and no more than 25 pages of content. You need to include outside sources and properly cite and reference your sources. You must have at least 10 references, 5 of which must be scholarly peer-reviewed articles. The 20 pages of content, includes title page and a reference sheet. This report needs to be in proper APA format.

Right Wing Web sites

Hide Assignment Information

Turnitin®

Turnitin® enabledThis assignment will be submitted to Turnitin®.

Instructions

In order to complete Assignment #5 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #5). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 outside sources. Please be sure to follow APA guidelines for citing and referencing sources. Assignments are due by 11:59 pm Eastern Time on Sunday.

1. What are the primary purposes of right-wing hate Web sites that use images, music, games, and the like to spread their propaganda?

2. Identify and explain situations where search and seizure is possible without a warrant. Please describe the limitations.

Due Date

Oct 11, 2020 11:59 PM

Cyber Security Lab – Shellshock

Please narrate and stake screenshots while doing lab like it says in instruction in PDF

This lab will be done in the SEED lab VM. (Lab pdf, notes, and c code file attached.)

  • Shellshock
  • Environment variables
  • Function definition in Bash
  • Apache and CGI programs

Note: You may need to change void main() to int main() in the C code.

The submission is a lab report that includes screenshots of the steps and a narrative of what is happening.

There are two submissions in case anything goes wrong with the first.

SQL Servers installation and access (Cyber Security)

 Using your textbook, the Internet, and any other suitable references, answer the following questions in your own words. Save your answers in a single file (minimum length of a full page of content).  Remember to include any sources that you use.

  1. Why would you perform a silent installation?
  2. Under what circumstances would a system administrator lose access to an instance of SQL Server? Give an example.
  3. Oracle offers a free download of all editions of the Oracle Database.  How does the company derive benefits from this approach?

financial measure

 

(1) Identify and describe one of the financial measures of profitability, liquidity, efficiency, and leverage.

2) How can an analyst use one of these financial measures to evaluate the financial condition of a corporation?