Internship Preparation Level II

 Mock Interview Experience: Below is a link for a mock interview video.

https://www.youtube.com/watch?v=srw4r3htm4U [title: Job Interview Simulation and Training – Mock Interview]

In the video, the narrator will introduce the video and give you some items to prepare before you actually start the interview. Then, he will actually begin asking you questions as part of the mock interview and then give you time to respond. You will need to respond in order to practice (simulate) the interview. You can practice (replay the video) as often as you would like. You can also stop the video so you can continue answering the questions or advance it if you need to move forward more quickly.

Please ensure that you do the following:

  1. Use a word document to complete this assignment
  2. Write each question
  3. Ensure that you answer each question in detail
  4. please upload the completed file here

Application Security Discussion

One defense mechanism may be relatively easy for an attacker to circumvent. Instead, a security system must have layers, making it unlikely that an attacker has the tools and skills to break through all the layers of defenses.

Phishing scams can be delivered in multiple ways and can be generalized for an entire organized or specifically aimed at one person. Please conduct a web search and write at least 2 paragraphs that describe the multiple methods of delivering a phishing scam and a provide a multi-layered defense to combat the phishing scam described.

Fully address the question(s) in this discussion; provide valid rationale for your choices, where applicable; and respond to at least two other students’ views.

Requirements:

  • Sources: 2 References to Support your answer
  • Citation Style: APA format
  • Length: 2 – 3 paragraphs
  • Engagement: Respond to two other students’ views
  • Posting Days: Initial Post due Thursdays of the week. Replies due by Sundays

PowerPoint_1A_KWT_Overview

PowerPoint_1A_KWT_Overview

     

Open the file Student_PowerPoint_1A_KWT_Overview.pptx   downloaded with this project. Then, in your textbook, turn to Project 1A and   complete all of the steps in Activities 1.01-1.14.
  Note: Activities 1.15 -1.16 are optional and may also be assigned by your   instructor but will not be submitted to MyLab IT to be graded.

 

Complete Activity 1.01   Identifying Parts of the PowerPoint Window. 

 

Complete Activity 1.02 Entering   Presentation Text

 

Complete Activity 1.03 Applying   a Presentation Theme 

 

Complete Activity 1.04 Inserting   a New Slide

 

Complete Activity 1.05   Increasing and Decreasing List Levels

 

Complete Activity 1.06 Adding   Speaker Notes to a Presentation

 

Complete Activity 1.07   Displaying and Editing Slides in the Slide Pane

 

Complete Activity 1.08 Inserting   a Picture from a File

 

Complete Activity 1.09 Applying   a Style to a Picture

 

Complete Activity 1.10 Applying   and Removing Picture Artistic Effects

 

Complete Activity 1.11 Viewing a   Slide Show

 

Complete Activity 1.12 Using   Presenter View

 

Complete Activity 1.13 Inserting   Headers and Footers on Slide Handouts

 

Complete Activity 1.14 Inserting   Slide Numbers on Slides

 

Save and close the file, and   then submit for grading.

Executive Dashboard and Data Driven Input

Assignment 1:

 Research a scholarly paper or professional video on “Executive Dashboards”  and reflect on only one (1) of the following:

  • “Components”: What are the components of an executive dashboard? 
  • “Drill-down”: What is an example of a drill-down dashboard?
  • “Analytics”: What type of analytics is most often shown on an executive dashboard?

NOTE:
You must copy and paste the topic (“Components” or “Drill-down” or “Analytics”) at the start of your paper to provide a context for your answer.
This paper must be between 250-300 words on what caught your eye and reflect on what you read. 
Do not add extraneous text that does not address the question – do not add an introduction or conclusion. 

Assignment 2:

 Research a scholarly paper or professional video on “Data Driven Input” and reflect on only one (1) of the following topics:

  • “Analytics Centric”: How can input be designed to support an Analytics Centric organization?
  • “Competency Centers”: The benefits of Analytics Competency Centers in data-driven organizational change.
  • “Roles”: The role of Systems Analysts, Business Analysts and Super Users in data-driven decisions.

NOTE:
You must copy and paste the topic (“Analytics Centric” or “Competency Centers” or “Roles”) at the start of your paper to provide a context for your answer.
This paper must be between 250-300 words on what caught your eye and reflect on what you read. 
Do not add extraneous text that does not address the question – do not add an introduction or conclusion.
Do not copy and paste text from the referenced resource. 

case-study

  • Describe any laws or regulations that may have been violated. 
  • How would you feel as a consumer if your personal information was stolen in this case?
  • How should Target customers be reassured that this won’t happen again?
  • 2 pages

Purpose:

Identify the main information security and privacy protections of the Financial Services Modernization Act of 1999 (Gramm-Leach-Bliley).

sites about the attack

https://www.infoworld.com/article/2609942/target-contractor-says-it-was-victim-of-cyber-attack.html

https://www.bloomberg.com/news/articles/2014-03-13/target-missed-warnings-in-epic-hack-of-credit-card-data

White hat and black hat hackers: who are they

Please complete the highlighted section of the attached paper Introduction, Background, Discussions, and Conclusion )in paragraph format.

Please provide at least 10 references of which 5 has to be peer-reviewed. Do not change the format of the paper.

System Designs

 

A final report which describes and documents your analysis and design efforts of the proposed solution. Your report must include at a minimum

  • A brief description of the problem, functionality of your proposed information system solution, and the business benefits gained by implementing it. 
  • Artifacts such as use case diagrams, activity diagrams, context level data flow diagrams, E-R diagrams, user interfaces etc. used in your information needs/requirements specification and the systems design.
  • List of the hardware and software required to meet the needs of your business problem.
  • A brief discussion on what kind of a project methodology do you envision to use to implement your proposed solution. Include in your discussion the possible project scope and risk issues, you may encounter.

Note: For 1st and 2nd bullet points, you can use your assignment work and add it to the report

Cryptography and block chain

  

Topics to cover : 

cryptography

Encryption/Decryption algorithms

Security

Hashing

Authentication

block chain

Provide  a reflection of at least 800 words (or 2 pages double spaced) of how  the knowledge, skills, or theories of this course have been applied, or  could be applied, in a practical manner to your current work  environment. If you are not currently working, share times when you have  or could observe these theories and knowledge could be applied to an  employment opportunity in your field of study. 

Requirements: ·  Provide a 800 word (or 2 pages double spaced) minimum reflection. · Use  of proper APA formatting and citations. If supporting evidence from  outside resources is used those must be properly cited. · Share a  personal connection that identifies specific knowledge and theories from  this course. · Demonstrate a connection to your current work  environment. If you are not employed, demonstrate a connection to your  desired work environment. · You should not provide an overview of the  assignments assigned in the course. The assignment asks that you reflect  how the knowledge and skills obtained through meeting course objectives  were applied or could be applied in the workplace.

use any outside references and cite them

Object oriented

1.Distinguish the programming approach used in procedural programming 
and object-oriented programming. 
2.Discuss the validity of the following statement: The object-oriented 
programming approach is ideal for simulating real-world problems. 
3.Consider the following scenarios and outline the objects and their 
interactions in terms of messages and arguments:
a.a driver driving a car; 
b.a customer making a cash withdrawal from an automated teller machine 
(ATM); 
c.a customer buying a compact disk player from a vendor; 
d.a traffic policeman directing traffic at a junction; 
e.a lecturer delivering his/her lecture to a class of students; 
f. a tutorial discussion between an instructor and students

ERD model

APA format, in-text citation, references included

2 pages

1. What is your understanding of Entity Integrity Vs Referential Integrity in ERD model. Illustrated with simple examples for ease of understanding of the concepts.

2. Describe various types of keys in ERD model (Primary, Foreign, Superkey etc) with simple examples.

3. Describe 3 entities and illustrate different types of joins using these 3 entities assume you have three entities student, course & enrollment and these tables are related.