GWU Job question-sample analysis technical skill

question-sample

Task: create technical interview questions and answers based on the job question-samples. Make sure to cover all the concepts and tools mentioned on job question-samples. Create questions and answers separately for each job post/ question-sample. (


JOB1 penetration tester

Your key responsibilities

Our cybersecurity professionals possess diverse industry knowledge, along with unique technical expertise and specialized skills. The team stays highly relevant by researching and discovering the newest security vulnerabilities, attending and speaking at top security conferences around the world, and sharing knowledge on a variety of cybersecurity topics with key industry groups. The team frequently provides thought leadership and information exchanges through traditional and less conventional communications channels such as speaking at conferences and publishing white papers.

As part of our Penetration Testing team, you’ll identify potential threats and vulnerabilities to operational environments. Projects here could include penetration testing and simulating physical breaches to identify vulnerabilities.

Our professionals work together in planning, pursuing, delivering and managing engagements to assess, improve, build, and in some cases operate integrated security operations for our clients.

Skills and attributes for success

  • Perform penetration testing which includes internet, intranet, wireless, web application, social engineering and physical penetration testing.
  • Execute red team scenarios to highlight gaps impacting organizations security postures.
  • Ability to work both independently as well as lead a team of technical testers on penetration testing and red team engagements.
  • Provide technical leadership and advise junior team members on attack and penetration test engagements.
  • Identify and exploit security vulnerabilities in a wide array of systems in a variety of situations.
  • Perform in-depth analysis of penetration testing results and create report that describes findings, exploitation procedures, risks and recommendations.
  • Execute penetration testing projects using the established methodology, tools and rules of engagements.
  • Convey complex technical security concepts to technical and non-technical audiences including executives.

To qualify for the role you must have

  • A bachelor’s degree and at least 3 years of related work experience
  • Experience with manual attack and penetration testing
  • Experience with scripting / programming skills (e.g., Python, PowerShell, Java, Perl etc.).
  • Updated and familiarized with the latest exploits and security trends
  • Experience working in a technical team to conduct remote and on-site penetration testing within defined rules of engagement.
  • Familiarity to perform network penetration testing that involves avoiding detection and common alert thresholds on endpoints and security toolinG


Ideally, you’ll also have

  • A bachelor’s degree in Computer Science, Cybersecurity, Information Systems, Information Technology, Engineering, or a related field with at least three years of related work experience or a master’s degree and at least two years of related work experience in penetration testing which includes internet, intranet, web application penetration tests, wireless, social engineering, and red team assessments
  • Knowledge of Windows, Linux, Unix, any other major operating systems
  • Familiarity with the latest exploits, tactics, techniques, and procedures (TTP), vulnerability remediation and security trends in Cloud implementations
  • Deep understanding of TCP/IP network protocols
  • Deep understanding and experience with various Active Directory attack techniques
  • Understanding of network security and popular attacks vectors
  • An understanding of web-based application vulnerabilities (OWASP Top 10)

JOB 2: penetration tester

Perform internal and external pentest against systems to determine vulnerabilities and offer mitigation strategies.

Perform web app pentests
Perform vulnerability risk assessment
Perform physical pentests and social engineering
Perform cyber incident response as needed for programs

Qualifications

– Bachelors’ degree from an accredited college in a related discipline, or equivalent experience/combined education, with 3 to 6 years of professional experience; or 1 to 3 years of professional experience with a Masters’ degree.
– Must have a Secret Clearance.
– 3 years in Pen Testing and Vulnerability Assessment, with specific emphasis on web application and enterprise network environments.
– 5 years of professional experience in incident detection and response, malware analysis, or cyber forensics.

Experience with the majority of the tools listed below:
• Kali Linux
• Metaspoilt
• Burp suite pro
• Cobalt Strike / Empire
• Tenable Nessus
• Debuggers such as Immunity
• Bloodhound
• BladeRF / HakRF
• Hak5 equipment
• Wireshark / tcpdump

Specific experience in at least 1 of the following specialties:
• Mobile application testing
• Cloud infrastructure testing
• RF Testing
• Mainframe systems

Preferred Qualifications:

Understanding of Cyber Kill Chain & Intelligence Defense.

Case Study: Privacy and the Right to Be Forgotten

QUESTION

Henri was a well-known shopkeeper and
café owner in a small town on the outskirts of Paris. He was thrust into
a vortex of controversy in the summer of 2007 when he was falsely
accused of sexual harassment by a disgruntled clerk under his
employment. Henri was completely exonerated, but links to old, damaging
articles in the local newspaper remained accessible through Google. That
newspaper was particularly aggressive in its initial coverage of the
events and did not give Henri the benefit of the doubt, despite his
protestations of innocence. Years later, people still brought up the
incident to him or his family, often with an accusatory tone. Henri
wanted this portion of his past, full of these false allegations and
innuendos, to be expunged. Since most people came across this reporting
through their search of Google.fr, he had asked Google for its help in
suppressing the links to these old stories. Google was not interested in
responding to his repeated requests for its assistance in removing
these links.

There
are two attributes of internet data that cause problems for victims
like Henri: internet data are both permanent and easily accessible. Web
pages are rarely deleted, and sometimes those that are deleted are
nevertheless preserved by caching services like Google Cache and the
Internet Archive. At the same time, search engines like Google and Bing
make all of those data exceptionally easy to access.

It
seemed that people like Henri would never be able to control
incriminating information about their past circulating on the
internet. However, in 2014 the European Union Court of Justice issued a
surprising court order against Google. It demanded that the search
engine company remove hyperlinks that connect search engine users to
content that is “no longer necessary,” or “inadequate, irrelevant, or no
longer relevant.” Exceptions are warranted if there is some
“preponderance of public interest” at stake. Thus, if someone like Henri
asks Google to remove these links to “irrelevant” and outdated
material, the search engine company must oblige this request.

The
European Court’s decision was based on the “right to be forgotten,”
which was cited as a basic aspect of a person’s overall privacy rights.
The legal authority of this right to be forgotten is found in the Data
Protection Directive adopted by the European Parliament in 1995. The
Directive established a comprehensive privacy framework in the European
Union, requiring that data “controllers” respect the privacy rights of
all “data subjects.”

Advocates
of this right claim that individuals should be able to insist on the
removal of old, irrelevant material that infringes on their basic
privacy rights. Skeptics of this new legal development, on the other
hand, expressed their unease about the burdens placed on search engine
companies like Google. There was also concern that the deletion of
these links for private interests could lead to “counterfeit histories.”

What
about the public’s right to know this information that is now filtered
out thanks to an individual’s complaints about irrelevancy?

The
EU’s decision establishes a new but more precarious boundary between
privacy and free speech that clearly favors privacy. The decision is in
keeping with Europe’s tradition of giving equal weight to privacy and
free speech rights. In the United States, however, priority is generally
given to free speech rights, and so it is probably unlikely that
a version of the “right to be forgotten” will be codified in U.S. law.

Google
agreed to comply with the European Court’s ruling but acknowledged the
difficulties with implementation. Within a few months after the ruling,
Google had received over 100,000 requests for the removal of links to
“irrelevant” or “unnecessary information.” The EU’s order, however,
applied only to European domains such as Google.fr or Google.co.uk—not
to Google.com itself. Some privacy rights advocates claim that this
doesn’t go far enough and that the ruling should apply globally in order
to fully protect the data rights of European citizens. There are other
questions about how extensively to apply European privacy rules, such as
whether or not publishers should be allowed to appeal Google’s decision
to remove links to their content.

What
is your opinion on the EU’s decision tu more precarious boundary
between privacy and free speech? What are your thoughts about the United
States leaning towards free speech rather than privacy? What do you
think will be the best way to balance privacy and free speech? EU’s way
or USA’s way? Why?

GWU Job QUESTION analysis technical skill

QUESTION

Task: create technical interview questions and answers based on the job QUESTIONs. Make sure to cover all the concepts and tools mentioned on job QUESTIONs. Create questions and answers separately for each job post/ QUESTION. (


JOB1 penetration tester

Your key responsibilities

Our cybersecurity professionals possess diverse industry knowledge, along with unique technical expertise and specialized skills. The team stays highly relevant by researching and discovering the newest security vulnerabilities, attending and speaking at top security conferences around the world, and sharing knowledge on a variety of cybersecurity topics with key industry groups. The team frequently provides thought leadership and information exchanges through traditional and less conventional communications channels such as speaking at conferences and publishing white papers.

As part of our Penetration Testing team, you’ll identify potential threats and vulnerabilities to operational environments. Projects here could include penetration testing and simulating physical breaches to identify vulnerabilities.

Our professionals work together in planning, pursuing, delivering and managing engagements to assess, improve, build, and in some cases operate integrated security operations for our clients.

Skills and attributes for success

  • Perform penetration testing which includes internet, intranet, wireless, web application, social engineering and physical penetration testing.
  • Execute red team scenarios to highlight gaps impacting organizations security postures.
  • Ability to work both independently as well as lead a team of technical testers on penetration testing and red team engagements.
  • Provide technical leadership and advise junior team members on attack and penetration test engagements.
  • Identify and exploit security vulnerabilities in a wide array of systems in a variety of situations.
  • Perform in-depth analysis of penetration testing results and create report that describes findings, exploitation procedures, risks and recommendations.
  • Execute penetration testing projects using the established methodology, tools and rules of engagements.
  • Convey complex technical security concepts to technical and non-technical audiences including executives.

To qualify for the role you must have

  • A bachelor’s degree and at least 3 years of related work experience
  • Experience with manual attack and penetration testing
  • Experience with scripting / programming skills (e.g., Python, PowerShell, Java, Perl etc.).
  • Updated and familiarized with the latest exploits and security trends
  • Experience working in a technical team to conduct remote and on-site penetration testing within defined rules of engagement.
  • Familiarity to perform network penetration testing that involves avoiding detection and common alert thresholds on endpoints and security toolinG


Ideally, you’ll also have

  • A bachelor’s degree in Computer Science, Cybersecurity, Information Systems, Information Technology, Engineering, or a related field with at least three years of related work experience or a master’s degree and at least two years of related work experience in penetration testing which includes internet, intranet, web application penetration tests, wireless, social engineering, and red team assessments
  • Knowledge of Windows, Linux, Unix, any other major operating systems
  • Familiarity with the latest exploits, tactics, techniques, and procedures (TTP), vulnerability remediation and security trends in Cloud implementations
  • Deep understanding of TCP/IP network protocols
  • Deep understanding and experience with various Active Directory attack techniques
  • Understanding of network security and popular attacks vectors
  • An understanding of web-based application vulnerabilities (OWASP Top 10)

JOB 2: penetration tester

Perform internal and external pentest against systems to determine vulnerabilities and offer mitigation strategies.

Perform web app pentests
Perform vulnerability risk assessment
Perform physical pentests and social engineering
Perform cyber incident response as needed for programs

Qualifications

– Bachelors’ degree from an accredited college in a related discipline, or equivalent experience/combined education, with 3 to 6 years of professional experience; or 1 to 3 years of professional experience with a Masters’ degree.
– Must have a Secret Clearance.
– 3 years in Pen Testing and Vulnerability Assessment, with specific emphasis on web application and enterprise network environments.
– 5 years of professional experience in incident detection and response, malware analysis, or cyber forensics.

Experience with the majority of the tools listed below:
• Kali Linux
• Metaspoilt
• Burp suite pro
• Cobalt Strike / Empire
• Tenable Nessus
• Debuggers such as Immunity
• Bloodhound
• BladeRF / HakRF
• Hak5 equipment
• Wireshark / tcpdump

Specific experience in at least 1 of the following specialties:
• Mobile application testing
• Cloud infrastructure testing
• RF Testing
• Mainframe systems

Preferred Qualifications:

Understanding of Cyber Kill Chain & Intelligence Defense.

Watch video and answers all this questions

QUESTION

Assignment 3 Text mining

This is an individual assignment. Please be sure to watch the recorded “Assignment Lectures” for Assignment 3 (two parts) before you start. Lecture videos are under Content and contain step-by-step demos. You have to submit the Excel Graph activity before you progress to this assignment.

Purpose: Some of the most important data that we have are large quantities of text data. Text data includes books, articles, blog posts, social media posts, emails, reports, journals and diaries, shopping lists, etc. etc. etc. This data is unstructured and can be massive. We have software tools available to help us make sense out of large quantities of text data. When we use software to analyze and try to make sense out of text data, we call this text mining. A practical example of this is chat bots. Chat bots utilize algorithms to try to make sense out of what the user types so it can select an appropriate response. In this assignment we will explore the text mining strategies of looking at word frequency and occurrences. Other methods beyond the scope of this class include part of speech tagging and machine learning. 

Tasks: 

In this assignment you will need files or web links (URLS) with text data. Please watch the How-To video before you start the assignment. You will use two free browser-based text mining tools to analyze your text. 

Task 1. Visualizing Word Frequency. Looking at the frequency of occurrence of each word can give you an overall sense of a document. You will use your first file to create a word cloud to visualize frequency and understand how stop words affect word frequency analysis. We will use WordClouds for this.

Task 2. Taking a deeper look at word frequency and occurrence. For the second text document we will use Voyant Tools to explore other visualization methods as well as look at word correlations. 

Download the attached Word document Template add your screen shot for Task 2 and answer the questions for each task. This website can show you how to take a screenshot on whatever device you are using.

Steps for Task 1:

1. Open the following website: Word Clouds

2. Watch this HowTo video. To create a Word Cloud, you can upload a file or paste text or submit a URL.

3. Personalize your Word Cloud by using different Theme, Shape, Gap, Font or other options. Observe that Stop Words can be included or excluded. They are excluded by default, so you have to create two Word Clouds from the same text: one with and one without the stop words. The website has the common English stop words already.

4. Save your Word Clouds as two images, called “WordCloud with Stop Words” and “WordCloud without Stop Words”. Use the PNG file format. Submit these images to the Assignment 3 drop box.

5. Answer the questions in the Word document for Task 1.

Steps for Task 2: 

1. Open the following website: https://voyant-tools.org/

2. Paste in some URLS or paste the text from your Task 1 text file or from a different text file. 

3. You will see data in five different windows and each window has a tab. 

    a. In the upper left window click ‘Links’

    b. In the upper middle window click ‘TermsBerry’

    c. In the upper right window, leave it on ‘Trends’ (or click it if it’s not there)

    d. In the bottom left window, leave it on ‘Summary’ (or click it if not there)

    e. In the bottom right window, click ‘Correlations’

4. Take a screen shot of the entire screen and add it to your Word document. 

5. Answer the questions in the Word document for Task 2. 

P.S. Other tools that can also be used for this task: 

LINCS Project mirror

Huma-Num mirror

Case Study: The Monitoring of Social Media by Employers

QUESTION

Monitoring and electronic surveillance
of employees in the workplace has a long and complex history. Workers
have always felt uneasy about such intrusions but have had little legal
recourse. Disputes quickly arose when companies began to systematically
monitor email accounts of their workers. Workers objected, but several
key court decisions such as Smyth v. Pillsbury have strongly affirmed a
corporation’s legal right to monitor virtually all of the digital
activities of their employees.

The
debate about employee monitoring has now shifted to social media.
Social media has generally been more popular for personal matters rather
than work-related ones, but it has a growing presence in the workplace.
LinkedIn is a social network for professionals and is a popular
workplace tool that provides an online contact book, curriculum vitae,
and publishing platform for anyone in the labor market. Facebook
is trying to establish a presence in corporations, but some companies
ban Facebook because of its detrimental impact on worker productivity.

However,
monitoring a person’s personal Facebook page has become routine for
some businesses. There is a wealth of information on these pages that
makes a worker’s life and activities highly transparent. Moreover,
consultants predict that online monitoring of social media by employers
will rise over the next decade. Their research also shows that younger
people are more open to sharing their personal data with their
employers, with 36% of younger workers saying they would be happy to do
so.

Social
media offers a tantalizing opportunity for employers to gain some
insight into the personal lives and preferences of their employees. It
is also a way to detect potential problems and weed out unattractive job
applicants. It is fairly common for employers and head hunters to check
out a candidate’s background and qualifications on social media. They
are interested in seeing what a person’s Facebook page reveals about his
or her skills, personality, political leanings, recreational
activities, and so forth. Job candidates who have been indiscreet, who
have posted inappropriate photos, or sent provocative tweets may find
that good job opportunities are passing them by.

Some
human resources (HR) specialists and consultants also contend that this
monitoring of social media should continue even after a worker has been
hired. Advocates of such monitoring point to many examples of employees
posting inappropriate material, such as private or confidential
information. Some hospital employees, for example, have been discovered
discussing the sensitive details of a patient’s medical history on their
Facebook pages in direct violation of HIPAA. Others cite examples of
how employees use Twitter or Facebook to put the company they work for
in a bad light by making harmful and pejorative statements, often full
of hyperbole. According to Nancy Flynn, “Strict monitoring allows
employers to spot potential problems early [and] get the information
offline as quickly as possible.”

These
consultants, therefore, argue that companies should monitor the social
media sites of both their prospective and current employees. There are
many benefits of such monitoring both for employers and for employees,
such as a tradeoff of privacy for the guarantee of greater job security.
Other HR professionals disagree with this policy, even if the trend
among younger workers is to be more obliging. Cary Cooper, distinguished
professor of organizational psychology and health at Lancaster
University, regards this monitoring as “a plain case of trying to find
out what employees are doing and thinking—clearly an intrusion into
their private life. I see no HR justification for it whatsoever.

Questions:

What
is your opinion on employers monitoring your social media behavior? is
this ethical? Why? Why not? What are your thoughts about privacy and
legal implications when employers monitoring your live outside work?
Does the US goverment needs be more active in addressing this issue as
employers move to have more control over the employee lifes for security
purposes? Why? Why not?

ARCGIS ANALYSIS

QUESTION

Acquire and prepare datasets of your choosing for your own chosen location and study. Now, it

is your turn! Your task is to choose a place and bring together a variety of data in ArcGIS Pro,
such that the data are ready for study with each other. Do NOT merely replicate the datasets
that are already provided for your location of interest. You may go through similar types of
workflows as described in the sections above. Your requirements are as follows:
a. Choose a bounded location. You can use an administrative boundary, such as a
neighborhood, city, or county boundary, or you can draw your own boundary, as was done
in the above workflow.
b. Choose your location carefully. If you choose a very large area, your processes with take
longer than they would for smaller areas. Similarly, you can choose anywhere in the world,
but your work will be much more streamlined in you choose a place with good data
availability.
c. Find four sets of data from at least four data sources. Do NOT merely replicate the
datasets that are already provided for your location of interest.
d. Choose at least one raster layer.
e. You can choose your data as if you were going to conduct a study, such that all the data
layers are relevant to your given topic, but you are not required to do so. If you propose a
study, it need be only generally stated, as the study described herein is a broadly described
study of buildings and land cover at the UPC campus.
f. Choose an appropriate projected coordinate system for a spatial analysis in your study area.
g. Ensure that none of your data exceeds your chosen boundary.
12. Write up your results in a short report. The report should have your name, a title, and section
headings. The report should have high-quality language, free of grammatical and spelling errors.
Figures should have captions and be referred to in your text, as done in these instructions. Write
out prose in complete sentences for each section; do not just use bullet points. All language must
be in your own words no quotations, even properly cited ones. Citations to your sources of
information, such as for information about your chosen datasets and projected coordinate
system, should be in the Author-Date format of Chicago Manual Style and properly referenced
at the end of the written report. The report need only be long enough to clearly respond to the
listed topics for each of the following sections:
a. Introduction. Briefly summarize the data, methods, and goal of your data acquisition and
preparation project. (1 pt.)
b. Assessment of exemplar project. Briefly summarize the exemplar project and respond to
the questions posed in step 10 in prose NO bullet points or pasting of the
prompt/questions. (1 pt.)
c. Study area and coordinate system. Describe the geographic location of your data
collection and preparation project. Describe the boundary that defines the study area.
Describe and explain your choice of coordinate system for your study. (1 pt.)
d. Data Acquisition and Preparation. Go through each of your (at least) four chosen data
sets, and provide: (1.5 pts. per data set; 6 points total)
i. A QUESTION of the data, including what aspect of the real world it purports to
represent;

INFO 4230 Section 001 – Records Management Operations (Spring 2024 1

Question

Module 1 Discussion

Discussion

The readings introduce you to records and document management, the differences between documents and records, and the competencies required for certification. Using the Vesper video and one other source, post at least 2 thoughts about what you learned about EDM and ERM. (2 sources required; 1 must be the Vesper video)  with the complete citation using APA style

Peer Post Response:

You are expected to reply to at least ONE response made by other students in class. (Note: No citations to readings are required for responses). The reply posts should be composed of “value-added” information reflecting your opinion and input. 

Discussion Tips:

Provide your original post or response to the discussion question (minimum of 200 words) in the “Message” box of the discussion thread (Note: attachments will not be accepted). The discussion posts must be thoughtful, reflective, and supported by evidence such as assigned readings or other external publications and websites.

Module 2 Discussion

Records and document management are NOT the same things, and it’s important that you can articulate the differences. For this post, compare and contrast the major differences between records management and document management.

Discussion Tips:

Provide your original post or response to the discussion question (minimum of 200 words) in the “Message” box of the discussion thread (Note: attachments will not be accepted). The discussion posts must be thoughtful, reflective, and supported by evidence such as assigned readings or other external publications and websites.

The initial post should address the question and include at least TWO references or citations from the readings or external material. If a link exists, provide a citation and link; otherwise, provide the complete citation using APA style.

Module 3 Discussion

Discussion 

you may choose one Topic.

  • Topic 1. Discuss the relationship between records management and risk management. Your discussion should include a brief Question of what both records management is/does and what risk management is/does. Then, explain/illustrate how records management relates to risk management. Use at least 2 sources

Topic 2. List at least 4 major benefits of deploying an electronic document and records management system AND explain why they are important/beneficial. You may respond to this prompt in list or paragraph format – just make sure what you say is comprehensive and makes sense. You also may want to refer back to the readings in weeks 1& 2. Be sure to use in-text citations to reference the course materials you use to create your post. Use at least 3 sources/ citations  in this post.

Peer Post Response:

You are expected to reply to at least one response made by other students in class. (Note: No citations to readings are required for responses). The reply posts should be composed of “value-added” information reflecting your opinion and input. 

Discussion Tips:

Provide your original post or response to the discussion question (minimum of 250 words) in the “Message” box of the discussion thread (Note: attachments will not be accepted). The discussion posts must be thoughtful, reflective, and supported by evidence such as assigned readings or other external publications and websites.

Southern New Hampshire University IT 202 Project One Milestone

QUESTION

Overview

For the purposes of this assignment, imagine that you are a systems architect at a medium-sized publishing company with 130 employees. The company primarily publishes books, both in print and online. It also produces other kinds of content, such as audiobooks, interactive reading material, and magazines. Your leadership has decided that it is time to either upgrade the current OS or adopt a new one (e.g., Windows, Linux, macOS).

As the systems architect, you have the responsibility to determine which OS the company should implement for each department. There are many aspects to consider when making this decision, including what existing applications are used by employees on a frequent basis, cost, functionality provided, performance, vendor support, and so on. To determine which OS should be implemented, you need to complete a site survey first. Later, the site survey can be used to help you make a decision as to which operating systems to implement based on what is currently used in the department. For this activity, you will conduct a site survey. This is also a step that you will need to take when you submit Project One in Module Four. The feedback that you receive after submitting this activity should be implemented as you craft your Project One submission.

Prompt

Complete a Site Survey: A site survey compares the three different operating systems that the company is planning to implement. To complete this task, use the Project One Site Survey Template linked in the Supporting Materials area. Specifically, you must address the following rubric criteria:

Operating Systems: Acknowledge what OSes are already used in your site survey. The type of OS already used and how many employees are using it can influence your decision making.

Server: Determine whether the desktops are on a hardware or cloud-based server.

Although not required in this portion of the project, you may want to think about whether or not the server should be changed. This change could be recommended in your proposal.

  • Standard Hardware for Operating System Types: Determine the minimum required hardware. This could include desktop and server.

Network Connection: Determine whether the network is wired or wireless. 

  • You will want to think about whether or not the network connection should be changed. This change could be recommended in your proposal.

Applications: Identify what software applications need to be supported by the OS. Your survey of what applications desktop users use most frequently will influence your decision making, as some applications are not supported by certain OSes.

Supporting Materials

  • The following resources support your work on the project:
  • Reading: Organizational Needs
    This document will provide you with context on the company’s needs and industry best practices. As you review this document, you will learn about what the company currently uses when it comes to hardware and software. Learning about the organization’s needs can help you make an informed decision on which OS to implement.

Southern New Hampshire University DAD 220 Module Two Lab

Question

Overview

To complete this assignment, you’ll work in the Codio virtual lab environment to create tables similar to the ones that you saw in the previous activity.

Directions

To begin, go to your Codio virtual lab environment and start a new terminal session. Once there, perform the steps below to complete this activity. Manually enter any commands you are asked to write. To validate that these commands work, capture screenshots of the results and place them in a document for submission. Each screenshot should be around one quarter of a page.

  1. Connect to the database you created and named in Module One (for example, Jetson). Type after the prompt mysql> 
    1. use (table you named); 
      1. Example: mysql> use Jetson;
  2. Create the Employee table using the SQL statement shown here. Press Return after each line.
    CREATE TABLE Employee (Employee_ID SMALLINT,First_Name VARCHAR(40),Last_Name VARCHAR(60),Department_ID SMALLINT,Classification VARCHAR(10),STATUS VARCHAR(10),Salary DECIMAL(7,2));
  3. Create the Branches table. Fill in the missing characters or punctuation in the incomplete statement shown below to complete this action. 
    1. CREATE Branches (Department_ID SMALLINT,Department_Name )
  4. After creating the tables, use the correct commands to describe them . You’ll only be given commands to describe one of the tables and must complete the same action for the second one on your own. Validate your work with a screenshot. 
    1. describe Employee;
    2. Write the correct command to describe the Branches table
  5. Insert the following records into the Employee table (with support) . Each line going from left to right is a record. Each line going from top to bottom is a column. Validate your work with a screenshot. 
    1. INSERT INTO Employee VALUES (100, ‘John’, ‘Smith’, 1, ‘Exempt’, ‘Full-Time’, 90000),
      (101,’Mary’,’Jones’,2,’Non-Exempt’,’Part-Time’,35000),
      (102,’Mary’,’Williams’,3,’Exempt’,’Full-Time’,80000);
    2. Type the command select* from Employee; and take a screenshot of it to validate this step.
  6. Insert the following records into the Employee table for Gwen Johnson and Michael Jones by writing the correct SQL commands on your own (without support). 
    1. Gwen Johnson: Employee ID = 103, DEPARTMENT_ID = 4, Classification = NULL, Status = Full-Time, SALARY = 40000
    2. Michael Jones: Employee ID = 104, DEPARTMENT_ID = 4, Classification = Non-Exempt, Status = Full-Time, SALARY = 90000
    3. Insert your name into the table to verify and prove your work.
      1. (Your First and Last Name, or a nickname): Employee ID = 105, DEPARTMENT_ID = 1, Classification = Non-Exempt, Statues = Full-time, SALARY = (Choose a value between 50000 and 99000)
    4. Type the command select* from Employee; and take a screenshot of it to validate this step.
    5. Insert records for a musician, athlete, or other famous character of your choice. Make sure to enter information for all of the fields listed in this table. The Department_ID must be a number between 1 and 4.
    6. Write the correct command to prove that you’ve successfully completed this step, and validate it with a screenshot.
  7. Select the fields of last name, first name, and department id from the table. Validate your work with a screenshot. 
    1. Select First_Name, Last_Name, Employee_ID, Department_ID from Employee;

Program 3 C++

QUESTION

The Traveling Salesman Problem
Given a collection of cities, along with pairwise distances between the cities, what is the
shortest route that visits each city exactly once and returns the the starting city? This
question is commonly referred to as the traveling salesman problem (TSP). The traveling
salesman problem can be reformulated as finding a Hamiltonian cycle of least cost in a
weighted graph — a Hamiltonian cycle is a cycle that includes every vertex in the graph.
This assignment will focus on a brute-force solution to the traveling salesman problem.
Program Specifications
You will write a C++ program to implement a brute-force, permutation-based solution for
the traveling salesman problem. Your program will take in a single command line input
specifying a file to read. The input file will contain one or more lines, each of which specifies
a directed edge the form “src dst wt” where src and dst are non-negative integers indicating
the source and destination vertices of the edge, and wt is the weight of the edge. I will
provide you with sample input files for testing, but it is your responsibility make sure that
your program behaves correctly on any valid input file. Your program will output the cost
of the minimum Hamiltonian cycle. See the end of this handout for example output.
You will need to implement your own adjacency matrix or adjacency list structure to store the
graph. Take care not to over engineer your data structure — you do not need to write a full
class to implement your graph data structure. I suggest that you rely on standard template
library containers for your implementation (see https://cplusplus.com/reference/stl/). For
instance
• std::vector > adj matrix;
• std::vector > adj list;
Regardless of the data structure you choose, do not hard-code limits on your data structure
size. Also, please note that variable-length arrays (VLAs) are not part of the C++ standard
and should not be used. For your solution, you make use the std::next permutation
function.
Submission and Grading
You must use skeleton3.cpp (see iLearn) as a starting point for your program, and complete
the TSP function; feel free to create any additional helper functions or include any additional
standard libraries that you need, but do not modify any other existing functions. Your
source code should be contained in a single file and should be named after your TTU email
address excluding the “@tntech.edu” (e.g., jagraves21.cpp). All submissions will be made
on iLearn — please do not zip or compress your files. Make sure to follow best coding
practices (proper naming conventions, useful comments, etc.). Your program should compile
without errors or warnings. Programs will be compiled using the following command:
g++ -Wall -pedantic -std=c++11 [source file]
Sample Output
The following lines contain sample input and expected output to your programs. Please note
that these examples are not exhaustive, and you should verify your programs with additional
test cases.
$ ./a.out graph1.txt
18
$ ./a.out graph2.txt
14
$ ./a.out graph3.txt
No Hamiltonian cycle exists.