Chat application demo (using Angular and spring)

I want to demo chat web application with technology Angular 8 or above (frontend) and Spring (backend) with mysql databse

1. user can signup and login and chat with each other (one to one chat for example facebook)

2. web page design is not needed.

3. all chat should be store in database. if user have some chat and when it logout then after login all previous chat should be present in chat history.

4. all configuration for spring should be in xml based whatever required.

5. it should be work in windows 10.

Research paper and discussion

Part 1: Research paper (4-6 pages)

 please write a research paper that answers the following questions: 

  • What are mobile forensics and do you believe that they are different from computer forensics?
  • What is the percentage of attacks on networks that come from mobile devices?
  • What are challenges to mobile forensics?
  • What are some mobile forensic tools?
  • Should the analysis be different on iOS vs Android?

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Part 2: Discussion (500 words) and 2 responses

 expand on investigation and of digital forensic analysis and investigations. Organizations, especially those in the public, health and educational areas are bound by legal and statutory requirements to protect data and private information, therefore digital forensics analysis will be very beneficial when security breaches do occur. Using this weeks readings and your own research, discuss digital forensics and how it could be used in a risk management program.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

Part 3: Practical connection assignment (500 words)

 Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment.

Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment.  
  • You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Part 4 : Discussion (500 words) and 2 responses

discuss the characteristics of the three predominate anomaly detection methodologies.: Model-Based vs Model-free, Label vs Score, and Global vs. Local Perspective.  

Pratical connection – Data mining

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and been put into practice within their own career.

Assignment: Provide a reflection of at least 500 words of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have observed these theories and knowledge being applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 

Share a personal connection that identifies specific knowledge and theories from this course. 

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT provide an overview of the assignments given in the course. Rather, reflect and write about how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Topic:

1)  Can you please  explain about  Data mining topic 

 2 ) i work in IT industry i work for VMware virtualization  , Networking and Storage technologies and AwS ,Azure cloud technologies   how can you apply  in  Data Mining industry  

Research Paper – Distribution As A Determinant Of Business Success

Please submit a 5-research paper (plus cover page and reference page) related to the topic you researched a couple of weeks ago for the annotated bibliography. 
Your research paper should be in APA format. 
Your research paper should include: 
The paper should include the following:
Title page in APA formatIntroduction with thesis statement (one paragraph)Background Section (at least two paragraphs)Literature Review (at least three paragraphs)Personal Reflection (at least one paragraph)Conclusion (one paragraph)References in APA format (at least six sources)
USE THE OUTLINE AND ANOTATED BIBLIOGRAPHY FOR TOPIC AND CONTEXT REFERENCE, I’LL SUBMIT THE RESEARCH PAPER WITH THESE TWO FILLES ATTACHED SO EVERYTHING NEEDS TO FLOW TOGETHER

How these courses are useful for work

  1. Operational Excellence2. Information Governance3. Data Science and Big Data Analytics4. InfoTech Import in Strat Plan5. Emerging Threats and Countermeasures6. Cloud Computing7.InfoTech in a Global Economy  I want to some points for these will useful for my job duties1. Azure Cloud storage2. Dynamics CRM(Customer Relationship Management)3. Developer

  • JavaScript
  • Angular JS
  • JQuery
  • HTML/ HTML5, CSS
  • SharePoint
  • SSIS & SSRS

Course Research Project part 2

  

Part II – Investigation and Review

In part II, you will closely study the materials found on the topic and conduct research to fully understand the relevant details. Based on your research and investigation, you are going to describe your understandings in the review. For example, if you chose “An investigation on Facebook privacy issues” as your topic, you should describe its privacy policies in detail and present different ways to enforce privacy in Facebook. As a result, at least 800 words are expected for this part. Biblical worldview should be integrated in an appropriate manner and supported by Scripture. If you have used additional references in this part, be sure to include them at the end with the references from Part I. The second submission of the course project is due by 11:59 p.m. (ET) on Sunday of module/week 6.

The Meat Lady Dilemma

 Mrs Parker owns and operates a meat shop that processes and packages parcels of minced meat that is being sold to schools in the US. Her scales are all calibrated to perform measurement in pounds, however when the parcels are packaged, they need to be labelled in ounces. Mrs Parker has established that 1 pound is equivalent to 16 ounces. In each production cycle, 250 packs of meat are processed and the weight in pounds varies for each package. Mrs Parker is also interested in knowing the total costs, the total revenue and the total profit of each production run, given that the costs to produce and package an ounce of meat is US $0.25 and that the selling price of an ounce of meat is US $0.55. Because you are a budding Software Engineer, she has sought your assistance in creating a software solution that can be used within the business establishment. 

Required: A. Specifically identify the type of control structure which is needed to process the meat in each production run and provide a reason for your choice (4 marks) 

B. Your solution needs to represent the meat packages which are to be processed, how would you represent this appropriately in your program and what has guided your choice?  (4 marks) 

C. Construct a C# program that will solve Mrs Parker’s dilemma by making use of the choices made above. 

i. Implementation of the control structure to process the meat (2 marks) 

ii. Implementation of the meat packages to be processed (2 marks) 

iii. Calculation of costs, revenues, and profits (6 marks) 

iv. Appropriate program outputs displayed to the user 

Phd Interview Questions

WRITTEN INTERVIEW QUESTIONS

DOCTORAL CANDIDATES SHOULD PROVIDE AN AUTHENTIC PERSONAL STATEMENT TO EACH OF THE FIVE FOLLOWING QUESTIONS/PROMPTS REFLECTING ON THEIR INTERESTS. IN THE EVENT THAT ANY OUTSIDE RESOURCES ARE USED, RESOURCES SHOULD BE CITED IN APA FORMAT. SUBMISSIONS SHOULD BE A MAXIMUM OF 500 WORDS OR 125 WORDS PER QUESTION/PROMPT. IT IS BEST TO RESPOND TO EACH PROMPT/QUESTION INDIVIDUALLY FOR CLARITY OF THE REVIEWER. WRITING SAMPLES SHOULD BE SUBMITTED IN MICROSOFT WORD FORMAT AND INCLUDE THE CANDIDATE’S NAME.

1. PROVIDE A BRIEF INTRODUCTION FOCUSING ON YOUR EDUCATION, CAREER, AND DECISION TO APPLY TO UNIVERSITY OF THE CUMBERLANDS.

2. IN RELATION TO YOUR DOCTORAL PROGRAM APPLICATION, WHAT AREA OF RECENT RESEARCH IN THE FIELD WOULD YOU WANT TO STUDY, AND WHY?

3. HOW DOES YOUR CURRENT VOCATION RELATE TO YOUR APPLICATION TO THE DOCTORAL PROGRAM?

4. HOW WILL YOUR EXPERIENCES AND PERSONAL SKILLS HELP YOU TO BE SUCCESSFUL IN YOUR PROGRAM?

5. WHAT LONG-TERM GOALS DO YOU HAVE FOR APPLYING YOUR LEARNING FROM YOUR DOCTORAL PROGRAM?

Discussion

 In 500 words or more, discuss the risk and costs of compromised data integrity breaches. Focus on integrity, not confidentiality. Look at military, education, science, medicine, finance, utilities, municipalities, etc. 

Please find the sources from  https://libguides.nec.edu/az.php