Practical connection

  

My Job Role: UI Developer (Front end Developer) 

Skillset:  HTML, CSS, Javascript, Backbone JS, Vue JS, Angular JS, Angular versions from 1 to 8, React,  Redux, Jqurey, Bootstrap, Json, XML, YML, DS5, DS6. 

Please help me how these attached 15 subjects from my PhD in IT each are how they are helpful in my work environment as a UI developer also What I Learned from this course.

Information Technology (IT) Industry Analysis 2-3 page Paper

Information Technology (IT) Industry Analysis

The IT industry is always evolving and IT plays a very important role in business. Several of the technology companies that have dominated IT are Fortune 500 and even Fortune Global 500 organizations bringing in billions of dollars in revenue. Companies like IBM and HP started as hardware vendors, but now have ventured into software, and other areas of IT. Their contributions have shaped the IT industry. 

For this assignment, you will choose one of the IT industry leaders discussed in the Week One Lecture and create an analysis of that company. Include the following elements in your analysis supporting your statements using the required sources for this assignment. **I CHOSE MICROSOFT**

Explain how the organization started in the IT industry.

Explain the current state of the organization.

Evaluate the impact the technology organization you chose has had on business and/or business operations.

Analyze the role of IT in the chosen business and describe the innovations the organization has launched. Explain the reasons the innovations were either successes or failures for the company.

The IT Industry Analysis paper

Must be two to three double-spaced pages (600-900 words) in length (not including title and references pages) and formatted according to APA style as outlined in the Ashford Writing Center (Links to an external site.).

Must include a separate title page with the following:

Title of paper

Student’s name

Course name and number

Instructor’s name

Date submitted

Must use at least one credible source in addition to the course text.

Must document all sources in APA style.

Must include a separate references page that is formatted according to APA style 

Chat application demo (using Angular and spring)

I want to demo chat web application with technology Angular 8 or above (frontend) and Spring (backend) with mysql databse

1. user can signup and login and chat with each other (one to one chat for example facebook)

2. web page design is not needed.

3. all chat should be store in database. if user have some chat and when it logout then after login all previous chat should be present in chat history.

4. all configuration for spring should be in xml based whatever required.

5. it should be work in windows 10.

Final Research Paper – ERM

Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial. This is why an ERM is necessary to the fulfillment of any organization’s goals and objectives.

In your final research project for the course, your task is to write a 7-10 page paper discussing the following concepts:

  • Introduction
  • Why should an organization Implement an ERM application?
  • What are some key challenges and solutions to Implementing an ERM?
  • What is Important for an effective ERM?
  • Discuss at least one real organization that has been effective with implementing an ERM framework or /application.
  • Conclusion, final thoughts for future research
  • Recommendation

Your paper should meet the following requirements:

  • Be approximately seven to ten pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course, the course textbook, and at least ten scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Project

Database Management System

 Johnson’s Hospital System Case Study

Case Study 1

Hospital Management System

Aim: JHChospitalisamultispecialtyhospitalthatincludesanumberofdepartments,rooms,doctors, nurses , compounders , and other staff working in the hospital . Patients having different kinds of ailments come to the hospital and get checkup done from the concerned doctors . If required they are admitted in the hospital and discharged after treatment.

The aim of this case study is to design and develop a database for the hospital to maintain the records of various departments , rooms , and doctors in the hospital . It also maintains records of the regular patients , patients admitted in the hospital , the check up of patients done by the doctors , the patients that have been operated, and patients discharged from the hospital.

Description: In hospital, there are many departments like Orthopedic, Pathology, Emergency, Dental, Gynecology ,Anesthetics ,I.C.U.,Blood Bank,Operation Theater ,Laboratory ,M.R.I.,Neurology , Cardiology, Cancer Department, Corpse, etc. There is an OPD where patients come and get a card (that is ,entrycardofthepatient)forcheckupfromtheconcerneddoctor.Aftermakingentryinthecard,they go to the concerned doctor ’s room and the doctor checks up their ailments . According to the ailments , the doctor either prescribes medicine or admits the patient in the concerned department . The patient may choose either private or general room according to his/her need. But before getting admission in thehospital,thepatienthastofulfillcertainformalitiesofthehospitallikeroomcharges,etc.Afterthe treatment is completed , the doctor discharges the patient . Before discharging from the hospital , the patient again has to complete certain formalities of the hospital like balance charges , test charges , operation charges (if any), blood charges, doctors’ charges, etc.

Next we talk about the doctors of the hospital. There are two types of the doctors in the hospital, namely, regular doctors and call on doctors . Regular doctors are those doctors who come to the hospital daily . Calls on doctors are those doctors who are called by the hospital if the concerned doctor is not available.

Access control discussion 9

What technology can a business use to assist in the access control.

It must be at least 450 words and have references.

No plagiarism and no grammar mistakes and need APA format.

properly cite the references.

FAVORITE SCRIPTING LANGUAGE

Comment your favorite scripting language (VBScript, Node.Js, Python or SQL script). What do you think is most useful for administration and security? How can you use it? Minimum 150 words. APA format. 1 reference. No plagiarism. 100% original work. NEED THE WORK ASAP!!

Research project

 

Your Research Project is due this week. It must consist of:

1. 5 source annotated bibliography

2. slide presentation with 12 or more slides

3. Summary or Abstract containing at least 750 words.

The topic must be appropriate for graduate level. Find a topic that we covered in the course and dig deeper or find something that will help you in your work or in a subject area of interest related to the course topic. Use the Research Databases available from the Danforth Library not Google.

Intro to programming responses

Provide (2) 200 words response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

An if-then script simply takes an argument from a variable and checks to see if it is true. If it is true, then it executes the parameter. If it is false, then it executes a different parameter which can be another defined variable or an exit condition. Loops repeats the processed if-then program as many times as indicated within the set parameters until an exit condition is reached. The loop needs an exit condition that can be met or it can become an endless loop, or infinite loop. An infinite loop can accidentally use up 100% of your CPU usage that will lock up your device or cause it to crash. Ways to avoid an endless loop is to always make sure to set an exit condition that can be met, or makes sense to the language you are programming in. There may be a “continue” statement with another variable that could be out of place preventing the code to move on and continuously loop. Another way to prevent infinite loops is to set timeout conditions in your code. Also, if you are working with complex loops that have the potential to be endless, you may consider testing your code first through a walk-through program, such as the Python Tutor we will be using in this class and others such as Google Chrome Dev Tools. This will allow you to step through and visualize what your program is doing.

Endless loops can create a denial of service (DOS). You may accidentally DOS yourself! In fact, you can set up a simple script that throws specific types of packets to a single router or switch interface (IP and port range) over and over again causing a denial of service effect. You can also overwhelm firewalls by doing this, especially if they are doing deep packet inspections. There are several quirky vulnerabilities out there listed in the MITRE CVE that has exploits like this already written and tested. Building a virtual range to test these out is a lot of fun and you learn networking quickly.

RESPONSE 2:

This week we learned about variables along with creating loops and if-then scripts. Our textbook, Microsoft WSH and VBScript Programming for the Absolute Beginner, 4th Ed. by Jerry L. Ford, defines a variable as “an individual piece of data such as a name, number, or date that is stored in memory” (2014, p. 85). Variables are the numbers, dates or names in which you are looking for or defining in your scripts. For example, in this week’s practice scripts, fnum, snum, and total were the variables that were being defined. Once we defined are variables, we were able to look more into loops and if-then scripts.

Loops are “collection of statements repeatedly executed to facilitate the processing of large amounts of data” (Ford, 2014, p. 144). Loops could be used to repeat a certain function until the end condition is met. For example, in this week’s practice loop script, we set a up a loop where the program would produce numbers between the first variable, fnum, to the second variable, snum. Once the computer reached snum, the condition was met and the loop ended. The if-then script we learned included a loop, however, the loop would only run if the second number we typed was greater than the first number we chose. If the first number was larger than the second number, the loop would not run. In order to run the loop, the condition must be met prior to the program running the script. The whole purpose of the if-then script is to determine if the argument depicted in the script is accurate based off the variables provided. If the variables make the script accurate then it runs; if not, then it doesn’t run the script.

When creating loops, individuals might incorrectly type an “exit function” or create an improper condition to stop the loop. If this happens, an endless loop could be created. Based off initial research, endless loops are not necessarily dangerous, but rather annoying. Most people can exit an endless loop by doing a hard-exit of the program, or even shutting down their computer. However, some individuals might create an endless loop in order to create a DoS (Denial of Service) attack. DoS attacks are meant to prevent a person from using a certain program, and if someone was stuck in an endless loop, they would not be able to use that program until they manage to exit or stop the loop.