Originality is also guaranteed in our buy the online essay service by the provision of a detailed reference page which indicates the precise details used in the essay.
One of the major reasons why we started this writing services company is to offer Affordable Writing Service to all students in need of improving their academic grades.
Friday, March 29, 2019
Online essay writers
Buy the online essay writers will help you choose a topic that is relevant to what you want to write about and they will organize the paper in a well manner .
Online essay service
To avoid disappointments buy the online essay service from our company that will guarantee you papers that are custom written according to your instructions.
buy the online essay
Students can buy the online essay from our firm as it offers quality essays. The company has hired professional essay writers in order to offer quality essays.
Online essay
Buy the online essay company has helped many students achieve academic excellence by writing them essays which are compete and original to earn the highest grades.
Thursday, March 28, 2019
Dangers of smoking
The
Food and Drugs Administration (FDA) recommends that cigarette manufacturers
include warnings that caution consumers of the dangers of smoking. The
provision of warnings strives to ensure that the consumer is aware of the
dangers of smoking prior to purchasing and using the product. In the claim
selected, the cigarette manufacturers warn nonsmokers that they are at risk of
acquiring lung diseases because of inhaling second-hand smoke. The claim
demonstrates that nonsmokers are at risk of smoking-related diseases just like
the smokers. The claim illustrates that it is possible for nonsmokers to be
affected by tobacco smoke as it is puffed off by nonsmokers.
Specifically, the
claim indicates that nonsmokers are at risk of lung diseases. Nonsmokers who
inhale the tobacco smoke are likely to acquire lung diseases such as chronic
bronchitis, emphysema and lung cancer. Indirectly, the claim acts as a warning
to nonsmokers. The claim warns non-smokers to avoid areas where tobacco
inhalation is high as they would experience significant health risks. The claim
further indicates that the lung diseases would be fatal.
Supporting Articles
According
to Fanny & David (2011), air pollution increases the risk of lung diseases
such as chronic obstructive pulmonary disease. The authors conduct a
comprehensive analysis of review where they highlight the different research
studies that associate air pollution with the development of COPD. The authors
also conduct a comprehensive analysis of indoor and outdoor air pollution. The
authors indicate that exposure to outdoor pollution is inevitable since human
beings are generally outdoor persons. However, the exposure to indoor
pollutants includes exposure to second-hand smoking. Specifically, the authors
address the exposure to environmental tobacco smoke exposure. The authors
acknowledge that environmental tobacco smoke exposure is a leading risk factor
for lung cancer, chronic symptoms and low pulmonary functions. The authors
review various large scale studies that demonstrate a significant association
between outdoor air pollution and COPD admissions.
Brown
(2000) also conducts a review of epidemiological studies that attempt to show a
relation between lung cancer and non-smokers. Specifically, the authors review
epidemiological studies that demonstrate the high occurrence of lung cancer
among women living with husbands who are cigarette smokers. The study demonstrates
that women married to husbands who are smokers experience a significant risk of
lung diseases due to inhalations of environmental tobacco exposure. The authors
also analyze epidemiological studies that demonstrate that a high exposure to
tobacco smokers (at the workplace) can expose nonsmokers to the threat of lung
diseases.
Thomas,
et al. (2013) conducts a descriptive scientific study to establish the
existence of third-hand tobacco smoke and its relation to the occurrence of
lung cancer to nonsmokers. The authors describe third-hand tobacco smoke as
tobacco-specific substances that remain on surfaces and dusty areas after
people have smoked. The authors gathered random participants who lived in homes
where a family member smoked tobacco. The authors also included participants
who were active smokers; a fact that the author verified using a urine cotinine
test strip. The author used descriptive statistics to calculate the
smoking-related variable. The mean and median were also used to calculate the
existence of the tobacco carcinogen (NNK).
The authors analyzed the surfaces of homes of
smokers and nonsmokers and discovered the presence of a powerful
tobacco-specific lung carcinogen (NNK) that exposes non-smokers to the risk of
lung cancer. The authors put in the spotlight smokers and how their smoking
tendencies can affect non-smokers around them. The study also calls for
potential home buyers to determine whether a home has NNK or not so as to
minimize the risk of lung diseases and other tobacco related complications.
The
health claim on the association of secondhand tobacco inhalation to fatal lung
diseases is true. Scientific studies have proven the existence of tobacco
particles that nonsmokers inhale when in the presence of smokers. The claim can
inform a public-health intervention to minimize the exposure of nonsmokers to
secondhand smoking. Legislators can pass a bill that requires public areas such
as restaurants and offices to demarcate smoking zones for smokers. The
demarcation of smoking zones ensures that nonsmokers do not inhale the tobacco.
Additionally, states can begin statewide campaigns against tobacco smoking, in
enclosed areas. Smoking in enclosed areas results to the tobacco sediments
settling on surfaces, as well as the pollution of the air. Tobacco smoking
indoors increases the risk of secondhand smoking compared to outdoor smoking.
The campaign will focus on encouraging smokers to puff their cigarettes
outdoors. The campaign will be supported by adequate information on the risk of
indoor smoking. The campaign will focus on smokers who smoke within their homes
thus expose nonsmokers including their children to the negative outcomes of
secondhand smoke.
References
Brown,
K. G. (2000). Lung cancer and environmental tobacco smoke. Environmental Health
Perspectives Supplements, 107885.
Fanny,
W. & David, S. (2011). Air pollution and chronic obstructive pulmonary
disease. Journal of the Asian Pacific Society of Respiratory. Vol. 17:395-401.
Thomas,
J. L., Hecht, S. S., Luo, X., Ming, X., Ahluwalia, J. S., & Carmella, S. G.
(2014). Third Hand Tobacco Smoke: A Tobacco-Specific Lung Carcinogen on
Surfaces in Smokers’ Homes. Nicotine & Tobacco Research, 16(1), 26-32.
Carolyn Morgan is the author of this paper. A senior editor at MeldaResearch.Com in write my nursing research paper services. If you need a similar paper you can place your order from essay already written services.
Professional Roles and Values
In
nursing, regulatory agencies such as the Board of Nursing (BRN) and
professionals nursing organizations differ in several ways. Regulatory agencies
standardize the function of nurses in their different healthcare settings.
Regulatory agencies ascertain that nurses adhere to the regulations and ethical
codes of nursing practice. The board thus gives licenses that certify nurses to
provide nursing services. Nurses join a professional nursing organization so as
to remain updated on any changes that take place in the nursing profession.
Personally, I am a member of the American Nurses Association (ANA).
As a member
of the Association, I am able to network with other nurses thus acquire
knowledge based on their experience of handling different issues (American
Nursing Association, 2014). Overall, regulatory agencies ensure that I execute
nursing activities within the standards of safe nursing while professionals
nursing associations emphasize on professionals growth of the nurse.
The
nurse code of ethics influences nursing practice in various ways. The code of
ethics contains several provisions that give nurses directions, in relation to
their daily nursing engagement. Provision three has a significant influence on
my nursing practice. The provision advocates for the protection of patient’s
safety, health and rights during the delivery of nursing services. The
provision pushes me to put the interests of the patient first. I ensure that
patients receive medication quickly so as to minimize the pain and discomfort
that they could be experiencing. I also strive to ensure that patients receive
the right medication and the right dosage. I also ensure that I keep the
patient and his family informed on any medication or any development in the
patient’s health. I believe that the patient must be involved in the treatment
process so that he can also participate in decision-making, in relation to his
care and wellbeing. I am also influenced by provision eight that emphasizes on
the collaboration in the delivery of healthcare services. I believe in
consulting and seeking medical advice from my peers especially when making
life-changing decisions about a patient (Debnath, 2009). The provision has
enabled me to embrace the teamwork spirit that is essential to the provision of
critical healthcare services.
Nurses
working in a multidisciplinary team must possess critical professional traits
that would enhance their performance in the team. Personally, I will introduce the
professional trait of teamwork. Healthcare professionals specialize in their
specific fields and thus may find it difficult to ignore their proficiencies
and work as a team. I intend to use my interpersonal skills and teamwork spirit
to motivate members of the multidisciplinary team to abandon their differences
and work as a unit (Debnath, 2009). I will also emphasize on confidentiality
and privacy especially when handling patient information. The skill of
confidentiality is critical as it enables the nurse to build patient’s trust.
Patient confide in healthcare professionals who they are certain will keep
their medical information confidential. I will also introduce the professional
skill of responsibility. I will ensure that the multidisciplinary team understands
that they are responsible for the health and wellbeing of patients.
Theories
are interrelated concepts that strive to explain an observable fact.
Personally, I have been influenced by Abdella’s patient-centered nursing. The
theory emphasizes on taking a patient-centered approach to the provision of
patient care. The theory was proposed by Abdella Henderson, who argued that the
provision of healthcare should focus attaining the health requirements of the
patient. Additionally, Abdella recommends looking into the physical,
psychological, spiritual and emotional needs of the patient. Abdella calls
nurses to strive to understand the patient at a personal level and hence
acquire their understanding of his health problems. Additionally, nurses who understand
their patients can work with the patient in developing a healthcare plan that
the patient can execute (Alligood, 2013). Abdella’s patient-centered theory
influences my operations as nurses as I strive to ensure the patient undergoes
physical, emotional and psychological healing. I believe a patient can make a
full recovery when he is emotionally and psychologically fit. I strive to
ascertain that patients receive counseling services in case I notice they are
emotionally disturbed. It is through counseling that patients receive guidance
on the different issues affecting them.
Mary
Eliza Mahoney made significant contributions to the nursing profession. Eliza
was the first African-American to pass as a professional registered nurse.
Eliza emphasized on the provision of exceptional care to patients so as to
enhance patient satisfaction. Eliza is recognized for her hard work and
dedication that enabled her completes her studies despite the odds being
against her. Eliza played a significant role in changing the nursing
environment through the development an association that later changed its name
to the American nurses association. Eliza looked out for the interest of nurses
and used the association to advocate for improved education in nursing, as well
as the enrollment of additional African Americans in nursing. Eliza’s
contribution plays a significant role in modern day nursing. Today, the
American nursing association is the voice of over 3 million nurses. The
association advances their profession by promoting nurses rights as well as
setting the standards for effective nursing practice.
References
Alligood,
M. (2013). Nursing theorists and their work.
Elsevier health sciences.
American
Nursing Association, (2014). About ANA.
Debnath, R. (2009).
Professional skills in nursing. SAGE publishers.
Carolyn Morgan is the author of this paper. A senior editor at MeldaResearch.Com in write my nursing research paper services. If you need a similar paper you can place your order from essay already written services.
Risk Management related to Information Security
Introduction:
Risk
management is the process that identifies, assesses, and prioritizes and addresses risks
to minimize the chances of their occurrence so that an organization
can achieve its objectives. The risks can come
in different ways such as accidents, deliberate attacks, natural causes and
others incidences that might hinder
an organization from achieving
its set goals (Christopher,
2002).
Risk sources in an organization can be located in the infrastructure and other tangible
variables, human factor
variables, and decision-making. The
strategies for managing these threats
include avoiding the risk, transferring
the risk to another party or
reducing the effects of the risk.
One
of the risks a company might encounter is the risks involving
its information security. Information is a vital component of every organization because these organizations use the information
on their daily operations. Most of the information
on an organization is confidential
to that organization. Therefore, there could be serious implications if the
information is accessed by unauthorized persons or if it
is lost. With the modern technology companies and other organizations
are using information system to collect data, analyze it, store
it and even
transmit the data to valid designations. This calls for
protection of the information contained in these information systems
to ensure that it is secure from unauthorized individuals. In addition, the information
needs to be protected from losses because the
information could be stolen or lost through an information system breakdown. Therefore, it is mandatory for
every organization to have a mechanism for
protecting its information. One
of such mechanism is the information security
management system. Information security management system consists of a set of strategies concerned with the management of the risks related to information
security.
Types of risks
to information security:
An
information system consists
of people and computers that process information. The information
system helps organizations in decision-making, operations,
and management (Elky, 2006). Most of the organizations
use these systems
to store their information. Therefore, there is the risk of losing this
information in case there is
a breakdown of the computers or similarly,
the employees operating the computers could leak the information to unauthorized individuals. Similarly, the information
could be lost through physical
occurrences such as the destruction of the systems by floods
or it could be intercepted or accessed
by hackers. It is known that security is determined
by the people more than the technology. This implies that
employees are a greater threat rather than outsiders. These employees
have easy access
to an organization’s vital information; thus they are the major
risk to information security. Though other
unauthorized persons can access a company’s vital information through hacking activities, the risks
they pose are very minimal. However,
the use of computer
information systems poses other risks
to information like information
extortion, software attacks, and sabotage and
identity theft. Information extortion involves theft of an organization’s information and using it
to receive payment. On the other hand,
software attacks include the destruction of an organization’s software either by viruses or phishing attacks. Identity theft is a situation where one uses a person's
identity with an aim of accessing his/her vital information or take
advantage of the access to their information. Sabotage is the destruction
of an organization’s website to cause
loss of confidence in its clients. All these are the possible risks
to information security of an
organization. There could be great
financial losses or destruction of a company’s reputation if its vital information
or the information
about its customers gets into
the hands of competitors or hackers. Therefore, there is a need for organizations to have a well laid
down information security management system (Peltier, 2005).
Information security management system:
Information
security management system consists of a set of strategies concerned with the management of the risks related
to information security. Information is a valuable asset to
an organization; thus it should be protected by all means. The information security management system
(ISMS) is based on the principle
that an organization should develop, implement and maintain a coherent
set of strategies, processes and systems
in managing risk to its information assets. The information security management system includes people, IT systems and processes
using risk management
systems. A good information security
management system should ensure integrity, availability and confidentiality of the information. The integrity
of information means that the data
is accurate and consistent; thus an information security system ensures that information of an organization is not tampered with or
modified by unauthorized
users. Similarly, the ISMS ensures that the information is available when it
is needed by authorized users
while it also
ensures that the information is only available to the authorized parties.
Development of ISMS:
The
development of information security involves six steps that include a definition of security policy, the definition
of its scope, risk assessment, risk management,
control selection and maintenance and
improvement. The initial step in the
ISMS development entails with
developing the policies that would govern the risk management
system while the second step
involves determining the purpose of the
management system (Humphreys,
2010). The risk assessment is said to be the process of identifying
the information assets, the threats associated
with them and the impact on the organization
in case they were stolen or
lost. On the other hand, the
risk management is the development of strategies that aims to stop these risks
from taking place or reducing the
impacts of these risks in case they
occur. The control
selection is the process in which the appropriate measures to mitigate the information
security risks are implemented with a view to reducing the occurrence
of the identified risks. The maintenance
and improvement involve ensuring that
all the selected controls are efficient and effective throughout without changing the business
environment. Therefore, information security management is a continuous process that requires monitoring and reviewing to ensure
that the integrity,
confidentiality and availability of an organization’s information are guaranteed.
Benefits of ISMS:
The
general benefit of implementing an information security management system is the reduction
of the chances of the risk occurring
or/and reducing
the impact of the risk if
it occurs. However,
it has other advantages that include protection of the organization’s information in terms of integrity, availability, and confidentiality and allows regular monitoring and improvement of the system (Humphreys, 2010). The development of information security management also helps
an organization meet
contractual requirements as it
serves as an indication to the clients that
the company is concerned
about the security of their information. This gives the organization a competitive advantage over its competitors. The information security
management also ensures that there the right people,
procedures, processes and technologies input in place to ensure that
the organization’s information asset. It also provides a common
conceptual basis and language for information
security easy confidentiality
between business partners
with compliant ISMS. In addition,
ISMS brings about profitability and
cash-flow. This is because an
organization with a well laid out information security management system protects the
image of the company winning consumers’
confidence. The increase in confidence will result in increased output hence increasing
the organization's
profitability and cash flows.
Conclusion:
Risk
management is the process that identifies, assesses, and prioritizes and addresses risks
to minimize the chances of their occurrence so that an organization
can achieve its objectives. Risk sources in an organization can be located in the infrastructure and other tangible
variables, human factor
variables, and decision-making. The
strategies for managing these threats
include avoiding the risk, transferring
the risk to another party or
reducing the effects of the risk.
Information security is prone to a number risks threats. The
information on an organization
is prone to loss or theft and
other risks like information extortion, software attacks, and sabotage
and identity theft. Therefore, there is a need for organizations
to have a well laid down information security management system. A good
information security management system should ensure integrity, availability and confidentiality of the information. Similarly, an information security management system has other benefits such
allowing regular monitoring and improvement of the system. It
also helps an organization meet contractual requirements as it serves as an indication to the clients that
the company is concerned
about the security of their information. This gives the company
a competitive edge over its competitors. Therefore, ISMS is vital in every business
because to ensures that the organization’s
information is secure and protected.
References:
References:
Christopher (2002) Managing Information
Security Risks: The OCTAVE Approach; Addison-Wesley Professional, USA
Elky S. (2006) An
Introduction to Information System Risk Management.
Humphreys E. (2010) information
security management.
Peltier R. (2005) Information Security
Risk Analysis, Second Edition; CRC Press, USA.
Carolyn Morgan is the author of this paper. A senior editor at MeldaResearch.Com in write my nursing research paper services. If you need a similar paper you can place your order from essay already written services.
Action research on SQL development
In
this iteration, there is an explanation of the training in regard to the SQL
development tools in involvement that took place during my first week of
internship in Amphion Global Inc. I would have involvement in the SQL Developer
tool present in Oracle 11g database to create tables, database connection,
querying data, running and creating reports, and debugging SQL.
Plan
I
arrived early in the morning in the premises of Amphion Global Inc. In my
orientation iteration which was the first one, I had information on how the
training session would take place and I was prepared for it. The early
information helped to prepare for the training on SQL development environment
particularly with the SQL developer tool so that I had know-how before the
actual training day. I had an opportunity to go to the website of the company
so as to familiarize myself with the SQL development environment including
having interaction with SQL developers in the company. The training would be
under the supervision of the assistant SQL developer, Mr. Kim. I met with Mr.
Kim and he explained to me what I would expect that day concerning my training
session.
Mr.
Kim also explained to me the rules of the organization regarding the
requirements of the SQL developers and how I had to behave during my internship
period in Amphion Global Inc. He helped me understand how the internship was
vital as SQL is in deployment in the many of today’s databases and mobile apps,
including many other areas where it is useful. He gave me a schedule of the
day’s activities so that it would help me to follow the areas of the training
and see where I needed to pay much attention. I planned to concentrate in this
session of the training on SQL development as it would determine the rest of my
stay in the company. I would make sure that I grasp all the concepts from my
trainers and make the necessary inquiries so as better to understand my roles
and responsibilities in the company as an SQL developer intern.
Action
The
developer guided me to the room where the training was to take place. He began
by telling me the basics of the SQL programming language and asked me some
questions to assess how deep I understood about this language. SQL is a very
essential language useful to developers who wish to create data driven websites
(S. Jennifer, Personal communications, February 05, 2015). He guided me through
the basics of the SQL database server and the application areas of the SQL
programming language. He trained me on how to create a database in SQL through
the coding process. He trained me on how to write a secure code and the
importance of making the system secure as well as ensuring the security of the
database.
He taught me how information is very crucial for
any organization and its loss will culminate to the company losing a lot of
funds. He took me through the various DBMSs and how to ensure the security of
the SQL code in those DBMSs. He taught me about the escaping of parameters in
PHP with MySQL server through the use of the mysql_real_escape_string. He
guided me on how to make joins between tables of a database and the
requirements of businesses. He taught me on how to write more complex queries
so as to satisfy business needs. He trained me on the types of table joins the
left outer join, full outer join, and the right outer join.
He
also taught me about the self-join and how to select the most appropriate type
of join for a given situation. He also guided me through the various data types
which in the different DBMSs; MySQL data types, SQL Server Data Types, and
Oracle Data Types. He taught me how to write compliant codes that are in line
with the ANSI standards so as to ensure maintainability and cross-platform
standardization. He also taught about the normalization of databases, that is,
the first standard form, the second normal form, and the third normal form, yup
to the fifth normal form.
He
taught on how to qualify my database object names especially when working with
databases that are larger and those used by multiple users. I also learned
about indexing and its importance of speeding database table operations. He
helped me understand how to use database permissions and how to control the
access to databases by setting roles and permissions. I learned from the
developer how to choose the best DBMS solution for the particular project as
each of the DBMSs have their limitations. After the training session, the
developer responsible for training me gave me an assignment so as assess my
understanding of the concepts taught during the session.
Observation
I
learned many things that were helpful to me in regard to SQL development. I
observed that SQL is in deployment in many database management systems such as
MySQL, Oracle and SQL server. I also noted that one needed to have knowledge of
the SQL coding for them to be active in SQL development. I realized that a lot
is in the requirement for any SQL developer as they have to work towards
meeting the business needs. Also, the rules of coding must be duly followed as
well as the ANSI standards so as to ensure that databases but is scalable and
that they are platform independent. I also observed that the session went on as
planned and nothing was left out as per the schedule of the session.
Reflection
Everything
went on as planned and the session did not lag behind schedule. The training
was very enriching with insight and it helped grasp the concepts that I did not
have before. The session however took a short time and I would recommend that
there be more time allotted for the training session. The various employees I
interacted with were helpful as my interaction with them helped understand some
of the requirements as an SQKL developer intern. The assistant developer was
also very friendly as he was willing to assist me where I did not understand.
The session had helped me to achieve my goals that I had before and the
research that I did ahead of the session make me know the areas that IO needed
to pay more attention. With this profound knowledge, I had the confidence to
perform my tasks with expertise in the rest of the iterations.
Iteration 3: Reviewing and gathering
business requirements
The
session entailed the gathering of business requirements for the project
assignment that I was in involvement during the period of internship in Amphion
Global Inc. The project was about the development of SQL database and website
that would support business functions for and online selling and buying of
goods and services (J. Brandon, Personal Communications, February 20, 2015). I
would gather the requirements that would help shed light on the users’ needs
with regard to an online platform for selling and buying of goods and services.
Plan
I
was to be guided by one of the project team members, Ms. Jacob so as to gather
the required information that would have analysis later by the team members. I
was to interact by the various cadres of the organization and the users in the
marketplace. I was also to interact with other company CEOs who have deployed
this kind of technology, as well as database administrators because the project
also entailed coding development of databases. I was to use the various data
gathering techniques that would help me gather profound and complete data in
all areas of the project for analysis.
The
team member explained do me the rules to observe while I was going to gather
the requirements and she also explained to me how to structure the questions
and to utilize the other techniques. She also gave me the schedule on how to go
so as to ensure that I finished the task within the scheduled time. She
insisted on the importance of that phase and assisted me know how to behave
before the various people that I would meet with to gather data from them.
Action
I
designed the questionnaires as per the guideline of the team member that was to
be my supervisor in this session. I first of all began with the database
administrators of the company and I used the observation, interview questions
as well as the questionnaire to gather the required data from them. They
explained to me on the requirements for such a project especially in the area
of database development. In this case, the interview bore much fruit that the
other methods as it was the most appropriate method for c collecting
requirements for the development and coding of the project.
I
also interacted with other members of the team as they had some experiences
with the many projects they had been in involvement in. They helped shed light
on the areas of the project and how what I needed to include so that I got more
information from users. I went to the various clients that the company provided
consultant services to. I visited the various CEOs of the various companies
like Amazon and other companies that used the online platform for buying and
selling of goods and service. The various stakeholders of those companies
helped me also to understand more on what to expect from an online platform for
carrying out business.
I
interacted with users so as to know which kind of interface that would be most
captivating for the users. Where the interview failed, I used the other methods
and if any of them did not work well I had to deploy a better techniques to aid
in carrying out the project with all crucial information in hand. I did
consolation from my supervisor before completing any task. After I had gathered
all the information on the requirements, I formulated reports that would help
show how the process was carried out. That was vital so as to determine the areas
that required more in-depth research so that a repeat of the scheme would be
put to use in case the team recommended so.
Observation
I
observed that the requirements gathering had to cover many areas of the
development project. The other stakeholders from whom I was to collect data
were quite busy and this would not get enough information from them, causing me
to find alternatives o achieve the same. Something that I also observed was the
application of various data collection methods in order o find what was in the
requirement. I had to utilize every technique for me to get all information. I
interacted with the various documents in soft copy and hard copy and that was
vital in understanding how to deploy a site that would support a variety of
reports. I observed that the requirements gathering process was accorded some
quality of time as it entailed much on the broad capabilities in the need for
the project assignment.
I
observed that every activity in the company took place on a tight schedule and
there was no activity to lag behind the schedule as that would be questionable
by the relevant authority. I observed that a real structure of the interview
questions helped me gather the necessary data from the people that I interacted
with. I realized that I had to apply my judgment in case the situation
demanded, or to do a generalization if I did not get enough sample size to make
a comparison. I also observed that in case I did not have enough time in the
field, I had to utilize the Internet in acquiring the additional information
from the similar projects done by other scholars. Though some people were
unwilling to provide the necessary information may be because of their failure
to understand the topic clearly, I managed to gather all required data.
Reflection
The
requirements gathering phase went out as required. Through this iteration, I
refreshed my understanding n the various techniques of data collection and the
way to create reports from the data collected. It helped know how to interact
with the various people at different levels if authority and diverse
experiences. I discovered that as an intern in the field of SQL development, I needed
not only to have coding skills, but also to have data collection and data
analysis skills. The team member that was helping me during this iteration was
most of the type away and thus unable to provide help when I needed her most.
The tight schedule helped to have experience on how to work under pressure with
minimum supervision but concurrently concentrated on the delivery of quality
results. The rules explanation and the explanation on the code of conduct for
the process of requirements gathering by Ms. Jacob actually helped achieve the
best out of the process. Through the reports that I created, I came to realize
that every task that I carry out, there should be the creation of reports so
that they would be useful in understanding areas for improvement.
Iteration 4: Backup and Recovery
In
this iteration, there is an explanation of the backup of databases and
information as an SQL developer. The various methods of backup also had an
explanation and the way to choose the most appropriate backup type for a
particular task. I was to work with the system administrators in order to make
this useful.
Plan
I
met with the system administrators and they explained to me on the
responsibility of backing up and how often the backup takes place so as to
prepare for crises. They emphasized on the importance of backup data for the
company and the regular updating of the backups with the reasons for carrying
out those regular backups. They insisted to me on the essence of that iteration
to my internship period in Amphion Global Inc as well as in my future career as
an SQL developer. That was because, as an SQL developer, o would be working on
databases as part of my responsibility. They explained to me why they were
responsible for carrying out the disaster planning and the recovery processes.
They
gave me incidents that had occurred in the past and how they carried out the
recovery and through that I planned to have active participation in this
process so that I would learn more from these experts. I had not been in any
involvement in the past of such a task so this iteration would give me a lot of
insights. They showed me the disaster plan and the recovery plans that they had
been using and it had been going through updates so as to accommodate new
changes due to the number of disasters that come up each day.
They
explained to me the types of failure to prepare including human errors, natural
disasters, virus and malware and other types of incidents. They explained to be
the rules under which they worked as required by the company and the state and
any ignorance of those regulations and standards was a punishable offense. The
team was the one that had one of the most critical roles of dealing with
mission critical data as information for companies were very vital.
Action
We
acquired all the files and the data that were to undergo the backups and we
ensured that we made a rough sketch of the steps to carry out in achieving
proper backup for the data. The data backup and recovery rough sketch was to
help me understand how the task occurs as they had the prior knowledge
themselves and did not have the need even to write down the plan. We went
through the data from each department and did the backup one by one for the
period that had not undergone the backing up since the last backup. They
carried out the different types of backup to make me understand how those
backups take places, such as the normal backup, the differential backup, and
the incremental and daily backups.
The
most important was to perform the full backups and on a weekly basis and
supplement them with regular backups. I learned on how to select the backup
devices and media that ha high capacity is reliable expandable, high in speed
and cost efficient. They helped me to understand the backup solutions such as the
tape drives, digital audio tapes, autoloader tape systems, magnetic, optical
drives, tape jukeboxes, removable disks and disk drives. They explained to me
on the differences between those backup solutions in terms of their capacity,
reliability, extensibility, cost, and speed.
They
guided me ion how to access the backup utility in Windows and the general
backup options with the backup utility. I learned how to do the backup of files
without utilizing the wizard and that occurred manually through some few steps.
They told me how to recover data using the restore wizard and the restore tab.
We also carried out the manual restore step by step without utilizing the
wizard. I learned how to carry out authoritative and non-authoritative restore
in restoring the active directory.
Observation
I
observed that the backup and restore process was an involving one that required
much attention and a working plan to be in place. I observed that the rules in
the process were very vital to follow and any violation of the rules and
regulations regarding that was a punishable offense regardless of which
position you held in the company. I learned that the company had significant
data centers that were for the backup of the company data and system
information. The sites were offline and away from the company’s premises and
nobody would just go there without authorization. I observed that many at times
the backup and recovery team would work overtime and in weekends because
sometimes their tasks involved carrying them outside the regular business hours.
I
observed that they duly followed the schedule for weekly full backups
supplemented with daily backups and it was a must that they followed that
requirement. I observed that they were responsible for monitoring the processes
that went out in all departments so as to plan for the backup process more
effectively. They were also responsible for doing capacity planning in case the
network was experiencing downtime. The team was very vigilant as pertains to
the computer security incident planning and they had plans, response procedures
and policies in pace to take of that. They were also very vigilant concerning
any information on the likelihood of an event occurring that would compromise
the security of data.
Reflection
The
iteration enriched me with the knowledge I desired to have in the light of my
role and responsibilities as an SQL developer during the internship period and
later in life. They helped me to comprehend how vital the data backup and
recovery process is for any company. Working with the team members responsible
for the data backup and recovery was very imperative as from them I learned how
to work with and in a team. They helped me understand how to make plans and
ensure that I achieved those plans in all my responsibilities in the future,
either in live or in the line of my profession. The session aided in
comprehending how to carry out the different types of backups and the process
to follow in carrying out the restore process in the event of a disaster.
The
session took a long time, but it was necessary as it helped me to grasp every
concept in regard to the data backup and recovery from the planning stage to
the final step of plan implementation. All the employees of the company worked
as a team to achieve the common goals, the mission and vision of the company.
They had good organization and everything took place in good time according to
the laid down regulations and the quality standards in the organization.
There
was the boosting of employee morale for work through proper incentives that
were available and the extra payments for the working overtime. I, however,
suggest that there be also motivation for the interns so that their morale for
working would be boosted. That is because of the interns worked the same way
the employees of the company worked and they were as well involved in the
working of overtime but with no any incentives.
Iteration 5: Testing and analysis
Plan
I
met with the project team members that were responsible for the analysis of the
data gathered and they made the plans on how the analysis process would take
place on the requirements. They elaborated on their mandate and the
responsibility vested in them in foreseeing the project timeline and the
objectives of all projects for Amphion Inc. They were to meet before the
project development commenced so that they would carry out brainstorming on the
project requirements and carry out the feasibility study of the project
requirements before the actual coding took place.
During
the brainstorming session, they would share ideas on how to go in carrying out
the analysis of the data and through that the diverse opinions would help to
find out the best way to go. They were to divide the work amongst the various
subgroups and each group would be responsible for carrying out their tasks and
making reports after they finish their chore. The reports would have the
viewing of the review team who would give a go ahead I case the analysis took
place on the right or recommend for further analysis in case it did not go as
required. In this phase, I would have minimal participation, but I would be
welcome to ask questions and make the necessary inquiries so that I may not
left out of the game entirely.
Action
Te
team carried out the brainstorming and shared ideas on the process of the
impending requirements analysis and this was vital. There were diverse opinions
brought to the table and the various views helped in finding the most
appropriate way to go because they would not go by everybody’s opinion. They
determined the plan and the schedule of how the analysis process would take
place and the responsibility and deliverable of each team sub-team members.
They subdivided the team members and each team was responsible for handling a
given section of the data so that the work would go as planned in the schedule.
They grouped the data according to its relations and the requirements so that
each group would be responsible for analyzing related data without any
confusion.
The
team in which I was involved in had their mandate as other teams to analyze and
interpret the data so that they would describe it and summarize it. After they
had summarized the data, they had to identify any relationships between data
variables as well as compare the variables. They would also determine the
variations in the variables and forecast the outcomes of the user requirements
from the findings. They used the quantitative analysis of the data analysis as
it is the most accurate type of data analysis.
They
organized the data and used the SPSS because the use of the computer to analyze
the data would be much faster and easy to go. After the team, finished
analyzing the data, they interpreted the data using the various form as of data
interpretation. They made the recommendations on the findings as after every
analysis there must be a recommendations and assumptions to be made. After all
the teams had finished their work, they met to harmonize the data and make
necessary recommendations for the review process. They made reports that would
go to the review team for studying before they gave the go ahead for the
progress of the project development.
Observation
I
observed that the team was working in harmony towards achieving the objectives
of their tasks in involvement, and, in this case, the data analysis. Everybody
well understood their duties and responsibilities and they worked hard so that
they would complete everything required of them in light of the schedule. The
aging behind schedule was punishable and it was not allowed as the teams
members themselves were the ones involved in setting their goals and the plan
which they would follow. I observed that the brainstorming session was very
vital as trough the same the team members understood more what was required of
the team and the diverse ideas aided in making perfect plans for the best
outcome. I observed that if the analysis did not go well, then the subsequent
steps of the SDLC would not take place in the right way and the project would
fail utterly. They had to make assumptions about the data and the assumptions
were in line with the project requirements done to the best of their knowledge
and skills in the field.
I
learned that many of them had more than ten years of experience in the project
development process and because of that they did not have much problem in
carrying out any task. They worked on tight schedules and they seemed to enjoy
the going because they were used to it. They knew that by working under the
tight schedule would inculcate the virtue of self-discipline in them that was
crucial not only in their line of company duties, but also in their daily
lifestyles. I observed that they were the team that was vested with the
responsibility of quality assurance in the company. They were to work with
external auditors to achieve that. The meeting together of the teams after each
completed their work helped to harmonize the analyzed data and integrate it
accordingly. They worked together in unity and they were able to complete
everything as required before they presented the analyzed data to the review
team. I observed that the review team was the people to make the final
recommendations before any step in the project development process.
Reflection
Most
of the tasks went well in this phase although would have been some others that
did not go well according to me. The team was well coordinated and there were
no conflicts as each team member understood clearly their responsibility and
they carried them out without complaining. The management was friendly to the
employees of the company and that encouraged the employees to carry out their
duties as required even if they were to work overtime. The management was also
available for consultation in case of any issue and they responded forthwith to
any information. There were added wages in case the employees worked for more
time especially outside the office working hours. However, the review process
took a long time to be accomplished because of the team working together for
the whole process. I suggest that the review team should subdivide the tasks so
that they will curtail that problem.
Carolyn Morgan is the author of this paper. A senior editor at MeldaResearch.Com in write my nursing research paper services. If you need a similar paper you can place your order from essay already written services.
Subscribe to:
Posts (Atom)
Political Essay in Colorado
Are you looking to order for Political Essay? When you order with us,we assign your political essay to writers who have experience and are...
-
When you use our online assignment help services; you will be assured of being serviced by the best writers in the industry.
-
Abstract The research paper discusses details involving the potential for discovering parts of the universe that are difficult to identi...
-
SWOT analysis Adidas is a German multinational corporation that usually designs and manufactures sports clothing, shoes, and accessories...