1. Worked with business to analyze and evaluate the system program design and provided feedback on the research done.
2. Responsible for development and configuration of the requirements gathered.
3. Monitored the network congestion in order to achieve the optimal performance out of a network infrastructure.
4. Responsible for accessing and improving technical road blocks in system and project.
5. Responsible for identifying limitations in already built in system, processes and providing alternate solutions to overcome deficiencies.
6. Responsible for troubleshooting the problems that occur in the already built in system.
7. Responsible for setting up of new servers for the application, and maintaining the servers.
8. Responsible for configuration and maintenance of the database applications.
9.
…show more content…
Providing consultation for new and existing programs to both Internal Business teams and external customers.
10. Followed the SDLC lifecycle and making sure all applications are deployed as per the standard process.
11. Worked in end to end automation of many system reports and created a report dashboard for data extraction.
12. Responsible for preparing documentation for changes in the system / application.
13. Responsible for debugging the issues in applications deployed in production, UAT and fixing the errors using problem and change management process.
14. Responsible for developing the code based on the requirements of clients.
15. Responsible to create manual test plans and testing the code using the test case.
Involved with business to understand the business requirements and technical
Adjustments – They are made to the patients account when it is necessary to add or subtract an amount, which is not a payment from the balance.
1. Right patient - This right is used to confirm that the medication is being administered to the right patient. The medical assistant would ask the patient to cite his or her full name as well as one other identifier from the patients chart, such as their date of birth, age, or address. Not including any questions that prompts yes or no responses from the patient.
1. Describe in detail (using your own words) three (3) types of birth defects or genetic conditions (ex. Cleft foot).
Incentives four different text for the familiar text- lotus font, familiar-pen font, unfamiliar text - lotus font, unfamiliar - pen font was. For collecting data from SMI-RED-120Hz eye tracking device was used. Results show that word length has a significant effect on eye movement (fixation, saccade) and also passages type (familiar and unfamiliar passages) have significant effects on eye movement (fixation, saccade, regression). Font type has no significant effect on eye movement (fixation, saccade, regression).
Please tell me how the course is going for you so far? Is it hard, okay, or too easy?
Norm-reference (p.148) - This occurs when a researcher compares the participant’s score, to the score the reference group received on the same test. This reference group should be comparable to the participant in age and grade level.
tion, it also keeps children with diseases from being excluded from schools. Children 6 to 17 cannot be rejected and if the school offers services to younger or older children then they have to offer that to children with disabilities. Zero reject makes sure all children get an equal chance at an education no matter the child’s disability.
In Unit 1 Planning 10, I learned about various web 2.0 tools; e-mail (message), wordle,digital display,video tool, and sound tools. They all help to express yourself but they are used in different occasions. E-mail is used to communicate with a certain people through words. It is very convenient to "talk" to someone far away. The advantage of wordle is that you can introduce yourself with just one logo. Colours, arrangement and style of words involve in the overall impression. Digital display is great when you want to show photos and pictures together with words. Posters and presentaions can easily draw peoples' attention. The unique point of sound byte is that it only contains sound and there are no images to support it. Your skill of talking
An event log should be maintained and record any exceptional, out-of-routine security events, including intelligence and other guidelines relevant to security,
When it comes to smartphones, people make choice which smartphones is suitable for them and, sometimes people look at who gives more feature. In this project, the populations is representing are Population 1 which is all iPhone users in Montclair State University and, Population 2 is all Samsung users in Montclair State University. The quantitative variable I will using is cost. I will compare this two major population iPhone vs. Samsung. Also, the I will use this variable cost because I will be comparing iPhone models like five se, six s, six s plus, seven and, seven plus to Samsung s six, s six edge, s seven edge, note five and note seven. This data will show; how much people spend money on this device.
Family educational rights and privacy act was enforced in the year 1974.This act is under U.S compliance laws.
The 3 studies I choosed in the lesson of chapter 12 was social idenfity, social media, and alcohol use. Social identiy involves the sense of yourself as a group member. (Nevid,p.470) In the term social identify you have to know who you are at all times. Social media is a place were you can connect with others and people sometimes disclose information about themselves. (Nevid, p.447) Alcohol use is a result of bad behavior. Alcohol will effect a person health and hurt a family home. (Nevid,
8+ years of experience in the automating, configuring and deploying instances in the areas of Data center operations, cloud computing, software configuration management (SCM).
in the field. They produce the software to assist with testing, maintenance and diagnostics. Homologation
Peterson, L. L., & Davie, B. S. (2011). Computer Networks, Fifth Edition: A Systems Approach (The Morgan Kaufmann Series in Networking). Morgan Kaufmann.