Wednesday, January 29, 2020

Analysis of Whipps Cross Hospital Essay Example for Free

Analysis of Whipps Cross Hospital Essay Waltham Forest is one of the busiest areas in London. The main reason behind this comes from the big hospital called Whipps Cross; serving a large community of approximately 225,000 people it makes it difficult for the approximately 2488 hospital to keep track of every single patient. There for I am going to create a database for the hospital staff to be able to store, delete, search and edit data about the patients as well as the doctors. This will help the hospital to keep track of the patient, for example, their latest treatment that they had, and what doctor they saw last etc. The hospital database will be accessible to all staff or workers in the hospital. My database will also be used to produce report and respond to particular queries (question/ comments) that the doctors may have about patients. However before I start my database I will need the following information: OUTLINE In this section I am going to outline the headings that I will be including in my database; this will store information about staff (doctors) and patients of the hospital. Database: A database is a collection of data that is organised so that its contents can easily be accessed, managed and updated. The most prevalent type of database is the relational database, a tabular database in which data is defined so that it can be reorganized and accessed in a number of different ways. A distributed database is one that can be dispersed or replicated among different points in a network. Advantages * Reduced data redundancy * Reduced updating errors and increased consistency * Greater data integrity and independence from applications programs * Improved data access to users through use of host and query languages * Improved data security * Reduced data entry, storage, and retrieval costs * Facilitated development of new applications program Disadvantages * Database systems are complex, difficult, and time-consuming to design * Substantial hardware and software start-up costs * Damage to database affects virtually all applications programs * Extensive conversion costs in moving form a file-based system to a database system * Initial training required for all programmers and users (http://www.cl500.net/pros_cons.html) Tables: I am going to have two tables first table to get the details about the staff of Whipps Cross Hospital and the second table for the patients in Whipps cross hospital. For each table I will have different columns in which I will have suitable fields for instance for the first table I will put the doctor name and just say if there are 20 doctors working I will put all of their names, address, gender, date of birth, salary and staff ID etc. I will then store this information onto the computer. So altogether their will be six rows. For the second table for patients I will put the patients name in the first field, gender in the second field, then the address in the third field and their date of birth in the fourth field etc Forms: == A form is like a blank document witch allows you to enter information into the database. I will need the forms in my database as this will narrow my search when I am finding out information about the staff and the patients in Whipps cross hospital. I will also give each field its suitable form to access the information required. I will create a separate form for each doctor and patient in Whipps Cross Hospital so the information dont get mixed and makes it less complicated to store. The forms can also be used as a back up file. -Types of forms that I will be including in my database: o Names of staff and patients in alphanumerical form o Gender (M/F) in alphanumerical form o Address in alphanumeric form o Date of birth in integer form o Salary for the each staff member ($) money o Staff ID number (six digits) -in integer form Queries: This is a selection of data from the table in a database and a single query can extract data from different tables. It searches particularly information that is already stored on the database and will allow the hospital to use it for research + to make reports of their findings. A query is an inquiry into the database using the SELECT statement. A query is used to extract data from the database in a readable format according to the users request. For instance, if you have an employee table, you might issue a SQL statement that returns the employee who is paid the most. This request to the database for usable employee information is a typical query that can be performed in a relational database. (http://www.informit.com/articles/article.asp?p=29661rl=1) As from the definition it suggests that its the selection of data, I will design two tables one for the staff and other one for the patients in Whipps cross hospital so with the help of both tables the Whipps Cross can run a query to specific information about the patient or the doctor. The query can also be used under one table as, if the hospital only needs to find the patients information. A query is useful because it will allow me to extract specific information from the database. Whipps Cross Hospital can just run the queries and check if there database is working effectively it will save there time and make things easier to find and store. Reports: Producing information on a database in a form of a report data base will produce reports about the doctors and the patients e.g. patients information report, the doctors salary record etc. It will also produce results on a database in a presentable form. After making query database will produce the report for them in which it will be the information of one/two tables. This will be easier for Whipps Cross to translate the information. SUB TASK Design: I am designing a database for Whipps Cross Hospital to store their stuff and patients information under. Im going to design a database that will consist of two tables, one for the staff and the other one for the patients. EXAMPLE -For the staff: STAFF Surname John Forename Simon Gender (M/F) M D.O.B 04/05/1972 Address 31 Carlton Road, E17 5ET, Walthamstow, London Salary 30,000 per year ID number J17672 -For the patients: PATEINT Surname Jodi Forename Simon Gender (M/F) F D.O.B 06/08/1985 Address 9 farmer road, E10 5ST, Leyton, London NHS number 6314518420 History hepatitis B Implementation: At this point I will be making my database. I would like to use Delphi software which I can access to find the information about the staff or the patients on my computer, but the school does not pervade us with this software so there for I will be using Microsoft access to design my tables and the database or I can even use Microsoft excel to make the database. This is because the school dont have the appropriate software which they have in hospitals and this is the appropriate one. It is easier to use and it dont take a lot of space in the computer Testing: I will test my work by adding appropriate information and appropriate codes using Microsoft excel or Microsoft access for example: For the staff ID I had maximum range of number from 1000 to 20,000 so I can put six digits Id for the staff and I will make sure that these six digits should be between 1000 and 20,000 and for testing purpose I will put a number less than 1000 and greater then 20,000. So when I do this if the error occurred or I tried to put more then six digit ID the database will automatically reject the value so I will have to put another ID to test my work. When I will put the right values my database did work so this shows that my database is working perfect. This is one of the example which I have used from my report to show that what will happen if I will have number less than1000 or more then 20,00 in my database the computer will automatically reject those values and if I have more then 6numbers in my ID it will also reject it. In the case with fixing these errors I will have to make corrections in the structural mode of tables. All this means that when I will be making my table I will put the staff ID in the structural mode. So when I will need to change the data I cant directly change from my report or the inquiry I will have to go in structural mode to change this information. I can also produce a number of recodes and run queries to see if the results are accurate. Evaluate: I will evaluate my work by showing each step and explaining how I achieved this and all the errors and complication that I had. How I can improve my database. I will also explain the things which went right or wrong. INPUTS The data will be put into 2 tables, one for the staff and one for the patient. It will have different field names because there are 2 different sets of people. This will be the information that I will be putting into the database or the FIELDS.STAFF For the staff table: For the patients table: OUTPUTS How the data will be presented once it has come out of the computer; I will present my information in the form of table, reports and queries. SUCCESS CRITERIA In order for the database to be successful, I will measure the success of my data by running queries. Also, I will see if the correct information is displayed, this will tell me if it is a success and if it works proper.My database must contain information about Whipps cross hospitals staff and patients so it makes it easier for them to store and keep track of all the staff and patients so it makes it easier for Whipps Cross to store and keep track of all the stuff and patients. My database needed to be used friendly, it needs to have no spelling mistakes and it should have no gaps.

Tuesday, January 21, 2020

Database privacy and Legal Issues :: essays research papers

Database privacy and legal issues Data privacy law regulates data management, and information systems manage data. Therefore, data privacy assurance must consider system assurance. An IT department should streamline its functions with the industry standards and privacy regulations in order to avoid any disruption. In order to achieve those objectives, the IT department should assess the risks, design a strategic plan to achieve privacy compliance, implement required policies and procedures, and monitor and audit the procedures to ensure privacy compliance. Gavison, in his article "Privacy and the Limits of the Law", describes privacy in terms of controlling access to our physical person, and to our information. In one phrase, it is the "protection from being brought to the attention of others" struck us as particularly relevant to the census problem (1995). In his article "creating the Privacy Compliant Organization", Parker mentions that there are other forms of privacy to consider, includes: privacy of persons, privacy of personal behavior, privacy of personal communications, privacy of personal information, and privacy of territory (2001). Risk Assessment An IT department should identify and document the information systems that are subject to privacy requirements includes computer files, databases, archives, microfilm, personal records and copies wherever located. Moreover, it should perform a risk assessment and gap analysis of controls and procedures that are in place. The gap analysis will reveal the deficiencies between the current status and the legislative requirements and regulations under which the organization must operate. Additionally, the risk assessment must be applied to the likely risks that an organization may experience from a breach in privacy which include damage to the corporate reputation, damage to business credibility, financial loss, negative publicity, and fines and criminal records for employees. The result of this phase will be the basis for developing a strategic personal information privacy plan (Parker, 2001). Design a Strategic Plan Designing a privacy plan involves planning, and implementing a set of direction, methodology, and tools to address number of issues in order to achieve privacy compliant, which includes: †¢ Establishing the required infrastructure, including the required positions and appointing key privacy personnel. †¢ Establish the methodologies, which include team members, deliverables, activities, critical path, resources, skills, timelines and approaches to addressing the privacy gaps †¢ Introduce the privacy policies, standards, guidelines and procedures required to meet compliance requirements. †¢ Identify the changes required in the systems, procedures, forms, etc. †¢ Formulate the changes required to address the gaps, and †¢ Train the individuals to ensure that they fully understand the requirements of the legislation and the organization's objectives and deliverables to be created (Parker, 2001).

Monday, January 13, 2020

The Experience of Swimming

The Experience of Swimming What is Swimming? Swimming is a sport or activity of moving one’s body through water. I will be writing about my experiences of swimming, good and bad. Personally, I love swimming because I love being in the water. I started swimming when I was 6 years old. And at first I thought that swimming was a scary thing to do, but it was a fun experience. First, I’m going to tell you about my bad experience about swimming. When I was about 4 years old; and it was the time that I didn’t know how to swim. So a kid who was being a jerk pushed me into a pool.When falling into the pool, the water pushed me down from all sides. Like splashing around for no reason; though it looked like I’m having trouble. In the water, pushing up, down, left and right as nothing made any sense to me. The more I struggled, the more I get disoriented as I pushed myself up with my arms and legs. As I couldn’t find leverage, I was slowing going under into th e deep blue. My lungs burned for more air as my ears shocks and numbs. As how it felt that I tried to keep the air in me, it burst out of my mouth as bubbles reaching up the surface of the pool.My face was looking up; gasping for air. Not knowing what would happen next, everything around me just turned black. Complete utter darkness with no sound at all. But then again, there was a light coming towards to me. It wants me to come back. Through my unconscious state, I went there and woke up: coughing out water from the concrete floor. As I opened my eyes, it was blurry and I could hear again. Hearing my parents’ cry and also the other kid’s parents shouting at him. For what he did wrong, he was also crying. As for the person who had saved me from the pool of darkness, was my cousin.She just got back home from school and noticed that I was at the pool. So she just quickly ran to the pool, threw her backpack and took off her shoes to dive in and get me out quickly. Thanks to her, I was brought back alive but fear of swimming took place in my mind. Scared and frightened I was. Next, I’m going to tell you about my good experience about swimming. To overcome my fear from swimming, I had to go back into that pool where I was drowned. When entering the pool, it feels as if ice is circulating around the body. Then later on, I feel warm all of a sudden.It felt weird. In the pool, I am about two and a half feet above the water; I stare at it, and it stares right back at me. When the wind started to blow, it feels cool and chill around my wet body. As I was still in the water, there was a scent of chlorine. From the height of the pool, the black tile that runs down the center of every lane appears to me as a runway. In just a few seconds I will be moving down that runway, trying to take off above the water. My eyes will be focused on that tile, to make sure I am in the center of my lane.I can see the water grinning and laughing at me now; I am standing on the block with my knees almost to the point of shaking. Right now, it is so calm and smooth, beckoning me to dive in. But in just a few seconds, I gave into diving underwater. It was awesome to the point that it felt a wave pushing through you. It was a good experience I had for swimming. Though I had horrible experience swimming when I was young, over the years I've learned to conquer and overcome the fear of swimming, as I grew older. All in all, swimming was a fun experience in the end. And as what I’ve become now, I still love swimming.

Sunday, January 5, 2020

Tape Recorder Was Invented For Recording Sound By Fritz...

INTRODUCTION: Tape recorder was invented for recording sound by Fritz Pfleumer in 1928 based on the invention of magnetic wire recording by valdemar poulsen in 1898.The first tape recorder from AGE was the magnetophon K1, demonstrated in Germany in 1935.Eduard schuller of AGE built the recorders and developed a ring shaped recording and playback head. â€Å"A tape recorder is a portable electronic gadget used to record, reproduce, erase and rerecord sound on a magnetic tape. This devise can be used without any problem anybody by operating the press buttons attached to the recorder, viz. stop, play, wind, rewind, record, pause and reject†. GUIDELINES FOR USING A TAPE RECORDER IN TEACHING ï‚ ¢ Functions of tape and recorded cassette must be ensured before its use. ï‚ ¢ The teacher should be prepare, customize, and practice the recorded lesson before using in the classroom. ï‚ ¢ The teacher can use prerecorded programmed in tape recorder. ï‚ ¢ The teacher must store all the cassette so that they can be used later. All can use the prestigious person’s talks for their purpose and this can be possible only because of tape recorder. The store data of computer and measurement can be done in the instruments of scientific research and medical research. To preserve and reproduce the various forms of information tape recorder can be helpful. The tape recorder records and reproduces sound by keeping electrical signals as magnetic patterns on a plastic tape coated withShow MoreRelatedApplications Of Magnetic Storage Data1753 Words   |  8 PagesAfter the invention of the paper making technology, people started to write information on papers. It was much easier and better than before, but the papers were fragile they couldn’t stay fresh for very long time, also thousands of years ago only royal families and noble families had the chance to use well-made papers, so papers were also not reliable. In the twenty-f irst centuries, people have invented a lot of different appliances to storage knowledge and data, magnetic storage is one of the most popular