SlideShare a Scribd company logo
1 of 19
Impact of infectious diseases
As people know, now the COVID-19 is quite serious and
spreading rapidly. And people do not have a curing method
about it. COVID-19 causes xxx confirmed diagnosis and xxx
death in the whole world. Also, people still don't know where
COVID-19 comes from and how we can protect ourselves from
being healthy. From COVID-19, people should have profound
thinking about why infection diseases cause and how can human
avoid virus infection and how can government-run do during the
virus outbreak and reconstruction after the outbreak.
Historically, there are so many infection diseases in the world,
such as SARAS, Ebola, HIV and COVID-19.
Most infectious diseases are caused by microorganisms, such
as bacteria, viruses, parasites, or fungi. Diseases can be spread
from person to person, directly or indirectly. Zoonotic diseases
are infectious diseases of animals that can cause diseases when
spread to humans. However, infectious diseases are caused by
multiple reasons, mostly infectious is from animals, because
some animals they carry the virus in their body, those viruses
may not affect themselves, however, when spreading of the
virus, the virus will mutate to parasitize humans, and human's
body will have an overt reaction to the virus. In this article, it
will discuss 4 infectious diseases, SARAS, HIV, Ebola, and
COVID-19.
In the first place, whenever someone always have doubts
where infectious diseases from, how infectious diseases are
formed. 普遍上来说,Infectious diseases usually have a great harm
rate, because when an infectious disease breaks out, the doctors
usually do not have any preparations, so they can not treat the
disease well, or sometimes they can infect the doctor
themselves. If people want to protect them in order to avoid
disease, the most considerable thing is that they must know
least one infectious history, such as how it formed, who is more
susceptible to infection, does it have any medical treatment,
does it success. SARAS is a typical example about it.
Practically, SARS-CoV is the severe acute respiratory syndrome
coronavirus, and it is deadly infectious diseases and people are
also easily infected. SARS- CoV cause 8096 cases, including
774 deaths, in 37 countries for 8 months. The transmit speed of
SRAS is very fast, people who get infection, they always have
Fever, cough, difficulty breathing, chest radiographs showing
shadows of both lungs, and some patients developed respiratory
failure. Unfortunately, the use of antibiotics against bacterial
infections has not worked. And SRAS infectious for people is
depend on the strength of the personal resistance occurs. From
research, SRAS-CoV's occurrence of spreading in wild animals.
Because the scientist are aware of SRAS virus related to the
spread of wild animals. Following this clue, the scientists first
targeted the Guangdong wildlife market, and soon isolated and
detected exactly the same virus as the SARS virus in the civet
cats on the market. Furthermore, in these humans who deal with
animals in the wild animal market, relatively high antibodies
were detected. (What is an antibody? After our human body or
animal is infected with a pathogenic microorganism, it will
produce a substance that protects itself. One of them is called
immunoglobulin, which can exist in animals and humans for
months, years or more) after detecting the antibodies of these
people that they have also been infected with SARS before. This
kind of evidence proves that the civets sold and slaughtered by
people are the direct source of SARS virus infection. At this
time, Guangdong soon issued relevant policies. Guangdong
Province issued an injunction in early 2004 to comprehensively
kill civet cats in the wildlife market, ban wildlife trade and
close the wildlife market. This policy played a very critical role
in controlling the late spread of SARS. After that, there were no
new cases of SARS in Guangdong. Then scientist consider that
is the civet cat the natural host of SARS virus?The researchers
investigated farmed civet cats and wild civet cats across the
country, but found that they had no evidence of infection with
the SARS virus. In the laboratory, SARS virus is used to
artificially infect the civet, and the civet will also get sick and
show symptoms. Obviously, civet cats do not meet the
characteristics of the natural host of the SARS virus. It is only
the intermediate host of the virus, a "transit station" that
spreads the SARS virus from the natural host to people, and the
natural host behind is other animals. The origin of the SARS
virus is still an unsolved mystery. Driven by this mystery of
origin, scientist start Scientists began to focus their research
goals on bats,After 13 years of tracing, scientist finally
determined the bat origin of the SARS virus. Then they are huge
doubting that Since bats are the chief culprits of SARS, have
civets been wronged? Nor is it. Although the root cause of
SARS is not civet, it is a direct source of human infection with
SARS virus. Although SARS has not made a comeback for so
many years, in nature, this virus similar to SARS still exists. If
we humans are not vigilant, then the next virus infection may be
direct infection, or it may infect humans through other animals.
This possibility exists completely.
There is another infectious disease called Ebola, it is a fatal
viral hemorrhagic illness, because people get infection from
Filoviridae family. Infected persons suddenly developed high
Fever, headache, sore throat, weakness, and muscle pain. Then
came vomiting, abdominal pain, and diarrhea. Within two weeks
after the onset of the virus, the virus overflowed, causing
bleeding inside and outside the body, blood clotting, and
necrotic blood to spread quickly to various organs throughout
the body. The patient eventually developed symptoms such as
oral, nasal, and anal bleeding. In approximately 1500 confirmed
cases of Ebola, the mortality rate is as high as 88%. Ebola
caused xxx death in the whole world. In the research, the author
discussed that where Ebola came from, "Fruit bats of
Pteropodidae family, such as Hypsignathus monstrous, Epomops
franqueti, and Myonycteris torquata serve as the natural hosts of
the EBOV in Africa. Nonhuman primates may develop the
infection by eating the partly eaten fruits and may also transmit
the infection to humans.[[4]] Indian population is an impending
threat to EVD, as India falls in the home range of Pteropodidae
family of fruit bats." ( Ebola virus: A global public health
menace: A narrative review.
) from what article talks about, audiences could be clear know
that where how Ebola cause and scientists can use what research
invention to discover medical treatment and vaccine. in history,
the Ebola outbreak at African and Government departments has
controlled the epidemic. However, the most important thing
about Ebola is that everyone knows it will come in the future,
and no one knows the specific time. And Ebola virus will be
variation when each time it comes back. People have no way to
stop him, only protective measures. Finally, the best way people
can protect themselves from Ebola is that people should always
wash hands, avoid contact with body fluids of persons suspected
or diagnosed with Ebola infection, and do not process or
arrange the bodies of persons suspected or diagnosed with
Ebola.
The infectious diseases cause not only personal Physical and
mental injury, but also affect economic development in the
whole world. There is an excellent example of COVID-19, since
coronavirus has speeded about six months, and it affects xxx
countries and xxx people.
Take China for instance, as the first country that was damaged
by the virus, there is a huge loss in China. In the article of BMC
Research Notes, the passage briefly talks about such situation in
China. Accurate and precise data help to support the ideas. In
the article, it mentions that there are 2595 deaths from Covid-19
and there is a potential total fiscal value of Int$ 924,346,795.
Until now, the pandemic has not stopped yet. The loss of China
and furthermore the whole world is increasing exponentially.
Because COVID-19 is severe acute respiratory syndrome
coronavirus two and propagation speed is particularly fast and
appealed to people to stay at home and isolate themselves, The
government had to close many entertainment venues, made
many airlines suspended. The article "CORONAVIRUS
INFECTS THE GLOBAL ECONOMY" discusses how the global
economy is affected by COVID-19. Different fields are affected
by COVID-19, sales performance plummeted. In the research,
the author states that "The virus will nip China's economic
growth… S & P Global cut its forecast of 5.7% growth in
Chinese gross domestic product to 5%." ( CORONAVIRUS
INFECTS THE GLOBAL ECONOMY)It is tangible evidence to
tell the audience that COVID-19 causes the Chinese economy
had considerable fluctuation. China commercial is 20% of
worldwide growth, which proves the global economy will be
affected, attribute from "sharply reduced tourism revenues,
lower exports of consumer and capital goods, lower commodity
prices, and industrial supply-chain disruptions." Additionally,
Luxury brands are suffering from COVID-19, As the epicenter
of the European epidemic, Italy stopped all non-essential
business activities on March 12, and Italian luxury brand Gucci
announced that it would close six factories and all stores in
Italy, and cancel the original scheduled for May 8 in the United
States. The big annual show in San Francisco. French luxury
brand LVMH LVMH Group (LV, Dior, Givenchy, Guerlain, and
other brand parent companies) announced on March 15 that its
multiple brand perfume and cosmetics production lines would
fully produce hand sanitizers and disinfection products to help
France respond to epidemic prevention materials Shortages,
some of its brands in New York and California have closed
stores. French luxury brand Chanel (Chanel) announced on
March 19 that it would gradually close its production bases in
three countries, France, Italy, and Switzerland, with a closing
time of two weeks while closing stores across the United States.
French luxury brand Hermès (Hermès) has also closed 42
production bases. Recently, Switzerland raised the national
epidemic alert level to the highest level of "unusual status".
Swiss watch brand Rolex began to close its factories in Geneva,
Bill, and Crisco at 5 pm local time on March 17 until March.
27th. Swiss watch brand Patek Phillipe (PATEK PHILIPPE)
also announced the closure of the plant until March 27. British
luxury brand Burberry said that over 60% of stores in Europe,
the Middle East, India, and Africa have closed, 85% of stores in
the Americas have been closed, and about one-third of stores in
China have closed. Then supply chains also be affected.
COVID-19 epidemic will disturb some overseas regions and
products, such as computers, automobiles, and electronics,
through the supply chain in the short term. Affected industries
in the country may include a processor, communications, and
other electronic equipment manufacturing, metal products,
machinery and equipment repair, and leather, fur, feathers, and
their products and footwear industry; industries affected by
overseas demand may have consumers Services and retail trade;
affected sectors on the external supply side may include
automobiles, electronics, textiles and clothing, and retail
business. From evidence showed from research, there is a
conclusion that COVID-19 severely impacts the development of
economic, the same as other infectious diseases because the
government needs to promulgate some policies to prevent
human health. They have to stop economic growth first.
In conclusion, judging from the history of several pandemic
pandemics, the government has established a response system
such as early warning, warning, decision-making, and
implementation as the key links. It is necessary to set up a
special health committee to rectify the sanitation of the
ecological environment and organize and coordinate the power
of medical rescue. At the same time, the trend of the global
epidemic of infectious diseases should be incorporated into the
vision of policy makers. The prevention and treatment of
infectious diseases is related to social psychology and social
development, not just health issues. Medicine is science and
humanities.
In those countries which got affected by the pandemic, some of
those are under serious situations right now. Thus, here comes
the question: is the outbreak of the virus in these countries due
to the bad health systems? In fact, incomplete medical system
could be one but certainly not the only one reason that causes it.
There are many unignored facts about the countries that could
also have the negative effects. In the article of Iranian Journal
of Microbiology, the authors illustrate the three main reason
that Iran has so many cases reported than other counties.
Firstly, because Iran was under the sanctions before the Covid-
19, the country has not enough energy to response to such
pandemic. Furthermore, the article mentions the bureaucracies
and executive barriers toward cross-sectoral collaboration
which could cause the situation more seriously. After all, Iran
does not have qualified medical system which could easily
adjust to such disaster. Thus, a country could report so many
cases due to the different facts based on different countries.
RUNNING HEAD: Project Deliverable 1: Project Plan Inception
1
Project Deliverable 1: Project Plan Inception 2
Project Deliverable 1: Project Plan Inception
Dwight Ivey
Professor Jimmie Flores
Graduate Information Systems Capstone
20 April 2020
Background information
Based in San Francisco, Multipobrand Industries is a company
that deals with microfinancing of small business enterprises,
mostly in the computer and mobile technology industries. The
company mainly provides loans to the members of the state and
the country in general that are interested in setting up
businesses that are geared towards technological improvement,
including computers and mobile devices. The company,
however, plans to merger with a multinational microfinance
group to enable it to widen the scope of its financial services
from just financing the technological small business enterprises
to all the general public despite the business.
Currently, with annual revenue of $35 million annually, the
headquarters of the 25-member employee company is on the
fifth floor of Innovation plaza. The company provides financial
loans to its clients through visiting the offices or through
applications and websites that enable one who is registered with
the microfinance institution as a member to be able to access
the loans and repay them through the internet.
Company products and services
As earlier stated, the company mostly invests in providing loans
for small business enterprises to set up the sales of mobile
phones and computers in the state and in the country as a whole.
The loans provided range from short term loans that require
periods of up to one year to offset and long-term loans that take
the period of up to 5 years to offset. The company currently
offers these services either physically or over the internet to
these businesses at interest rates of 6% per annum. There are
systems in place that ensure auditing, reception of the payment,
billing, and issuing of receipts is done automatically (Hermes et
al, 2018). There are also security measures to ensure money
being physically deposited is well protected from malicious
third parties.
Speculations on outsourcing opportunities
Given the company’s recent decision to merge with a
multinational microfinancing group, there will be a broader
scope of activities calling for more efficient systems of
operations. The available opportunities for outsourcing that
might present include cloud hosting companies, security
logistics providers, and courier services. These outsourcing
opportunities will be clearly explained in the subsequent
paragraphs.
First, being a financial institution that provides services through
online platforms, there might be a need for migration to cloud
provision. This is meant to increase efficiency in the online
services being provided and the scalability of the newly merged
company. This will require the intervention of cloud service
providers like Microsoft Azure and Amazon Web Services to
provide cloud computing logistics to the company to enable
efficacy in the process execution and service provision
(Marinescu, 2017).
With the expected increase in the number of clients and
consequently, an increase in funds being transacted, there is a
need for upscale security around the premises. Also, with the
upscale of operational space from one floor to three floors,
there would be a need for implementation of security measures
within the premises. Therefore, the need for intervention of
third-party logistics providers in the provision of security in the
premises will be I place. This 3PL provider will be responsible
for beefing up security around the premise and also within the
premise to ensure malicious third parties infiltrate no
information or physical resources.
Given the wider scope of operations from just funding small
market enterprises to funding the general public and larger
enterprises, there will also be the need for logistics providers’’
intervention in providing courier services to the funds being
transacted. This logistics provider will also be responsible for
overseas shipments and transactions as a merger with the
multinational corporation would mean a significant upgrade of
the company to a multinational scale.
The importance of these third-party logistics providers who are
outsourced by the company is to increase efficiency while at the
same time, reducing costs of operation of the company (Grant,
2019). This reduction of the cost comes in where the
responsibilities of providing the funds towards these services
will be shifted from the company to these providers. There also
will be increased efficiency in the services being provided by
these companies. This is because these companies providing
specific services like shipment, cloud computing, and security
have invested in technologies that ensure they provide the best
quality of services. All these, therefore, work to the overall
advantage of the company.
Description of the current Information Systems of the company
Currently, the company has operational systems running on
computers that are used for auditing services and transaction
services. The software in the computers is meant to analyze
creditworthiness, eligibility, and other verifications of
requirements from clients before their loans are approved. There
is also software that is in place to trace payments of these
systems and those that are meant to run periodical audits
(Zhuhadar et al, 2017). In addition to these systems, there are
databases that are in place to provide the company with storage
of the client information and files that track the financial
records.
Relational databases are currently in use to receive information
from multiple clients and thereafter, analyze them and integrate
them into meaningful data that can be used by the company in
coming up with critical decisions, policy formulations, and
other calculations like accounts receivable and accounts payable
options. There are, however, plans to put into place data
warehousing techniques for more efficient analysis of data from
heterogeneous sources.
Projected Improvements
As earlier indicated, the company intends to adopt data
warehousing and cloud computing options in their
infrastructure. Data warehousing techniques are in place to
ensure that with the big data from merging the two companies
together, there is expected conflict in terms of analysis. The
data warehouse put in place is meant to sort out the data from
both heterogeneous sources, to summarize and consolidate these
pieces of information to desired and meaningful results by both
companies, to check the integrity of the data from various
sources and to build indices and partitions accordingly. This
way, there will be a reconciliation of the data from both
companies and thus smooth running of the merged companies.
Cloud computing will be in place to also ensure efficacy while
cutting on operational costs. With the merger to a multinational
company, there will be increased data traffic on the online
platforms and thus call for more efficient systems of operation
(Cull et al, 2018). With cloud service provision, there are
systems in place to ensure load balancing of the data traffic
while there are problems with specific nodes.
Load balancing, by definition, is the equal distribution of data
throughout the nodes of the system to prevent overloading of
particular nodes at the expense of others. Also, there are
systems in place that direct data to other nodes in the case of
malfunction of others until those malfunctioning nodes are
rectified. This not only improves the efficiency of data
transmission but eliminated downtime for online users.
Cost-cutting strategies associated with migration to cloud for
both companies include the elimination of the need to buy and
replacing physical servers and other computing hardware. This
will mean a reduction of the cost needed for these items.
Consequentially, it eliminates the need for a dedicated team that
is tasked with maintenance and security patching of the systems
periodically. This is because these services are done by cloud
service providers, thus a consequential reduction in the cost of
operating the business (Sampathkumaran et al, 2016).
Addressing Information Security
As with most other companies that are more invested in
internet-based operations, the issue of security of their data is
raised. With the migration to the cloud, there is a security
measure in place to ensure that there is no leakage of
information either from inside or outside sources. To begin
with, two-step authentication of data sources works to ensure
intruders who have no authorization cannot access the data
(Rittinghouse & Ransome, 2016). This can be used by the use of
passwords and pins that generate hash algorithms to the cloud
service providers where a similar algorithm is run against each
time one key in their password and access is only granted upon
a match (Nowrin & Khanam, 2019).
Finally, to address the issue of data loss, there are various
techniques in place by cloud service providers to ensure that
data is not lost, and the possibility of backing up the data. The
use of redundancy by cloud service providers ensures this.
Redundancy refers to the storage of the same information on
various multiple sources (Schultz et al, 2017). This works to be
able to retrieve the information in the case of losses due to any
reason. This also works to ensure a smooth transition of the
business from one server to the other in case of maintenance
schedules. Through this, a business doesn’t have to stop when
servers are being maintained, as there will be an automatic
connection to the next server. This improves the efficiency of
running a business.
References
Cull, R., Demirgüç-Kunt, A., & Morduch, J. (2018). The
microfinance business model: Enduring subsidy and modest
profit. The World Bank Economic Review, 32(2), 221-244.
Retrieved from https://academic.oup.com/wber/article-
abstract/32/2/221/4971668
Grant, D. B. (2019). Outsourcing integration and third party
logistics services: An appreciation of two ‘classic’articles in
industrial marketing management. Industrial Marketing
Management, 79, 21- 26. Retrieved from
https://www.sciencedirect.com/science/article/pii/S001985
0119302093
Hermes, N., Lensink, R., & Meesters, A. (2018). Financial
development and the efficiency of microfinance institutions. In
Research Handbook on Small Business Social Responsibility.
Edward Elgar Publishing. Retrieved from
https://www.elgaronline.com/view/edcoll/9781784711818/
9781784711818.00017.xml
Marinescu, D. C. (2017). Cloud computing: theory and practice.
Morgan Kaufmann. Retrieved from
https://books.google.com/books?hl=en&lr=&id=O9smDwA
AQBAJ&oi=fnd&pg=PP1&
dq=cloud+computing&ots=NOoVIymTwR&sig=Hgn1Faa7
X_QOiGWPqkHAHP4V9Q E
Nowrin, I. N., & Khanam, F. K. (2019, May). Importance of
Cloud Deployment Model and Security Issues of Software as a
Service (SaaS) for Cloud Computing. In 2019 International
Conference on Applied Machine Learning (ICAML) (pp. 183-
186). IEEE. Retrieved from
https://ieeexplore.ieee.org/abstract/document/8989204/
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing:
implementation, management, and security. CRC press.
Retrieved from
https://books.google.com/books?hl=en&lr=&id=YRIeASg
VUJoC&oi=fnd&pg=PP1&dq
=cloud+computing&ots=z7DNr7hgUL&sig=MruXPaJY_y_
6HqXfO67j5Nna61g
Sampathkumaran, R., Chandrasekaran, K., & Ramkumar, A.
(2016). U.S. Patent No. 9,519,695. Washington, DC: U.S.
Patent and Trademark Office. Retrieved from
https://patents.google.com/patent/US9519695B2/en
Schultz, B. M., Gaddehosur, P. R., Garg, M., & Rajwan, J. S.
(2017). U.S. Patent Application No. 14/839,829. Retrieved
from https://patents.google.com/patent/US20170063927A1/en
TAN, W. C., Osman, M. A., Siau, C. J. Y., & Tan, C. C. (2020).
U.S. Patent Application No. 16/019,586. Retrieved from
https://patents.google.com/patent/US20200007523A1/en
Zhuhadar, L., Thrasher, E., Marklin, S., & de Pablos, P. O.
(2017). The next wave of innovation—Review of smart
cities intelligent operation systems. Computers in Human
Behavior, 66, 273-281. Retrieved from
https://www.sciencedirect.com/science/article/pii/S074756
3216306574
Business Requirements
Reference number:
Document Control
Change Record
Date
Author
Version
Change Reference
Reviewers
Name
Position
Table of Contents
2Document Control
1
Business Requirements
4
1.1
Project Overview
4
1.2
Background including current process
4
1.3
Scope
4
1.3.1
Scope of Project
4
1.3.2
Constraints and Assumptions
5
1.3.3
Risks
5
1.3.4
Scope Control
5
1.3.5
Relationship to Other Systems/Projects
5
1.3.6
Definition of Terms (if applicable)
5
1 Business Requirements
1.1 Project Overview
Provide a short, yet complete, overview of the project.
1.2 Background including current process
Describe the background to the project, (same section may be
reused in the Quality Plan) include:
This project is
The project goal is to
The IT role for this project is
1.3 Scope
1.3.1 Scope of Project
The scope of this project includes a number of areas. For each
area, there should be a corresponding strategy for incorporating
these areas into the overall project.
Applications
In order to meet the target production date, only these
applications will be implemented:
Sites
These sites are considered part of the implementation:
Process Re-engineering
Re-engineering will
Customization
Customizations will be limited to
Interfaces
the interfaces included are:
Architecture
Application and Technical Architecture will
Conversion
Only the following data and volume will be considered for
conversion:
Testing
Testing will include only
Funding
Project funding is limited to
Training
Training will be
Education
Education will include
1.3.2 Constraints and Assumptions
The following constraints have been identified:
The following assumptions have been made in defining the
scope, objectives and approach:
1.3.3 Risks
The following risks have been identified as possibly affecting
the project during its progression:
1.3.4 Scope Control
The control of changes to the scope identified in this document
will be managed through the Change Control, with business
owner representative approval for any changes that affect cost
or timeline for the project.
1.3.5 Relationship to Other Systems/Projects
It is the responsibility of the business unit to inform IT of other
business initiatives that may impact the project. The following
are known business initiatives:
1.3.6 Definition of Terms (if applicable)
List any definitions that will be used throughout the duration of
the project.
5

More Related Content

Similar to Impact of infectious diseases As people know, now the COVID-1.docx

Ebola virus disease [ bio project ]
Ebola virus disease [ bio project ] Ebola virus disease [ bio project ]
Ebola virus disease [ bio project ] Abhishek Nayak
 
The coronavirus disease covid-19
The coronavirus disease  covid-19The coronavirus disease  covid-19
The coronavirus disease covid-19Mrsunny4
 
Coronavirus 2020, the essential guide to the Wuhan virus - Mark Bradley
Coronavirus 2020, the essential guide to the Wuhan virus - Mark BradleyCoronavirus 2020, the essential guide to the Wuhan virus - Mark Bradley
Coronavirus 2020, the essential guide to the Wuhan virus - Mark BradleyKaroline Barreda Gutiérrez
 
Coronavirus: All you need to know about symptoms and risks
Coronavirus: All you need to know about symptoms and risksCoronavirus: All you need to know about symptoms and risks
Coronavirus: All you need to know about symptoms and risksahmiz2428
 
Tick-Borne Case Study On Lyme
Tick-Borne Case Study On LymeTick-Borne Case Study On Lyme
Tick-Borne Case Study On LymeCindy Wooten
 
Novel corona virus 2019 (2019 - nCov)
Novel corona virus 2019 (2019 - nCov) Novel corona virus 2019 (2019 - nCov)
Novel corona virus 2019 (2019 - nCov) Ashraf ElAdawy
 
Ebola biology investigatory project
Ebola biology investigatory projectEbola biology investigatory project
Ebola biology investigatory projectShilpi Srivastava
 

Similar to Impact of infectious diseases As people know, now the COVID-1.docx (12)

Smallpox
 Smallpox  Smallpox
Smallpox
 
Ebola virus disease [ bio project ]
Ebola virus disease [ bio project ] Ebola virus disease [ bio project ]
Ebola virus disease [ bio project ]
 
The coronavirus disease covid-19
The coronavirus disease  covid-19The coronavirus disease  covid-19
The coronavirus disease covid-19
 
Coronavirus 2020, the essential guide to the Wuhan virus - Mark Bradley
Coronavirus 2020, the essential guide to the Wuhan virus - Mark BradleyCoronavirus 2020, the essential guide to the Wuhan virus - Mark Bradley
Coronavirus 2020, the essential guide to the Wuhan virus - Mark Bradley
 
Coronavirus: All you need to know about symptoms and risks
Coronavirus: All you need to know about symptoms and risksCoronavirus: All you need to know about symptoms and risks
Coronavirus: All you need to know about symptoms and risks
 
Pets vs covid 19
Pets vs covid 19Pets vs covid 19
Pets vs covid 19
 
Tick-Borne Case Study On Lyme
Tick-Borne Case Study On LymeTick-Borne Case Study On Lyme
Tick-Borne Case Study On Lyme
 
Novel corona virus 2019 (2019 - nCov)
Novel corona virus 2019 (2019 - nCov) Novel corona virus 2019 (2019 - nCov)
Novel corona virus 2019 (2019 - nCov)
 
Ebola biology investigatory project
Ebola biology investigatory projectEbola biology investigatory project
Ebola biology investigatory project
 
smallpox
smallpoxsmallpox
smallpox
 
Policy
PolicyPolicy
Policy
 
Grade 6 Mapeh
Grade 6 MapehGrade 6 Mapeh
Grade 6 Mapeh
 

More from charisellington63520

in addition to these questions also answer the following;Answer .docx
in addition to these questions also answer the following;Answer .docxin addition to these questions also answer the following;Answer .docx
in addition to these questions also answer the following;Answer .docxcharisellington63520
 
In an environment of compliancy laws, regulations, and standards, in.docx
In an environment of compliancy laws, regulations, and standards, in.docxIn an environment of compliancy laws, regulations, and standards, in.docx
In an environment of compliancy laws, regulations, and standards, in.docxcharisellington63520
 
In American politics, people often compare their enemies to Hitler o.docx
In American politics, people often compare their enemies to Hitler o.docxIn American politics, people often compare their enemies to Hitler o.docx
In American politics, people often compare their enemies to Hitler o.docxcharisellington63520
 
In addition to the thread, the student is required to reply to 2 oth.docx
In addition to the thread, the student is required to reply to 2 oth.docxIn addition to the thread, the student is required to reply to 2 oth.docx
In addition to the thread, the student is required to reply to 2 oth.docxcharisellington63520
 
In addition to reading the Announcements, prepare for this d.docx
In addition to reading the Announcements, prepare for this d.docxIn addition to reading the Announcements, prepare for this d.docx
In addition to reading the Announcements, prepare for this d.docxcharisellington63520
 
In Act 4 during the trial scene, Bassanio says the following lin.docx
In Act 4 during the trial scene, Bassanio says the following lin.docxIn Act 4 during the trial scene, Bassanio says the following lin.docx
In Act 4 during the trial scene, Bassanio says the following lin.docxcharisellington63520
 
In a Word document, please respond to the following questions.docx
In a Word document, please respond to the following questions.docxIn a Word document, please respond to the following questions.docx
In a Word document, please respond to the following questions.docxcharisellington63520
 
In a Word document, create A Set of Instructions. (you will want.docx
In a Word document, create A Set of Instructions. (you will want.docxIn a Word document, create A Set of Instructions. (you will want.docx
In a Word document, create A Set of Instructions. (you will want.docxcharisellington63520
 
In a two page response MLA format paperMaria Werner talks about .docx
In a two page response MLA format paperMaria Werner talks about .docxIn a two page response MLA format paperMaria Werner talks about .docx
In a two page response MLA format paperMaria Werner talks about .docxcharisellington63520
 
In a paragraph (150 words minimum), please respond to the follow.docx
In a paragraph (150 words minimum), please respond to the follow.docxIn a paragraph (150 words minimum), please respond to the follow.docx
In a paragraph (150 words minimum), please respond to the follow.docxcharisellington63520
 
In a paragraph form, discuss the belowThe client comes to t.docx
In a paragraph form, discuss the belowThe client comes to t.docxIn a paragraph form, discuss the belowThe client comes to t.docx
In a paragraph form, discuss the belowThe client comes to t.docxcharisellington63520
 
In a minimum of 300 words in APA format.Through the advent o.docx
In a minimum of 300 words in APA format.Through the advent o.docxIn a minimum of 300 words in APA format.Through the advent o.docx
In a minimum of 300 words in APA format.Through the advent o.docxcharisellington63520
 
In a paragraph form, post your initial response after reading th.docx
In a paragraph form, post your initial response after reading th.docxIn a paragraph form, post your initial response after reading th.docx
In a paragraph form, post your initial response after reading th.docxcharisellington63520
 
In a minimum 250-word paragraph, discuss at least one point the auth.docx
In a minimum 250-word paragraph, discuss at least one point the auth.docxIn a minimum 250-word paragraph, discuss at least one point the auth.docx
In a minimum 250-word paragraph, discuss at least one point the auth.docxcharisellington63520
 
In a hostage crisis, is it ethical for a government to agree to gran.docx
In a hostage crisis, is it ethical for a government to agree to gran.docxIn a hostage crisis, is it ethical for a government to agree to gran.docx
In a hostage crisis, is it ethical for a government to agree to gran.docxcharisellington63520
 
In a double-spaced 12 Font paper  How did you immediately feel a.docx
In a double-spaced 12 Font paper  How did you immediately feel a.docxIn a double-spaced 12 Font paper  How did you immediately feel a.docx
In a double-spaced 12 Font paper  How did you immediately feel a.docxcharisellington63520
 
In a follow-up to your IoT discussion with management, you have .docx
In a follow-up to your IoT discussion with management, you have .docxIn a follow-up to your IoT discussion with management, you have .docx
In a follow-up to your IoT discussion with management, you have .docxcharisellington63520
 
In a COVID-19 situation identify the guidelines for ethical use of t.docx
In a COVID-19 situation identify the guidelines for ethical use of t.docxIn a COVID-19 situation identify the guidelines for ethical use of t.docx
In a COVID-19 situation identify the guidelines for ethical use of t.docxcharisellington63520
 
In a 750- to 1,250-word paper, evaluate the implications of Internet.docx
In a 750- to 1,250-word paper, evaluate the implications of Internet.docxIn a 750- to 1,250-word paper, evaluate the implications of Internet.docx
In a 750- to 1,250-word paper, evaluate the implications of Internet.docxcharisellington63520
 
In a 600 word count (EACH bullet point having 300 words each) di.docx
In a 600 word count (EACH bullet point having 300 words each) di.docxIn a 600 word count (EACH bullet point having 300 words each) di.docx
In a 600 word count (EACH bullet point having 300 words each) di.docxcharisellington63520
 

More from charisellington63520 (20)

in addition to these questions also answer the following;Answer .docx
in addition to these questions also answer the following;Answer .docxin addition to these questions also answer the following;Answer .docx
in addition to these questions also answer the following;Answer .docx
 
In an environment of compliancy laws, regulations, and standards, in.docx
In an environment of compliancy laws, regulations, and standards, in.docxIn an environment of compliancy laws, regulations, and standards, in.docx
In an environment of compliancy laws, regulations, and standards, in.docx
 
In American politics, people often compare their enemies to Hitler o.docx
In American politics, people often compare their enemies to Hitler o.docxIn American politics, people often compare their enemies to Hitler o.docx
In American politics, people often compare their enemies to Hitler o.docx
 
In addition to the thread, the student is required to reply to 2 oth.docx
In addition to the thread, the student is required to reply to 2 oth.docxIn addition to the thread, the student is required to reply to 2 oth.docx
In addition to the thread, the student is required to reply to 2 oth.docx
 
In addition to reading the Announcements, prepare for this d.docx
In addition to reading the Announcements, prepare for this d.docxIn addition to reading the Announcements, prepare for this d.docx
In addition to reading the Announcements, prepare for this d.docx
 
In Act 4 during the trial scene, Bassanio says the following lin.docx
In Act 4 during the trial scene, Bassanio says the following lin.docxIn Act 4 during the trial scene, Bassanio says the following lin.docx
In Act 4 during the trial scene, Bassanio says the following lin.docx
 
In a Word document, please respond to the following questions.docx
In a Word document, please respond to the following questions.docxIn a Word document, please respond to the following questions.docx
In a Word document, please respond to the following questions.docx
 
In a Word document, create A Set of Instructions. (you will want.docx
In a Word document, create A Set of Instructions. (you will want.docxIn a Word document, create A Set of Instructions. (you will want.docx
In a Word document, create A Set of Instructions. (you will want.docx
 
In a two page response MLA format paperMaria Werner talks about .docx
In a two page response MLA format paperMaria Werner talks about .docxIn a two page response MLA format paperMaria Werner talks about .docx
In a two page response MLA format paperMaria Werner talks about .docx
 
In a paragraph (150 words minimum), please respond to the follow.docx
In a paragraph (150 words minimum), please respond to the follow.docxIn a paragraph (150 words minimum), please respond to the follow.docx
In a paragraph (150 words minimum), please respond to the follow.docx
 
In a paragraph form, discuss the belowThe client comes to t.docx
In a paragraph form, discuss the belowThe client comes to t.docxIn a paragraph form, discuss the belowThe client comes to t.docx
In a paragraph form, discuss the belowThe client comes to t.docx
 
In a minimum of 300 words in APA format.Through the advent o.docx
In a minimum of 300 words in APA format.Through the advent o.docxIn a minimum of 300 words in APA format.Through the advent o.docx
In a minimum of 300 words in APA format.Through the advent o.docx
 
In a paragraph form, post your initial response after reading th.docx
In a paragraph form, post your initial response after reading th.docxIn a paragraph form, post your initial response after reading th.docx
In a paragraph form, post your initial response after reading th.docx
 
In a minimum 250-word paragraph, discuss at least one point the auth.docx
In a minimum 250-word paragraph, discuss at least one point the auth.docxIn a minimum 250-word paragraph, discuss at least one point the auth.docx
In a minimum 250-word paragraph, discuss at least one point the auth.docx
 
In a hostage crisis, is it ethical for a government to agree to gran.docx
In a hostage crisis, is it ethical for a government to agree to gran.docxIn a hostage crisis, is it ethical for a government to agree to gran.docx
In a hostage crisis, is it ethical for a government to agree to gran.docx
 
In a double-spaced 12 Font paper  How did you immediately feel a.docx
In a double-spaced 12 Font paper  How did you immediately feel a.docxIn a double-spaced 12 Font paper  How did you immediately feel a.docx
In a double-spaced 12 Font paper  How did you immediately feel a.docx
 
In a follow-up to your IoT discussion with management, you have .docx
In a follow-up to your IoT discussion with management, you have .docxIn a follow-up to your IoT discussion with management, you have .docx
In a follow-up to your IoT discussion with management, you have .docx
 
In a COVID-19 situation identify the guidelines for ethical use of t.docx
In a COVID-19 situation identify the guidelines for ethical use of t.docxIn a COVID-19 situation identify the guidelines for ethical use of t.docx
In a COVID-19 situation identify the guidelines for ethical use of t.docx
 
In a 750- to 1,250-word paper, evaluate the implications of Internet.docx
In a 750- to 1,250-word paper, evaluate the implications of Internet.docxIn a 750- to 1,250-word paper, evaluate the implications of Internet.docx
In a 750- to 1,250-word paper, evaluate the implications of Internet.docx
 
In a 600 word count (EACH bullet point having 300 words each) di.docx
In a 600 word count (EACH bullet point having 300 words each) di.docxIn a 600 word count (EACH bullet point having 300 words each) di.docx
In a 600 word count (EACH bullet point having 300 words each) di.docx
 

Recently uploaded

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 

Recently uploaded (20)

The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 

Impact of infectious diseases As people know, now the COVID-1.docx

  • 1. Impact of infectious diseases As people know, now the COVID-19 is quite serious and spreading rapidly. And people do not have a curing method about it. COVID-19 causes xxx confirmed diagnosis and xxx death in the whole world. Also, people still don't know where COVID-19 comes from and how we can protect ourselves from being healthy. From COVID-19, people should have profound thinking about why infection diseases cause and how can human avoid virus infection and how can government-run do during the virus outbreak and reconstruction after the outbreak. Historically, there are so many infection diseases in the world, such as SARAS, Ebola, HIV and COVID-19. Most infectious diseases are caused by microorganisms, such as bacteria, viruses, parasites, or fungi. Diseases can be spread from person to person, directly or indirectly. Zoonotic diseases are infectious diseases of animals that can cause diseases when spread to humans. However, infectious diseases are caused by multiple reasons, mostly infectious is from animals, because some animals they carry the virus in their body, those viruses may not affect themselves, however, when spreading of the virus, the virus will mutate to parasitize humans, and human's body will have an overt reaction to the virus. In this article, it will discuss 4 infectious diseases, SARAS, HIV, Ebola, and COVID-19. In the first place, whenever someone always have doubts where infectious diseases from, how infectious diseases are formed. 普遍上来说,Infectious diseases usually have a great harm rate, because when an infectious disease breaks out, the doctors usually do not have any preparations, so they can not treat the disease well, or sometimes they can infect the doctor themselves. If people want to protect them in order to avoid disease, the most considerable thing is that they must know least one infectious history, such as how it formed, who is more susceptible to infection, does it have any medical treatment,
  • 2. does it success. SARAS is a typical example about it. Practically, SARS-CoV is the severe acute respiratory syndrome coronavirus, and it is deadly infectious diseases and people are also easily infected. SARS- CoV cause 8096 cases, including 774 deaths, in 37 countries for 8 months. The transmit speed of SRAS is very fast, people who get infection, they always have Fever, cough, difficulty breathing, chest radiographs showing shadows of both lungs, and some patients developed respiratory failure. Unfortunately, the use of antibiotics against bacterial infections has not worked. And SRAS infectious for people is depend on the strength of the personal resistance occurs. From research, SRAS-CoV's occurrence of spreading in wild animals. Because the scientist are aware of SRAS virus related to the spread of wild animals. Following this clue, the scientists first targeted the Guangdong wildlife market, and soon isolated and detected exactly the same virus as the SARS virus in the civet cats on the market. Furthermore, in these humans who deal with animals in the wild animal market, relatively high antibodies were detected. (What is an antibody? After our human body or animal is infected with a pathogenic microorganism, it will produce a substance that protects itself. One of them is called immunoglobulin, which can exist in animals and humans for months, years or more) after detecting the antibodies of these people that they have also been infected with SARS before. This kind of evidence proves that the civets sold and slaughtered by people are the direct source of SARS virus infection. At this time, Guangdong soon issued relevant policies. Guangdong Province issued an injunction in early 2004 to comprehensively kill civet cats in the wildlife market, ban wildlife trade and close the wildlife market. This policy played a very critical role in controlling the late spread of SARS. After that, there were no new cases of SARS in Guangdong. Then scientist consider that is the civet cat the natural host of SARS virus?The researchers investigated farmed civet cats and wild civet cats across the country, but found that they had no evidence of infection with the SARS virus. In the laboratory, SARS virus is used to
  • 3. artificially infect the civet, and the civet will also get sick and show symptoms. Obviously, civet cats do not meet the characteristics of the natural host of the SARS virus. It is only the intermediate host of the virus, a "transit station" that spreads the SARS virus from the natural host to people, and the natural host behind is other animals. The origin of the SARS virus is still an unsolved mystery. Driven by this mystery of origin, scientist start Scientists began to focus their research goals on bats,After 13 years of tracing, scientist finally determined the bat origin of the SARS virus. Then they are huge doubting that Since bats are the chief culprits of SARS, have civets been wronged? Nor is it. Although the root cause of SARS is not civet, it is a direct source of human infection with SARS virus. Although SARS has not made a comeback for so many years, in nature, this virus similar to SARS still exists. If we humans are not vigilant, then the next virus infection may be direct infection, or it may infect humans through other animals. This possibility exists completely. There is another infectious disease called Ebola, it is a fatal viral hemorrhagic illness, because people get infection from Filoviridae family. Infected persons suddenly developed high Fever, headache, sore throat, weakness, and muscle pain. Then came vomiting, abdominal pain, and diarrhea. Within two weeks after the onset of the virus, the virus overflowed, causing bleeding inside and outside the body, blood clotting, and necrotic blood to spread quickly to various organs throughout the body. The patient eventually developed symptoms such as oral, nasal, and anal bleeding. In approximately 1500 confirmed cases of Ebola, the mortality rate is as high as 88%. Ebola caused xxx death in the whole world. In the research, the author discussed that where Ebola came from, "Fruit bats of Pteropodidae family, such as Hypsignathus monstrous, Epomops franqueti, and Myonycteris torquata serve as the natural hosts of the EBOV in Africa. Nonhuman primates may develop the infection by eating the partly eaten fruits and may also transmit the infection to humans.[[4]] Indian population is an impending
  • 4. threat to EVD, as India falls in the home range of Pteropodidae family of fruit bats." ( Ebola virus: A global public health menace: A narrative review. ) from what article talks about, audiences could be clear know that where how Ebola cause and scientists can use what research invention to discover medical treatment and vaccine. in history, the Ebola outbreak at African and Government departments has controlled the epidemic. However, the most important thing about Ebola is that everyone knows it will come in the future, and no one knows the specific time. And Ebola virus will be variation when each time it comes back. People have no way to stop him, only protective measures. Finally, the best way people can protect themselves from Ebola is that people should always wash hands, avoid contact with body fluids of persons suspected or diagnosed with Ebola infection, and do not process or arrange the bodies of persons suspected or diagnosed with Ebola. The infectious diseases cause not only personal Physical and mental injury, but also affect economic development in the whole world. There is an excellent example of COVID-19, since coronavirus has speeded about six months, and it affects xxx countries and xxx people. Take China for instance, as the first country that was damaged by the virus, there is a huge loss in China. In the article of BMC Research Notes, the passage briefly talks about such situation in China. Accurate and precise data help to support the ideas. In the article, it mentions that there are 2595 deaths from Covid-19 and there is a potential total fiscal value of Int$ 924,346,795. Until now, the pandemic has not stopped yet. The loss of China and furthermore the whole world is increasing exponentially. Because COVID-19 is severe acute respiratory syndrome coronavirus two and propagation speed is particularly fast and appealed to people to stay at home and isolate themselves, The government had to close many entertainment venues, made many airlines suspended. The article "CORONAVIRUS
  • 5. INFECTS THE GLOBAL ECONOMY" discusses how the global economy is affected by COVID-19. Different fields are affected by COVID-19, sales performance plummeted. In the research, the author states that "The virus will nip China's economic growth… S & P Global cut its forecast of 5.7% growth in Chinese gross domestic product to 5%." ( CORONAVIRUS INFECTS THE GLOBAL ECONOMY)It is tangible evidence to tell the audience that COVID-19 causes the Chinese economy had considerable fluctuation. China commercial is 20% of worldwide growth, which proves the global economy will be affected, attribute from "sharply reduced tourism revenues, lower exports of consumer and capital goods, lower commodity prices, and industrial supply-chain disruptions." Additionally, Luxury brands are suffering from COVID-19, As the epicenter of the European epidemic, Italy stopped all non-essential business activities on March 12, and Italian luxury brand Gucci announced that it would close six factories and all stores in Italy, and cancel the original scheduled for May 8 in the United States. The big annual show in San Francisco. French luxury brand LVMH LVMH Group (LV, Dior, Givenchy, Guerlain, and other brand parent companies) announced on March 15 that its multiple brand perfume and cosmetics production lines would fully produce hand sanitizers and disinfection products to help France respond to epidemic prevention materials Shortages, some of its brands in New York and California have closed stores. French luxury brand Chanel (Chanel) announced on March 19 that it would gradually close its production bases in three countries, France, Italy, and Switzerland, with a closing time of two weeks while closing stores across the United States. French luxury brand Hermès (Hermès) has also closed 42 production bases. Recently, Switzerland raised the national epidemic alert level to the highest level of "unusual status". Swiss watch brand Rolex began to close its factories in Geneva, Bill, and Crisco at 5 pm local time on March 17 until March. 27th. Swiss watch brand Patek Phillipe (PATEK PHILIPPE) also announced the closure of the plant until March 27. British
  • 6. luxury brand Burberry said that over 60% of stores in Europe, the Middle East, India, and Africa have closed, 85% of stores in the Americas have been closed, and about one-third of stores in China have closed. Then supply chains also be affected. COVID-19 epidemic will disturb some overseas regions and products, such as computers, automobiles, and electronics, through the supply chain in the short term. Affected industries in the country may include a processor, communications, and other electronic equipment manufacturing, metal products, machinery and equipment repair, and leather, fur, feathers, and their products and footwear industry; industries affected by overseas demand may have consumers Services and retail trade; affected sectors on the external supply side may include automobiles, electronics, textiles and clothing, and retail business. From evidence showed from research, there is a conclusion that COVID-19 severely impacts the development of economic, the same as other infectious diseases because the government needs to promulgate some policies to prevent human health. They have to stop economic growth first. In conclusion, judging from the history of several pandemic pandemics, the government has established a response system such as early warning, warning, decision-making, and implementation as the key links. It is necessary to set up a special health committee to rectify the sanitation of the ecological environment and organize and coordinate the power of medical rescue. At the same time, the trend of the global epidemic of infectious diseases should be incorporated into the vision of policy makers. The prevention and treatment of infectious diseases is related to social psychology and social development, not just health issues. Medicine is science and humanities. In those countries which got affected by the pandemic, some of those are under serious situations right now. Thus, here comes the question: is the outbreak of the virus in these countries due to the bad health systems? In fact, incomplete medical system could be one but certainly not the only one reason that causes it.
  • 7. There are many unignored facts about the countries that could also have the negative effects. In the article of Iranian Journal of Microbiology, the authors illustrate the three main reason that Iran has so many cases reported than other counties. Firstly, because Iran was under the sanctions before the Covid- 19, the country has not enough energy to response to such pandemic. Furthermore, the article mentions the bureaucracies and executive barriers toward cross-sectoral collaboration which could cause the situation more seriously. After all, Iran does not have qualified medical system which could easily adjust to such disaster. Thus, a country could report so many cases due to the different facts based on different countries. RUNNING HEAD: Project Deliverable 1: Project Plan Inception 1 Project Deliverable 1: Project Plan Inception 2
  • 8. Project Deliverable 1: Project Plan Inception Dwight Ivey Professor Jimmie Flores Graduate Information Systems Capstone 20 April 2020 Background information Based in San Francisco, Multipobrand Industries is a company that deals with microfinancing of small business enterprises, mostly in the computer and mobile technology industries. The company mainly provides loans to the members of the state and the country in general that are interested in setting up businesses that are geared towards technological improvement, including computers and mobile devices. The company, however, plans to merger with a multinational microfinance group to enable it to widen the scope of its financial services from just financing the technological small business enterprises to all the general public despite the business. Currently, with annual revenue of $35 million annually, the headquarters of the 25-member employee company is on the fifth floor of Innovation plaza. The company provides financial loans to its clients through visiting the offices or through applications and websites that enable one who is registered with the microfinance institution as a member to be able to access
  • 9. the loans and repay them through the internet. Company products and services As earlier stated, the company mostly invests in providing loans for small business enterprises to set up the sales of mobile phones and computers in the state and in the country as a whole. The loans provided range from short term loans that require periods of up to one year to offset and long-term loans that take the period of up to 5 years to offset. The company currently offers these services either physically or over the internet to these businesses at interest rates of 6% per annum. There are systems in place that ensure auditing, reception of the payment, billing, and issuing of receipts is done automatically (Hermes et al, 2018). There are also security measures to ensure money being physically deposited is well protected from malicious third parties. Speculations on outsourcing opportunities Given the company’s recent decision to merge with a multinational microfinancing group, there will be a broader scope of activities calling for more efficient systems of operations. The available opportunities for outsourcing that might present include cloud hosting companies, security logistics providers, and courier services. These outsourcing opportunities will be clearly explained in the subsequent paragraphs. First, being a financial institution that provides services through online platforms, there might be a need for migration to cloud provision. This is meant to increase efficiency in the online services being provided and the scalability of the newly merged company. This will require the intervention of cloud service providers like Microsoft Azure and Amazon Web Services to provide cloud computing logistics to the company to enable efficacy in the process execution and service provision (Marinescu, 2017). With the expected increase in the number of clients and consequently, an increase in funds being transacted, there is a need for upscale security around the premises. Also, with the
  • 10. upscale of operational space from one floor to three floors, there would be a need for implementation of security measures within the premises. Therefore, the need for intervention of third-party logistics providers in the provision of security in the premises will be I place. This 3PL provider will be responsible for beefing up security around the premise and also within the premise to ensure malicious third parties infiltrate no information or physical resources. Given the wider scope of operations from just funding small market enterprises to funding the general public and larger enterprises, there will also be the need for logistics providers’’ intervention in providing courier services to the funds being transacted. This logistics provider will also be responsible for overseas shipments and transactions as a merger with the multinational corporation would mean a significant upgrade of the company to a multinational scale. The importance of these third-party logistics providers who are outsourced by the company is to increase efficiency while at the same time, reducing costs of operation of the company (Grant, 2019). This reduction of the cost comes in where the responsibilities of providing the funds towards these services will be shifted from the company to these providers. There also will be increased efficiency in the services being provided by these companies. This is because these companies providing specific services like shipment, cloud computing, and security have invested in technologies that ensure they provide the best quality of services. All these, therefore, work to the overall advantage of the company. Description of the current Information Systems of the company Currently, the company has operational systems running on computers that are used for auditing services and transaction services. The software in the computers is meant to analyze creditworthiness, eligibility, and other verifications of requirements from clients before their loans are approved. There is also software that is in place to trace payments of these systems and those that are meant to run periodical audits
  • 11. (Zhuhadar et al, 2017). In addition to these systems, there are databases that are in place to provide the company with storage of the client information and files that track the financial records. Relational databases are currently in use to receive information from multiple clients and thereafter, analyze them and integrate them into meaningful data that can be used by the company in coming up with critical decisions, policy formulations, and other calculations like accounts receivable and accounts payable options. There are, however, plans to put into place data warehousing techniques for more efficient analysis of data from heterogeneous sources. Projected Improvements As earlier indicated, the company intends to adopt data warehousing and cloud computing options in their infrastructure. Data warehousing techniques are in place to ensure that with the big data from merging the two companies together, there is expected conflict in terms of analysis. The data warehouse put in place is meant to sort out the data from both heterogeneous sources, to summarize and consolidate these pieces of information to desired and meaningful results by both companies, to check the integrity of the data from various sources and to build indices and partitions accordingly. This way, there will be a reconciliation of the data from both companies and thus smooth running of the merged companies. Cloud computing will be in place to also ensure efficacy while cutting on operational costs. With the merger to a multinational company, there will be increased data traffic on the online platforms and thus call for more efficient systems of operation (Cull et al, 2018). With cloud service provision, there are systems in place to ensure load balancing of the data traffic while there are problems with specific nodes. Load balancing, by definition, is the equal distribution of data throughout the nodes of the system to prevent overloading of particular nodes at the expense of others. Also, there are systems in place that direct data to other nodes in the case of
  • 12. malfunction of others until those malfunctioning nodes are rectified. This not only improves the efficiency of data transmission but eliminated downtime for online users. Cost-cutting strategies associated with migration to cloud for both companies include the elimination of the need to buy and replacing physical servers and other computing hardware. This will mean a reduction of the cost needed for these items. Consequentially, it eliminates the need for a dedicated team that is tasked with maintenance and security patching of the systems periodically. This is because these services are done by cloud service providers, thus a consequential reduction in the cost of operating the business (Sampathkumaran et al, 2016). Addressing Information Security As with most other companies that are more invested in internet-based operations, the issue of security of their data is raised. With the migration to the cloud, there is a security measure in place to ensure that there is no leakage of information either from inside or outside sources. To begin with, two-step authentication of data sources works to ensure intruders who have no authorization cannot access the data (Rittinghouse & Ransome, 2016). This can be used by the use of passwords and pins that generate hash algorithms to the cloud service providers where a similar algorithm is run against each time one key in their password and access is only granted upon a match (Nowrin & Khanam, 2019). Finally, to address the issue of data loss, there are various techniques in place by cloud service providers to ensure that data is not lost, and the possibility of backing up the data. The use of redundancy by cloud service providers ensures this. Redundancy refers to the storage of the same information on various multiple sources (Schultz et al, 2017). This works to be able to retrieve the information in the case of losses due to any reason. This also works to ensure a smooth transition of the business from one server to the other in case of maintenance schedules. Through this, a business doesn’t have to stop when
  • 13. servers are being maintained, as there will be an automatic connection to the next server. This improves the efficiency of running a business. References Cull, R., Demirgüç-Kunt, A., & Morduch, J. (2018). The microfinance business model: Enduring subsidy and modest profit. The World Bank Economic Review, 32(2), 221-244. Retrieved from https://academic.oup.com/wber/article- abstract/32/2/221/4971668 Grant, D. B. (2019). Outsourcing integration and third party logistics services: An appreciation of two ‘classic’articles in industrial marketing management. Industrial Marketing Management, 79, 21- 26. Retrieved from https://www.sciencedirect.com/science/article/pii/S001985 0119302093 Hermes, N., Lensink, R., & Meesters, A. (2018). Financial development and the efficiency of microfinance institutions. In Research Handbook on Small Business Social Responsibility. Edward Elgar Publishing. Retrieved from https://www.elgaronline.com/view/edcoll/9781784711818/ 9781784711818.00017.xml Marinescu, D. C. (2017). Cloud computing: theory and practice. Morgan Kaufmann. Retrieved from https://books.google.com/books?hl=en&lr=&id=O9smDwA AQBAJ&oi=fnd&pg=PP1& dq=cloud+computing&ots=NOoVIymTwR&sig=Hgn1Faa7 X_QOiGWPqkHAHP4V9Q E Nowrin, I. N., & Khanam, F. K. (2019, May). Importance of Cloud Deployment Model and Security Issues of Software as a Service (SaaS) for Cloud Computing. In 2019 International Conference on Applied Machine Learning (ICAML) (pp. 183- 186). IEEE. Retrieved from https://ieeexplore.ieee.org/abstract/document/8989204/ Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation, management, and security. CRC press.
  • 14. Retrieved from https://books.google.com/books?hl=en&lr=&id=YRIeASg VUJoC&oi=fnd&pg=PP1&dq =cloud+computing&ots=z7DNr7hgUL&sig=MruXPaJY_y_ 6HqXfO67j5Nna61g Sampathkumaran, R., Chandrasekaran, K., & Ramkumar, A. (2016). U.S. Patent No. 9,519,695. Washington, DC: U.S. Patent and Trademark Office. Retrieved from https://patents.google.com/patent/US9519695B2/en Schultz, B. M., Gaddehosur, P. R., Garg, M., & Rajwan, J. S. (2017). U.S. Patent Application No. 14/839,829. Retrieved from https://patents.google.com/patent/US20170063927A1/en TAN, W. C., Osman, M. A., Siau, C. J. Y., & Tan, C. C. (2020). U.S. Patent Application No. 16/019,586. Retrieved from https://patents.google.com/patent/US20200007523A1/en Zhuhadar, L., Thrasher, E., Marklin, S., & de Pablos, P. O. (2017). The next wave of innovation—Review of smart cities intelligent operation systems. Computers in Human Behavior, 66, 273-281. Retrieved from https://www.sciencedirect.com/science/article/pii/S074756 3216306574 Business Requirements Reference number: Document Control Change Record Date Author Version Change Reference
  • 15. Reviewers Name Position Table of Contents 2Document Control 1 Business Requirements 4 1.1 Project Overview 4
  • 16. 1.2 Background including current process 4 1.3 Scope 4 1.3.1 Scope of Project 4 1.3.2 Constraints and Assumptions 5 1.3.3 Risks 5 1.3.4 Scope Control 5 1.3.5 Relationship to Other Systems/Projects 5 1.3.6 Definition of Terms (if applicable) 5 1 Business Requirements 1.1 Project Overview Provide a short, yet complete, overview of the project. 1.2 Background including current process Describe the background to the project, (same section may be reused in the Quality Plan) include: This project is The project goal is to
  • 17. The IT role for this project is 1.3 Scope 1.3.1 Scope of Project The scope of this project includes a number of areas. For each area, there should be a corresponding strategy for incorporating these areas into the overall project. Applications In order to meet the target production date, only these applications will be implemented: Sites These sites are considered part of the implementation: Process Re-engineering Re-engineering will Customization Customizations will be limited to Interfaces the interfaces included are: Architecture Application and Technical Architecture will Conversion Only the following data and volume will be considered for conversion: Testing Testing will include only
  • 18. Funding Project funding is limited to Training Training will be Education Education will include 1.3.2 Constraints and Assumptions The following constraints have been identified: The following assumptions have been made in defining the scope, objectives and approach: 1.3.3 Risks The following risks have been identified as possibly affecting the project during its progression: 1.3.4 Scope Control The control of changes to the scope identified in this document will be managed through the Change Control, with business owner representative approval for any changes that affect cost or timeline for the project. 1.3.5 Relationship to Other Systems/Projects It is the responsibility of the business unit to inform IT of other business initiatives that may impact the project. The following are known business initiatives:
  • 19. 1.3.6 Definition of Terms (if applicable) List any definitions that will be used throughout the duration of the project. 5