SlideShare a Scribd company logo
Student Name: Comment by Ahmad Al-Sadi:
Student ID:
Overall Given Mark:
/ 20
Instructions:
Based on the given case study of Mr. Brusca, write your
answers on the giving space using this answer sheet and upload
it on Blackboard before the 48 hours since begging of the exam.
Question Number 1: What questions might be useful to elicit
further details surrounding the Chest pain, using one of the
common acronyms in this regard? (5 Marks)
Answer:
Question Number 2: From the subjective information you have
obtained from Mr. Brusca’s history, what are his identifiable
risk factors for heart disease? Which risk factors are modifiable
and which are unmodifiable?
(5 Marks)
Answer:
Question Number 3: List three priority nursing diagnosis for
Mr. Brusca’s case, and cluster subjective and objective data that
support each diagnosis. (3 Marks)
Answer:
#
Nursing Diagnosis
Subjective Data
Objective Data
1
2
3
Question Number 4: From the previous data, discuss the main
issues of health promotion and disease prevention should the
nurse discussed during health history and physical examination?
(4 Marks)
Answer:
Question Number 5: Considering the relationship of the
cardiovascular system to the respiratory system, what
respiratory problems might Mr. Brusca have as a result of his
cardiovascular disease? And what are respiratory clinical signs
associated with the respiratory problem(s)? (3 Marks)
Answer:
CYBER CRIME
Chapter 2 Lecture Notes
Objectives
● Explore a brief history of computer technology
● Familiarize student with some basic computer
language
● Discuss the forms of Internet communication
Details:
History of Computers
● Computer:
○ Device used to ascertain an amount or number by
calculation
or reckoning
○ Mechanism through which raw information (data) is
processed
● First computer created by Chinese 800 yrs. ago
○ ABACUS: wooden frame device with rows of
different colored
beads
○ Used for mathematical computations
● England (mid-19 th Century); Charles Babbage
○ Designed engine that received instructions from
punch cards
○ Made calculations form memory bank
○ Printed out mathematical solutions
● America (late-19 th Century); Herman Hollerith (US
government employee)
○ Created first device used exclusively for data
processing
○ Used to tabulate 1890 Census for US
○ Later developed his own company-Tabulating Machine
Company, predecessor to IBM
● 20 th Century Computer Development Progress
○ Atanasoff-Berry Computer (ABC): first modern digital
computer
■ Capabilities: binary arithmetic, parallel processing,
separate memory, regenerative memory, basic
computer functionality
● Electronic Numerical Integrator and Computer
(ENIAC); 1945
● Used to calculate firing and bombing tables for US
military (WWII)
● Colossus I (circa-1945): British designed for code-
breaking of German
military
● Computer mainframe technology designed (1960’s-
1970’s)
● Present Day: PC’s (originally contained operating
systems: DOS & UNIX)
and graphical user interface platforms (Windows and
Macintosh)
II.Computer Language
● Binary Language: structure of data which is
processed through the
computer
○ Bit: smallest piece of data-either positive or
negative electrical
state, 1 or 0
○ Byte: Comprised of 8 Bits; each byte represents a
letter,
number or character
■ Eight Bits=One Byte (letter-number-character)
■ Example: 01000001(bits)=A (byte)
● Kilobyte: 1,000 characters; One-half page of text
● Gigabyte: 1billion characters; Truck full of paper
● Computer Hardware (Input Devices): also categorized
as output or
storage devices
○ Components that are physical in nature: modems,
keyboards,mouse,scanner
○ Mediums through which information is introduced
into
computer
● Computer Software (Analyze): series of instructions
performing
particular tasks
○ Instructs computer components
■ What to do and how to interact with user
■ Three types: boot sequence-operating
system-application software
■ Boot Sequence: series of steps
before starting to use computer
■ Operating System: runs user
applications and provides
interface to the hardware:
Windows, Macintosh
● Application Software: prepackaged instructions allow
users to perform
various functions: word processing, statistical analysis,
play games etc.
○ Programs: Establishes sequence of rules through
which
software operates
○ Source Code: Set of instructions written in a
program
○ Object Code: What is actually executed by the
computer
● Hacker Terminology
○ Back door: Deliberate hole in software or program
to allow
unauthorized access
○ Cracker: Name given by traditional hackers to
individuals who
violated secure systems for illegal purposes
○ DDoS attack: (Distributed Denial of Service attack
): Use of
multiple systems to inundate (flood) a single system,
causing
the target site to shut down
○ Logic bomb: Piece of code inserted into software
program that
performs a malicious function when programmed
conditions
are met
○ Phishing: Solicitation of information (personal,
financial) via
e-mail from a
fraudster posing as a legitimate firm for the purpose
of stealing identifying data
○ Phreaking: Violating secure telephone systems and
making
illegal calls or transactions from the system
○ Trojan Horse: Harmless looking program that hides
malicious
content to damage targeted computer
III.History of Internet
● History:
● Initial conception grew out of government suspicion
and social hysteria
around Cold War between US and Russia in 1950’s-
1960’s
● Push to develop alternative communication systems
that would operate
if Nuclear attacks knocked out normal
telecommunication systems
● Computer networks linked four Universities over
phone lines
● Limited to written correspondence only (April 7,
1969-first
document-“start date for Internet”); no interactive
sessions
● Network Language:
○ TCP/IP: (Transmission Control Protocol/Internet
Protocol)
■ Suite of protocols that define the Internet
■ Method of communication between programs which
enables transfer of information
● IMAP: (Internet message Access Protocol)
○ Method of accessing electronic mail or bulletin
board
messages that are kept on a shared server
■ Examples: Access from home, work, notebook while
traveling
○ Routers: Special-purpose software packages that
handle the
connection between two or more networks
○ Cookies: storage platforms for information
○ Domain Name System: Group of computers on a
common
network defined by common IP addresses
■ Examples: com (commercial organization), edu
(educational institution), gov (government
organization), org (non-profit organization), net
(Internet access providers)
○ Cloud Computing: Delivers computing as a service;
system
involves a set of services, technologies and virtual
resources
○ Examples: video sites (YouTube); communication tools
(Skype)
○ Company software and application updates may be
centrally
uploaded thus negating maintenance and upkeep of
individual
computers
● Cyberworld: Three different levels of networked
systems: Intranets,
Internets, Internet
○ Intranets:
● Small local networks connecting computers within
one organization
● Controlled by common system administrator
● internets:
○ Connect several networks
○ Usually located in small geographical area
○ Share common protocol (usually TCP/IP)
● The Internet:
○ Largest network in the world
○ TCI/IP-based network links millions of users globally
across
more than 45,000 networks
1. INTERNET CATEGORIES
● World Wide Web: An electronic marketplace or
arena where electronic
storefronts of businesses, civic groups, individuals and
government
entities display their products or ideologies
○ Each web site is characterized by its Uniform
Resource
Locator (URL)
○ Designs range from simple text-only sites to
advanced
video-audio configuration
● Bulletin Boards: Posting services similar to a
community bulletin board
in a library, transportation hub, schools, municipal
buildings
○ Individuals can access software, post personal
information,
and exchange electronic mail
○ Very popular among subversive, terrorist groups,
child
pornographers (private areas for illegal communications)
○ Protected by First Amendment
○ Difficult for law Enforcement due to Jurisdictional
Issues:
access in one county and board is physically located
in
another jurisdiction
● Internet Relay Chat (Chat Rooms)
○ On line discussions in chat rooms
○ Allow users to interact with several others at same
time (party
line)
○ Characterized by topic
○ Users may choose to observe, participate in group
discussions or private
○ Topics range from harmless interests like sports,
hobbies to
profane
■ Solicitations for sex very common in “teen rooms”
CYBER CRIME
Chapter 2 Lecture Notes
Objectives
● Explore a brief history of computer technology
● Familiarize student with some basic computer
language
● Discuss the forms of Internet communication
Details:
History of Computers
● Computer:
○ Device used to ascertain an amount or number by
calculation
or reckoning
○ Mechanism through which raw information (data) is
processed
● First computer created by Chinese 800 yrs. ago
○ ABACUS: wooden frame device with rows of
different colored
beads
○ Used for mathematical computations
● England (mid-19 th Century); Charles Babbage
○ Designed engine that received instructions from
punch cards
○ Made calculations form memory bank
○ Printed out mathematical solutions
● America (late-19 th Century); Herman Hollerith (US
government employee)
○ Created first device used exclusively for data
processing
○ Used to tabulate 1890 Census for US
○ Later developed his own company-Tabulating Machine
Company, predecessor to IBM
● 20 th Century Computer Development Progress
○ Atanasoff-Berry Computer (ABC): first modern digital
computer
■ Capabilities: binary arithmetic, parallel processing,
separate memory, regenerative memory, basic
computer functionality
● Electronic Numerical Integrator and Computer
(ENIAC); 1945
● Used to calculate firing and bombing tables for US
military (WWII)
● Colossus I (circa-1945): British designed for code-
breaking of German
military
● Computer mainframe technology designed (1960’s-
1970’s)
● Present Day: PC’s (originally contained operating
systems: DOS & UNIX)
and graphical user interface platforms (Windows and
Macintosh)
II. Computer Language
● Binary Language: structure of data which is
processed through the
computer
○ Bit: smallest piece of data-either positive or
negative electrical
state, 1 or 0
○ Byte: Comprised of 8 Bits; each byte represents a
letter,
number or character
■ Eight Bits=One Byte (letter-number-character)
■ Example: 01000001(bits)=A (byte)
● Kilobyte: 1,000 characters; One-half page of text
● Gigabyte: 1billion characters; Truck full of paper
● Computer Hardware (Input Devices): also categorized
as output or
storage devices
○ Components that are physical in nature: modems,
keyboards,mouse,scanner
○ Mediums through which information is introduced
into
computer
● Computer Software (Analyze): series of instructions
performing
particular tasks
○ Instructs computer components
■ What to do and how to interact with user
■ Three types: boot sequence-operating
system-application software
■ Boot Sequence: series of steps
before starting to use computer
■ Operating System: runs user
applications and provides
interface to the hardware:
Windows, Macintosh
● Application Software: prepackaged instructions allow
users to perform
various functions: word processing, statistical analysis,
play games etc.
○ Programs: Establishes sequence of rules through
which
software operates
○ Source Code: Set of instructions written in a
program
○ Object Code: What is actually executed by the
computer
● Hacker Terminology
○ Back door: Deliberate hole in software or program
to allow
unauthorized access
○ Cracker: Name given by traditional hackers to
individuals who
violated secure systems for illegal purposes
○ DDoS attack: (Distributed Denial of Service attack
): Use of
multiple systems to inundate (flood) a single system,
causing
the target site to shut down
○ Logic bomb: Piece of code inserted into software
program that
performs a malicious function when programmed
conditions
are met
○ Phishing: Solicitation of information (personal,
financial) via
e-mail from a
fraudster posing as a legitimate firm for the purpose
of stealing identifying data
○ Phreaking: Violating secure telephone systems and
making
illegal calls or transactions from the system
○ Trojan Horse: Harmless looking program that hides
malicious
content to damage targeted computer
III. History of Internet
● History:
● Initial conception grew out of government suspicion
and social hysteria
around Cold War between US and Russia in 1950’s-
1960’s
● Push to develop alternative communication systems
that would operate
if Nuclear attacks knocked out normal
telecommunication systems
● Computer networks linked four Universities over
phone lines
● Limited to written correspondence only (April 7,
1969-first
document-“start date for Internet”); no interactive
sessions
● Network Language:
○ TCP/IP: (Transmission Control Protocol/Internet
Protocol)
■ Suite of protocols that define the Internet
■ Method of communication between programs which
enables transfer of information
● IMAP: (Internet message Access Protocol)
○ Method of accessing electronic mail or bulletin
board
messages that are kept on a shared server
■ Examples: Access from home, work, notebook while
traveling
○ Routers: Special-purpose software packages that
handle the
connection between two or more networks
○ Cookies: storage platforms for information
○ Domain Name System: Group of computers on a
common
network defined by common IP addresses
■ Examples: com (commercial organization), edu
(educational institution), gov (government
organization), org (non-profit organization), net
(Internet access providers)
○ Cloud Computing: Delivers computing as a service;
system
involves a set of services, technologies and virtual
resources
○ Examples: video sites (YouTube); communication tools
(Skype)
○ Company software and application updates may be
centrally
uploaded thus negating maintenance and upkeep of
individual
computers
● Cyberworld: Three different levels of networked
systems: Intranets,
Internets, Internet
○ Intranets:
● Small local networks connecting computers within
one organization
● Controlled by common system administrator
● internets:
○ Connect several networks
○ Usually located in small geographical area
○ Share common protocol (usually TCP/IP)
● The Internet:
○ Largest network in the world
○ TCI/IP-based network links millions of users globally
across
more than 45,000 networks
1. INTERNET CATEGORIES
● World Wide Web: An electronic marketplace or
arena where electronic
storefronts of businesses, civic groups, individuals and
government
entities display their products or ideologies
○ Each web site is characterized by its Uniform
Resource
Locator (URL)
○ Designs range from simple text-only sites to
advanced
video-audio configuration
● Bulletin Boards: Posting services similar to a
community bulletin board
in a library, transportation hub, schools, municipal
buildings
○ Individuals can access software, post personal
information,
and exchange electronic mail
○ Very popular among subversive, terrorist groups,
child
pornographers (private areas for illegal communications)
○ Protected by First Amendment
○ Difficult for law Enforcement due to Jurisdictional
Issues:
access in one county and board is physically located
in
another jurisdiction
● Internet Relay Chat (Chat Rooms)
○ On line discussions in chat rooms
○ Allow users to interact with several others at same
time (party
line)
○ Characterized by topic
○ Users may choose to observe, participate in group
discussions or private
○ Topics range from harmless interests like sports,
hobbies to
profane
■ Solicitations for sex very common in “teen rooms”
Case Study
Henry Brusca is a 68-year-old, married father of 7 who was in
relatively good health until 3 weeks ago. At that time, he visited
the emergency room with the complaint of “just not feeling
right.” His BP on admission was 170/118, so he was admitted to
the coronary care unit with the diagnosis of uncontrolled HTN.
His BP was controlled with medication, and he was discharged
several days later. He is now being seen for follow-up care and
management of HTN. Because Mr. Brusca is newly diagnosed
with HTN, you will need to complete a history and thorough
cardiovascular examination.
Case Study Findings
Biographical data:
■ 68-year-old white male.
■ Married, father of seven grown children.
■ Self-employed entrepreneur; BS degree in engineering.
■ Born and raised in the United States, Italian descent, Catholic
religion.
■ Blue Cross/Blue Shield medical insurance plan.
■ Referral: Follow-up by primary care physician.
■ Source: Self, reliable.
Current health status:
■ No chest pain, dyspnea, palpitations, or edema.
■ Complains of fatigue, loss of energy, and occasional dizzy
spells.
Past health history:
■ No rheumatic fever or heart murmurs.
■ No history of injuries.
■ Inguinal hernia repair.
■ Left ventricular hypertrophy revealed by electrocardiogram
(ECG).
■ Hospitalized 3 weeks ago for HTN.
■ No known food, drug, or environmental allergies.
■ No other previous medical problems.
■ Immunizations up to date.
■ No prescribed medications except Vasotec 5 mg bid and
weekly use of antacid for indigestion.
Family history:
■ Positive family history of HTN and stroke.
■ Mother had HTN and died at age 78 of a stroke.
■ Paternal uncle died at age 79 of MI.
Review of systems:
■ General Health Survey: Fatigue, weight gain of 60 lb over
past 3 years.
■ Integumentary: Feet cold, thick nails, tight shoes.
■ Head, Eyes, Ears, Nose, and Throat (HEENT): Two dizzy
spells over past 6 months.
■ Eyes: Wears glasses, no visual complaints, yearly eye
examination.
■ Respiratory: “Short winded” with activity.
■ Gastrointestinal: Indigestion on weekly basis.
■ Genitourinary: Awakens at least once a night to go to
bathroom.
■ Musculoskeletal/Neurological: General weakness, cramps in
legs with walking.
■ Lymphatic: No reported problems.
■ Endocrine: No reported problems.
Psychosocial profile:
■ States that he does not have time for routine checkups. “I only
go to the doctor’s when I’m sick. “Typical day consists of
arising at 7 A.M., showering, having breakfast, and then going
to work. Returns home by 6 P.M., eats dinner, watches TV till
11:30 P.M., but usually falls asleep before news is over.
Usually in bed by 12 midnight.
■ 24-hour recall reveals a diet high in carbohydrates and fats
and lacking in fruits and vegetables. Heavy-handed with salt
shaker; salts everything. Admits that he has gained weight over
the years and is 60 lb overweight.
■ No regular exercise program. States: “I’m too busy running
my business.”
■ Hobbies include reading, crossword puzzles, and antique
collecting.
■ Sleeps about 7 hours a night, but usually feels he is not
getting enough sleep. Lately is more and more tired. Wife states
that he snores.
■ Never smoked. Has a bottle of wine every night with dinner.
■ Works at sedentary job, usually 7 days a week. No
environmental hazards in workplace.
■ Lives with wife of 45 years in a two-story, single home in the
suburbs with ample living space.
■ Has a large, close, caring family.
■ Admits that running his own business is very stressful, but
feels he can handle it alone and doesn’t need anyone to help
him.
General Health Survey findings:
■ Well-developed, well-groomed 68-year-old white male,
appears younger than stated age.
■ Sits upright and relaxed during interview, answers questions
appropriately.
■ Alert and responsive without complaint, oriented x 4 (time,
place, situation, and person).
■ Affect pleasant and appropriate.
■ Head-to-toe scan reveals positive arcus senilis, positive AV
nicking and cotton wool, extremity changes including thin,
shiny skin, thick nails, and edema.
■ Vital Signs
■ Temperature, 36.6 °C.
■ Pulse, 86 BPM, strong and regular.
■ Respirations, 18/min, unlabored.
■ BP: 150/90 mmHg.
■ Height: 180 CM.
■ Weight: 124 KG.
Cardiovascular assessment findings include:
■ Neck Vessels
■ Positive large carotid pulsation, +3, symmetrical with smooth,
sharp upstroke and rapid descent, artery stiff, negative for
thrills and bruits.
■ JVP at 30 degrees <3 cm, negative abdominojugular reflux.
■ Precordium
■ Positive sustained pulsations displaced lateral to apex, PMI 3
cm with increased amplitude.
■ Slight pulsations also appreciated at LLSB and base, but not
as pronounced.
■ Negative thrills; cardiac borders percussed third, fourth, and
fifth intercostal spaces to the left of the midclavicular line.
■ Heart sounds appreciated with regular rate and rhythm at apex
S1 > S2 and +S4,at LLSB S1 > S2.
■ S2 negative split, at base left S1 < 2 negative split, at base
right S1 < 2 with an accentuated
S2, negative for murmurs and rubs.
Questions:
1) What questions might be useful to elicit further details
surrounding the Chest pain, using one of the common acronyms
in this regard? (5 Marks)
2) From the subjective information you have obtained from Mr.
Brusca’s history, what are his identifiable risk factors for heart
disease? Which risk factors are modifiable and which are
unmodifiable? (5 Marks)
3) List three priority nursing diagnosis for Mr. Brusca’s case,
and cluster subjective and objective data that support each
diagnosis. (3 Marks)
4) From the previous data, discuss the main issues of health
promotion and disease prevention should the nurse discussed
during health history and physical examination? (4 Marks).
5) Considering the relationship of the cardiovascular system to
the respiratory system, what respiratory problems might Mr.
Brusca have as a result of his cardiovascular disease? (3 Marks)
Student NameComment by Ahmad Al-Sadi Student IDOverall.docx

More Related Content

Similar to Student NameComment by Ahmad Al-Sadi Student IDOverall.docx

Is202 ch03 and ch04
Is202   ch03 and ch04Is202   ch03 and ch04
Is202 ch03 and ch04
Shaheen Khan
 
Generation of computer
Generation of computerGeneration of computer
Generation of computer
rameshkumar1646
 
01 computing
01 computing01 computing
01 computing
Sulman Ahmed
 
Introduction to Computer
Introduction to ComputerIntroduction to Computer
Introduction to Computer
suganya2411
 
Courses in technical english ensas i 2014 2015
Courses in technical english ensas i  2014 2015Courses in technical english ensas i  2014 2015
Courses in technical english ensas i 2014 2015
Rednef68 Rednef68
 
Cibm ch03 and ch04
Cibm   ch03 and ch04Cibm   ch03 and ch04
Cibm ch03 and ch04
Shaheen Khan
 
Lecture 1 (1).ppt
Lecture 1 (1).pptLecture 1 (1).ppt
Lecture 1 (1).ppt
hmaham
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 2 - The Sys...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 2 - The Sys...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 2 - The Sys...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 2 - The Sys...
yaminohime
 
Computer application appreciation unit i
Computer application appreciation  unit iComputer application appreciation  unit i
Computer application appreciation unit i
AndreaTugwell
 
Computer application appreciation unit i
Computer application appreciation  unit iComputer application appreciation  unit i
Computer application appreciation unit i
AndreaTugwell
 
Overview_of_Computer_System.pptx
Overview_of_Computer_System.pptxOverview_of_Computer_System.pptx
Overview_of_Computer_System.pptx
MohsinMir13
 
Autocad and computer introduction for beginers
Autocad and computer introduction for beginers Autocad and computer introduction for beginers
Autocad and computer introduction for beginers
Ayele Bedada
 
Introduction to computer Powerpoint Presentation
Introduction to computer Powerpoint PresentationIntroduction to computer Powerpoint Presentation
Introduction to computer Powerpoint Presentation
Jibin Sr. Plamoottukada
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentals
Rajesh Dash
 
Uc13.chapter.02
Uc13.chapter.02Uc13.chapter.02
Uc13.chapter.02
Irfan Ali Memon
 
Computer Concepts Unit A 2013
Computer Concepts Unit A 2013Computer Concepts Unit A 2013
Computer Concepts Unit A 2013
jarana00
 
what is a computer
what is a computerwhat is a computer
what is a computer
ajmeriparween
 
Chapter 01 -Fundamental of IT and OS.pptx
Chapter 01 -Fundamental of IT and OS.pptxChapter 01 -Fundamental of IT and OS.pptx
Chapter 01 -Fundamental of IT and OS.pptx
ssuser31c469
 
ComputerIntroduction.ppt
ComputerIntroduction.pptComputerIntroduction.ppt
ComputerIntroduction.ppt
IlaiyarajaS2
 
Lecture_1.pptx
Lecture_1.pptxLecture_1.pptx
Lecture_1.pptx
MNumanZafar1
 

Similar to Student NameComment by Ahmad Al-Sadi Student IDOverall.docx (20)

Is202 ch03 and ch04
Is202   ch03 and ch04Is202   ch03 and ch04
Is202 ch03 and ch04
 
Generation of computer
Generation of computerGeneration of computer
Generation of computer
 
01 computing
01 computing01 computing
01 computing
 
Introduction to Computer
Introduction to ComputerIntroduction to Computer
Introduction to Computer
 
Courses in technical english ensas i 2014 2015
Courses in technical english ensas i  2014 2015Courses in technical english ensas i  2014 2015
Courses in technical english ensas i 2014 2015
 
Cibm ch03 and ch04
Cibm   ch03 and ch04Cibm   ch03 and ch04
Cibm ch03 and ch04
 
Lecture 1 (1).ppt
Lecture 1 (1).pptLecture 1 (1).ppt
Lecture 1 (1).ppt
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 2 - The Sys...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 2 - The Sys...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 2 - The Sys...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 2 - The Sys...
 
Computer application appreciation unit i
Computer application appreciation  unit iComputer application appreciation  unit i
Computer application appreciation unit i
 
Computer application appreciation unit i
Computer application appreciation  unit iComputer application appreciation  unit i
Computer application appreciation unit i
 
Overview_of_Computer_System.pptx
Overview_of_Computer_System.pptxOverview_of_Computer_System.pptx
Overview_of_Computer_System.pptx
 
Autocad and computer introduction for beginers
Autocad and computer introduction for beginers Autocad and computer introduction for beginers
Autocad and computer introduction for beginers
 
Introduction to computer Powerpoint Presentation
Introduction to computer Powerpoint PresentationIntroduction to computer Powerpoint Presentation
Introduction to computer Powerpoint Presentation
 
Computer fundamentals
Computer fundamentalsComputer fundamentals
Computer fundamentals
 
Uc13.chapter.02
Uc13.chapter.02Uc13.chapter.02
Uc13.chapter.02
 
Computer Concepts Unit A 2013
Computer Concepts Unit A 2013Computer Concepts Unit A 2013
Computer Concepts Unit A 2013
 
what is a computer
what is a computerwhat is a computer
what is a computer
 
Chapter 01 -Fundamental of IT and OS.pptx
Chapter 01 -Fundamental of IT and OS.pptxChapter 01 -Fundamental of IT and OS.pptx
Chapter 01 -Fundamental of IT and OS.pptx
 
ComputerIntroduction.ppt
ComputerIntroduction.pptComputerIntroduction.ppt
ComputerIntroduction.ppt
 
Lecture_1.pptx
Lecture_1.pptxLecture_1.pptx
Lecture_1.pptx
 

More from cpatriciarpatricia

Strict APA format 1 page and no references before 2015. Peer-reviewe.docx
Strict APA format 1 page and no references before 2015. Peer-reviewe.docxStrict APA format 1 page and no references before 2015. Peer-reviewe.docx
Strict APA format 1 page and no references before 2015. Peer-reviewe.docx
cpatriciarpatricia
 
Stress and Healthcare Workers Productivity at Lexington Medical .docx
Stress and Healthcare Workers Productivity at Lexington Medical .docxStress and Healthcare Workers Productivity at Lexington Medical .docx
Stress and Healthcare Workers Productivity at Lexington Medical .docx
cpatriciarpatricia
 
Stress and Chronic Illness- Choose and describe chronic illness su.docx
Stress and Chronic Illness- Choose and describe chronic illness su.docxStress and Chronic Illness- Choose and describe chronic illness su.docx
Stress and Chronic Illness- Choose and describe chronic illness su.docx
cpatriciarpatricia
 
StrengthsWeaknessesOpportunitiesThreatsSkillsK.docx
StrengthsWeaknessesOpportunitiesThreatsSkillsK.docxStrengthsWeaknessesOpportunitiesThreatsSkillsK.docx
StrengthsWeaknessesOpportunitiesThreatsSkillsK.docx
cpatriciarpatricia
 
Strengths-based nursing (SBN) is an approach to care in which eigh.docx
Strengths-based nursing (SBN) is an approach to care in which eigh.docxStrengths-based nursing (SBN) is an approach to care in which eigh.docx
Strengths-based nursing (SBN) is an approach to care in which eigh.docx
cpatriciarpatricia
 
Strengths-to-Strategies, Curriculum Vitae, and Action PlanDue.docx
Strengths-to-Strategies, Curriculum Vitae, and Action PlanDue.docxStrengths-to-Strategies, Curriculum Vitae, and Action PlanDue.docx
Strengths-to-Strategies, Curriculum Vitae, and Action PlanDue.docx
cpatriciarpatricia
 
Street Sense Media uses a range of creative platforms to spotl.docx
Street Sense Media uses a range of creative platforms to spotl.docxStreet Sense Media uses a range of creative platforms to spotl.docx
Street Sense Media uses a range of creative platforms to spotl.docx
cpatriciarpatricia
 
Strengths Paper Write a 2-page paper that identifies your top 5 str.docx
Strengths Paper Write a 2-page paper that identifies your top 5 str.docxStrengths Paper Write a 2-page paper that identifies your top 5 str.docx
Strengths Paper Write a 2-page paper that identifies your top 5 str.docx
cpatriciarpatricia
 
Stratification and Prejudice in Current EventsThe purpose of t.docx
Stratification and Prejudice in Current EventsThe purpose of t.docxStratification and Prejudice in Current EventsThe purpose of t.docx
Stratification and Prejudice in Current EventsThe purpose of t.docx
cpatriciarpatricia
 
Street CodeConsider this quote from Robert Sampson and William J.docx
Street CodeConsider this quote from Robert Sampson and William J.docxStreet CodeConsider this quote from Robert Sampson and William J.docx
Street CodeConsider this quote from Robert Sampson and William J.docx
cpatriciarpatricia
 
Strengths and Barriers to Program Implementation As you de.docx
Strengths and Barriers to Program Implementation As you de.docxStrengths and Barriers to Program Implementation As you de.docx
Strengths and Barriers to Program Implementation As you de.docx
cpatriciarpatricia
 
Strengths 1. Large Enrollment 2. Flexible class schedules1. The.docx
Strengths 1. Large Enrollment 2. Flexible class schedules1. The.docxStrengths 1. Large Enrollment 2. Flexible class schedules1. The.docx
Strengths 1. Large Enrollment 2. Flexible class schedules1. The.docx
cpatriciarpatricia
 
Street artist Shepard Fairey, who was graduated from the Rhode I.docx
Street artist Shepard Fairey, who was graduated from the Rhode I.docxStreet artist Shepard Fairey, who was graduated from the Rhode I.docx
Street artist Shepard Fairey, who was graduated from the Rhode I.docx
cpatriciarpatricia
 
Stream MorphologyInvestigation ManualENVIRONMENTAL SCI.docx
Stream MorphologyInvestigation ManualENVIRONMENTAL SCI.docxStream MorphologyInvestigation ManualENVIRONMENTAL SCI.docx
Stream MorphologyInvestigation ManualENVIRONMENTAL SCI.docx
cpatriciarpatricia
 
STRATEGYLeadershipLighting a fire under theniWhy urgen.docx
STRATEGYLeadershipLighting a fire under theniWhy urgen.docxSTRATEGYLeadershipLighting a fire under theniWhy urgen.docx
STRATEGYLeadershipLighting a fire under theniWhy urgen.docx
cpatriciarpatricia
 
STRATEGIESWhat can I do with this majorAREAS EMPLOYER.docx
STRATEGIESWhat can I do with this majorAREAS EMPLOYER.docxSTRATEGIESWhat can I do with this majorAREAS EMPLOYER.docx
STRATEGIESWhat can I do with this majorAREAS EMPLOYER.docx
cpatriciarpatricia
 
Strategies for ChangeWeek 7 The Hard Side of Change Management.docx
Strategies for ChangeWeek 7 The Hard Side of Change Management.docxStrategies for ChangeWeek 7 The Hard Side of Change Management.docx
Strategies for ChangeWeek 7 The Hard Side of Change Management.docx
cpatriciarpatricia
 
Strategic PlanningUnrestrictedthe managerial proc.docx
Strategic PlanningUnrestrictedthe managerial proc.docxStrategic PlanningUnrestrictedthe managerial proc.docx
Strategic PlanningUnrestrictedthe managerial proc.docx
cpatriciarpatricia
 
StrategicCompetitive PositionApple Inc. is known for its state-of.docx
StrategicCompetitive PositionApple Inc. is known for its state-of.docxStrategicCompetitive PositionApple Inc. is known for its state-of.docx
StrategicCompetitive PositionApple Inc. is known for its state-of.docx
cpatriciarpatricia
 
Strategies for Negotiation & Conflict Resolution Dr. Janice Ba.docx
Strategies for Negotiation & Conflict Resolution Dr. Janice Ba.docxStrategies for Negotiation & Conflict Resolution Dr. Janice Ba.docx
Strategies for Negotiation & Conflict Resolution Dr. Janice Ba.docx
cpatriciarpatricia
 

More from cpatriciarpatricia (20)

Strict APA format 1 page and no references before 2015. Peer-reviewe.docx
Strict APA format 1 page and no references before 2015. Peer-reviewe.docxStrict APA format 1 page and no references before 2015. Peer-reviewe.docx
Strict APA format 1 page and no references before 2015. Peer-reviewe.docx
 
Stress and Healthcare Workers Productivity at Lexington Medical .docx
Stress and Healthcare Workers Productivity at Lexington Medical .docxStress and Healthcare Workers Productivity at Lexington Medical .docx
Stress and Healthcare Workers Productivity at Lexington Medical .docx
 
Stress and Chronic Illness- Choose and describe chronic illness su.docx
Stress and Chronic Illness- Choose and describe chronic illness su.docxStress and Chronic Illness- Choose and describe chronic illness su.docx
Stress and Chronic Illness- Choose and describe chronic illness su.docx
 
StrengthsWeaknessesOpportunitiesThreatsSkillsK.docx
StrengthsWeaknessesOpportunitiesThreatsSkillsK.docxStrengthsWeaknessesOpportunitiesThreatsSkillsK.docx
StrengthsWeaknessesOpportunitiesThreatsSkillsK.docx
 
Strengths-based nursing (SBN) is an approach to care in which eigh.docx
Strengths-based nursing (SBN) is an approach to care in which eigh.docxStrengths-based nursing (SBN) is an approach to care in which eigh.docx
Strengths-based nursing (SBN) is an approach to care in which eigh.docx
 
Strengths-to-Strategies, Curriculum Vitae, and Action PlanDue.docx
Strengths-to-Strategies, Curriculum Vitae, and Action PlanDue.docxStrengths-to-Strategies, Curriculum Vitae, and Action PlanDue.docx
Strengths-to-Strategies, Curriculum Vitae, and Action PlanDue.docx
 
Street Sense Media uses a range of creative platforms to spotl.docx
Street Sense Media uses a range of creative platforms to spotl.docxStreet Sense Media uses a range of creative platforms to spotl.docx
Street Sense Media uses a range of creative platforms to spotl.docx
 
Strengths Paper Write a 2-page paper that identifies your top 5 str.docx
Strengths Paper Write a 2-page paper that identifies your top 5 str.docxStrengths Paper Write a 2-page paper that identifies your top 5 str.docx
Strengths Paper Write a 2-page paper that identifies your top 5 str.docx
 
Stratification and Prejudice in Current EventsThe purpose of t.docx
Stratification and Prejudice in Current EventsThe purpose of t.docxStratification and Prejudice in Current EventsThe purpose of t.docx
Stratification and Prejudice in Current EventsThe purpose of t.docx
 
Street CodeConsider this quote from Robert Sampson and William J.docx
Street CodeConsider this quote from Robert Sampson and William J.docxStreet CodeConsider this quote from Robert Sampson and William J.docx
Street CodeConsider this quote from Robert Sampson and William J.docx
 
Strengths and Barriers to Program Implementation As you de.docx
Strengths and Barriers to Program Implementation As you de.docxStrengths and Barriers to Program Implementation As you de.docx
Strengths and Barriers to Program Implementation As you de.docx
 
Strengths 1. Large Enrollment 2. Flexible class schedules1. The.docx
Strengths 1. Large Enrollment 2. Flexible class schedules1. The.docxStrengths 1. Large Enrollment 2. Flexible class schedules1. The.docx
Strengths 1. Large Enrollment 2. Flexible class schedules1. The.docx
 
Street artist Shepard Fairey, who was graduated from the Rhode I.docx
Street artist Shepard Fairey, who was graduated from the Rhode I.docxStreet artist Shepard Fairey, who was graduated from the Rhode I.docx
Street artist Shepard Fairey, who was graduated from the Rhode I.docx
 
Stream MorphologyInvestigation ManualENVIRONMENTAL SCI.docx
Stream MorphologyInvestigation ManualENVIRONMENTAL SCI.docxStream MorphologyInvestigation ManualENVIRONMENTAL SCI.docx
Stream MorphologyInvestigation ManualENVIRONMENTAL SCI.docx
 
STRATEGYLeadershipLighting a fire under theniWhy urgen.docx
STRATEGYLeadershipLighting a fire under theniWhy urgen.docxSTRATEGYLeadershipLighting a fire under theniWhy urgen.docx
STRATEGYLeadershipLighting a fire under theniWhy urgen.docx
 
STRATEGIESWhat can I do with this majorAREAS EMPLOYER.docx
STRATEGIESWhat can I do with this majorAREAS EMPLOYER.docxSTRATEGIESWhat can I do with this majorAREAS EMPLOYER.docx
STRATEGIESWhat can I do with this majorAREAS EMPLOYER.docx
 
Strategies for ChangeWeek 7 The Hard Side of Change Management.docx
Strategies for ChangeWeek 7 The Hard Side of Change Management.docxStrategies for ChangeWeek 7 The Hard Side of Change Management.docx
Strategies for ChangeWeek 7 The Hard Side of Change Management.docx
 
Strategic PlanningUnrestrictedthe managerial proc.docx
Strategic PlanningUnrestrictedthe managerial proc.docxStrategic PlanningUnrestrictedthe managerial proc.docx
Strategic PlanningUnrestrictedthe managerial proc.docx
 
StrategicCompetitive PositionApple Inc. is known for its state-of.docx
StrategicCompetitive PositionApple Inc. is known for its state-of.docxStrategicCompetitive PositionApple Inc. is known for its state-of.docx
StrategicCompetitive PositionApple Inc. is known for its state-of.docx
 
Strategies for Negotiation & Conflict Resolution Dr. Janice Ba.docx
Strategies for Negotiation & Conflict Resolution Dr. Janice Ba.docxStrategies for Negotiation & Conflict Resolution Dr. Janice Ba.docx
Strategies for Negotiation & Conflict Resolution Dr. Janice Ba.docx
 

Recently uploaded

skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
Mohammad Al-Dhahabi
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
blueshagoo1
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
heathfieldcps1
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
Prof. Dr. K. Adisesha
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
RidwanHassanYusuf
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 

Recently uploaded (20)

skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 

Student NameComment by Ahmad Al-Sadi Student IDOverall.docx

  • 1. Student Name: Comment by Ahmad Al-Sadi: Student ID: Overall Given Mark: / 20 Instructions: Based on the given case study of Mr. Brusca, write your answers on the giving space using this answer sheet and upload it on Blackboard before the 48 hours since begging of the exam. Question Number 1: What questions might be useful to elicit further details surrounding the Chest pain, using one of the common acronyms in this regard? (5 Marks) Answer: Question Number 2: From the subjective information you have obtained from Mr. Brusca’s history, what are his identifiable
  • 2. risk factors for heart disease? Which risk factors are modifiable and which are unmodifiable? (5 Marks) Answer: Question Number 3: List three priority nursing diagnosis for Mr. Brusca’s case, and cluster subjective and objective data that support each diagnosis. (3 Marks) Answer: # Nursing Diagnosis
  • 4. Question Number 4: From the previous data, discuss the main issues of health promotion and disease prevention should the nurse discussed during health history and physical examination? (4 Marks) Answer: Question Number 5: Considering the relationship of the cardiovascular system to the respiratory system, what respiratory problems might Mr. Brusca have as a result of his cardiovascular disease? And what are respiratory clinical signs associated with the respiratory problem(s)? (3 Marks) Answer:
  • 5. CYBER CRIME Chapter 2 Lecture Notes Objectives ● Explore a brief history of computer technology ● Familiarize student with some basic computer language ● Discuss the forms of Internet communication Details: History of Computers ● Computer: ○ Device used to ascertain an amount or number by calculation or reckoning
  • 6. ○ Mechanism through which raw information (data) is processed ● First computer created by Chinese 800 yrs. ago ○ ABACUS: wooden frame device with rows of different colored beads ○ Used for mathematical computations ● England (mid-19 th Century); Charles Babbage ○ Designed engine that received instructions from punch cards ○ Made calculations form memory bank ○ Printed out mathematical solutions ● America (late-19 th Century); Herman Hollerith (US government employee) ○ Created first device used exclusively for data processing ○ Used to tabulate 1890 Census for US ○ Later developed his own company-Tabulating Machine Company, predecessor to IBM ● 20 th Century Computer Development Progress ○ Atanasoff-Berry Computer (ABC): first modern digital computer ■ Capabilities: binary arithmetic, parallel processing, separate memory, regenerative memory, basic computer functionality ● Electronic Numerical Integrator and Computer
  • 7. (ENIAC); 1945 ● Used to calculate firing and bombing tables for US military (WWII) ● Colossus I (circa-1945): British designed for code- breaking of German military ● Computer mainframe technology designed (1960’s- 1970’s) ● Present Day: PC’s (originally contained operating systems: DOS & UNIX) and graphical user interface platforms (Windows and Macintosh) II.Computer Language ● Binary Language: structure of data which is processed through the computer ○ Bit: smallest piece of data-either positive or negative electrical state, 1 or 0 ○ Byte: Comprised of 8 Bits; each byte represents a letter, number or character ■ Eight Bits=One Byte (letter-number-character) ■ Example: 01000001(bits)=A (byte) ● Kilobyte: 1,000 characters; One-half page of text ● Gigabyte: 1billion characters; Truck full of paper ● Computer Hardware (Input Devices): also categorized
  • 8. as output or storage devices ○ Components that are physical in nature: modems, keyboards,mouse,scanner ○ Mediums through which information is introduced into computer ● Computer Software (Analyze): series of instructions performing particular tasks ○ Instructs computer components ■ What to do and how to interact with user ■ Three types: boot sequence-operating system-application software ■ Boot Sequence: series of steps before starting to use computer ■ Operating System: runs user applications and provides interface to the hardware: Windows, Macintosh ● Application Software: prepackaged instructions allow users to perform
  • 9. various functions: word processing, statistical analysis, play games etc. ○ Programs: Establishes sequence of rules through which software operates ○ Source Code: Set of instructions written in a program ○ Object Code: What is actually executed by the computer ● Hacker Terminology ○ Back door: Deliberate hole in software or program to allow unauthorized access ○ Cracker: Name given by traditional hackers to individuals who violated secure systems for illegal purposes ○ DDoS attack: (Distributed Denial of Service attack ): Use of multiple systems to inundate (flood) a single system, causing the target site to shut down ○ Logic bomb: Piece of code inserted into software program that performs a malicious function when programmed conditions are met ○ Phishing: Solicitation of information (personal,
  • 10. financial) via e-mail from a fraudster posing as a legitimate firm for the purpose of stealing identifying data ○ Phreaking: Violating secure telephone systems and making illegal calls or transactions from the system ○ Trojan Horse: Harmless looking program that hides malicious content to damage targeted computer III.History of Internet ● History: ● Initial conception grew out of government suspicion and social hysteria around Cold War between US and Russia in 1950’s- 1960’s ● Push to develop alternative communication systems that would operate if Nuclear attacks knocked out normal telecommunication systems ● Computer networks linked four Universities over phone lines ● Limited to written correspondence only (April 7, 1969-first
  • 11. document-“start date for Internet”); no interactive sessions ● Network Language: ○ TCP/IP: (Transmission Control Protocol/Internet Protocol) ■ Suite of protocols that define the Internet ■ Method of communication between programs which enables transfer of information ● IMAP: (Internet message Access Protocol) ○ Method of accessing electronic mail or bulletin board messages that are kept on a shared server ■ Examples: Access from home, work, notebook while traveling ○ Routers: Special-purpose software packages that handle the connection between two or more networks ○ Cookies: storage platforms for information ○ Domain Name System: Group of computers on a common network defined by common IP addresses ■ Examples: com (commercial organization), edu (educational institution), gov (government organization), org (non-profit organization), net (Internet access providers)
  • 12. ○ Cloud Computing: Delivers computing as a service; system involves a set of services, technologies and virtual resources ○ Examples: video sites (YouTube); communication tools (Skype) ○ Company software and application updates may be centrally uploaded thus negating maintenance and upkeep of individual computers ● Cyberworld: Three different levels of networked systems: Intranets, Internets, Internet ○ Intranets: ● Small local networks connecting computers within one organization ● Controlled by common system administrator ● internets: ○ Connect several networks ○ Usually located in small geographical area ○ Share common protocol (usually TCP/IP) ● The Internet: ○ Largest network in the world ○ TCI/IP-based network links millions of users globally
  • 13. across more than 45,000 networks 1. INTERNET CATEGORIES ● World Wide Web: An electronic marketplace or arena where electronic storefronts of businesses, civic groups, individuals and government entities display their products or ideologies ○ Each web site is characterized by its Uniform Resource Locator (URL) ○ Designs range from simple text-only sites to advanced video-audio configuration ● Bulletin Boards: Posting services similar to a community bulletin board in a library, transportation hub, schools, municipal buildings ○ Individuals can access software, post personal information, and exchange electronic mail ○ Very popular among subversive, terrorist groups, child pornographers (private areas for illegal communications) ○ Protected by First Amendment
  • 14. ○ Difficult for law Enforcement due to Jurisdictional Issues: access in one county and board is physically located in another jurisdiction ● Internet Relay Chat (Chat Rooms) ○ On line discussions in chat rooms ○ Allow users to interact with several others at same time (party line) ○ Characterized by topic ○ Users may choose to observe, participate in group discussions or private ○ Topics range from harmless interests like sports, hobbies to profane ■ Solicitations for sex very common in “teen rooms” CYBER CRIME Chapter 2 Lecture Notes Objectives ● Explore a brief history of computer technology ● Familiarize student with some basic computer
  • 15. language ● Discuss the forms of Internet communication Details: History of Computers ● Computer: ○ Device used to ascertain an amount or number by calculation or reckoning ○ Mechanism through which raw information (data) is processed ● First computer created by Chinese 800 yrs. ago ○ ABACUS: wooden frame device with rows of different colored beads ○ Used for mathematical computations ● England (mid-19 th Century); Charles Babbage ○ Designed engine that received instructions from punch cards ○ Made calculations form memory bank ○ Printed out mathematical solutions ● America (late-19 th Century); Herman Hollerith (US government employee) ○ Created first device used exclusively for data processing ○ Used to tabulate 1890 Census for US
  • 16. ○ Later developed his own company-Tabulating Machine Company, predecessor to IBM ● 20 th Century Computer Development Progress ○ Atanasoff-Berry Computer (ABC): first modern digital computer ■ Capabilities: binary arithmetic, parallel processing, separate memory, regenerative memory, basic computer functionality ● Electronic Numerical Integrator and Computer (ENIAC); 1945 ● Used to calculate firing and bombing tables for US military (WWII) ● Colossus I (circa-1945): British designed for code- breaking of German military ● Computer mainframe technology designed (1960’s- 1970’s) ● Present Day: PC’s (originally contained operating systems: DOS & UNIX) and graphical user interface platforms (Windows and Macintosh) II. Computer Language ● Binary Language: structure of data which is processed through the computer ○ Bit: smallest piece of data-either positive or
  • 17. negative electrical state, 1 or 0 ○ Byte: Comprised of 8 Bits; each byte represents a letter, number or character ■ Eight Bits=One Byte (letter-number-character) ■ Example: 01000001(bits)=A (byte) ● Kilobyte: 1,000 characters; One-half page of text ● Gigabyte: 1billion characters; Truck full of paper ● Computer Hardware (Input Devices): also categorized as output or storage devices ○ Components that are physical in nature: modems, keyboards,mouse,scanner ○ Mediums through which information is introduced into computer ● Computer Software (Analyze): series of instructions performing particular tasks ○ Instructs computer components ■ What to do and how to interact with user ■ Three types: boot sequence-operating system-application software
  • 18. ■ Boot Sequence: series of steps before starting to use computer ■ Operating System: runs user applications and provides interface to the hardware: Windows, Macintosh ● Application Software: prepackaged instructions allow users to perform various functions: word processing, statistical analysis, play games etc. ○ Programs: Establishes sequence of rules through which software operates ○ Source Code: Set of instructions written in a program ○ Object Code: What is actually executed by the computer ● Hacker Terminology ○ Back door: Deliberate hole in software or program to allow unauthorized access ○ Cracker: Name given by traditional hackers to individuals who violated secure systems for illegal purposes ○ DDoS attack: (Distributed Denial of Service attack ): Use of
  • 19. multiple systems to inundate (flood) a single system, causing the target site to shut down ○ Logic bomb: Piece of code inserted into software program that performs a malicious function when programmed conditions are met ○ Phishing: Solicitation of information (personal, financial) via e-mail from a fraudster posing as a legitimate firm for the purpose of stealing identifying data ○ Phreaking: Violating secure telephone systems and making illegal calls or transactions from the system ○ Trojan Horse: Harmless looking program that hides malicious content to damage targeted computer III. History of Internet ● History: ● Initial conception grew out of government suspicion and social hysteria around Cold War between US and Russia in 1950’s-
  • 20. 1960’s ● Push to develop alternative communication systems that would operate if Nuclear attacks knocked out normal telecommunication systems ● Computer networks linked four Universities over phone lines ● Limited to written correspondence only (April 7, 1969-first document-“start date for Internet”); no interactive sessions ● Network Language: ○ TCP/IP: (Transmission Control Protocol/Internet Protocol) ■ Suite of protocols that define the Internet ■ Method of communication between programs which enables transfer of information ● IMAP: (Internet message Access Protocol) ○ Method of accessing electronic mail or bulletin board messages that are kept on a shared server ■ Examples: Access from home, work, notebook while traveling ○ Routers: Special-purpose software packages that handle the connection between two or more networks
  • 21. ○ Cookies: storage platforms for information ○ Domain Name System: Group of computers on a common network defined by common IP addresses ■ Examples: com (commercial organization), edu (educational institution), gov (government organization), org (non-profit organization), net (Internet access providers) ○ Cloud Computing: Delivers computing as a service; system involves a set of services, technologies and virtual resources ○ Examples: video sites (YouTube); communication tools (Skype) ○ Company software and application updates may be centrally uploaded thus negating maintenance and upkeep of individual computers ● Cyberworld: Three different levels of networked systems: Intranets, Internets, Internet ○ Intranets: ● Small local networks connecting computers within one organization
  • 22. ● Controlled by common system administrator ● internets: ○ Connect several networks ○ Usually located in small geographical area ○ Share common protocol (usually TCP/IP) ● The Internet: ○ Largest network in the world ○ TCI/IP-based network links millions of users globally across more than 45,000 networks 1. INTERNET CATEGORIES ● World Wide Web: An electronic marketplace or arena where electronic storefronts of businesses, civic groups, individuals and government entities display their products or ideologies ○ Each web site is characterized by its Uniform Resource Locator (URL) ○ Designs range from simple text-only sites to advanced video-audio configuration ● Bulletin Boards: Posting services similar to a community bulletin board in a library, transportation hub, schools, municipal buildings
  • 23. ○ Individuals can access software, post personal information, and exchange electronic mail ○ Very popular among subversive, terrorist groups, child pornographers (private areas for illegal communications) ○ Protected by First Amendment ○ Difficult for law Enforcement due to Jurisdictional Issues: access in one county and board is physically located in another jurisdiction ● Internet Relay Chat (Chat Rooms) ○ On line discussions in chat rooms ○ Allow users to interact with several others at same time (party line) ○ Characterized by topic ○ Users may choose to observe, participate in group discussions or private ○ Topics range from harmless interests like sports, hobbies to profane ■ Solicitations for sex very common in “teen rooms”
  • 24. Case Study Henry Brusca is a 68-year-old, married father of 7 who was in relatively good health until 3 weeks ago. At that time, he visited the emergency room with the complaint of “just not feeling right.” His BP on admission was 170/118, so he was admitted to the coronary care unit with the diagnosis of uncontrolled HTN. His BP was controlled with medication, and he was discharged several days later. He is now being seen for follow-up care and management of HTN. Because Mr. Brusca is newly diagnosed with HTN, you will need to complete a history and thorough cardiovascular examination. Case Study Findings Biographical data: ■ 68-year-old white male. ■ Married, father of seven grown children. ■ Self-employed entrepreneur; BS degree in engineering. ■ Born and raised in the United States, Italian descent, Catholic religion. ■ Blue Cross/Blue Shield medical insurance plan. ■ Referral: Follow-up by primary care physician. ■ Source: Self, reliable. Current health status: ■ No chest pain, dyspnea, palpitations, or edema. ■ Complains of fatigue, loss of energy, and occasional dizzy spells. Past health history: ■ No rheumatic fever or heart murmurs. ■ No history of injuries. ■ Inguinal hernia repair. ■ Left ventricular hypertrophy revealed by electrocardiogram (ECG). ■ Hospitalized 3 weeks ago for HTN. ■ No known food, drug, or environmental allergies.
  • 25. ■ No other previous medical problems. ■ Immunizations up to date. ■ No prescribed medications except Vasotec 5 mg bid and weekly use of antacid for indigestion. Family history: ■ Positive family history of HTN and stroke. ■ Mother had HTN and died at age 78 of a stroke. ■ Paternal uncle died at age 79 of MI. Review of systems: ■ General Health Survey: Fatigue, weight gain of 60 lb over past 3 years. ■ Integumentary: Feet cold, thick nails, tight shoes. ■ Head, Eyes, Ears, Nose, and Throat (HEENT): Two dizzy spells over past 6 months. ■ Eyes: Wears glasses, no visual complaints, yearly eye examination. ■ Respiratory: “Short winded” with activity. ■ Gastrointestinal: Indigestion on weekly basis. ■ Genitourinary: Awakens at least once a night to go to bathroom. ■ Musculoskeletal/Neurological: General weakness, cramps in legs with walking. ■ Lymphatic: No reported problems. ■ Endocrine: No reported problems. Psychosocial profile: ■ States that he does not have time for routine checkups. “I only go to the doctor’s when I’m sick. “Typical day consists of arising at 7 A.M., showering, having breakfast, and then going to work. Returns home by 6 P.M., eats dinner, watches TV till 11:30 P.M., but usually falls asleep before news is over. Usually in bed by 12 midnight. ■ 24-hour recall reveals a diet high in carbohydrates and fats and lacking in fruits and vegetables. Heavy-handed with salt shaker; salts everything. Admits that he has gained weight over the years and is 60 lb overweight. ■ No regular exercise program. States: “I’m too busy running
  • 26. my business.” ■ Hobbies include reading, crossword puzzles, and antique collecting. ■ Sleeps about 7 hours a night, but usually feels he is not getting enough sleep. Lately is more and more tired. Wife states that he snores. ■ Never smoked. Has a bottle of wine every night with dinner. ■ Works at sedentary job, usually 7 days a week. No environmental hazards in workplace. ■ Lives with wife of 45 years in a two-story, single home in the suburbs with ample living space. ■ Has a large, close, caring family. ■ Admits that running his own business is very stressful, but feels he can handle it alone and doesn’t need anyone to help him. General Health Survey findings: ■ Well-developed, well-groomed 68-year-old white male, appears younger than stated age. ■ Sits upright and relaxed during interview, answers questions appropriately. ■ Alert and responsive without complaint, oriented x 4 (time, place, situation, and person). ■ Affect pleasant and appropriate. ■ Head-to-toe scan reveals positive arcus senilis, positive AV nicking and cotton wool, extremity changes including thin, shiny skin, thick nails, and edema. ■ Vital Signs ■ Temperature, 36.6 °C. ■ Pulse, 86 BPM, strong and regular. ■ Respirations, 18/min, unlabored. ■ BP: 150/90 mmHg. ■ Height: 180 CM. ■ Weight: 124 KG. Cardiovascular assessment findings include: ■ Neck Vessels ■ Positive large carotid pulsation, +3, symmetrical with smooth,
  • 27. sharp upstroke and rapid descent, artery stiff, negative for thrills and bruits. ■ JVP at 30 degrees <3 cm, negative abdominojugular reflux. ■ Precordium ■ Positive sustained pulsations displaced lateral to apex, PMI 3 cm with increased amplitude. ■ Slight pulsations also appreciated at LLSB and base, but not as pronounced. ■ Negative thrills; cardiac borders percussed third, fourth, and fifth intercostal spaces to the left of the midclavicular line. ■ Heart sounds appreciated with regular rate and rhythm at apex S1 > S2 and +S4,at LLSB S1 > S2. ■ S2 negative split, at base left S1 < 2 negative split, at base right S1 < 2 with an accentuated S2, negative for murmurs and rubs. Questions: 1) What questions might be useful to elicit further details surrounding the Chest pain, using one of the common acronyms in this regard? (5 Marks) 2) From the subjective information you have obtained from Mr. Brusca’s history, what are his identifiable risk factors for heart disease? Which risk factors are modifiable and which are unmodifiable? (5 Marks) 3) List three priority nursing diagnosis for Mr. Brusca’s case, and cluster subjective and objective data that support each diagnosis. (3 Marks) 4) From the previous data, discuss the main issues of health promotion and disease prevention should the nurse discussed during health history and physical examination? (4 Marks). 5) Considering the relationship of the cardiovascular system to the respiratory system, what respiratory problems might Mr. Brusca have as a result of his cardiovascular disease? (3 Marks)