Preview

Nt1310 Unit 5 Exercise 1

Satisfactory Essays
Open Document
Open Document
322 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 5 Exercise 1
1. List the patients that you took care of this week (one initial only); their age; gender; and primary diagnosis.
* S. 12 year old, female diagnosis with Vaso Occlusive Sickle Cell Anemia.
2. List the medications that you administered this week:
* Hydroxurea 700mg PO, Normal Saline 1000ml 125ml/ hr., Enalapril 20 mg PO, Morphine 1mg IVP

3. List procedures you performed or observed this week:
* Medication administration, physical assessment, IV pumps, IV syringes, Oxygen administration.
5. State how you plan to improve on your clinical performance during the next rotation on the Pediatrics unit.
*
From this experience in the stimulation lab, I discovered my weaknesses and strengths. I failed to check the patients arm band to make sure

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 7 Exercise 1

    • 489 Words
    • 2 Pages

    The proposed method is illustrated as a flow chart in Fig 3. First, the source node broadcast the RREQ to neighbor nodes. The neighbor nodes forward the Route Request (RREQ) to the destination node. Destination node stores the neighbor RREQ in a table and checks the RREQ. If RREQ is from the true Source node address, then the system is regular and begins to transmit test data packets otherwise repeat the process. Next, it will check the packet delivery ratio if packet delivery ratio drops to threshold then Send Bait RREQ. The source node randomly chooses one-hop neighbor node (nr) as a destination node. The Source node selects one-hop neighbor node nr as the destination node and sends the RREQ to that node. First, if nr had not launched black hole attack, then after the source node had sent the RREQ, then other nodes in addition to nr node also reply with RREP. It indicates that there is an Attacker in Reply routing. If the only nr sent RREP then…

    • 489 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The Wiremap test is used to identify physical errors of the installation; proper pin termination at each end, shorts between any two or more wires, continuity to the remote end, split pairs, crossed pairs, reversed pairs, and any other mis-wiring. It tests four-pair data and voice cable links terminated with standard, modular, eight-position RJ45 jacks. Shielded ports test both shielded and unshielded cabling. This is essential for just about any network as telephones (voice) are also used in conjunction with data communications. This tester should be a part of every cable installation kit.…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Exercise 1.1

    • 1895 Words
    • 8 Pages

    Ants may lay pheromone trails when travelling from the nest to food, or from food to the nest, or when travelling in either direction depending on the species. They also follow these trails with a allegiance which is a function of the trail strength, among other variables. Ants drop pheromones as they walk by stopping briefly and touching their gaster, which carries the pheromone secreting gland, on the ground. The strength of the trail they lay is a function of the rate at which they make deposits, and the amount per deposit. Since pheromones evaporate and diffuse away, the strength of the trail when it is encountered by another ant is a function of the original strength, and the time since the trail…

    • 1895 Words
    • 8 Pages
    Good Essays
  • Best Essays

    Nt1310 Unit 4 Exercise 1

    • 1486 Words
    • 6 Pages

    As it is evident from the related work discussed in the section 2, when small files are stored on HDFS, disk utilization is not a bottleneck. In general, small file problem occurs when memory of NameNode is highly consumed by the metadata and BlockMap of huge numbers of files. NameNode stores file system metadata in main memory and the metadata of one file takes about 250 bytes of memory. For each block by default three replicas are created and its metadata takes about 368 bytes [9]. Let the number of memory bytes that NameNode consumed by itself be denoted as α. Let the number of memory bytes that are consumed by the BlockMap be denoted as β. The size of an HDFS block is denoted as S. Further assume that there are N…

    • 1486 Words
    • 6 Pages
    Best Essays
  • Satisfactory Essays

    802.3 is the IEEE working group and it provides standards and recommendations in architecture and internetworking in LANs and MANs…

    • 545 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Grandfather – father – Son: According to this backup rotation schedule incremental backups are performed daily, while full backups are done weekly and monthly.…

    • 770 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Thank you contacting me and for considering me on your issues that you’re having. It will a pleasure to be your consultant. In your email, it says you have been having issues with sluggish performance your warehouse workstation computer. Are you having any other issues with your other workstations being sluggish? For warehouse workstation being sluggish, I would have to check in detail what causing the issues. As for upgrading, my question is what did you want to upgrade? Your OS Window System 64 bit, or different Window OS, or upgrade your whole desktop system? List below are the minimum hardware requirements for Windows XP Professional 64bit Edition are:…

    • 192 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1 Exercise 1

    • 5033 Words
    • 21 Pages

    EXERCISE - 1 Write a Program in C/ C++ for error detecting code using CRC-CCITT (16 bit)…

    • 5033 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    NT 1330 Unit 2 Exercise 1

    • 363 Words
    • 2 Pages

    Let’s begin with the smaller branch supporting the five user workstations and the very slow network connectivity. You may not need a DNS server at all. If there is a lot of file & data sharing, then maybe the branch could benefit from a server, but configured in a secondary zone, such as an ADI. If there is not enough file/data sharing to need the presence of the server, an ADI server could potentially slow down an already sluggish system even more.…

    • 363 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 1 Exercise 1

    • 484 Words
    • 2 Pages

    Graph 1, illustrates the pH of each quadrat. The pH in Quadrat 1 was more acidic than the pH in Quadrat 2, 3, and 4 this is due to the slope of the ground (refer to Graph 8), different soil substrate and the decomposition of organic matter. As can be seen from Graph 8, the soil pH increased with a decrease in the slope of the ground. In Quadrat 1, the soil had a pH of 7.5 due to having a higher soil elevation of -8° in comparison to Quadrat 2, 3 and 4, in which the slope of the ground was -2°, -2° and -1°, respectively and the pH was 9 within each quadrat. This makes Quadrat 1 more prone to acidification, as it receives more acid rain than soils in lower elevations. Quadrat 1 is more acidic than Quadrat 2, 3 and 4 because at low tide (Quadrat…

    • 484 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    cout << "You are in factorial program of C++. Please enter a +ve integer:- ";…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    To understand how to interface with the local exchange you must first understand the different networks that comprise it. The first network is the access network. The access network is the network that connects the individual user or business with the telecommunications system. It’s a critical portion of the network because it is the part of the network that reaches the end users and “connects them”. This is made up of a series of fiber-optic and copper cabling and passive and active equipment that connects you to the local exchange.…

    • 336 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 3 Assignment 1

    • 3788 Words
    • 16 Pages

    With security mechanisms for the new network, management has asked for a report describing how the basics of a network operate and how two nodes communicate. With this we are going to break down the OSI model (Open Systems Interconnection) which is seven layers along with the TCP/IP (Transmission Control Protocol/Internet Protocol). After this the management team will know the difference between the two models along with some other key information.…

    • 3788 Words
    • 16 Pages
    Better Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 2469 Words
    • 10 Pages

    “Tell me and I forget. Show me and I remember. Involve me and I understand.” Chinese proverb One’s understanding of network protocols can often be greatly deepened by “seeing protocols in action” and by “playing around with protocols” – observing the sequence of messages exchanged between two protocol entities, delving down into the details of protocol operation, and causing protocols to perform certain actions and then observing these actions and their consequences. This can be done in simulated scenarios or in a “real” network environment such as the Internet. The Java applets that…

    • 2469 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    I have just read your email and have to say that I was a bit overwhelmed about your file problems. I was looking into suggesting that you buy a new rack mount or a new network server, but they are tremendously expensive ranging from $1,000- $5,000. Also the time it will take for you and your employees to learn about the new server, buying it, and then installing it will be time consuming.…

    • 374 Words
    • 1 Page
    Satisfactory Essays