Premium Essay

Nt1310 Unit 3

Submitted By
Words 610
Pages 3
a. Standard Precautions are infection control practices that are used to help prevent the transmission of diseases. The infections can be spread through contact with blood, body fluids, non-intact skin and mucous membranes to name a few. In order to prevent the spread of the diseases precautions must be taken by practicing correct infection control guidelines. This would include; gloves, masks, proper wound care, correct disposal of contaminated products and handwashing (Kinn’s p 381).
b. There are five major areas included in the Occupational Safety and Health Administration (OSHA) compliance guidelines (Kinn’s p 386-391).
i. Barrier Protection - wearing Personal Protective Equipment (PPE). ii. Environmental Protection – reducing the risk of work related injuries. This can be done by isolating any physical or mechanical hazard.
iii. …show more content…
Post Exposure Follow Up – if someone is exposed through an unintentional needle stick, a human bite, exposure to broken skin, or blood, certain procedures need to be followed.

2. III.C.6. Define personal protective equipment (PPE) for: a. all body fluids, secretions and excretions; b. blood; c. non-intact skin; d. mucous membranes.
a. Personal Protective Equipment (PPE) involves dedicated clothing worn for protection against contamination. The choice of PPE is based on the what kind of interaction you will be having with the patient and possible exposure (CDC).
i. Gloves – gloves should be worn when there is a potential for contact with blood, all body fluids, secretions and excretions, non-intact skin and mucous membranes. Gloves should fit appropriately and not be worn more than once. Hand hygiene before and after removing gloves should be followed. ii. Gowns – a gown should be worn to protect the skin and clothing during procedures where contact with blood or body fluids is expected. The gown should not be worn more than once and once the gown is removed, perform hand hygiene before leaving the

Similar Documents

Premium Essay

Nt1310 Unit 3

...Complete Name: Unit 3 Student Name: Emerson, D'Shelia J ********************************************************************************************************** 1. Recruitment, Examination, and Selection ********************************************************************************************************** 2. What are the various forms of examinations used in screening employees for public employment? Student Answer: Before one is adequately considered qualified for a job in public service the following examinations are carried out as assessments of minimum qualifications requirements;Evaluations of training aspects, education, qualifications, and experience. This is a test of how learned one is, where they have worked before...

Words: 1465 - Pages: 6

Premium Essay

Nt1310 Unit 3

...record for audit provides complete information about the transactions and items of data that shows who has access to the network and what they are doing at a given time, where it may be used for security to recover lost data. We have audit trail software that helps track the source Manager (Beal, n.d.) . 2. Explain local area computer network performance issues. Currently, the vast majority of the population have access to the systems in homes and at their workplaces. Due to the increase in use, this is the reason why the network speed is slow also raising questions of hackers. 2.1 Describe how response times are affected for the following a) Speed of devices: The speed of the computer network depends on the number of devices connected to the network and their download and upload speed will be also very depending on how close you access point. It might also depend on the production on what components were used to build the hardware. And use and works faster than others and some slow. If the device is a high speed, then the response time will be high, and vice versa (Mitchell, n.d.). b) Bandwidth of transmission line: The response time depends on the distance between the client and the server, so the further away from each other, the longer it will take for the data transfer. ISPS can also be the difference if we add any meetings between ISP devices reduces the response time (Aidan Finn, n.d.). c) Queuing at nodes: the queuing process represent the term first come...

Words: 517 - Pages: 3

Premium Essay

Nt1310 Unit 3

...to not show up, in which case you can change the default ordering to allow alert rules to be applied before Pass rules. 2. If we only went to a few web sites, why are there so many alerts? Intrusion Detection Systems (IDS) monitors and gathers information through log files by sniffing packets. This information is analyzed for possible intrusion attempts. NIDS uses NIC’s running in promiscuous mode to capture and analyzed raw packet in real time (Pollock, 2014). Snort is a rule base system design to monitor different traffic patterns with a sophisticated detection engine that can analyzed and pinpoint attacks at real-time. Depending on the type of site, a security specialist analyzes can present a lot of traffic or very little traffic. 3. What are the advantages of logging more information to the alerts file? The advantage of logging more information from alert files gives security and network admin more information about possible attacks and weak points on a network. Snort can use third party Log Parser to manage Intrusion detection logs. Two convert snort log files into a text format. Admin can use the following command: output alert csv: alert.csv default (Managing Snort Alerts,). The logs can be customized by the admin. 4. What are the disadvantages of logging more information to the alerts file? More information is great but, if that information is compromised this would leave a network vulnerable to any insider or hacker to sell or used this information for their...

Words: 1545 - Pages: 7

Premium Essay

Nt1310 Unit 3

...radio signals in space. As a large amount of computing power is required to cover the appropriate frequencies the telescope detects, SETI@home uses a significant numbers of normal computers (belonging to the general public) to analyse the data which is constantly streaming from Arecibo. The computers used are given data from a data server (which stores data from the Arecibo telescope), which they then analyse, and then return to the data server. This occurs when the computer is idle (using spare power). 3) Name another problem in your area of study that might require the use of a grid computing facility. Describe how and why grid computing can be used to solve this problem. Data-Intensive problems can be solved on the program Matlab using grid computing. All computers involved will have to have the required Matlab software to be connected. A person may consider using grid computing in this situation in the event of the data being handled is too much for one desktop. Question 3 1) List and briefly describe the considerations that you would take into account in choosing/buying a laptop for use as a first-year Physics student embarking on a 4-year Physics/Science-related degree programme. • Budget. Regardless of the different specs and roles required for the laptop, a budget will be established in most circumstances (i.e. how much can the physics student spend, or how much he/she wants too). It is important that a clear idea of a price limit is settled, to prevent overspending and...

Words: 2165 - Pages: 9

Premium Essay

Nt1310 Unit 3

...A&P Regrades 4. a)This is correct because the basement membrane is where a cell attaches to a “lining”, so the basement membrane will always be outside the normal cell membrane as it is not a part of the actual enterocyte or keratinocyte cell. 7. b)This is correct because the working muscle gets hot and the blood that is being pumped into the muscles are cooler than the muscles themselves, so blood flow into the working skeletal muscle will cool the muscle back down. 8. b)This is incorrect because the rate of transport will only increase if there is a concentration gradient. If there is not gradient, there will not be an increase of transport, so more Glut-4 doesn’t always increase uptake. 11. a) This is incorrect because if there is more glucose ingested, the Glut-2 would allow glucose to be absorbed into the bloodstream, signalling insulin to be secreted. b)This is correct because the concentrated glucose can be taken in by Glut-2, causing a rise in blood glucose. Although, there would be more glucose uptake if there was dietary sodium because more sodium would mean more activity with SGLT-1, causing more glucose to be absorbed into the blood than just GLUT-2 uptake. d)This is incorrect because more glucose ingested would mean more glucose can be absorbed and moved into the bloodstream, causing more glucose to be in the blood rather than less. 12. c)This is correct because insulin resistant cows will have more blood glucose because the glucose will not uptake. If there...

Words: 1295 - Pages: 6

Premium Essay

Nt1310 Unit 3

...collection? 1. CPU 2. Optical storage 3. Optical scanner 4. Light pen 5. None Ans: 3 2. Which among the following is an electro mechanical handheld device? 1. Mouse 2. Monitor 3. ALU 4. CPU 5. None Ans: 1 3. Which among the following utilizes light sensitive detector to select objects on display screen? 1. Mouse 2. Barcode reader 3. Monitor 4. Light pen 5. None Ans: 4 4. Which among the following devices takes voice as input? 1. Speakers 2. Microphone 3. Light pen 4. Control unit 5. None Ans: 2 5. Which among the following is the most important output device as people interact with it directly? 1. Monitor 2. Mouse 3. Keyboard 4. Track ball 5. None Ans: 1 6. Which among the...

Words: 1015 - Pages: 5

Premium Essay

Nt1310 Unit 3

...1 UNIT III. SUPPORT, LOCOMOTION, DIGESTION AND EXCRETION Part 1. Biochemistry of the Bone Chemical and Cellular Composition of the Bone 1. Bone is a mineralized connective tissue, consisting of the following components: Organic (______________) Inorganic (________________) • Mostly Type I _____________ • Its noncollagen components are: o _____________________ o _____________________ o Bone _____________ o _____________________ • _____________________ [Ca10(PO4)6(OH)2] • • _____________ and _____________ 2. Osteoclasts are responsible for __________________ bone. a. They _______________ the matrix to release _____________ (_____________,_____________) into the blood. b. Its apical ruffled membrane border contains: H+-translocating ATPase • Expels...

Words: 675 - Pages: 3

Premium Essay

Nt1310 Unit 3

...Analyze three (3) specific potential malicious attacks and / or threats that could be carried out against the network and organization. Browser attacks Browser based attacks are the most common network attack. They try to trick internet surfers into downloading malware that is disguised as a software application or an update. Cyber criminals also target popular operating systems and applications by employing an exploit. This can be a piece of data or a series of commands that takes advantage of vulnerability in the system. An attack as such can put the network at risk. Browser attacks can download many different types of viruses which can cause system crashes and data loss. This can be avoided by regular updates to both the browser and related...

Words: 759 - Pages: 4

Premium Essay

Nt1310 Unit 3

...plane handles the packets transiting the router among the networks it serves. • The data plane handles the actual network traffic. 3. List two ways you can provide physical security for a router. Answer: There are different ways to provide physical security for a router are shown below.  The room that contains the router should be free of electrostatic or magnetic interference.  It should have controls for temperature and humidity.  If continuous operation of the router is critical, an uninterruptible power supply (UPS) should be installed and spare components kept on hand. 4. List three services you should block at a border router. Answer: The below table shows the services that should be completely blocked by a typical border router. Services to Block Completely at a Border Router Port (Transport) Servie 1 (TCP & UDP) tcpmux 7 (TCP & UDP) echo 9 (TCP & UDP) discard 11 (TCP) systat 13 (TCP & UDP) daytime 5. List two strategies that could be applied to mitigate Denial of Service (DoS) attacks on a router? Answer: There are three primary strategies for combatting DoS attacks, Mention below. 1. Prevent malicious traffic from entering the common network from the enterprise network. 2. Configure and deploy local protective measures, at both border and interior routers. 3. Coordinate protective measures against distributed DoS attacks with network access providers and/or backbone administrators. 6....

Words: 783 - Pages: 4

Premium Essay

Nt1310 Unit 3

...The simulation was performed to study the performance of both IPTV and VOIP over the LTE networks. We used the OPNET simulator 17.5 Modeler to examine the behavior of IPTV and VOIP over LTE networks in the real time domain with reasonably accurate emulation of multiple network topologies. Different thirty of scenarios have been designed in our simulation as shown in Tables 1 up to 4 and their simulated results were accumulated to analyze the effect on overall performance and all of results are monotonically and stable without any resonance. 7.2 Network Topology The network topology consists of application configuration that we accessed our application of video and voice transmission through it, profile configuration that we defined our simulated application to each LTE mobile node, LTE configuration that we accessed all required network parameters through it (i.e. In our simulation it will use physical layer mode as an efficiency mode) and seven cells in each cell LTE mobile SS nodes are located at a certain distance from LTE BS as shown in Fig.6. This network will receive a video and voice streaming signal over IP networks such that LTE BS can access it at a certain transmission power and distance between it and the other base stations and SS in the network in the same coverage area through the accessed network. 7.3 Different schemes Based on LTE Networks 7.2.1 Distance Variation The strength of the transmission signals is a critical issue that affects directly on the quality...

Words: 460 - Pages: 2

Premium Essay

Nt1310 Unit 3

...CORNERSTONE OVERVIEW PRIOR KNOWLEDGE (Before the Unit) Students will need content knowledge about how to classify and describe rocks, how rocks are used by people, and the rock cycle and how rocks are formed. They will need to research this information for their chosen rock of study and apply it to their short poem and timeline included in their pamphlet. If students are choosing to create a pamphlet about marble, for instance, they will need to understand that this rock is classified as a metamorphic rock and is often used for sculptures and countertops. Students will also need to describe the rock cycle in order to successfully create a timeline that demonstrates how marble is formed. Students will also need to practice fluency and creative expression skills. Specifically, students need to be able to read accurately, at an appropriate pace, and with meaningful expression. Teachers will want to use the exemplars provided in this cornerstone to support students in applying previous knowledge and skills to this project. PLACEMENT WITHIN THE UNIT Before:...

Words: 834 - Pages: 4

Premium Essay

Nt1310 Unit 3

...system database. On the other hand, if we decrease security level, this will cause that there will be false acceptance in some verification processes and at the same time there will be no matching between user data and any data stored in database and not belong to him/ her. Also there will be privacy problem because of the development of technologies, people can't trust that there biological identities is secured all the time. Biological identities can be used in police crime unit to identify criminals and threats by verifying the attributes. (Robert Gellman, 2013), (L. JEAN CAMP, 2004) Digital identity of a person is all the digital data which belong to that person. Digital identity can be used to identify any individual by creating it on any system. Digital identity is processing faster than biological identity. Digital identity can be created not only for humans but also for business, organizations, devices, software and any object. Digital identity can be traced among some techniques. In police crime unit they trace digital identities of cybercrimes and also they use it to ensure the accessibility to their systems only for the authorized users. (OECD, 2011) ...

Words: 1278 - Pages: 6

Premium Essay

Nt1310 Unit 3

...guidance, and documenting of processes and procedures, and assist in training for system users, for example I held a workshop for team member after I attended an ISA Firewall course. I am also a member of the exchange group, our task is to configure MS exchange server for the student network which is on MS Exchange server. Divided the task between two of us, I was dealing with installing MS exchange and assigning server certificates. First of all, find information, source and plan. We all have to meet and discuss how the project will move forward to the next task which was the installation & decide the appropriate steps for the project to move forward as follows; 1. Install exchange server 2. I choose Custom Exchange Server Installation 3. Choose the installation of Exchange Mailbox, Client Access and Hub Transport server roles 4. Reboot the server and exchange management console will load from start program MS exchange After the installation is over, requested, imported and assigned the certificate for exchange server The next section we will be working on is to publish the rules in ISA server on the student network. Created web server publishing rule for Exchange and OCS and CWA on ISA server. I am in a group called Network group which handles the network infrastructure and the telephony system. The network group which I am apart of maintain the telephony system of CNWL. I am in charge of the telephony system which is configured on this web base configuration interface...

Words: 664 - Pages: 3

Premium Essay

Nt1310 Unit 3 Assignment 3

...Question 1 1.1) The organization was built on bus topology which works best with only a limited number of devices connected. The reason users are experiencing slow speeds to additional users were added. The bus network topology at optimal speeds when there are less than 12 device on the network. 1.2) They could create a new network with the same design for the new users thus decreasing the pressure on the current network. Another option would be to create a new network with topological plan which would be able to accommodate the 20 new users as well as the existing users. 1.3) A single cable, the backbone functions as a shared communication medium that devices attach or tap into with an interface connector. A device wanting to communicate with another device on the network sends a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes the message 1.4) 2.) 3.1) 3.2) 1 minute =60 seconds Therefore 10 × 60 = 600 seconds 1Gb = 1024 Mb 1024 ÷ 600 = 1.7066666667 8bits = 1 Byte 8 ×1.7066666667=13.6533333333 Therefore the throughput on the network is 13.65Mbps 3.3) Accessibility –The server can be remotely accessed from various platforms on the network. Proper Management - Management of files is easy as all files are stored at the same place. This also means finding files is simple. Security – The rules which define...

Words: 903 - Pages: 4

Premium Essay

Nt1310 Unit 3 Assignment 3

...Tucson 2011 has been ranked No. 5. What does this subcompact crossover have to offer? The Hyundai Tucson arrived in the United States in 2005 and its style was similar to the Santa Fe but with more fluid lines. The latest Tucson is one of the first Hyundai to use the design philosophy of the vehicle manufacturer's Fluidic Sculptured. Two four-cylinder engines are available and include a 2.0-liter bed with 164 horsepower and 146 feet of torque and a torque of 2.4 liters at 176 horsepower and 168 feet of torque. Transmission choices include a five-speed manual or a six-speed automatic. The controller moves very slowly and facilitates the motor in its powerband. The 2.0-liter engine moves the Tucson from 0 to 60 in 9.5 seconds and the 2.4-liter unit makes 0 to 60 seconds in 8.8 seconds. The four-wheel disc brakes stop the Tucson from 60 mph in 120 feet. Outside, Tucson has curved body lines combined with a bold front-end. Overall, it is described as a young and sophisticated vehicle that is eye-catching. The interior is well finished and aesthetically pleasing considering the price of this passage. Buttons and buttons for air conditioning and stereo are simple and simple. Standard features include a stereo system with six 160-watt speakers, XM satellite radio, navigation, iPod integration and leatherette partitions. The Tucson will occupy four feet six feet and offers a good back room for the legs. The cargo capacity is 55.8 cubic feet, the rear seats are folded, nearly 25 cubic feet...

Words: 505 - Pages: 3