Ch 19 CaseStudy3 VSD SSL

Good Essays
Topics: Heart, Blood
Crimes of the Heart: A Case Study on Cardiac Anatomy

Tiffany is worried about her newborn son. Ever since she brought Caleb home from the hospital it has been so hard to get him to eat and he seems to be breathing too hard all the time. At his one month check-up, the nurse tells her that Caleb has only gained one pound since he was born and Tiffany breaks into tears.

Dr. Baker checks over Caleb in the exam room, taking extra time feeling and listening to his chest. After the exam Dr. Baker says, “When I listen to Caleb’s heart I hear an extra sound called a murmur. I want to use an echocardiogram and an ECG to get a good picture of all the parts of his heart.”

After a full day of tests, Tiffany meets with Dr. Baker in his office. He explains, “After a careful review of all the information, I have discovered that Caleb has a hole in the heart muscle wall between his right and left ventricles. We call it a ventricular septal defect. That is probably why he has been so irritable and hard to feed. The hole is not very big, but he will still need to have surgery to repair it.” Although the thought of her tiny son having surgery is terrifying, Tiffany is relieved to know why things have been so tough at home.
Short Answer Questions:

1. Caleb has abnormal heart sounds that tipped the doctor off to a problem.
a. Name the normal sounds of the heart and indicate what causes these sounds.
The two major sounds that are heard in a normal heart beat sound like “lub dub”. The “lub” is the first heart sound, commonly termed S1, and is caused by turbulence caused by the closure of mitral and tricuspid valves at the start of systole. The second sound, “dub” or S2, is caused by the closure of aortic and pulmonic valves, marking the end of systole. (STETHOGRAPHICS.COM)

b. In relation to the normal heart sounds, when would you expect to hear the abnormal sound Dr. Baker heard? Explain your answer.
When a valve is stenotic or damaged, the abnormal turbulent flow of blood

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Casestudy3

    • 608 Words
    • 6 Pages

    The Flamingo Grill Case Report By: Rebecca Johnson Executive Report Background The Flamingo Grill is an upscale restaurant located in St. Petersburg, Florida. Flamingo’s management team hired advertising firm Haskell & Johnson to recommend how their advertising budget of $279,000 should be allocated across television, radio, and newspaper advertisements. Objective Maximize the total exposure rating across all media, while reaching at least 100,000 new customers. Methodology A Linear…

    • 608 Words
    • 6 Pages
    Satisfactory Essays
  • Powerful Essays

    Sm Ch 19

    • 10283 Words
    • 87 Pages

    CHAPTER 19 COSTING AND THE VALUE CHAIN OVERVIEW OF BRIEF EXERCISES, EXERCISES, PROBLEMS, AND CRITICAL THINKING CASES Brief Exercises B. Ex. 19.1 B. Ex. 19.2 B. Ex. 19.3 B. Ex. 19.4 B. Ex. 19.5 B. Ex. 19.6 Topic Value chain components Capturing market share with target prices Cost of quality Cost reduction non-value-added activities Manufacturing efficiency in a JIT system Activity-based management cost savings B. Ex. 19.7 B. Ex. 19.8 B. Ex. 19.9 B. Ex. 19.10 Target costing Cost of quality Characteristics…

    • 10283 Words
    • 87 Pages
    Powerful Essays
  • Good Essays

    Ssl Weakness

    • 758 Words
    • 4 Pages

    The current state of authenticity in SSL is questionable and deleterious to the security of SSL as a whole. SSL, even with the most current updates, suffers a great deal of weaknesses that had been highlighted over the years. Some of the most prominent issues are: certificate and configuration issues, protocol attacks, application-level issues, and PKI trust issues. As reported in the RSA conference in Europe back in 2011, SSL certificates issues encompass insufficient domain name coverage…

    • 758 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Ap World Ch 19

    • 1175 Words
    • 5 Pages

    Ch. 19 – Southwest Asia and the Indian Ocean, 1500--1750 I. The Ottoman Empire Expansion and Frontiers 1. Osman established the Ottoman Empire in northwestern Anatolia in 1300. He & his successors consolidated control over Anatolia. 2. Egypt and Syria were added to the empire in 1516—1517. Suleiman the Magnificent conquered much of eastern Europe. 3. The Ottoman Empire fought w/Venice for two centuries as it attempted to exert its control over the Mediterranean.…

    • 1175 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Homework Ch 18 19

    • 299 Words
    • 2 Pages

    purchases and net ports. If spending change happens infrequently then added goods go into inventory causing company to spend capital on invested inventory. Consumption function accounts for the difference between changes in expenditure. Chapter 19 1. Why does the real interest rate affect planned aggregate expenditure? Give examples. Because the raising or lowering affects the cost of borrowing, which affects consumption and planned investment (which all is a part of aggregate expenditure)…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Physics CH18 and CH 19

    • 732 Words
    • 4 Pages

    Name ____________________________________ Equipotential Go to http://phet.colorado.edu/simulations/sims.php?sim=Charges_and_Fields and click on Run Now. Complete Part 1 for chapter 18 and part 2 and 3 for chapter 19. Part 1: What is an equipotential line and how is this simulation related to work and energy? 1) Turn on “Show Numbers” 2) Place a positive 1 nano-coulomb charge near the center of the screen. 3) In the lower left of the screen is a meter for indicating electric potential…

    • 732 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Ssl Vpn Security

    • 2614 Words
    • 11 Pages

    over time. Productivity enhancements can be measured in terms of tool effectiveness, user time savings, usability improvements, and user satisfaction. Secure Sockets Layer (SSL) VPN is an emerging technology that provides remote-access VPN capability, using the SSL function that is already built into a modern web browser. SSL VPN allows users from any Internet-enabled location to launch a web browser to establish remote-access VPN connections, thus promising productivity enhancements and improved…

    • 2614 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Management Ch 19, 20, 21

    • 14386 Words
    • 45 Pages

    CHAPTER 19 NOTES Good mission and vision statements should invoke a desirable future and create uneasiness with the status quo. As you are reminded in the figure, the letter “P” in the P-O-L-C framework stands for “planning.” Good plans are meant to achieve something—this something is captured in verbal and written statements of an organization’s mission and vision (its purpose, in addition to specific goals and objectives). With a mission and vision, you can craft a strategy for achieving them…

    • 14386 Words
    • 45 Pages
    Good Essays
  • Powerful Essays

    Wildcard SSL Certificates Summary Cyber security is the burning concern today causing a panic attack on businesses and individuals. Majority of the adults shop from e-commerce websites. Therefore, securing a site from hackers is paramount or else the firm will lose its customers and their business will go down drastically. If a business wants to stay up in its game, it should convince its users so that people will board it. Among the many parameters to secure a site, why is SSL important? We shall…

    • 969 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    SSL-Secure socket layer

    • 2648 Words
    • 11 Pages

    Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland zhon003@ec.auckland.ac.nz Abstract Secure Socket Layer (SSL) and Transport Layer Security (TLS) is the protocol above TCP, which can protect user’s privacy when they sending data from a client side to a web server, this is an important protocol due to the expansion of Internet. In fact, it is a long way to make the SSL/TLS protocol perfectly. However there are still…

    • 2648 Words
    • 11 Pages
    Powerful Essays