Preview

Nt1310 Unit 3 Assignment 1

Satisfactory Essays
Open Document
Open Document
438 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 3 Assignment 1
Morgan Trahan
10/02/2014
Unit 3 Assignment 1
Lymphatic filariasis is an extremely painful infection of the lymphatic system. It is caused when thread-like filarial parasites are transmitted to humans through mosquitoes. There are three forms of the parasites which are Wuchereria bancrofti, Brugia malayi and Brugia timorican. The most common is Wuchereia bancrofti. When the mosquito bites the human, it injects the larvae into the blood stream which then circulates into the lymphatic system. The parasites can live up to six years in a human. The disease is most common in tropical areas and sub-tropical areas such as mid-Africa and southern Asia due to their elevated temperatures and moist climate CITATION Sab14 \l 1033 (Institute, 2014).
…show more content…
Standard diagnosis for filariasis is by blood smear. The parasites that cause the disease circulate through the blood at night so typically doctors will take a blood sample at night, then look for the parasite under a microscope. Once a person has been diagnosed doctors typically prescribe Diethylcarbamazine. Diethylcarbamazine kills the microvilli and some of the adult worms. It is no longer available in physicians in the United States because the Federal Drug Association has disapproved the drug. Though if lab results are positive then physicians can obtain the drug from the Centers of Disease Control and Prevention CITATION Cen10 \l 1033 (Centers for Disease Control and Prevention,

You May Also Find These Documents Helpful

  • Good Essays

    Typically the infant is found dead after having been put to bed, and exhibits no signs of having suffered.[7]…

    • 681 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 3299 Words
    • 14 Pages

    Magnifier will allocate a section of your screen (by default at the top) where it will display a magnified version of what is under your mouse. It is also possible to configure it to follow the keyboard focus instead of the mouse position.…

    • 3299 Words
    • 14 Pages
    Good Essays
  • Better Essays

    Nt1330 Unit 3 Assignment 1

    • 1092 Words
    • 5 Pages

    Computer technology continues to make rapid advances in healthcare facilities. Many healthcare facilities have used computer programs for administrative functions such as payroll and billing. Electronic health record (EHR) systems have the potential to transform the health care system from a mostly paper-based industry to one that utilizes clinical and other pieces of information to assist providers in delivering higher quality of care to their patients.…

    • 1092 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Nt1330 Unit 3 Assignment 1

    • 2755 Words
    • 12 Pages

    Setting up my new computer, with the Window 7, operating system was fairly simple. The setup directions were easy to follow, in order to get me up and running. Upon setting up my new system I took care of establishing my internet connection, from my Internet Service Provider, which happens to be Comcast. Now that I’m connected to the internet and ready to take on the World Wide Web the fun part begins, making sure it’s protected against any harmful attackers, and any virus threats.…

    • 2755 Words
    • 12 Pages
    Good Essays
  • Good Essays

    NT1330 Unit 3 Assignment 3

    • 1030 Words
    • 5 Pages

    Desktop and laptop grouping them together because they are so similar the device they self-are not security concerns. It the operation system that would have the security concerns, that is why they have patches for the OS.…

    • 1030 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The surveys were designed for three different targeted audiences, survey1 for IT professionals in the IT departments of SCT, CAS and DU, survey 2 for all users types such as staff, employees and students of SCT, CAS and DU from all departments and survey 3 designed for Vendors who are providing technologies to SCT, CAS and DU.…

    • 306 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    I think that the organizations requirements for user's passwords to be several character long and have a certain amount of attempts is actually a great security measure. Yes, i think the additional security is worth it. I also think the number of security entry should be limited. The reason I agree with both is because if they were not in place it woud give people an easier chance of unlocking you phone and disappearing with it. For example, I have an Iphone i went to a friends get together. I place my phone down for 5 minute to get a drink someone took my phone and was trying to unlock it. The person could not get my code correct so my phone shut him out completely. I was happy because my information was protected.…

    • 413 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Any public wireless hotspots, such as at restaurants, hotels, parks are not a good place to use any website that requires personal or financial information. When using an unsecure network, a hacker can easily get access to any webpage you access. They can access documents, pictures, bank information, your phone number, address, credit card information and passwords. Once the hacker has your username and password for one website they can try to log in as you on multiple other websites. This is why it is best to never use the same username and password on different websites. When you are connecting to a wireless network, if it does not ask you for a WEP, WPA, or WPA2 password, then your connection is not secure, meaning none of the data you access with be encrypted.…

    • 356 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The benefits of creating a Virtual Local Area Network (VLAN) are numerous and include such things as less bandwidth consumption, greater security, and the ability for users to be in different geographical locations while still sharing resources. One plan to segment the network is to divide it into broadcast domains, reducing network congestion and also increasing security. The network will be segmented according to group functions. For instance, the engineering department will have one segment, the call center will have another segment, operations will have another segment, and the marketing department will have another segment.…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 8 Assignment 1

    • 1415 Words
    • 6 Pages

    This project used an Atmega644 microcontroller clocked at 20MHz in each of the two functional modules for processing. Memory storage is provided by a standard Secure Digital (SD) card. Xbee modules provide bidirectional wireless communication and we use the TLV5616 DAC chip for generating analog audio. The LM358 dual op amp provides active filtering to the output of the DAC. Music files can be added to the SD card using any computer with a multimedia card reader. Once the base station detects an SD card inserted into the holder, it awaits data requests from the portable module. The portable module requests data when required and feeds these values into the DAC. The DAC output is low-pass filtered by the op amp, which also buffers the DAC output before it reaches the audio output…

    • 1415 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    NTFS is the newer filing system from Windows only Windows 2000 and higher use NTFS and FAT32. Which file system is intended primarily for use in large USB flash drives? I think it would be NTSF it a little more better an newer when it comes to the new OS out there like windows 8/7/ and maybe Vista XP just in case you have application that might run better on vista and XP. Plus since USB didn’t come out until Windows 98 well that when I first saw a USB port…

    • 462 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Improving a company’s system helps aid in its success in today’s market as well as in the future of the company’s growth and stabilization. this new system that will enable the company to promptly accomplish these requirements without hesitation and will not interfere with the company’s time management protocols or add extra unneeded expenses.…

    • 753 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1244 Words
    • 5 Pages

    Analysis and explanation of the threat and vulnerability pairs and their likelihood of occurrence. The chart explains the aspects of the vulnerabilities and threats. b\Because we have no data on these threats on the amount of occurrences we cannot assign an impact rating or a probability rating in which is high medium an low (reference page 121 of book)…

    • 1244 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The user domain contains the employees that will be accessing resources in the network. Users access systems, applications, and data within the rights and privileges defined by the acceptable use policy. The AUP must be followed at all time or the user may be terminated. There are threats ranging from lack of awareness to blackmail and extortion. All employees are responsible for their own actions when using the network. The users will all be expected to read and abide by the acceptable use policy. (Kim & Solomon, 2012)…

    • 539 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1410 Words
    • 6 Pages

    Don’t limit yourself to modular sizes listed in a catalog - surf2 tables are available in 1 inch…

    • 1410 Words
    • 6 Pages
    Good Essays