Premium Essay

Nt1310 Unit 5 Exercise 1

Submitted By
Words 1038
Pages 5
1. Using the Rule of Nines, A.N. sustained burns to 45% of her body when combing A&P sites.
2. Criteria to assess includes burns on the face and neck, singed nasal hair, hoarse, dry cough, bloody/sooty sputum, labored respirations. Additionally, edema, blisters, and ulcerations along the mucosal lining of the oorpharyngeal and laryngeal sites. The edema may continue to increase for 24-48 hours post injury, so close pulmonary assessment is pertinent. Asses initially for need of intubation with mechanical ventilation, continuous O2 saturation monitoring, pulmonary toilet, and CXR. Careful assessment in the order of respiratory distress and airway obstruction is essential. Assess for deep facial and neck burns, stridor, accessory muscle use, hypoxia, blistering/edema to the oropharyngeal airway, continuous ABG assessment in the order of intubation and mechanical ventilation need.
3. H&G 20 and 51 increase during the first 24-48 hours post inhalation injury secondary to hemoconcentration related to intravascular fluid volume loss. This is proportional to the level of fluid volume. As fluid returns to the intravascular space, H&H levels return to normal. H&H should decrease with adequate hydration. Serum potassium of 4.9 initially is expected to increase secondary to cellular lysis and fluid shifts to extracellular …show more content…
Once fluid resuscitation has begun, narcotic analgesics are administered IV to control pain, which should be evaluated and adjusted continuously per patient status. Analgesics are most effective if given on a scheduled basis rather than per request, as effective pain management is responsible by the activated sympathetic nervous system, vasoconstriction, which decreases blood flow to the wound, which delays wound healing. Do not use IM injections during the emergency period secondary to poor absorption. The most common, in the early, acute phase of a burn injury, includes opioid agents such as morphine sulfate, fentanyl, and

Similar Documents

Premium Essay

Nt1310 Unit 5 Exercise 1

...Data usage not stable because it depend on user using internet. This is table of my data usage in three days. • On first day, I less using internet so data usage are less. I just surf internet like search in google, chat in media social, and view email. • Second days, data usage increase because more activities are doing such as watch video on YouTube, download some files, and playing game online. • Last day, I watching movies, playing game online, and update system laptop. Therefore, data usage more used than two days ago. • So last days is more data usage used than other days. Data usage depend on by user using internet. 6.0 Analysis: • This is date rate I took on second day for review data intervals in 1 second(s). • Data rate not stable in 1 second(s), average of data rate is 266k per...

Words: 476 - Pages: 2

Premium Essay

Nt1310 Unit 5 Exercise 1

...generate the watermark an input frame is scanned to compute the , which represents the 128-bit hash value MD5 cryptographic function. The watermark is nothing but the bits of digital signature of hash value and secretes key . In the initial stage we extract the frames from the video sequence. The watermark generation process shown in Fig. 2. is explained in following steps: 1. The hash value is initialized to some arbitrary fixed value. 2. The position of the Last Non Zero (LNZ) level for each block is stored so that it can be used while extracting the watermark. 3. The value of the JPEG quantization matrix corresponding to LNZ is set to 1 so that after embedding the watermark bit the pixel value vary by plus or minus 1 instead of plus or minus . This modification in quantizer value leads to less distortion in video signal....

Words: 708 - Pages: 3

Premium Essay

Nt1310 Unit 5 Exercise 1

...I Thomas Edmond sat alone in the bright, cold, white room on a single blue chair bearing a plastic seat and four stout legs of stainless steel. His legs swung back and forth, barely long enough to touch the white linoleum tile floor but still managing to graze it ever so slightly. The five inch thick steel door directly in front of him has remained both shut and locked for the past five hours. Unbeknownst to Thomas, a small camera hidden beside a ventilation shaft in the ceiling monitored his actions. A calming synthesized female voice sounded from a loudspeaker hidden somewhere in the room. “Subject identified. Edmond, Thomas. Six years of age. Date of birth: The twenty ninth of August, nineteen eighty eight. Edmond, Thomas. Please rise from your seat.” Thomas arose. “Edmond, Thomas. A series of images will be displayed. You are requested to react according to the immediate emotional response each image will elicit of you. Do you have any questions before we begin Task 1A?” “I don’t understand,” replied Thomas, scanning the room for the source of the voice. “Simplified explanation: We will show you some pictures. We want you to show us how each picture makes you feel. Do you have any questions before we start?” He shook his head as a way to say “no”. Suddenly, a blank white projector screen lowered from the ceiling. Its loud motors could be heard whirring as it inched within view of Thomas. He looked on in awe, for he had no idea how this screen was seemingly lowering itself...

Words: 1783 - Pages: 8

Premium Essay

Nt1310 Unit 5 Exercise 1

...This scenario would generate the maximum surge pressure in start-up case, because of the dead-end pipeline. This surge pressure (14barg), was however, less than network design pressure. PE 1.16) another likely scenario (no. 5) that I envisaged was simultaneous shut down of both pumps while the line is full of water. Since one check valve is installed at the outlet of each pump, upon shutdown of pumps those valves and associated pipes would experience a severe back pressure caused by the huge amount of water inside the pipeline. Software outputs showed that a serious water hammering would happen in this scenario. My recommendation was to shut down pumps in sequence order, first pump A and then after a defined time interval, e.g., 2 minutes, pump B. PE 1.17) The last probable scenario that I modelled was simultaneous start-up of both pumps while the whole pipeline is full of water. This case is prone to cause a considerable surge pressure. The software output graphs...

Words: 622 - Pages: 3

Premium Essay

Telecommunications

...Exercise One Nt1310 Week 1 In: Computers and Technology Exercise One Nt1310 Week 1 NT1310:Week 1 Telecommunications By: Kenneth Martin You are an IT Network Specialist and are required to develop the design of the company’s telephone system for its new building which will begin construction in a few months. In order to get a background which will help when developing the new system, your supervisor asked you to research the current Plain Old Telephone Service (POTS) currently used by the company. You must research the system components and report back to your supervisor , the Telecommunications Manager, within a week. 1. Describe a local land line phone system based on the following Landline Telephone Components: a. Local Loop a local loop is the wired connection from a telephone company's central office in a locality to its customers' telephones at homes and businesses. This connection is usually on a pair of copper wires called twisted pair. The system was originally designed for voice transmission only using analog transmission technology on a single voice channel. Today, your computer's modem makes the conversion between analog signals and digital signals. With Integrated Services Digital Network (ISDN) or Digital Subscriber Line (DSL), the local loop can carry digital signals directly and at a much higher bandwidth than they do for voice only. b. Central Office In telephone communication in the United States, a central office (CO) is an office in a locality...

Words: 496 - Pages: 2

Premium Essay

Nt1230 Syllabus

...routine adminstrative tasks of popular desktop operating system(s) for standalone and network client computers, and related aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the NSA program: 1 Date: 8/31/2012 Client-Server Networking I Syllabus NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420...

Words: 1834 - Pages: 8

Premium Essay

Unit 3 Exercise 1 Nt1310

...| Unit 3. Exercise 1. | | Specifications - Definitions | | Unit 3. Exercise 1. | | Specifications - Definitions | NT1310: physical networking April 15, 2014 Authored by: Nicholas Rapisardi NT1310: physical networking April 15, 2014 Authored by: Nicholas Rapisardi 1. Application (in terms of cabling infrastructure): The application layer is the OSI layer closest to the end user, which means both the OSI application layer and the user interact directly with the software application. When determining resource availability, the application layer must decide whether sufficient network or the requested communication exists.. (OSI_model#Layer_7:_application_layer) 2. Unshielded twisted-pair: UTP cable is a popular cable used in computer networking that consists of two shielded wires twisted around each other. In the image to the right, is an example of the different network cables you're likely to encounter. (/jargon/u/utpcable.htm) 3. Shielded Twisted-pair: Twisted Pair (STP) has a fine wire mesh surrounding the wires to protect the transmission; Unshielded Twisted Pair (UTP) does not. Shielded cable is used in older telephone networks, network, and data communications to reduce outside interference. In the picture to the right, is an example of what these cables look like inside. (jargon/t/twispair.htm) 4. Fiber-Optic cable: A fiber optic cable is a network cable that contains strands of glass fibers inside an insulated casing. These...

Words: 1317 - Pages: 6

Premium Essay

Nothing

...ITT Technical Institute NT1310 Physical Networking Student Course Package Bring this document with you each week Students are required to complete each assignment and lab in this course package on time whether or not they are in class. Late penalties will be assessed for any assignments or labs handed in past the due date. The student is responsible for replacement of the package if lost. Table of Contents Syllabus 2 Student Professional Experience 19 Graded Assignments and Exercises 23 Labs 47 Documenting your Student Professional Experience 57 ITT Technical Institute NT1310 Physical Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course examines industry standards and practices involving the physical components of networking technologies (such as wiring standards and practices, various media and interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installation, testing and troubleshooting techniques for a computer network. Where Does This Course Belong? | | | NT2799 | | | | | | | | NSA Capstone | | | | | | | Project | | | | | NT2580...

Words: 10839 - Pages: 44

Free Essay

Connector Installations

...NT1310 Unit 6 Exercise 1 Luz Garcia 7/22/14 Connector Installations Twisted-pair cable: Step 1: Measure the cable you want to put ends on and trim it to the proper length using the cable cutter. Step 2: Use the cable stripper to strip about 1.5" of the jacket from the end of the cable. Then, rotate the stripper around the cable twice. This will cut through the jacket. Step 3: Remove the stripper from the cable and pull the trimmed jacket from the cable, exposing the inner conductors. If a jacket slitting cord (usually a white thread) is present, separate it from the conductors and trim it back to the edge of the jacket. Step 4: Untwist all the inner conductor pairs and spread them apart so that you can see each individual conductor. Step 5: Line up the individual conductors so that the color code matches the color-coding standard you are using. Step 6: This step includes two points. First, trim the conductors so that the ends are even with each other, making sure that the jacket of the cable will be inside the connector. Second, the total length of exposed connectors after trimming should be no longer than 0.5" to 0.625". Step 7: Insert the conductors in the connector, ensuring that all conductors line up properly with the pins as they were in the previous step. If they don't line up, pull them out and line up. Do this carefully, as it's the last...

Words: 591 - Pages: 3

Premium Essay

Unit

...ITT TECHNICAL INSTITUTE NT1310 Physical Networking GRADED ASSIGNMENTS ------------------------------------------------- Student Professional Experience Project NSA SPE Project 1 (to be completed by the end of NT1310): Install, Configure, Test, Maintain and/or Document the Worksite Local Area Network and Its Components Purpose The purpose of the Student Professional Experience (SPE) project is to provide you an opportunity for work experience in your field or in a related field to add to your résumé. You may have an opportunity to serve your community or work for a local employer for a project that will take between 20 and 30 hours. Project Logistics Career Services will identify an employer with needs in the following areas: Network related tasks (mostly confined to the LAN and Microsoft Windows Server 2008 environments) Students are expected to practice various skills discussed in all the technical courses in Quarters 1 through 3 of the NSA program at an employer’s site on network related tasks (more confined to the LAN and Microsoft Windows Networking with Server 2008 environments) that would involve installation, configuration, testing, maintenance and documentation of the worksite network and its components, and to properly document the technical information in all involved activities. Such documentation will be used as the source material for Items 2 and 3 defined in the Deliverables section of this document. Possible example projects could...

Words: 6762 - Pages: 28

Free Essay

Nt1310 Unit 9 Exercise 1

...Montie Ramsarran August 11th, 2014 NT1310 Mr. Amos Unit 9 Exercise 1 Light Source and Components-Definitions 1. Forward Biased LED: A bias voltage that is applied to a pn-junction in the direction that causes a large current flow; used in some semiconductor diode circuits. 2. Incoherent Light: Light in which the electric and magnetic fields of photons are completely random in orientation. Incoherent light is typically emitted from light bulbs and LEDs. 3. Laser: Acronym for light amplification by stimulated emission of radiation. The laser produces a coherent source of light with a narrow beam and a narrow spectral bandwidth (about 2cm). Lasers in fiber optics are usually solid-state semiconductor types. Lasers are used to provide the high-powered, tightly controlled light wave lengths necessary for high-speed, long-distance optical fiber transmissions. 4. Output Pattern: A setting that selects the output pattern for comparison outputs. This enables outputs for changes in levels rather than just upper/lower limit comparisons to set value. It can be set according to the control applications. Note: The settings must be as follows for correct zone outputs. 5. Output Power: The useful signal or power delivered by a circuit or device. 6. Modulation Speed: (1) Coding of information onto the carrier frequency. Types of modulation include amplitude modulation (AM), frequency modulation (FM), and phase modulation...

Words: 1207 - Pages: 5

Premium Essay

Nt2640

...associate degree in Mobile Communications Technology. The following diagrams indicate how this course relates to other courses in respective programs: Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1201 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming Technology Courses General Education/ General Studies 1 Date: 7/18/2011 IP Networking Syllabus Mobile Communications Technology MC2799 MCT Capstone Project NT2640 IP Networking MC2560 Mobile Wireless Communication I MC2660 Mobile Wireless Communication II MC2665 Mobile...

Words: 2573 - Pages: 11

Premium Essay

Fsmo Role Ayer Nate Method

...have one domain controller (not recommended), there is nothing to do since all roles must be on this server, but if you have multiple servers you should move some of theese roles on to more servers. It is also important to be aware of what servers are Global Catalog servers, especially if you have more than one domain and even if only one domain, they will be prefered by applications like Exchange server. It is recommended to place the forest roles on one Domain Controller (DC) and the domain roles on another server. If not all Domain Controllers are Global Catalog servers, it is also important to place the infrastructure master on a server that is NOT a Global Catalog server. Recommended Best Practice setup of FSMO roles. Domain Controller #1 Place the two forest roles on this server. * Schema Master * Domain Master Domain Controller #2 Place the domain roles on this server. * RID Master * Infrastructure Master * PDC Emulator If more domains exist in the forest, place the domain roles on a server in theese domains like Domain Controller #2 Global Catalog configuration. In Windows 2008 Active Directory all Domain Controllers are by default Global Catalog servers, personally...

Words: 10360 - Pages: 42