Free Essay

Unit 9

In: Science

Submitted By caneishe
Words 683
Pages 3
HS140 Week 9 Final Project
Please answer the following case study questions using the knowledge gained in this course. Remember to cite your references in APA format. Answer the questions in complete sentences and spell-check your Assignment. Each question is worth 4 points. Case 1
A patient calls the physician’s office because she is concerned that her prescription medication looks different from what she normally takes. She mentions that her co-pay was lower too. 1. What are some initial questions you should ask the patient to gather information the physician might need?

2. Critically evaluating the situation, what are three possible explanations of the difference in appearance and cost of the medication?

3. The patient describes the tablet’s appearance and the markings on it. If the physician were to ask your assistance in identifying the medication (which you would present to him/her for verification) what are three possible sources to determine the identity of the medication?

Case 2
A patient visits the clinic and it is determined he has a sinus infection as well as a seasonal allergies. The patient’s chart indicates an allergy to penicillin and lists current medications as atenolol. He is given a prescription for Augmentin. 1. Explain whether Augmentin is a reasonable antibiotic choice in this patient.

2. The patient is also given another medication to help with the itching of seasonal allergies. The instructions are to take ½ of a tablet before breakfast, lunch, and dinner for 10 days. How many scored tablets should the patient expect to receive?

3. For the sinus pain, the patient is told to take the following medication: acetaminophen 325 milligrams, one to two tablets taken every 4 to 6 hours as needed for pain. How should this be charted using correct abbreviations?

4. The patient has been taking Sudafed and wants to know if he should continue to take it. What is your response?

Case 3
An elderly patient is complaining of a bad cough at her yearly physical. She has recently been diagnosed with diabetes and regularly takes prescription pain medication for her arthritis. 1. She is prescribed: Micronase 5 mg; i tab qam 30 min ac breakfast
Explain how she should take this medication.

2. The patient has been taking 3x the recommended dose of Pepto-Bismol. You mention this to the patient and she does not seem concerned. She claims she needs to take more than normal because she is always constipated. What might be some original causes of her constipation that are leading her to become constipated prior to starting the Pepto-Bismol?

3. What are you views of her opinion to take Pepto-Bismol for constipation?

4. What might some other options be?

5. The patient claims that you should not be concerned because Pepto-Bismol is “not really even medicine.” What is your response?

6. The doctor sends her home with an Rx for 15mL of cough suppressant q8h x10d. The patient arrives home and has a calibrated tablespoon and a teaspoon. She calls the office and asks which she should use to take the medicine. What is your response?

7. How much medication should she take, given the device you recommended? 8. How often? 9. If the medication is supplied in half-pint bottles, how many bottles will she need during the 10 days? 10. The patient is nervous about taking “more medication” and asks if there is anything she should be concerned about with a cough syrup. What is your response?
Case 4
A physician asks you to call a prescription into the pharmacy for a patient. 1. The first is for amoxicillin 250/5 mL i tsp PO BID x 10 days. The pharmacy gives the patient a 200 mL bottle of the reconstituted antibiotic. Is this sufficient, why or why not?

2. After 5 days, the patient feels better and wants to stop the medication because it is upsetting his stomach. What is your response?

3. Since the patient has suffered an upset stomach, he believes he is allergic to amoxicillin. Would you agree? Explain your response.…...

Similar Documents

Free Essay

It273 Unit 9 Guide

...Project Grading Rubric Course: IT273 Unit: 9 Points: 70 Project Instructions: Project Instructions: Respond to each of the project requirements and submit all work to the Dropbox as a single file. Project requirements: 1. Callingyou Inc is a growing company providing 24-7 telephone support services for numerous companies. They have asked you to prepare a design proposal for their new office network. They will have two offices with a dedicated T1 line between them and would like each office to be able support sixty employee workstations with internet access, central server access, and VoIP. These workstations will be shared by multiple users as the company operates on shifts to provide 24-7 support. Each office will also have eight management offices. In addition to this office support, they also need to support VPN access for employees working from home. And, support for secure internet access customers visiting the office is desired. The Callingyou Inc executives have no experience with networks but want to be sure that they are making the right decision; so, they have asked that in addition to providing a design that the proposal specifically describe all network design considerations. The descriptions should be thorough but understandable for a layman, and it should be clear how the network design proposed relates to each of those considerations. Your proposal document should be between 4 and 10 pages before including diagrams or references. Visio should be used to......

Words: 730 - Pages: 3

Premium Essay

Cm350 Unit 9

...Unit 9 Assignment Unit 9 Assignment KAPLAN UNIVERSITY CM350-01 Public Relations Strategies Situation Pink Nutrition just opened up their store this year and they want to expand into other cities in the surrounding county. Recently however, there has been other nutrition stores that haven recently opened up in the same areas that Pink Nutrition is planning to open which is going to make it a lot more difficult for Pink Nutrition to have the same success as their current location. The new Nutrition stores that have opened are attempting to copy and adopt similar strategies that have been used successfully by Pink Nutrition. Although, the product differs this will pose to be a difficult task for Pink Nutrition to overcome. Potential clients are however are savvy and Pink Nutrition wants to strengthen its brand identity to spread out with a new marketing campaign. Pink Nutrition wants to connect with the community on values and to build a relationship of trust and integrity that potential clients want to be loyal to buy from their new store. This new program would be named “Wellness and More”, which would provide customers to take a part in providing health and awareness to their friends and family. Customers would be able to partake in community walk and get fit events which will help to encourage their surrounding community and others that may be looking for a fun and friendly way to get healthier or stay healthier. Pink Nutrition will donate a part of the proceeds......

Words: 823 - Pages: 4

Free Essay

Is3230 Unit 9 Lab 9

...Encryption Standard. 7. What is SHA1, and what is it used for? The Secure Hash Algorithm 1 (SHA-1) is a well-known and currently secure cryptographic hash function designed by the NSA. Is it used similarly to TripleDES or are they different? They are the same, they both use algorithms. 8. Provide and explanation for the difference between symmetric keys and asymmetric keys in a PKI? symmetric-key: It only needs one key to encrypt the message. And both user only need the same key to decode the message. And the in order to create the key is by moving the bit. asymmetric-key: It needs two different keys- public key and private key. Everyone can see the public key and only the person who has private key can decode the message. 9. What is a common drawback to Encrypting using enterprise level tools such as PGP? Complexity, cost, lack of scalability, and lack of interoperability with VoIP systems. So even though implementing encryption is appealing, many businesses may balk at the potential obstacles. 10. What is the difference between PGB and GPG? “PGP” stands for “Pretty Good Privacy.” It was developed by Phil Zimmermann. At first it was written as copyrighted freeware under the Gnu Public License. Later, PGP was upgraded and made into a propriety program. The rights for this program are traded around. The reason for this upgrade was legal defense costs and royalty issues related to the export laws of the USA. Now the PGP program is owned by PGP......

Words: 804 - Pages: 4

Premium Essay

Unit 9 Es2555

...Unit 9 Problem Set 1: Monetary Policy and Inflation 1. Consider an economy that uses gold as its currency. Define each of the three properties of money listed below. Considering these properties, is gold a good monetary system? a. Medium of exchange: any item that buyers give to sellers when they purchase goods and services. b. Unit of account: a standard unit in which prices can be stated and the value of goods and services can be compared. c. Store of value: the property of money that holds that money preserves value until it is used in an exchange. d. Is gold a good monetary system? Gold standard works for a while. It is just that we are running out of gold. It was supposed to keep the government in check for the amount of money that it could print, but then in times of trouble it would use the gold as an emergency fund that it would have to pay back, sometime. It use to work in international trade systems on larger scale because of different types of currency. We now have the fiat money which is just money that the government can have better control on. 2. Given your answers to the previous question, explain whether you think gold had advantages over the use of fiat money. You can’t just print gold like you can paper money. When you have the ability to just print money, everything else will also go up in price because there is no real value to paper money. Gold has a better value to it because you know that if you don’t have it, you will get......

Words: 1094 - Pages: 5

Free Essay

Unit 9

...Valerie Coakley PS220-03: Child and Adolescent Psychology June 22, 2010 Unit 9 Final Project: Urie Bronfenbrenner developed the ecological systems theory to explain how everything in a child and the child's environment affects how a child grows and develops. He labeled different aspects or levels of the environment that influence children's development, including the microsystem, the mesosystem, the exosystem, and the macrosystem (Bukatko, 2008). Bronfenbrenner’s theory stresses the need to understand how children develop in everyday life. The development issue I chose to discuss is Fetal Alcohol Syndrome (FAS) and how the surroundings and everyday life affects the development. There are different characteristics that accompany FAS in the different stages of a child's life. "At birth, infants with intrauterine exposure to alcohol frequently have low birth rate; pre-term delivery; a small head circumference; and the characteristic facial features of the eyes, nose, and mouth" (Phelps, 1995, p. 204). Some of the facial abnormalities that are common of children with FAS are: microcephaly, small eye openings, broad nasal bridge, flattened mid-faces, thin upper lip, skin folds at the corners of the eyes, indistinct groove on the upper lip, and an abnormal smallness of the lower jaw (Wekselman, Spiering, Hetteberg, Kenner, & Flandermeyer, 1995; Phelps, 1995). These infants also display developmental delays, psychomotor......

Words: 1466 - Pages: 6

Free Essay

Unit 9 Explore and Discuss

...mike zavala NT1430 5/24/14 Unit 9 Explore and Discuss Bind in linux- BIND (Berkeley Internet name domain ) is the most commonly used DNS (domain name system) server on the internet, and it is the defacto standard on linux and other Unix-like operating systems. Configuring BIND- the first thing to configure is /ect/bind/named.conf. The first part of this step is specifying binds root directory, the listing port with IP’s, the pid file, and line for IPv6 protocol. The second part of named.conf is the internal view used for our local network. The third part of named.conf is the external view used to resolve our domain name for the rest of the world and to resolve all other domain names for us( and anyone who wants to use our DNS server). The final part of named.conf is the logging policy. The /var/log/named/ directory mustbe exist and belong to named: BIND history – BIND was originally written at University of California at Berkeley (UCB) as a graduate student project under a grant from the U.S. Defense Advanced Research Projects Administration (DARPA). The acronym BIND originally stood for Berkeley Internet name daemon. DNS BIND Linux – BIND provides an openly redistributable reference implementation of the major components of the DNS, including a DNS server (called named), a DNS resolver library and tools for verifying the proper operation of the DNS server. The resolver library is a collection of functions witten in the C programming language that provides......

Words: 268 - Pages: 2

Free Essay

Unit 9 Seminar

...Reesa Gumbs Unit 9 Seminar Kaplan University David Young Research and discuss the history of the Americans with Disabilities Act and its impact on business organizations today Americans with Disabilities Act of 1990 is an act that is for employers with more than 15 employees, that prohibits any discrimination against qualified individual with disabilities. While some health conditions are protected by this act not all are. It applies to anyone who has physical or mental impairments that limits one or more life activities. The way that this act has change the work force is that it is giving everyone to who is qualified and meet the companies requirements a chance to be a part of the work force. Some of the major changes that has coming about from this act is the way in which companies treat workers with disabilities. Companies has to make the necessary changes with in the business place to suit that worker. This has also lead to the change in the ways how buildings are built. All building and public transportation must have access for persons with disabilities. Another way that this act is impacting business today is how they issue the medical test when you apply for the job. General health exams can only be done one the job has been offered. Also the facilities that the individual will be working has to be suitable for them to do the work because they have to been seen like any other employee. Companies cannot just say they will not change because of financing...

Words: 323 - Pages: 2

Premium Essay

Unit 9 Seminar

...Unit 9 Seminar August 31, 2012 MT140: Introduction to Management Unit 9 Seminar Many people encounter communication problems and sometimes they can be avoided and others not so much. Everyone uses a process of perception and filtering and it’s easy to mistake perception which will lead to a misunderstanding as does filtering. It’s best to try and use clear, slow speech when communicating with someone, be sure to repeat, pause, and use gestures. Word choice and body language are what I believe to be very important in communication. These two can clash very quickly and easily if not done properly, it can also cause confusion. There are also different kinds of communication channels that we have such as oral and written. Oral communication is face to face discussion, telephone, and even through presentation and speech. The written communication is emails, memos, letters, reports, computer files, and more. The steps to managing change can also vary, but change can happen constantly and unpredictably. There are several ways you can take to managing the change and they could be by first building a case for the change. What’s the reason for the change and why is it so important that it happens within the business? Next, would to be sharing the vision and values these are important because you would want your company to know what the vision is and values. This way everyone is on board and has and understanding to why it is happening. Thirdly, you will need the recourses......

Words: 295 - Pages: 2

Premium Essay

Unit 9

...Unit 9 #1 Transder: A device that converts from one form to another. #3 Radio Frequency interference and Electromagnetic interference. #5. Electric Field and Magnetic field. Diffraction occurs with all waves, including sound waves, water waves, and electromagnetic waves such as visible light, X-rays and radio waves #17. Refraction is the change in direction of a wave due to a change in its transmission medium. #18. Shadow Zone is an area following an obstacle that does not receive a wave by diffraction. #19 Thre basic modes : Ground wave, space wave. sky wave. #20. Ground Wave propagation is a method of radio frequency propagation that uses the area between the surface of the earth and the ionosphere for transmission. #24. The radio waves having high frequencies are basically called as space waves. These waves have the ability to propagate through atmosphere, from transmitter antenna to receiver antenna. #30. The CRITICAL FREQUENCY is the maximum frequency that a radio wave can be transmitted vertically and still be refracted back to Earth. The CRITICAL ANGLE is the maximum and/or minimum angle that a radio wave can be transmitted and still be refracted back to Earth. In radio transmission maximum usable frequency (MUF) is the highest radio frequency that can be used for transmission between two points via reflection from the ionosphere ( skywave or "skip" propagation) at a specified time, independent of transmitter power. This index is......

Words: 412 - Pages: 2

Premium Essay

Physics Unit 9

...Physics Homework, Unit 9 Deborah Williams 08/13/2014 Pg. 268-269-1. What is the source of wave motion? Answer: A wiggle in space and time. 2. If we double the frequency of a vibrating object, what happens to its period? Answer: Frequency and period are the inverse of each other. Frequency = 1/period or Period = 1/frequency 36. A railroad locomotive is at rest with its whistle shrieking, and then it starts moving toward you. a. Does the frequency that you hear increase, decrease, or stay the same? b. How about the wavelength reaching your ear? c. How about the speed of sound in the air between you and the locomotive? Answer: The speed of sound of the whistle does not depend on the frequency, all sounds travel at the same speed in a given medium. There is a change in frequency due to the motion of the source, called the Doppler Effect. The wavelength of the sound is the distance between successive compressions or rarefactions, if the sound itself does not change pitch, wavelength would not change. Pg. 291-2. Which have the longest wavelengths: light waves, X-rays, or radio waves? Answer: X-rays have the shortest wavelengths, light waves, then radio waves are the longest. 6. Do radio waves travel at the speed of sound, at the speed of light, or at some speed in between? Answer: Waves are different in frequency and wavelength, they all have the same speed. Radio waves are not sound waves. 7. What do radio waves and light have in common? ......

Words: 459 - Pages: 2

Premium Essay

Unit 9 Sql

...Create Database, Create Table, Alter Table, Insert, Update, and Delete When Constraints May Be Violated Unit 9 Alexander Diaz Kaplan University August 12, 2014 Unit 9 -- Q1. Use tempDB -- Create a table called MyNewTable with three columns (rowID smallint, createdDate datetime, name varchar with a length of 30) [pic] -- Q2. Use tempDB -- Create a script that checks to see if MyNewTable Exists, drop it if it does. Recreate the query in Question 1 so that table does not allow an insert where the createdDate is less than the current datetime --- Insert a row into MyNewTable using the current datetime value--- If your Insert completed successfully something is wrong with your previous statements. If it failed? Explain why and how you might change the create table --- In order to fix the problem, assuming you always want to insert every row using the current date time value. Hint -- Search for -- "adding a second to a date field SQL" [pic] I believe using the smalldatetime option in order to use the ‘ss’ for the two digits to represent the ranging value from 00 to 59. Also using an alias for the table name in order for the query to proceed without errors. -- Q3. In the script above, Explain exactly why you cannot update col1 for the final two statements in the list. Each column in a table must have a specific data type and usually a maximum size that controls what data can be inserted or updated and whether a column may contain NULL......

Words: 689 - Pages: 3

Premium Essay

Unit 9 Assignment

...Unit 9 Assignment PS210: History of Psychology Kaplan University August 18, 2014 Psychology today reflects the history and origins of psychology. In order to have a full understanding of psychology, you need to spend some time exploring its history and origins. Structuralism, in psychology is defined as the study of the elements of consciousness. It focuses on recurring patterns of thought and behaviors and it also involves more psychological aspect of human studies rather than social structures. Structuralist use numerous techniques to examine one's own conscious feelings and thoughts. Functionalism is the study of the mind and how the mind functions to the whole body to adapt into a community or a society. It is also a perspective or theory that tries to explain and justify why society is the way it is. According to different psychologist it can explain social structures and social behavior of a society and their functions. In the functionalist perspective, society is thought to function like organisms, with many social institutions working together to maintain and reproduce societies. Functionalists studied the mind not from the standpoint of its composition, its mental elements or its structure but as a conglomerate or accumulation of functions and processes (Schultz, 2012). William James was the major contributor to functionalism. James broadened the field of structuralism to more of an developmental, education, and gender......

Words: 993 - Pages: 4

Premium Essay

Unit 9

...Unit 9 Assignment 1. Refer to the sets of the aggregate demand, short-run aggregate supply, and long-run aggregate supply curves. Use the graphs to explain the process and steps by which each of the following economic scenarios will shift the economy from one long-run macroeconomic equilibrium to another equilibrium. Under each scenario, elaborate the short-run and long-run effects of the shifts in the aggregate demand and aggregate supply curves on the aggregate price level and aggregate output (real GDP). a. Suppose the household wealth decreases due to a decline in the stock market asset prices (See the set of graphs below and pay attention to the 3-stage shifts in graphs). Answer: In graph one the decline in the stock market asset price causes the AD line to shift downward, decreasing. The long-run equilibrium in the first graph is the point where all three of the lines (LRAS, S1, and D1) are connecting. With a lower GDP, the aggregated demand curve shifts to the left (D1 to D2) creating a new equilibrium point at a lower price level. In the second graph it shows a higher supply with the increase in the SRAS (S1 to S2) curve. It will create a new long run equilibrium at a lower price level. In the last graph it shows both the shift in the AS curve from AD1 to AD2 due to the decrease and it shows the increase in the SRAS curve from S1 to S2 due to higher supplies. It shows both the old and new equilibrium along the LRAS curve. The first one being higher......

Words: 1410 - Pages: 6

Free Essay

Unit 9

...Unit 9 Lab Security Basics Task 1: Features of Hardware and Software Firewalls * Hardware Firewall – Cisco ASA 5505 Firewall 1) Usually purchased as a stand-alone product typically found in routers or other networking equipment. 2) Usually a minimum of 4 network ports (the Cisco unit has 8) 3) Usually used in businesses or large networking systems 4) Intended for network security * Software Firewall – 2014 Trend Micro Instant Security and Antivirus 1) Usually purchased by individual users 2) Usually an installable form of software 3) Protects from outside attempts to control or gain access to your computer 4) Protects against Trojan programs or email worms 5) Only protects individual computer, not a network Task 2: Part 1: Which anti-virus program is free and which provide trial versions * Panda – No free trial or free version; yearly prices : $31.99, $49.99, $35.00 * Norton – No free product ,free trial version for 30 days; yearly prices : $49.99, $79.99, $49.99 * McAfee – No free or trial versions; yearly prices : $79.99, $49.99, $44.99 * AVG – No freeware, trial for 30 days; yearly prices : $39.99, $54.99 * Kaspersky – Offers a free anti-virus software and 30 trial; yearly prices : $69.95, $64.95, $59.95, $59.95 Part 2: Define malicious code terms Term – Trojan horse Program Definition – generally non-self-replicating type of malware program containing malicious code that,......

Words: 298 - Pages: 2

Premium Essay

Unit 9

...Unit 9 Assignment Kaplan University CJ211: Police Operations Police Technology has evolved so much from the time of the first modern officer. With population increasing, law enforcement officers needed technology that gave them the chance to do their jobs quicker and better. Instead of having to shoot a suspect, officers now have less than lethal weaponry which makes it possible to incapacitate using different methods. Crime mapping allows police departments to find correlations between crimes in different areas of the city. In order for law enforcement officers to contain traffic pursuits they now use pursuit management technology which helps to stop a pursuit before something gets damaged or somebody gets hurt. Police officers sometimes have to deal with violent, combative people and while dealing with them have to keep in mind the use-of-force protocols. Less-lethal technologies give police an alternative to using physical force options that potentially are more dangerous to the officers and the suspects (National Institute of Justice). There are seven types of less-than lethal technology. Conducted Energy Devices, such as the Taser and Stun gun, can induce involuntary muscle contractions that temporarily incapacitate people. Directed Energy Devices use radiated energy to achieve the same effect as blunt force, without injury. Chemicals, including pepper spray, tear gas, and stink bombs, are used to incapacitate suspects so officers can catch them and......

Words: 1078 - Pages: 5

Dictionary M W Premium 4.2.0 APK | Johnny English contre-attaque (2018) | Connect with us on Facebook