In April 2019, Paul Marrapese, an independent security
researcher from San Jose,
California, has published research warning that peer-to-peer
software developed by
Shenzhen Yunni Technology firm, that's used in millions of IoT
devices around the world,
has a vulnerability that could allow an attacker to eavesdrop on
conversations or press
household items into service as nodes in a botnet.
The software, called iLnkP2P, is designed to enable a user to
connect to IoT devices from
anywhere by using a smartphone app. The iLnkP2P functionality is
built into a range of
products from companies that include HiChip, TENVIS, SV3C,
VStarcam, Wanscam, NEO
Coolcam, Sricam, Eye Sight, and HVCAM.
What Marrapese found is that as many as 2 million devices, and
possibly more, using
iLnkP2P software for P2P communication do not have authentication
or encryption
controls built-in, meaning that an attacker could directly connect
to a device and bypass
the firewall. Marrapese discovered the iLinkP2P flaw after buying
an inexpensive IoT-
connected camera on Amazon.
"I found that I was able to connect to it externally without any
sort of port forwarding,
which both intrigued and concerned me," Marrapese told Information
Security Media
Group. "I found that the camera used P2P to achieve this, and
started digging into how
it worked. From there, I quickly learned how ubiquitous and
dangerous it was."
While the flaws with the iLnkP2P peer-to-peer software apparently
have not yet been
exploited in the wild, Marrapses believes it's better for consumers
to know now before
an attacker decides to start taking advantage of this particular
vulnerability.
"There have been plenty of stories in the past about IP cameras and
baby monitors being
hacked, but I believe iLnkP2P is a brand new vector not currently
being exploited in the
wild," Marrapese says. "With that being said, the biggest
motivation behind this
disclosure is to inform consumers before it's too late - because I
believe it's only a matter
of time."
As part of his research, Marrapese says he attempted to contact not
only Shenzhen
Yunni Technology but also several of the IoT manufacturers that use
the company's P2P
software. As of Monday, even after publishing results,
he had not heard back from
anyone.
Users of IoT devices that make use of the iLnkP2P software scan a
barcode or copy a six-
digit number that is included in the product. From there, the owner
can access the
device from a smartphone app.
It's through these unique identifier numbers that Marrapese was
able to discover that
each device manufacturer used a specific alphabetic prefix to
identify their particular
product. For instance, HiChip uses "FFFF" as a prefix for the
identification number for its
devices. Once Marrapese was able to identify these devices through
the unique number
systems, he created several proof-of-concept attacks that took
advantage of the flaws
in the software.
[Source:
https://www.databreachtoday.com/2-million-iot-devices-have-p2p-software-
flaw-researcher-a-12428 Accessed July 2020]
a) In this case study, it is mentioned that vulnerable
IoT devices can service as nodes
in a botnet. Explain the working mechanism of a Botnet. Discuss any
two attacks
carried out by a botnet.
b) Report the importance of security in IoT devices. How
does encryption help improve
security for these devices?
c) Discuss the importance of lightweight cryptography in
IoT enabled low-power
devices. List the potential lightweight cryptographic algorithms
for low-power IoT
devices.
In: Computer Science
modify the code below to create a GUI program that accepts a
String from the user in a TextField and reports whether or not
there are repeated characters in it. Thus your program is a client
of the class which you created in question 1
above.
N.B. most of the modification needs to occur in the constructor and
the actionPerformed() methods. So you should spend time working out
exactly what these two methods are doing, so that you can make the
necessary modifications.
Q1 CODE: (do not modify this one)
public class QuestionOne {
// main funtion
public static void main(String []args) {
Scanner sc = new Scanner(System.in);
// get user input string
System.out.println("Enter a String: ");
String s = sc.nextLine();
// calling the static function and store it to a variable
boolean repeatChar = repeatCharacter(s);
// if the result of the static function is true
if(repeatChar){
// print has repeated characters
System.out.println("String has repeated characters");
}
else {
// if not display no repeated characters
System.out.println("String does not have repeated
characters");
}
}
// static function that accepts string as parameter
public static boolean repeatCharacter(String s){
char ch;
//check if repeated character available or not
for(int i=0; i < s.length(); ++i) {
ch = s.charAt(i);
//check if the index and the last index of the character is same or
not
if(s.indexOf(ch) != s.lastIndexOf(ch)) {
return true;
}
}
// no character repetition return false
return false;
}
CODE TO MODIFY THE GUI: (Please modify this one)
//SimplApp.java - a simple example of a GUI program
//You should be able to give a brief description of what
//such a program will do and the steps involved
import javax.swing.*; //for JFrame, JButton, JLabel
import java.awt.*; //for Container, BorderLayout
import java.awt.event.*; //for WindowAdapter,
ActionListner, ActionEvent
public class SimplApp extends JFrame {
// define window's width and height in pixels
private static final int WIDTH = 400;
private static final int HEIGHT = 200;
// used for displaying text in the window
private JLabel infoLabel;
private class ButtonAction implements
ActionListener {
public void actionPerformed(ActionEvent e){
infoLabel.setText("You fool !!");
} //end of actionPerformed
} //end of class ButtonAction
// used to destroy/close the window
private class WindowDestroyer extends
WindowAdapter {
public void windowClosing(WindowEvent e){
dispose();
System.exit(0);
} //end of windowClosing()
} //end of class WindowDestroyer
// Below is the constructor for the class SimplApp
public SimplApp(String windowTitle) {
super(windowTitle);
setSize(WIDTH, HEIGHT);
// create content pane to add components to
window
Container c1 = getContentPane();
c1.setLayout( new BorderLayout());
// create a label component with the String
centred
infoLabel = new JLabel( "Initial",
JLabel.CENTER);
c1.add( infoLabel, BorderLayout.CENTER);
// create a button component
JButton button1=new JButton("Don't Press
Me!");
c1.add( button1, BorderLayout.NORTH);
//goes at top
// add an action event to button
ButtonAction myAction = new ButtonAction();
button1.addActionListener(myAction);
// add action event to window close button
WindowDestroyer myListener = new
WindowDestroyer();
addWindowListener( myListener);
} //end of SimplApp constructor
public static void main(String[] args) {
// calls constructor
SimplApp app = new SimplApp("Zzzz");
// display window on the screen
app.setVisible(true);
System.out.println("Finished
SimplApp.main()");
} //end of SimplApp.main()
} //end of SimplApp class
Thanks, anyone/expert answer person!
}
In: Computer Science
The advantages of e-mail communication.
The first thing most of us do when we get up in the morning is to turn on the computer and check for e-mail messages. This has become a part of our daily routine. We take it for granted that this has been an age-old practice and don't pause to think that it is a product of recent technological revolution. It is a wonder how we ever survived without it. The advantages of e-mail communication are many, and the chief among them are its speed, low cost, and convenience.
Speed is the obvious advantage. Just as our planes, trains, and automobiles are moving ever faster, so are our modes of communication. We can send e- mail around the world in a matter of minutes with no more effort than it takes to press a few keys on the computer. It is this speed that has led to our calling regular mail "snail mail."
E-Mail has also the advantage of being inexpensive. Many people have access to e-mail for free through their work or school. If some people may pay for e-mail through an online service, there is no increase in cost relative to the number of messages sent. It is the same price to send one message to one person as it is to send messages back and forth all day or to a hundred people. Finally, if we consider the costs saved in long-distance phone bills in addition to cost saved in postage, most e-mail users come out ahead.
There is no question that e-mail is convenient. It allows us to send the same message to many people at the same time with little more effort than it takes to send a message to one person. When sending multiple copies of a message, we avoid the trouble of photocopying the letter, printing out additional copies, addressing envelopes, and posting the mail. E-mail is also convenient because it lends itself to an informal style that makes composing a message relatively easy; in addition, readers of e-mail tolerate more mistakes than readers of conventional mail, and their tolerance saves us time.
E-Mail thus gives us the ability to send messages with convenience, speed and little expense. In not too distant a future, "snail mail" is likely to become obsolete, and one can already hear the bell toll for the US Postal Services.
Please answer the following Questions from above essay.
1. What is the topic of the essay?
2. What is the position taken by the writer on the topic?
3. Does the essay have a plan of development? If so, describe the plan.
4. Imagine you are the author of the essay. Take a reader curious to know how the essay developed through the pre-writing stage of the essay.
5. What are the three parts of the essay?
6. How does the essay hook the reader?
7. What is the first supporting point? What details does the writer give in support of the point?
8. What is the second supporting point? What details does the writer give in support of the point?
9. What is the third supporting point? What details does the writer give in support of the point?
10. What method of organization does the writer use to organize the material in the essay?
11. How does the essay conclude?
12. Why doesn't the writer discuss the disadvantages of e-mail communication in the essay?
In: Psychology
I am working on creating a Broadcast Receiver. I am extremely new to Android development and Java. I added my code at the bottom of this, but whenever I press the button the app crashes. I'm assuming something is wrong with connecting the broadcastIntent() function. If you could really focus on the first part that would be great!! I appreciate any help :)
Here are the directions from my professor:
public void broadcastIntent(View view){
Intent intent =
new Intent();
intent.setAction("my.CUSTOM_INTENT");
sendBroadcast(intent);
}
Toast.makeText(context, "Intent Detected.", Toast.LENGTH_LONG).show();
<intent-filter>
<action android:name="my.CUSTOM_INTENT"></action>
</intent-filter>
MORE DIFFICULT:
<intent-filter>
<action android:name="android.net.conn.CONNECTIVITY_CHANGE" />
</intent-filter>
<uses-permission android:name="android.permission.INTERNET" /> <uses-permission android:name="android.permission.ACCESS_NETWORK_STATE" />
MY CODE:
<MainActivity>
package com.example.ica4_broadcast;
import androidx.appcompat.app.AppCompatActivity;
import android.content.Intent;
import android.os.Bundle;
import android.view.View;
import android.widget.Button;
import android.widget.Toast;
public class MainActivity extends AppCompatActivity {
private Button mybutton;
@Override
protected void onCreate(Bundle savedInstanceState) {
super.onCreate(savedInstanceState);
setContentView(R.layout.activity_main);
Button mybutton = (Button) findViewById(R.id.mybutton);
}
private void broadcastIntent(View view) {
Intent intent = new Intent();
intent.setAction("my.CUSTOM_INTENT");
sendBroadcast(intent);
}
}
<activity_xml>
<?xml version="1.0" encoding="utf-8"?>
<androidx.constraintlayout.widget.ConstraintLayout xmlns:android="http://schemas.android.com/apk/res/android"
xmlns:app="http://schemas.android.com/apk/res-auto"
xmlns:tools="http://schemas.android.com/tools"
android:layout_width="match_parent"
android:layout_height="match_parent"
tools:context=".MainActivity">
<Button
android:id="@+id/mybutton"
android:layout_width="wrap_content"
android:layout_height="wrap_content"
android:layout_marginTop="235dp"
android:layout_marginEnd="146dp"
android:layout_marginRight="146dp"
android:onClick="broadcastIntent"
android:text="Button"
app:layout_constraintEnd_toEndOf="parent"
app:layout_constraintTop_toTopOf="parent" />
</androidx.constraintlayout.widget.ConstraintLayout>
<manifest>
<?xml version="1.0" encoding="utf-8"?>
<manifest xmlns:android="http://schemas.android.com/apk/res/android"
package="com.example.ica4_broadcast">
<application
android:allowBackup="true"
android:icon="@mipmap/ic_launcher"
android:label="@string/app_name"
android:roundIcon="@mipmap/ic_launcher_round"
android:supportsRtl="true"
android:theme="@style/Theme.ICA4Broadcast">
<activity android:name=".MainActivity">
<intent-filter>
<action android:name="android.intent.action.MAIN" />
<category android:name="android.intent.category.LAUNCHER" />
</intent-filter>
</activity>
<receiver android:name=".MyReceiver" android:exported="true">
<intent-filter>
<action android:name="my.CUSTOM_INTENT"/>
</intent-filter>
</receiver>
</application>
</manifest>
<MyReceiver>
package com.example.ica4_broadcast;
import android.content.BroadcastReceiver;
import android.content.Context;
import android.content.Intent;
import android.widget.Toast;
public class MyReceiver extends BroadcastReceiver {
@Override
public void onReceive(Context context, Intent intent) {
Toast.makeText(context, "Intent Detected", Toast.LENGTH_LONG).show();
}
}In: Computer Science
Designing and implementing a C++ structure data type - Monthly Budget
Remember to use correct code formatting and documentation.
A student has established the following monthly budget:
Budget Categories Budgeted amount
-----------------------------------------------------
Housing $ 580.00
Utilities $ 150.00
Household Expenses $ 65.00
Transportation $ 50.00
Food $ 250.00
Medical $ 30.00
Insurance $ 100.00
Entertainment $ 150.00
Clothing $ 75.00
Miscellaneous $ 50.00
----------------------------------------------------
Write a program that declares a MonthlyBudget structure designed with member variables to hold each of these expense categories. The program should define two MonthlyBudget structure variables budget and spent. The first MonthlyBudget structure variable budget will contain (ie., be assigned) the budget figures given above. Pass this first structure >budget variable to a function displayBudget that will display the budget categories along with the budgeted amounts.
The second MonthlyBudget structure variable spent will be passed to another function getExpenses that should create a screen form that displays each category name and its budgeted amount, then positions the cursor next to it for the user to enter the amounts actually spent in each budget category during the past month.
Finally, the program should then pass both structure variables budget and spent to a function compareExpenses that displays a report indicating the amount over or under budget the student spent in each category, as well as the amount over or under for the entire monthly budget.
You may design your own user-input interface but you must use a structure and must implement the three functions listed above. The format of the monthly budgeted report should appear as similar as possible to the sample output shown below.
HINT: Use the setw and right manipulators to right-justify dollar value outputs in function compareExpenses.
INPUT VALIDATION: Do not accept negative values for the users actual expenditure inputs in function getExpenses.
A sample test run using the Code::Block IDE-CompilerHere is your monthly budget for YEAR 2020:
Housing $ 580
Utilities $ 150
Household $ 65
Transportation $ 50
Food $ 250
Medical $ 30
Insurance $ 100
Entertainment $ 150
Clothing $ 75
Miscellaneous $ 50
=================================================
Total Budgeted $ 1500
=================================================
Enter month of expenditure: March
Enter actual monthly expenditures for each budget category
Housing: $ 580
Utilities: $ 130
Household: $ 50
Transportation:$ 50
Food: $ 230
Medical: $ 30
Insurance: $ 100
Entertainment: $ 120
Clothing: $ -10
ERROR: You must enter a positive number.
Clothing: $ 100
Miscellaneous: $ 30
Budgeted Spent Difference
=================================================
Housing 580.00 580.00 0.00
Utilities 150.00 130.00 -20.00
Household 65.00 50.00 -15.00
Transportation 50.00 50.00 0.00
Food 250.00 230.00 -20.00
Medical 30.00 30.00 0.00
Insurance 100.00 100.00 0.00
Entertainment 150.00 120.00 -30.00
Clothing 75.00 100.00 25.00
Miscellaneous 50.00 30.00 -20.00
=================================================
Total 1500.00 1420.00 80.00
=================================================
Congratulations! You were $80.00 under budget in March 2020.
Process returned 0 (0x0) execution time : 104.850 s
Press any key to continue.
Please make sure to declare your struct above your function prototypes and include appropriate function documentation as needed. You may use pointers or constant reference parameters when passing the structure variables to the functions mentioned above. DO NOT use global variables.
In: Computer Science
Scenario
It is 2020, and General Foryota Company opens a plant in which to
build a new mass-produced hover-craft. This hover-craft will work
using E-85 Ethanol, will travel up to 200 mph, and will reduce
pollution worldwide at a rate of 10 percent per year. It is likely
that when all automobiles in the industrial world have been changed
over to hovercrafts, emission of greenhouse gasses may be so
reduced that global warming may end and air quality will become
completely refreshed.
However, the downside is that during the transition time, GFC's Hover-Vee (only available in red or black), will most likely put all transportation as we know it in major dissaray. Roadways will no longer be necessary, but new methods of controlling traffic will be required. Further, while the old version of cars are still being used, Hover-vee's will cause accidents, parking issues, and most likely class envy and warfare. The sticker price on the first two models will be about four times that of the average SUV (to about $200,000.) Even so, GFC's marketing futurists have let them know that they will be able to pre-sell their first three years of expected production, with a potential waiting list which will take between 15 and 20 years to fill.
The Chief Engineer (CE) of GFC commissions a study on potential liabilities for the Hover-vees. The preliminary result is that Hover-vees will likely kill or maim humans at an increased rate of double to triple over automobile travel because of collisions and crashes at high speeds -- projected annual death rates of 100,000 to 200,000. However, global warming will end, and the environment will flourish.
The U. S. Government gets wind of the plans. Congress begins to discuss the rules on who can own and operate Hover-vees. GFC's stock skyrockets. The Chief Engineer takes the results of the study to the Chief Legal Counsel (CLC), and together they agree to bury the study, going forward with the production plans. The Chief Project Manager (CPM), who has read the study and agreed to bury it, goes ahead and plans out the project for the company, with target dates and production deadlines.
Our class is a team of young lawyers, project managers, engineers, and congressional aides who are all part of the process of helping get this project off the ground. In fact, according to the first letter of your last name, you are the following team:
Somebody sent a secret copy of the report to you at your home address. It has no information in it at all, except for the report showing the proof of the increase in accidents and deaths. The report shows, on its face, that the CE, CLC, CPM, and your Congressional Representative have seen copies of this report. On the front there are these words typed in red: They knew — they buried this. Please save the world!
Each of you feel a very loyal tie to your boss and your company/country. You all have mortgages, and families to feed. It is likely if you blow the whistle on this report, you will lose your job and your livelihood. You're not even sure who wrote the study in your envelope or who actually sent it to you.
Address all of the following:
In: Operations Management
Grammar Exercises
35. Microsoft faces two major threats: piracy and patent lawsuits.
36. Bill Gates focuses on product development and strategy; Satya Nadella focuses on operations.
37. Bill Gates focuses on product development and strategy; on the other hand, Satya Nadella focuses on operations.
38. Microsoft’s American offices are in Redmond Washington, New York City, San Francisco , Birmingham Alabama, and Phoenix Arizona.
39. Cloud computing involves three possible platforms: software as-a-service (SaaS) platform-as-a-service (PaaS) and infrastructure-as-a-service (IaaS).
48. The recent story about Microsoft in The Wall Street Journal/“The Wall Street Journal” was called Microsoft’s Gamble on Cloud Computing/“Microsoft’s Gamble on Cloud
Computing.”
49. Bill Gates said that he’d like to see the phrase go bing it/“go bing it” replace the phrase go google it/“go google it.”
50. At the luncheon, his speech, titled The Road to the Future/“The Road to the Future,” laid out his vision for cloud computing over the next decade.
51. In 2013, 3/three Microsoft business divisions were combined.
52. Revenues for the last fiscal year were $62,484 million/$62,484,000,000.
53. Revenues rose 28 percent/28% over the past year.
54. Microsoft employs over 89 thousand/89,000 employees.
55. Microsoft has five/5 business divisions.
56. 5/Five Microsoft divisions make up the Microsoft corporation.
57. Microsoft lost money in 3/three of the 17/seventeen product groups.
62. Microsoft joined with Accenture to create Avanade, an IT consultancy. They/It specialize/s in connecting to consumers through online platforms such as social networks.
63. Neither Yahoo! nor Microsoft has/have increased its/their market share in the search engine market for the past five years.
64. Microsoft hold/s its/their annual shareholders meeting at the corporate headquarters.
65. Every new Microsoft employee should provide copies of his/her/their Social Security card/s at the orientation.
66. The manual about computer programming tips are/is on reserve at the corporate reading room.
67. Microsoft and its competitors in the technology industry is/are constantly changing.
68. Many of Google’s HR policies are aimed at eliciting/illiciting honest feedback.
69. The advice/advise on Microsoft’s Help menu is not helpful.
70. All employees should ensure/insure that their LinkedIn pages do not contain any content contrary to the Code of Conduct.
71. This decision affects/effects every aspect of our marketing strategy.
72. Their next step is to identify how to raise enough capital/capitol for the venture.
73. She told me that the two products contain complementary/complimentary features.
74. This search engine is much more reliable than/then Google’s.
75. Sundar Pichai, CEO/ceo of Google, says that Google is ahead of its competitors in the race to develop artificial intelligence capabilities."
76. We just hired her for a Senior Developer/senior developer position.
77. Google’s headquarters are located in Silicon Valley/silicon valley.
78. The headquarters are located just West/west of Sunnyvale.
79. Please contact Eileen Chao, Communications Lead/communications lead, for additional press inquires.
80. Ms. Chao explained, “We/we will invest more than $50 million this year to research and develop artificial intelligence.”
In: Operations Management
Patient Profile: Candace is a 23-year-old, G1P1, MWF, who delivered a 7 pound 8 ounce baby boy three weeks ago at the local birth center. She is very happy about the birth and is adjusting well to motherhood. She breastfed her baby a few minutes after the birth and has continued to exclusively breastfeed him. She intends to breastfeed for at least a year probably starting him on solid foods around six months. Prior to the pregnancy, Candace was a busy office executive in a local shipping firm. She is on a six-week leave of absence. She plans to pump her breast milk for the baby when she returns to work. She is hoping that her mother-in-law who will be caring for the baby, will be able to bring the baby to her workplace at least once a day at noon to breastfeed and then give the baby the breast milk she has left from a bottle for the other feedings. Her mother-in-law will be arriving from out of state in two weeks. Candace is a very “in control person.” She plans everything in her life, and up to this point the world has respected her wishes.
Case Study: Candace called the birth center this morning crying. Her breast on the left side is so sore she cannot stand to have the baby nurse on that side, and to make matters worse, that is the only side the baby will take. For the last 12 hours the baby seems to want to nurse all the time or just cries and sucks his fist. She feels sick, cannot get anything done at home and at 2 p.m. is still in her pajamas with last night’s dinner and this morning’s breakfast dishes still in the sink. She and her husband had an argument this morning and he left for work angry and overtired after getting no sleep all night from the baby crying. He just wants her to stop being so stubborn, since she obviously doesn’t have enough milk, and give the baby some formula. Her car has broken down and she has no other source of transportation. The nurse working at the birth center offers to make a home visit.
Questions:
1. Prior to arriving at the home, what problems does the nurse anticipate at this visit?
2. Make a list of the quesitons that the nruse will ask Candace at the home visit.
3. Make a list of the observations that need to be made at the home visit.
4. Explain the process of supply and demand as it aplies to breastfeeding and milk supply.
5. Why does it appear to Candace’s husband that Candace has lost her milk?
6. On arrival the nruse find that Candac’s left breast mipple is cracked and bleeding slightly. The nurse also notes that Candace has a fever of 101.2, seems lethargic, and has an area the size of a quarter on the underside of her right breast that is firm, red, and warm. Candace tells the nruse that she feels like she has the flu. What is Candace’s problem, what probably caused it and what is the nurs’es next action?
7. The CNM at the birth center calls in a prescription for ampicillin 500 mg po qid for 10 days. Candace starts crying and asks if this means she can no longer breastfeed. What is the nruse’s best response?
8. Outline a teaching plan to reduce the possibility of Candace having another mastitis infection.
9. Why did the baby only want to nurse on the left side?
10. How can the nurse help Candace get him to also nurse on the right side?
11. Where can the nurse refer Candace for support with her breastfeeding?
12. Candace plans to return to work in two weeks. Make a list of decisions and possible problems that she will have to work through during these next two weeks, and after she returns to work, to prepare her and the baby for this transition. Provide alternative suggestions for her to consider.
13. Identify three priority concepts for Candace and three goals for each concept.
In: Nursing
Discussion Topic: Minimum 250 words
Griffin is proud of his accomplishments as a college football player.
“I’ve worked for a long time to make it this far. I did all the hard work. In addition to training hard with my team when I was in high school, spending my summers at football camp, and working out in general in the weight room, I also kept my grades up and look what it got me—a college scholarship! Next step? The NFL!”
However, college football is also taking its toll.
“I’m up at 7 every morning, bacon and eggs and biscuits and gravy and a big glass of orange juice for breakfast, followed by morning classes. Then I lift weights and practice all afternoon, eat two foot-long subs, one for my first lunch, and one for my second lunch, ending with a study hall just for the team.”
When asked if he varies his menu, Griffin tilts his head and wrinkles his nose, looking up at the ceiling. “Well, breakfast varies, depending on whether they’ve got waffles or not. I like a stack of waffles; but lunch is generally the same. Sometimes I add chips or a big cookie. Dinner’s always different. Last night I had spaghetti.”
Griffin faced some challenges last season, including a knee injury.
“But that’s all done with now. My knee is fine. The coach lectured me about something called ‘stress fractures,’” he says, “but nothing has happened. He didn’t have to worry about me.”
The nutritionist’s nurse asks the big question: What brings Griffin here today?
“Playing college football has been a big shock,” Griffin says. “I push myself harder than I have ever done in my life. My body’s just under a lot of stress. I mean, in high school, you’re player number one. You get drafted to a good college team, though, and boy, you find you’re struggling not to be on the bottom. Here, everyone was the best player in his high school. So pressure and competition and training are extra tough.”
“Eating is different too. At home, my mom let me eat what I wanted when I wanted, as long as I took my turn doing the dishes,” he laughs. “But here, some of our senior teammates have been teaching us how to load carbs. Recently some weird stuff has been happening to me, so my coach said I should talk to a dietitian.”
In: Nursing
Which clients would be at risk for developing nonthrombocytopenic purpura? Select all that apply.
| A. |
Child adopted from India and displaying malaise, lethargy, and petechiae all over the body associated with suspected scurvy. |
|
| B. |
73-year-old client admitted with concussion that resulted from a fall |
|
| C. |
55-year-old client diagnosed with Cushing disease displaying bruises, weight gain with a buffalo hump, and "moon" face |
|
| D. |
15-year-old with insulin-dependent diabetes who has hypoglycemia and is displaying irritability with headaches and tachycardia |
|
| E. |
Pregnant mother experiencing headaches and proteinuria |
Misinterpreting her physician's instructions, a 69-year-old woman with a history of peripheral artery disease has been taking two 325 mg tablets of aspirin daily. How has this most likely affected her hemostatic status?
|
Irreversible acetylation of platelet cyclooxygenase activity has occurred. |
||
|
The client's prostaglandin TXA2 levels are abnormally high. |
||
|
She is at risk of developing secondary immune thrombocytopenic purpura (ITP). |
||
|
The binding of an antibody to platelet factor 4 produces immune complexes. |
A client visited his health care provider after finding an enlarged lymph node along the mediastinal border. The health care provider may be alerted to a possible diagnosis of Hodgkin lymphoma (HL) based on the client having which other clinical manifestations? Select all that apply.
| A. |
Yeast infection in the mouth |
|
| B. |
Night sweats |
|
| C. |
Unexplained pruritus |
|
| D. |
Joint swelling |
|
| E. |
Sore throat with pustules on tonsils. |
The nurse is caring for a client who develops a paroxysmal supraventricular tachycardia. Which medications should the nurse prepare to administer? Select all that apply.
| A. |
Adenosine |
|
| B. |
Diltiazem (Class IV) |
|
| C. |
Lidocaine (Class 1B) |
|
| D. |
Metoprolol (Class II) |
|
| E. |
Amiodarone (Class III) |
You note eosinophilia on the client's laboratory results. You should interview the client about a history of which conditions? Select all that apply.
| A. |
Asthma |
|
| B. |
Exposure to parasites |
|
| C. |
Allergic reactions |
|
| D. |
Viral infection |
|
| E. |
Bacterial infection |
A surgeon is explaining to the parents of a 6-year-old boy the rationale for the suggestion of removing the boy's spleen. Which teaching point would be most accurate?
| A. |
"We believe that your son's spleen is causing the destruction of many of his blood platelets, putting him at a bleeding risk." |
|
| B. |
"Your son's spleen is inappropriately destroying the platelets from his blood and needs to be removed." |
|
| C. |
"Your son's spleen is holding on to too many of his platelets so they're not available for clotting." |
|
| D. |
"We think that his spleen is inhibiting the production of platelets by his bone marrow." |
A 78-year-old male client has undergone a total knee replacement. He just doesn't feel like getting out of bed and moving around. After 3 days of staying in bed, the physical therapist encourages him to get out of bed to the chair for meals. He starts to complain of dizziness and lightheadedness. These symptoms are primarily caused by which pathophysiologic principle? Select all that apply.
| A. |
Client is experiencing a reduction in plasma volume. |
|
| B. |
Peripheral vasoconstriction mechanism has failed. |
|
| C. |
Client is so stressed that he is releasing too many endorphins. |
|
| D. |
Client is still bleeding from the surgical procedure. |
|
| E. |
Client has loss all of his muscle tone. |
From the current health histories, which client(s) is at risk for developing secondary forms of immune thrombocytopenic purpura (ITP)? Select all that apply.
| A. |
Female client in the first trimester reporting abdominal cramping |
|
| B. |
Middle-aged client scheduled for gastroscopy to confirm Helicobactor pylori |
|
| C. |
Former IV drug user recently diagnosed with hepatitis C virus |
|
| D. |
Older adult female undergoing testing for cause of joint discomfort |
|
| E. |
Adolescent admitted for facial burns when the "vape" (cigarette) exploded in the mouth |
In: Nursing