Questions
In April 2019, Paul Marrapese, an independent security researcher from San Jose, California, has published research...

In April 2019, Paul Marrapese, an independent security researcher from San Jose,
California, has published research warning that peer-to-peer software developed by
Shenzhen Yunni Technology firm, that's used in millions of IoT devices around the world,
has a vulnerability that could allow an attacker to eavesdrop on conversations or press
household items into service as nodes in a botnet.
The software, called iLnkP2P, is designed to enable a user to connect to IoT devices from
anywhere by using a smartphone app. The iLnkP2P functionality is built into a range of
products from companies that include HiChip, TENVIS, SV3C, VStarcam, Wanscam, NEO
Coolcam, Sricam, Eye Sight, and HVCAM.
What Marrapese found is that as many as 2 million devices, and possibly more, using
iLnkP2P software for P2P communication do not have authentication or encryption
controls built-in, meaning that an attacker could directly connect to a device and bypass
the firewall. Marrapese discovered the iLinkP2P flaw after buying an inexpensive IoT-
connected camera on Amazon.
"I found that I was able to connect to it externally without any sort of port forwarding,
which both intrigued and concerned me," Marrapese told Information Security Media
Group. "I found that the camera used P2P to achieve this, and started digging into how
it worked. From there, I quickly learned how ubiquitous and dangerous it was."
While the flaws with the iLnkP2P peer-to-peer software apparently have not yet been
exploited in the wild, Marrapses believes it's better for consumers to know now before
an attacker decides to start taking advantage of this particular vulnerability.
"There have been plenty of stories in the past about IP cameras and baby monitors being
hacked, but I believe iLnkP2P is a brand new vector not currently being exploited in the
wild," Marrapese says. "With that being said, the biggest motivation behind this
disclosure is to inform consumers before it's too late - because I believe it's only a matter
of time."
As part of his research, Marrapese says he attempted to contact not only Shenzhen
Yunni Technology but also several of the IoT manufacturers that use the company's P2P

software. As of Monday, even after publishing results, he had not heard back from
anyone.
Users of IoT devices that make use of the iLnkP2P software scan a barcode or copy a six-
digit number that is included in the product. From there, the owner can access the
device from a smartphone app.
It's through these unique identifier numbers that Marrapese was able to discover that
each device manufacturer used a specific alphabetic prefix to identify their particular
product. For instance, HiChip uses "FFFF" as a prefix for the identification number for its
devices. Once Marrapese was able to identify these devices through the unique number
systems, he created several proof-of-concept attacks that took advantage of the flaws
in the software.
[Source: https://www.databreachtoday.com/2-million-iot-devices-have-p2p-software-
flaw-researcher-a-12428 Accessed July 2020]

a) In this case study, it is mentioned that vulnerable IoT devices can service as nodes
in a botnet. Explain the working mechanism of a Botnet. Discuss any two attacks
carried out by a botnet.

b) Report the importance of security in IoT devices. How does encryption help improve
security for these devices?

c) Discuss the importance of lightweight cryptography in IoT enabled low-power
devices. List the potential lightweight cryptographic algorithms for low-power IoT
devices.

In: Computer Science

modify the code below to create a GUI program that accepts a String from the user...

modify the code below to create a GUI program that accepts a String from the user in a TextField and reports whether or not there are repeated characters in it. Thus your program is a client of the class which you created in question 1 above.


N.B. most of the modification needs to occur in the constructor and the actionPerformed() methods. So you should spend time working out exactly what these two methods are doing, so that you can make the necessary modifications.

Q1 CODE: (do not modify this one)

public class QuestionOne {
// main funtion
public static void main(String []args) {
Scanner sc = new Scanner(System.in);
// get user input string
System.out.println("Enter a String: ");
String s = sc.nextLine();
// calling the static function and store it to a variable
boolean repeatChar = repeatCharacter(s);
// if the result of the static function is true
if(repeatChar){
// print has repeated characters
System.out.println("String has repeated characters");
}
else {
// if not display no repeated characters
System.out.println("String does not have repeated characters");
}
}
// static function that accepts string as parameter
public static boolean repeatCharacter(String s){
char ch;
//check if repeated character available or not
for(int i=0; i < s.length(); ++i) {
ch = s.charAt(i);
//check if the index and the last index of the character is same or not
if(s.indexOf(ch) != s.lastIndexOf(ch)) {   
return true;
}
}
// no character repetition return false
return false;
}

CODE TO MODIFY THE GUI: (Please modify this one)

//SimplApp.java - a simple example of a GUI program

//You should be able to give a brief description of what

//such a program will do and the steps involved

import javax.swing.*; //for JFrame, JButton, JLabel

import java.awt.*; //for Container, BorderLayout

import java.awt.event.*; //for WindowAdapter,

ActionListner, ActionEvent

public class SimplApp extends JFrame {

// define window's width and height in pixels

private static final int WIDTH = 400;

private static final int HEIGHT = 200;

// used for displaying text in the window

private JLabel infoLabel;

private class ButtonAction implements

ActionListener {

public void actionPerformed(ActionEvent e){

infoLabel.setText("You fool !!");

} //end of actionPerformed

} //end of class ButtonAction

// used to destroy/close the window

private class WindowDestroyer extends

WindowAdapter {

public void windowClosing(WindowEvent e){

dispose();

System.exit(0);

} //end of windowClosing()

} //end of class WindowDestroyer

// Below is the constructor for the class SimplApp

public SimplApp(String windowTitle) {

super(windowTitle);

setSize(WIDTH, HEIGHT);

// create content pane to add components to

window

Container c1 = getContentPane();

c1.setLayout( new BorderLayout());

// create a label component with the String

centred

infoLabel = new JLabel( "Initial",

JLabel.CENTER);

c1.add( infoLabel, BorderLayout.CENTER);

// create a button component

JButton button1=new JButton("Don't Press

Me!");

c1.add( button1, BorderLayout.NORTH);

//goes at top

// add an action event to button

ButtonAction myAction = new ButtonAction();

button1.addActionListener(myAction);

// add action event to window close button

WindowDestroyer myListener = new

WindowDestroyer();

addWindowListener( myListener);

} //end of SimplApp constructor

public static void main(String[] args) {

// calls constructor

SimplApp app = new SimplApp("Zzzz");

// display window on the screen

app.setVisible(true);

System.out.println("Finished

SimplApp.main()");

} //end of SimplApp.main()

} //end of SimplApp class

Thanks, anyone/expert answer person!


}

In: Computer Science

The advantages of e-mail communication. The first thing most of us do when we get up...

The advantages of e-mail communication.

The first thing most of us do when we get up in the morning is to turn on the computer and check for e-mail messages. This has become a part of our daily routine. We take it for granted that this has been an age-old practice and don't pause to think that it is a product of recent technological revolution. It is a wonder how we ever survived without it. The advantages of e-mail communication are many, and the chief among them are its speed, low cost, and convenience.

Speed is the obvious advantage. Just as our planes, trains, and automobiles are moving ever faster, so are our modes of communication. We can send e- mail around the world in a matter of minutes with no more effort than it takes to press a few keys on the computer. It is this speed that has led to our calling regular mail "snail mail."

E-Mail has also the advantage of being inexpensive. Many people have access to e-mail for free through their work or school. If some people may pay for e-mail through an online service, there is no increase in cost relative to the number of messages sent. It is the same price to send one message to one person as it is to send messages back and forth all day or to a hundred people. Finally, if we consider the costs saved in long-distance phone bills in addition to cost saved in postage, most e-mail users come out ahead.

There is no question that e-mail is convenient. It allows us to send the same message to many people at the same time with little more effort than it takes to send a message to one person. When sending multiple copies of a message, we avoid the trouble of photocopying the letter, printing out additional copies, addressing envelopes, and posting the mail. E-mail is also convenient because it lends itself to an informal style that makes composing a message relatively easy; in addition, readers of e-mail tolerate more mistakes than readers of conventional mail, and their tolerance saves us time.

E-Mail thus gives us the ability to send messages with convenience, speed and little expense. In not too distant a future, "snail mail" is likely to become obsolete, and one can already hear the bell toll for the US Postal Services.

Please answer the following Questions from above essay.

1. What is the topic of the essay?

2. What is the position taken by the writer on the topic?

3. Does the essay have a plan of development? If so, describe the plan.

4. Imagine you are the author of the essay. Take a reader curious to know how the essay developed through the pre-writing stage of the essay.

5. What are the three parts of the essay?

6. How does the essay hook the reader?

7. What is the first supporting point? What details does the writer give in support of the point?

8. What is the second supporting point? What details does the writer give in support of the point?

9. What is the third supporting point? What details does the writer give in support of the point?

10. What method of organization does the writer use to organize the material in the essay?

11. How does the essay conclude?

12. Why doesn't the writer discuss the disadvantages of e-mail communication in the essay?

In: Psychology

I am working on creating a Broadcast Receiver. I am extremely new to Android development and...

I am working on creating a Broadcast Receiver. I am extremely new to Android development and Java. I added my code at the bottom of this, but whenever I press the button the app crashes. I'm assuming something is wrong with connecting the broadcastIntent() function. If you could really focus on the first part that would be great!! I appreciate any help :)

Here are the directions from my professor:

  1. Create an empty project
  2. Create a method in MainActivity.java which creates a Broadcast.

public void broadcastIntent(View view){
       Intent intent = new Intent();
       intent.setAction("my.CUSTOM_INTENT"); sendBroadcast(intent);
   }

  1. Add a button to activity_main.xml and link it to this method.
  2. Is it working? How can you test it? STOP
  3. Create a Broadcast Receiver (accept defaults)
  4. Add the following code to your receiver in onReceive() : (remember to comment out the auto generated exception!) what’s an exception?
Toast.makeText(context, "Intent Detected.", Toast.LENGTH_LONG).show();
  1. Edit your manifest by adding the following as a child node of <receiver>
<intent-filter>
    <action android:name="my.CUSTOM_INTENT"></action>
</intent-filter>
  1. RUN it
MORE DIFFICULT:
  1. Create a second receiver called ConnectionReciever and add the following code in onReceive():
  2. ConnectivityManager cm =             (ConnectivityManager) context.getSystemService(Context.CONNECTIVITY_SERVICE);     NetworkInfo activeNetwork = cm.getActiveNetworkInfo();     boolean isConnected = activeNetwork != null &&             activeNetwork.isConnectedOrConnecting();     if (isConnected) {         try {             Toast.makeText(context, "Network is connected", Toast.LENGTH_LONG).show();         } catch (Exception e) {             e.printStackTrace();         }     } else {         Toast.makeText(context, "Network state has changed or reconnected", Toast.LENGTH_LONG).show();     } }
  3. In your manifest include the following as your intent-filter as a node of the new receiver:
<intent-filter>

    <action android:name="android.net.conn.CONNECTIVITY_CHANGE" />

</intent-filter>
  1. Since you are being nosey – you need to ask for user- permission. Include the following as nodes of <manifest> :
<uses-permission android:name="android.permission.INTERNET" />

<uses-permission android:name="android.permission.ACCESS_NETWORK_STATE" />
  1. Test it!

MY CODE:

<MainActivity>

package com.example.ica4_broadcast;

import androidx.appcompat.app.AppCompatActivity;

import android.content.Intent;
import android.os.Bundle;
import android.view.View;
import android.widget.Button;
import android.widget.Toast;


public class MainActivity extends AppCompatActivity {
    private Button mybutton;

    @Override
    protected void onCreate(Bundle savedInstanceState) {
        super.onCreate(savedInstanceState);
        setContentView(R.layout.activity_main);
        Button mybutton = (Button) findViewById(R.id.mybutton);
    }

    private void broadcastIntent(View view) {
        Intent intent = new Intent();
        intent.setAction("my.CUSTOM_INTENT");
        sendBroadcast(intent);
        }

}

<activity_xml>

<?xml version="1.0" encoding="utf-8"?>
<androidx.constraintlayout.widget.ConstraintLayout xmlns:android="http://schemas.android.com/apk/res/android"
    xmlns:app="http://schemas.android.com/apk/res-auto"
    xmlns:tools="http://schemas.android.com/tools"
    android:layout_width="match_parent"
    android:layout_height="match_parent"
    tools:context=".MainActivity">

    <Button
        android:id="@+id/mybutton"
        android:layout_width="wrap_content"
        android:layout_height="wrap_content"
        android:layout_marginTop="235dp"
        android:layout_marginEnd="146dp"
        android:layout_marginRight="146dp"
        android:onClick="broadcastIntent"
        android:text="Button"
        app:layout_constraintEnd_toEndOf="parent"
        app:layout_constraintTop_toTopOf="parent" />

</androidx.constraintlayout.widget.ConstraintLayout>

<manifest>

<?xml version="1.0" encoding="utf-8"?>
<manifest xmlns:android="http://schemas.android.com/apk/res/android"
    package="com.example.ica4_broadcast">

    <application
        android:allowBackup="true"
        android:icon="@mipmap/ic_launcher"
        android:label="@string/app_name"
        android:roundIcon="@mipmap/ic_launcher_round"
        android:supportsRtl="true"
        android:theme="@style/Theme.ICA4Broadcast">
        <activity android:name=".MainActivity">
            <intent-filter>
                <action android:name="android.intent.action.MAIN" />
                <category android:name="android.intent.category.LAUNCHER" />
            </intent-filter>
        </activity>
        <receiver android:name=".MyReceiver" android:exported="true">
            <intent-filter>
                <action android:name="my.CUSTOM_INTENT"/>
            </intent-filter>
        </receiver>
    </application>
</manifest>

<MyReceiver>

package com.example.ica4_broadcast;

import android.content.BroadcastReceiver;
import android.content.Context;
import android.content.Intent;
import android.widget.Toast;

public class MyReceiver extends BroadcastReceiver {
    @Override
    public void onReceive(Context context, Intent intent) {
            Toast.makeText(context, "Intent Detected", Toast.LENGTH_LONG).show();

    }
}

In: Computer Science

Designing and implementing a C++ structure data type - Monthly Budget Remember to use correct code...

Designing and implementing a C++ structure data type - Monthly Budget

Remember to use correct code formatting and documentation.

A student has established the following monthly budget:

Budget Categories       Budgeted amount

-----------------------------------------------------

Housing                  $ 580.00

Utilities                   $ 150.00

Household Expenses    $ 65.00

Transportation           $ 50.00

Food                      $ 250.00

Medical                  $ 30.00

Insurance                $ 100.00

Entertainment           $ 150.00

Clothing                  $ 75.00

Miscellaneous           $ 50.00

----------------------------------------------------

Write a program that declares a MonthlyBudget structure designed with member variables to hold each of these expense categories. The program should define two MonthlyBudget structure variables budget and spent. The first MonthlyBudget structure variable budget will contain (ie., be assigned) the budget figures given above. Pass this first structure >budget variable to a function displayBudget that will display the budget categories along with the budgeted amounts.

The second MonthlyBudget structure variable spent will be passed to another function getExpenses that should create a screen form that displays each category name and its budgeted amount, then positions the cursor next to it for the user to enter the amounts actually spent in each budget category during the past month.

Finally, the program should then pass both structure variables budget and spent to a function compareExpenses that displays a report indicating the amount over or under budget the student spent in each category, as well as the amount over or under for the entire monthly budget.

You may design your own user-input interface but you must use a structure and must implement the three functions listed above. The format of the monthly budgeted report should appear as similar as possible to the sample output shown below.

HINT: Use the setw and right manipulators to right-justify dollar value outputs in function compareExpenses.

INPUT VALIDATION: Do not accept negative values for the users actual expenditure inputs in function getExpenses.

A sample test run using the Code::Block IDE-CompilerHere is your monthly budget for YEAR 2020:

Housing        $  580
Utilities      $  150
Household      $   65
Transportation $   50
Food           $  250
Medical        $   30
Insurance      $  100
Entertainment  $  150
Clothing       $   75
Miscellaneous  $   50
=================================================
Total Budgeted $ 1500
=================================================

Enter month of expenditure: March
Enter actual monthly expenditures for each budget category

Housing:       $ 580
Utilities:     $ 130
Household:     $ 50
Transportation:$ 50
Food:          $ 230
Medical:       $ 30
Insurance:     $ 100
Entertainment: $ 120
Clothing:      $ -10
ERROR: You must enter a positive number.
Clothing:      $ 100
Miscellaneous: $ 30


                 Budgeted     Spent      Difference
=================================================
Housing           580.00      580.00        0.00
Utilities         150.00      130.00      -20.00
Household          65.00       50.00      -15.00
Transportation     50.00       50.00        0.00
Food              250.00      230.00      -20.00
Medical            30.00       30.00        0.00
Insurance         100.00      100.00        0.00
Entertainment     150.00      120.00      -30.00
Clothing           75.00      100.00       25.00
Miscellaneous      50.00       30.00      -20.00
=================================================
Total            1500.00     1420.00       80.00
=================================================

Congratulations! You were $80.00 under budget in March 2020.

Process returned 0 (0x0)   execution time : 104.850 s
Press any key to continue.

Please make sure to declare your struct above your function prototypes and include appropriate function documentation as needed. You may use pointers or constant reference parameters when passing the structure variables to the functions mentioned above. DO NOT use global variables.

In: Computer Science

Scenario It is 2020, and General Foryota Company opens a plant in which to build a...

Scenario
It is 2020, and General Foryota Company opens a plant in which to build a new mass-produced hover-craft. This hover-craft will work using E-85 Ethanol, will travel up to 200 mph, and will reduce pollution worldwide at a rate of 10 percent per year. It is likely that when all automobiles in the industrial world have been changed over to hovercrafts, emission of greenhouse gasses may be so reduced that global warming may end and air quality will become completely refreshed.

However, the downside is that during the transition time, GFC's Hover-Vee (only available in red or black), will most likely put all transportation as we know it in major dissaray. Roadways will no longer be necessary, but new methods of controlling traffic will be required. Further, while the old version of cars are still being used, Hover-vee's will cause accidents, parking issues, and most likely class envy and warfare. The sticker price on the first two models will be about four times that of the average SUV (to about $200,000.) Even so, GFC's marketing futurists have let them know that they will be able to pre-sell their first three years of expected production, with a potential waiting list which will take between 15 and 20 years to fill.

The Chief Engineer (CE) of GFC commissions a study on potential liabilities for the Hover-vees. The preliminary result is that Hover-vees will likely kill or maim humans at an increased rate of double to triple over automobile travel because of collisions and crashes at high speeds -- projected annual death rates of 100,000 to 200,000. However, global warming will end, and the environment will flourish.

The U. S. Government gets wind of the plans. Congress begins to discuss the rules on who can own and operate Hover-vees. GFC's stock skyrockets. The Chief Engineer takes the results of the study to the Chief Legal Counsel (CLC), and together they agree to bury the study, going forward with the production plans. The Chief Project Manager (CPM), who has read the study and agreed to bury it, goes ahead and plans out the project for the company, with target dates and production deadlines.

Our class is a team of young lawyers, project managers, engineers, and congressional aides who are all part of the process of helping get this project off the ground. In fact, according to the first letter of your last name, you are the following team:

  • A-G: Attorney on the GFC team
  • H-N: Project Manager on the GFC team
  • 0-S: Engineer on the GFC team
  • T-Z: Congressional Aide

Somebody sent a secret copy of the report to you at your home address. It has no information in it at all, except for the report showing the proof of the increase in accidents and deaths. The report shows, on its face, that the CE, CLC, CPM, and your Congressional Representative have seen copies of this report. On the front there are these words typed in red: They knew — they buried this. Please save the world!

Each of you feel a very loyal tie to your boss and your company/country. You all have mortgages, and families to feed. It is likely if you blow the whistle on this report, you will lose your job and your livelihood. You're not even sure who wrote the study in your envelope or who actually sent it to you.

Address all of the following:

  • Utilizing your profession's code of ethics, what would be your first step?
  • Who would you talk to first?
  • Would you go to the press?
  • Would you go to your boss?
  • Should you do anything at all?

In: Operations Management

Grammar Exercises 35. Microsoft faces two major threats: piracy and patent lawsuits. 36. Bill Gates focuses...

Grammar Exercises

35. Microsoft faces two major threats: piracy and patent lawsuits.

36. Bill Gates focuses on product development and strategy; Satya Nadella focuses on operations.

37. Bill Gates focuses on product development and strategy; on the other hand, Satya Nadella focuses on operations.

38. Microsoft’s American offices are in Redmond Washington, New York City, San Francisco , Birmingham Alabama, and Phoenix Arizona.

39. Cloud computing involves three possible platforms: software as-a-service (SaaS) platform-as-a-service (PaaS) and infrastructure-as-a-service (IaaS).

48. The recent story about Microsoft in The Wall Street Journal/“The Wall Street Journal” was called Microsoft’s Gamble on Cloud Computing/“Microsoft’s Gamble on Cloud

Computing.”

49. Bill Gates said that he’d like to see the phrase go bing it/“go bing it” replace the phrase go google it/“go google it.”

50. At the luncheon, his speech, titled The Road to the Future/“The Road to the Future,” laid out his vision for cloud computing over the next decade.

51. In 2013, 3/three Microsoft business divisions were combined.

52. Revenues for the last fiscal year were $62,484 million/$62,484,000,000.

53. Revenues rose 28 percent/28% over the past year.

54. Microsoft employs over 89 thousand/89,000 employees.

55. Microsoft has five/5 business divisions.

56. 5/Five Microsoft divisions make up the Microsoft corporation.

57. Microsoft lost money in 3/three of the 17/seventeen product groups.

62. Microsoft joined with Accenture to create Avanade, an IT consultancy. They/It specialize/s in connecting to consumers through online platforms such as social networks.

63. Neither Yahoo! nor Microsoft has/have increased its/their market share in the search engine market for the past five years.

64. Microsoft hold/s its/their annual shareholders meeting at the corporate headquarters.

65. Every new Microsoft employee should provide copies of his/her/their Social Security card/s at the orientation.

66. The manual about computer programming tips are/is on reserve at the corporate reading room.

67. Microsoft and its competitors in the technology industry is/are constantly changing.

68. Many of Google’s HR policies are aimed at eliciting/illiciting honest feedback.

69. The advice/advise on Microsoft’s Help menu is not helpful.

70. All employees should ensure/insure that their LinkedIn pages do not contain any content contrary to the Code of Conduct.

71. This decision affects/effects every aspect of our marketing strategy.

72. Their next step is to identify how to raise enough capital/capitol for the venture.

73. She told me that the two products contain complementary/complimentary features.

74. This search engine is much more reliable than/then Google’s.

75. Sundar Pichai, CEO/ceo of Google, says that Google is ahead of its competitors in the race to develop artificial intelligence capabilities."

76. We just hired her for a Senior Developer/senior developer position.

77. Google’s headquarters are located in Silicon Valley/silicon valley.

78. The headquarters are located just West/west of Sunnyvale.

79. Please contact Eileen Chao, Communications Lead/communications lead, for additional press inquires.

80. Ms. Chao explained, “We/we will invest more than $50 million this year to research and develop artificial intelligence.”


In: Operations Management

Patient Profile: Candace is a 23-year-old, G1P1, MWF, who delivered a 7 pound 8 ounce baby...

Patient Profile: Candace is a 23-year-old, G1P1, MWF, who delivered a 7 pound 8 ounce baby boy three weeks ago at the local birth center. She is very happy about the birth and is adjusting well to motherhood. She breastfed her baby a few minutes after the birth and has continued to exclusively breastfeed him. She intends to breastfeed for at least a year probably starting him on solid foods around six months. Prior to the pregnancy, Candace was a busy office executive in a local shipping firm. She is on a six-week leave of absence. She plans to pump her breast milk for the baby when she returns to work. She is hoping that her mother-in-law who will be caring for the baby, will be able to bring the baby to her workplace at least once a day at noon to breastfeed and then give the baby the breast milk she has left from a bottle for the other feedings. Her mother-in-law will be arriving from out of state in two weeks. Candace is a very “in control person.” She plans everything in her life, and up to this point the world has respected her wishes.

Case Study: Candace called the birth center this morning crying. Her breast on the left side is so sore she cannot stand to have the baby nurse on that side, and to make matters worse, that is the only side the baby will take. For the last 12 hours the baby seems to want to nurse all the time or just cries and sucks his fist. She feels sick, cannot get anything done at home and at 2 p.m. is still in her pajamas with last night’s dinner and this morning’s breakfast dishes still in the sink. She and her husband had an argument this morning and he left for work angry and overtired after getting no sleep all night from the baby crying. He just wants her to stop being so stubborn, since she obviously doesn’t have enough milk, and give the baby some formula. Her car has broken down and she has no other source of transportation. The nurse working at the birth center offers to make a home visit.

Questions:

1. Prior to arriving at the home, what problems does the nurse anticipate at this visit?

2. Make a list of the quesitons that the nruse will ask Candace at the home visit.

3. Make a list of the observations that need to be made at the home visit.

4. Explain the process of supply and demand as it aplies to breastfeeding and milk supply.

5. Why does it appear to Candace’s husband that Candace has lost her milk?

6. On arrival the nruse find that Candac’s left breast mipple is cracked and bleeding slightly. The nurse also notes that Candace has a fever of 101.2, seems lethargic, and has an area the size of a quarter on the underside of her right breast that is firm, red, and warm. Candace tells the nruse that she feels like she has the flu. What is Candace’s problem, what probably caused it and what is the nurs’es next action?

7. The CNM at the birth center calls in a prescription for ampicillin 500 mg po qid for 10 days. Candace starts crying and asks if this means she can no longer breastfeed. What is the nruse’s best response?

8. Outline a teaching plan to reduce the possibility of Candace having another mastitis infection.

9. Why did the baby only want to nurse on the left side?

10. How can the nurse help Candace get him to also nurse on the right side?

11. Where can the nurse refer Candace for support with her breastfeeding?

12. Candace plans to return to work in two weeks. Make a list of decisions and possible problems that she will have to work through during these next two weeks, and after she returns to work, to prepare her and the baby for this transition. Provide alternative suggestions for her to consider.

13. Identify three priority concepts for Candace and three goals for each concept.

In: Nursing

Discussion Topic: Minimum 250 words Griffin is proud of his accomplishments as a college football player....

Discussion Topic: Minimum 250 words

Griffin is proud of his accomplishments as a college football player.

“I’ve worked for a long time to make it this far. I did all the hard work. In addition to training hard with my team when I was in high school, spending my summers at football camp, and working out in general in the weight room, I also kept my grades up and look what it got me—a college scholarship! Next step? The NFL!”

However, college football is also taking its toll.

“I’m up at 7 every morning, bacon and eggs and biscuits and gravy and a big glass of orange juice for breakfast, followed by morning classes. Then I lift weights and practice all afternoon, eat two foot-long subs, one for my first lunch, and one for my second lunch, ending with a study hall just for the team.”

When asked if he varies his menu, Griffin tilts his head and wrinkles his nose, looking up at the ceiling. “Well, breakfast varies, depending on whether they’ve got waffles or not. I like a stack of waffles; but lunch is generally the same. Sometimes I add chips or a big cookie. Dinner’s always different. Last night I had spaghetti.”

Griffin faced some challenges last season, including a knee injury.

“But that’s all done with now. My knee is fine. The coach lectured me about something called ‘stress fractures,’” he says, “but nothing has happened. He didn’t have to worry about me.”

The nutritionist’s nurse asks the big question: What brings Griffin here today?

“Playing college football has been a big shock,” Griffin says. “I push myself harder than I have ever done in my life. My body’s just under a lot of stress. I mean, in high school, you’re player number one. You get drafted to a good college team, though, and boy, you find you’re struggling not to be on the bottom. Here, everyone was the best player in his high school. So pressure and competition and training are extra tough.”

“Eating is different too. At home, my mom let me eat what I wanted when I wanted, as long as I took my turn doing the dishes,” he laughs. “But here, some of our senior teammates have been teaching us how to load carbs. Recently some weird stuff has been happening to me, so my coach said I should talk to a dietitian.”

  1. “We eat a lot,” Griffin says, “so we can bulk up; but recently, I’ve been kind of worried that I was going to get fat. My mom saw how much more I was eating and said, ‘Honey, be careful. You don’t want to get fat. What happens if you ever stop working out?’ That made sense to me. So I kept up the high carb intake but reduced my daily intake to 1600 kcal to avoid looking fat. I want to look bulked up, yeah, but not fat, for NFL recruiters. Coach got on me last time I did that, so this time I just didn’t tell him. I do all right. It’s not like I’m starving myself. This week, though, I got weak and kind of, I don’t know, I didn’t have any energy. How many calories is enough, and what’s too much?” How would you answer Griffin?
    1. Griffin mentions that some senior teammates are teaching the newer players how to “load carbs.” What advice might you give Griffin about this practice? How many carbs are good for players such as Griffin?

In: Nursing

Which clients would be at risk for developing nonthrombocytopenic purpura? Select all that apply. A. Child...

Which clients would be at risk for developing nonthrombocytopenic purpura? Select all that apply.

A.

Child adopted from India and displaying malaise, lethargy, and petechiae all over the body associated with suspected scurvy.

B.

73-year-old client admitted with concussion that resulted from a fall

C.

55-year-old client diagnosed with Cushing disease displaying bruises, weight gain with a buffalo hump, and "moon" face

D.

15-year-old with insulin-dependent diabetes who has hypoglycemia and is displaying irritability with headaches and tachycardia

E.

Pregnant mother experiencing headaches and proteinuria

Misinterpreting her physician's instructions, a 69-year-old woman with a history of peripheral artery disease has been taking two 325 mg tablets of aspirin daily. How has this most likely affected her hemostatic status?

Irreversible acetylation of platelet cyclooxygenase activity has occurred.

The client's prostaglandin TXA2 levels are abnormally high.

She is at risk of developing secondary immune thrombocytopenic purpura (ITP).

The binding of an antibody to platelet factor 4 produces immune complexes.

A client visited his health care provider after finding an enlarged lymph node along the mediastinal border. The health care provider may be alerted to a possible diagnosis of Hodgkin lymphoma (HL) based on the client having which other clinical manifestations? Select all that apply.

A.

Yeast infection in the mouth

B.

Night sweats

C.

Unexplained pruritus

D.

Joint swelling

E.

Sore throat with pustules on tonsils.

The nurse is caring for a client who develops a paroxysmal supraventricular tachycardia. Which medications should the nurse prepare to administer? Select all that apply.

A.

Adenosine

B.

Diltiazem (Class IV)

C.

Lidocaine (Class 1B)

D.

Metoprolol (Class II)

E.

Amiodarone (Class III)

You note eosinophilia on the client's laboratory results. You should interview the client about a history of which conditions? Select all that apply.

A.

Asthma

B.

Exposure to parasites

C.

Allergic reactions

D.

Viral infection

E.

Bacterial infection

A surgeon is explaining to the parents of a 6-year-old boy the rationale for the suggestion of removing the boy's spleen. Which teaching point would be most accurate?

A.

"We believe that your son's spleen is causing the destruction of many of his blood platelets, putting him at a bleeding risk."

B.

"Your son's spleen is inappropriately destroying the platelets from his blood and needs to be removed."

C.

"Your son's spleen is holding on to too many of his platelets so they're not available for clotting."

D.

"We think that his spleen is inhibiting the production of platelets by his bone marrow."

A 78-year-old male client has undergone a total knee replacement. He just doesn't feel like getting out of bed and moving around. After 3 days of staying in bed, the physical therapist encourages him to get out of bed to the chair for meals. He starts to complain of dizziness and lightheadedness. These symptoms are primarily caused by which pathophysiologic principle? Select all that apply.

A.

Client is experiencing a reduction in plasma volume.

B.

Peripheral vasoconstriction mechanism has failed.

C.

Client is so stressed that he is releasing too many endorphins.

D.

Client is still bleeding from the surgical procedure.

E.

Client has loss all of his muscle tone.

From the current health histories, which client(s) is at risk for developing secondary forms of immune thrombocytopenic purpura (ITP)? Select all that apply.

A.

Female client in the first trimester reporting abdominal cramping

B.

Middle-aged client scheduled for gastroscopy to confirm Helicobactor pylori

C.

Former IV drug user recently diagnosed with hepatitis C virus

D.

Older adult female undergoing testing for cause of joint discomfort

E.

Adolescent admitted for facial burns when the "vape" (cigarette) exploded in the mouth

In: Nursing