Thursday, January 30, 2020

Health & Social Care Essay Example for Free

Health Social Care Essay Ai Identify four key pieces of Legislation and Codes of Practice relating to handling information in social care setting. 1). Data Protection Act 1998 Gives rights to individuals in respect of personal data held about them. It also seeks to protect individuals with regard to the processing of personal data. 2). Freedom of Information Act 2000 The Freedom of Information Act gives you the right to ask any public sector organisation for all the recorded information they have on any subject. Anyone can make a request for information – there are no restrictions on your age, nationality or where you live. If you ask for information about yourself, then your request will be handled under the Data Protection Act. 3). Employees Policies Procedures To make sure that all records that are kept in the office are put away in a locked secure cabinet. And when you write out the daily report sheet in the Care Plan Book, make sure that the Care Plan Book is closed and not left open. 4). Health and Social Care Act 2008 requires us to publish a code that sets out the practice we will follow in obtaining, handling, using and disclosing confidential personal information. Aii Explain how legal requirements and codes of practice affect the day to day work of a social care worker in relation to handling information. It is important to follow the codes of practice in everything you do in your day to day work. For example, I personally had a situation a while ago where my regular service user was in hospital for a couple of months, and a friend of Mr Ts approached me and asked if I could give her the key safe code so she could go into to his property and clean round and get him some shopping. I told her that I could not give her Mr Ts key safe code as it is my duty of care not to give out any information that was entrusted to me. And if I gave it to her then I would be breaking the codes of practice and my employees policies and procedures.

Wednesday, January 22, 2020

National Science Foundation Pre-doctoral Fellowship Essay -- Medical E

National Science Foundation Pre-doctoral Fellowship Biotin is an essential vitamin for humans; it must be included in infant formulas and in fluids for intravenous nutrition. Even though it is a necessary component of our diet, we do not yet know the mechanism by which biotin, also known as vitamin H, is synthesized in the body from dethiobiotin. The enzyme that accomplishes this conversion has been termed biotin synthase. This enzyme catalyzes the insertion of sulfur at nonactivated positions of dethiobiotin, between carbons C1 and C4, to generate biotin. This mechanism is of interest because it appears to involve uncommon chemistry and because of the commercial value of the product. Biotin is sold as a pharmaceutical and as a food and cosmetic additive. This water soluble vitamin is essential for the growth and well-being of animals and humans, and it is used in the formation of fats the utilization of carbon dioxide. Prof. Richard H. Holm's bioinorganic chemistry class sparked my interest in the understanding of enzyme mechanisms as model systems for the design of more selective drugs and better synthetic catalysts that allow us to run reactions with good yield, little waste, and inexpensively. Having worked for two years with Prof. JoAnne Stubbe on the mechanism of nucleotide reduction in E. coli by ribonucleoside diphosphate reductase, I have come to appreciate the positive effects of an understanding of this mechanism in the synthesis of more efficient drugs for the treatment of cancer and viral diseases. Increased knowledge of the biotin biosynthase mechanism should allow us to produce biotin more efficiently, and the knowledge gained from this mechanism could be applied to similar enzymes. Despite recent advan... ...should aid me in designing more successful experiments. Works Cited 1. Sanyal, I., G. Cohen, and D.H. Flint. (1994) Biochemistry 33, 3625-3631. 2. Birch, O.M., M. Fuhrmann, and N.M. Shaw. (1995) J. Biol. Chem. 270, 19158-19165. 3. Sanyal, I., K.J. Gibson, and D.H. Flint. (1996) Arch. Biochem. Biophys. 326, 48-56. 4. MÃ ©jean, A., B. Tse Sum Bui, D. Florentin, O. Ploux, Y. Izumi, and A. Marquet. (1995) Eur. J. Biochem. 217, 1231-1237. 5. Frappier, F., M. Jouany, A. Marquet, A. Olesker, and J.C. Tabet. (1982) J. Org. Chem. 1982, 2257-2261. 6. Parry, R.J. (1983) Tetrahedron 39, 1215-1238. 7. Parry, R.J. and M.G. Kunitani. (1979) Methods Enzymol. 62, 353-370. 8. Trainor, D.A., R.J. Parry, and A. Gitterman. (1980) J. Am. Chem. Soc. 102, 1467-1468. 9. Baldet, P., H. Gerbling, S. Axiotis, and R. Douce. (1993) Eur. J. Biochem. 217, 479-485.

Tuesday, January 14, 2020

Questions on Computer Basics and Software

No. of Printed Pages : 4 BACHELOR IN COMPUTER APPLICATIONS (BCA Revised) Term-End Examination cV 00 June, 2012 BCS-011 BCS-011 : COMPUTER BASICS AND P C SOFTWARE Time : 3 hours Maximum Marks : 100 Weightage : 75% Note : Question number 1 is compulsory and carries 40 marks. Attempt any three questions from the rest. (a) Convert the following hexadecimal number to equivalent binary and decimal : (i) (ii) (b) (51)16 (DA)16 5 4 1. How is the access time on a disk is defined ? Explain each of the component of access time with the help of an example. Explain the basic structure of a computer system ? With the help of a diagram .A personal computer has a component called motherboard. How is motherboard related to the basic computer structure ? (c) 6 BCS-011 1 P. T. O. List five facilities that are provided by an operating system to a user or to a program. Draw a flow chart to add integer between 2 to (n+1) where n>2. Explain the terms : Subroutine and function with the help of an example. C onsider two IP addresses 160. 10. 11. 25 160. 10. 12. 35 Do they belong to the same network , if (i) The subnet mask is 255. 255. 0. 0 (ii) The subnet mask is 255. 255. 255. 0 Justify your answer. (h) What is a Wide Area Network (WAN) ? What are the characteristics of WAN ?How are they different from LANs ? Is Internet a WAN ? Justify your answer. What is the need of memory hierarchy in a computer system ? Explain with the help of various trade offs like cost, speed, size etc. What is perverse software ? List various types of perverse software. Give four ways to counter perverse software. What are cookies in the context of Browser software ? Are cookies bad ? Explain. List four precautions for safe browsing. BCS-011 2 7 6 8 6 3. (a) Compare and contrast the characteristics of the following : (i) (ii) (b) Dot matrix printer versus Laser printer Cathode ray tube monitors versus liquid crystal display monitors. (c) â€Å"Latest word processor have text 8 manipulation functions that ex tend beyond a basic ability to enter and change text † . Explain any four of these advanced text manipulation functions. 6 Explain the characteristics of the following data transmission channels : (i) (ii) Optic fiber cables Radio waves (iii) Infrared 4. (a) List six activities that should be part of an e-learning system. Explain the phases of content development in e-learning. (b) Compare and contrast the following : (i) (ii) SRAM versus DRAM SIMM versus DIMM 6 8 (iii) ROM versus PROM (iv) CD-ROM versus Pen – drive. c) What is Open Source Software ? What are the main features of open source development model ? BCS-011 3 6 P. T. O. 5. Explain any five of the following with the help of an example/diagram, if needed. (i) (ii) The uses of WIKI in collaboration. The activities/actions performed by a search engine. 20 (iii) TCP/IP model. (iv) (v) (vi) Activities in a project management software. Batch systems and time sharing operating systems. Different types of parts in a computer. (vii) Concept of Instruction ; and motivation for development of UNICODE. BCS-011 4

Monday, January 6, 2020

Managing Cultural Diversity An Organization - 2226 Words

Managing cultural diversity workplaces are a challenge that has the potential to influence organization positively or negatively. People are an organization’s most important key of assets and knowing how to maximize their abilities is critical to success. Utilizing diversity and acknowledging, appreciating will help build the resources that business needs to be successful now and in the future. Australia has seen dramatic changes in the structure of its workplace. Now made up of women, immigrants, and minorities are increasing percentage of workplace. In addition to these workers, who speak variety different languages, approaches to work, and have varying customs, the population is also getting older, requiring people who are from†¦show more content†¦There is no accurate definition of multiculturalism . According to Koleth in Australia, Multiculturalism has served a variety of objectives over the years, including, the pursuit of social justice, appreciation of di versity and the recognition of identities, the integration of migrants, nation building, and attempts to achieve and maintain social cohesion.’ The Keating government was particularly focused on linking multiculturalism to the Australian value of ‘fair go’ (Koleth, 2010, p60). Multiculturalism has evolved as the dominant bipartisan policy approach to address Australia s cultural diversity since the early 1970s. Since that time momentous advances have been made in the workplaces. For example, anti-discrimination laws have been enacted. Government programs have become more sensitive to the needs of all clients, society has generally embraced diversity in the arts, lifestyles, and cuisine, and Australia government has begun to use cultural diversity for economic benefit. Australia government has also begun to appreciate how the existence of people from culturally diverse backgrounds in their society provides bridges to other countries and cultures in an increasingly global community. The review of literature is a key process of any research as it allows research to be placed in context. Equally, it does not only become familiar concepts, theories and arguments associated to the research topic. Particularly, this literature review comprises