Free Essay

Computer E

In: Computers and Technology

Submitted By alexeiavaughn
Words 390
Pages 2
Alexeia Vaughn
Ms. Gresham
September 15,2012

Diabetic Educator In today’s society I have slowly learned that in order to have a nice future of at least what you want you need to decide on a career rather than a job. In order to pick a career that you would enjoy there are many different things you have to think about before you choose. As a little child I knew that I always wanted to work with people regardless of age doing something in the medical field. I have researched and decided that I want to become a diabetic educator / endocrinologist .I was diagnosed with diabetes at the age of nine and I have been through all the ups and downs that come along with disease and learned over the years that you can still live a normal life with diabetes yes it can be hard but you can get through it . I learned this through my endocrinologist and id like to help some other teens realize this.
A diabetic educator is a health care professional who teaches people who have diabetes how to manage their diabetes. Some diabetes educators are certified diabetes educators (CDEs). Diabetes educators are found in hospitals, physician offices, managed care organizations, home health care, and other settings, a person who shows people with diabetes how to test, record, and control blood sugar; how to make good choices about nutrition and physical activity; and how to prevent and treat problems associated with diabetes. Because the experience of living with diabetes is individual and each person and family living with diabetes is unique, diabetic educators have come to expect the unexpected and have shared learning experiences with their patients as new technology provides interesting and innovative ways to combat diabetes, its complications, and side effects of its treatment.‎ I learned that diabetic educators / endocrinologists don’t only work with patients who have diabetes but treats diseases of the glands, which include, pancreas, thyroid, adrenals, ovaries, testes and hormonal disorders, including, obesity, infertility, conditions resulting from insufficient or too much hormones. They also treat certain cancers of the glands. There are many different challenges that I would have to face being a diabetic educator , many of the hospitals are cutting down on their diabetic education programs because one they are costly and also the patients are uninterested . Also diae…...

Similar Documents

Free Essay

Computer

...well-networked infrastructure, use of internet, use of open-source software, e-banking, e-commerce and e-governance. Of late the phrase "Digital Bangladesh" has been much talked about especially during the election campaign of the political parties targeting the ninth parliamentary election. On the eve of the election, Bangladesh Awami League, one of the major political parties, first declared vision 2021 with the aim to turn Bangladesh into a digital country by the next decade. More than a month ago, the Bangladesh Computer Council also organized a computer fair with the theme "Digital Bangladesh". It refers to an e-state where all its activities of governance, commerce, education, agriculture etc will be powered by computer and internet. Different analyses of the electoral results have revealed that the young generation who consist of more than one third of the voters had indeed brought this overwhelming victory for AL. With many other reasons, implicitly it can be inferred that voters of this generation while exercising their franchise considered party manifestos seriously. Presumably the visionary approach of AL's manifesto, entitled 'a charter for change' might have allured the young voters much, especially it's 'Vision 2021' which envisions 'Digital Bangladesh'. To cherish such a dream is easy, but it is too much difficult to materialize this dream. Land phone, mobile, computer, laptop, e-magazine and diary, e-book reader and many more tools of information......

Words: 1210 - Pages: 5

Free Essay

Computer

...Computer Fundamental What Is Computer? Kw¤úDUvi wK? Computer kãwUi mvaviY A_© n‡”Q MYK hš¿| j¨vwUb kã Compute †_‡K Bs‡iRx Computer k‡ãi DrcwË| Compute kãwUi A_© MYbv ev wnmve wbKvk Kiv| Kw¤úDUv‡ii mvnv‡h¨ g~jZt †hvM, we‡qvM, ¸Y, fvM BZ¨vw` Kvhv©ejx m¤úv`b Kiv hvq| wKš‘ eZ©gvb hy‡M Kw¤úDUv‡ii eûgyLx e¨env‡ii d‡j Kw¤úDUv‡ii ms½v A‡bK e¨vcKZv jvf K‡i‡Q| †Kvb mxwgZ ms½v w`‡q Avi Kw¤úDUvi‡K MÛxe× Kiv hvq bv| Who Is The Inventor Of Computer? Kw¤úDUvi -Gi Avwe®‹viK ‡K? wewkó weÁvbx weªwUk MwYZwe` Pvj©m e¨v‡eR AvaywbK Kw¤úDUv‡ii g~jbxwZ wbav©iY K‡ib| ‰eÁvwbK cÖhwy ³i Afv‡e e¨v‡e‡Ri GB g~jbxwZ ev¯—evqb Kiv m¤¢e nqwb| ZeyI Zvui GB hyMvš—Kvix wPš—vfvebv Ges cÖ‡Póvi Rb¨ Zvu‡K AvaywbK Kw¤úDUv‡ii RbK ejv nq| 1887 mv‡j Wv³vi nvigvb n‡jwi_ Av‡gwiKvi Av`gïgvixi KvR `ª“Z m¤úv`‡bi Rb¨ Pvj©m e¨v‡e‡Ri g~jbxwZ wb‡q M‡elbv ïi“ K‡ib| c‡i 1911 mv‡j `yÕwU wfbœ ‡Kv¤úvbxi mn‡hvMxZvq wZwb KgwcDwUs, †Uey‡jwUs I †iKwW©s †Kv¤úvbx cÖwZôv K‡ib| hv c‡i wek¦ weL¨vZ IBM (International Business Machine) -G iƒcvš—wiZ nq| Computer Structure: Kw¤úDUvi Gi MVb cÖbvjxt Computer g~jZt wZbwU As‡k wef³| †hgb t 1. Input Device. D`vniYt Kx †evW©, gvDm, Rqw÷K, MÖvwd· c¨vW, ¯‹vbvi BZ¨vw`| 2. Central Processing Unit (CPU) 3. Output Device. D`vniYt gwbUi, wcÖ›Uvi, w¯úKvi cÖfw„ Z| BbcyU wWfvBm MvwbwZK hyw³ Ask -----------^----------‡m›Uªvj BDwbU --- > -----------^----------¯§„wZ GjvKv AvDUcyU wWfvBm Kw¤úDUvi I gvby‡li g‡a¨ cv_©K¨t Kw¤úDUvi I gvby‡li g‡a¨ cv_©K¨ n‡jv Kw¤úDUvi †h †Kvb Kv‡Ri djvdj AwZ `ª“Z MwZ‡Z cÖ`k©b K‡i|......

Words: 3038 - Pages: 13

Premium Essay

Me E E E

...Me e e e e e e e e e e e e e e r t y I mn m o p m n b g sd s a w w x djko a a ed fd s a Me e e e e e e e e e e e e e e r t y I mn m o p m n b g sd s a w w x djko a a ed fd s a Me e e e e e e e e e e e e e e r t y I mn m o p m n b g sd s a w w x djko a a ed fd s a Me e e e e e e e e e e e e e e r t y I mn m o p m n b g sd s a w w x djko a a ed fd s a Me e e e e e e e e e e e e e e r t y I mn m o p m n b g sd s a w w x djko a a ed fd s a Me e e e e e e e e e e e e e e r t y I mn m o p m n b g sd s a w w x djko a a ed fd s a Me e e e e e e e e e e e e e e r t y I mn m o p m n b g sd s a w w x djko a a ed fd s a Me e e e e e e e e e e e e e e r t y I mn m o p m n b g sd s a w w x djko a a ed fd s a Me e e e e e e e e e e e e e e r t y I mn m o p m n b g sd s a w w x djko a a ed fd s a Me e e e e e e e e e e e e e e r t y I mn m o p m n b g sd s a w w x djko a a ed fd s a Me e e e e e e e e e e e e e e r t y I mn m o p m n b g sd s a w w x djko a a ed fd s a Me e e e e e e e e e e e e e e r t y I mn m o p m n b g sd s a w w x djko a a ed fd s a Me e e e e e e e e e e e e e e r t y I mn m o p m n b g sd s a w w x djko a a ed fd s a...

Words: 520 - Pages: 3

Free Essay

Computer

...Computer and our life Importance of computer: Computer is an important machine in our life. Without computer our life is nothing. We need to use it in every sector of our life. What type of work sector that is we are using computer. It makes our job easier and simple. Computer creates a great opportunity for us. We are changing our life style quickly through computer. We are using it in education sector, medical sector, research and experimental job, designing, architectural designing, planning, public administration and etc. Computer changed our education system. We can learn through long distance education system. Now we do not need to go far from home to learn something. We can save our time and money by this. Without that we are able to get every service at home. Computer is also able to provide us another service. Now doctor can do operations through computer. It resumes risk for a patient. Doctors do not need to work more. Computer also helps us in research like educational, scientific, medical and etc. Really, computer is a great invention of human life. Computer and communication: ------------------------------------------------- Without helping in our work we can communicate through computer. Now-a-days computer is the powerful communication media. Generally it communicates through network and internet is the well known network system. We can talk, chat, mail through computer. We can keep contract with international community by internet. E-mail is a......

Words: 850 - Pages: 4

Free Essay

Computers

...outlined as follows: 1. Review the input, processing, output and storage requirements 2. Develop the logic for the program 3. Write the program using a programming language 4. Test and debug the program 5. Complete the program documentation What is a Program? - A program is an organized lists of instructions that, when executed, causes the computer to behave in a predetermined manner. Without programs, computers are useless. What is Programming? - Programming is instructing a computer to do something for you with the help of a programming language Identifiers Manipulation of data is a basic feature of a computer’s abilities. This data must be present in the memory (RAM) of the computer for operations to be done on it. The computer accesses this data via memory addresses. Identifiers are required to keep track of these memory addresses (receptacles, data containers). Identifiers allow us humans to give these ‘data containers’ more meaningful names. This makes the task of manipulation of data more manageable. Internally the computer sees a HEXIDECIMAL label representing the memory location, we see familiar titles / labels such as YEAR, FNAME, AGE, which we are able to put into some context. Variables are identifiers whose value can be changed within a program have the following attributes a logical name which is descriptive and useful (e.g. total_males, count, StartDate. Poor......

Words: 834 - Pages: 4

Premium Essay

Computers

...The computer is one of the most brilliant gifts of science. This device was originally developed by Charles Babbage. Most countries have developed fast due to computerization. Writing a program is essential for a computer. Speed, accuracy, reliability, and integrity are the main characteristics of a computer. Many of the routine activities today at home and in business are done by computers. The computer has proved a friend and servant of science, technology and industry. Most offices, shops, factories and industries use computers. The Internet is a storehouse of information. The computer is a boon to all. Telecommunication and satellite imageries are computer based. Computers have made the world a global village today. The computer is one of the most brilliant gifts of science. It is an electronic device for storing and analyzing information fed into it, for calculating, or for controlling machinery automatically. Charles Babbage developed this device first in 1812 followed by George Boole in 1854, Howard and Aitten in 1937, Dr. John Nouchly and J. P. Eckert in 1946. These computers were named the first generation equipment. Today, wit the 'Artificial Intelligence' technology, we are using fifth generation computers. Each new generation of computers has been smaller, lighter, speedier and more powerful than the earlier ones. Now note-book sized computers like laptop are fairly common. Computers have been dominating technology since 1970s, and has now entered almost all......

Words: 1135 - Pages: 5

Premium Essay

Computers

...1. The instructions that tell a computer how to carry out the processing tasks are referred to as computer ......... 1) programs 2) processors 3) input devices 4) memory modules 5) None of these 2. An area of a computer that temporarily holds data waiting to be processed is .......... 1) CPU 2) Memory 3) Storage 4) File 5) None of these 3. To select or unselect one word to the right 1) CTRL + SHIFT 2) CTRL + SHIFT + UP Arrow 3) CTRL + SHIFT + Down Arrow 4) CTRL + SHIFT + Right Arrow 5) None of these 4. To maximize or restore a selected window 1) CTRL + F7 2) CTRL + F10 3) CTRL + F8 4) CTRL + F9 5) None of these 5. To Copy a picture of the selected window to the clipboard 1) ALT + TAB 2) Ctrl + TAB 3) ALT + Print Screen 4) Both (1) and (2) 5) None of these 6. .......... is the key to close a selected drop - down list; cancel a comm-and and close a dialog box. 1) TAB 2) SHIFT 3) ESC 4) F10 5) None of these 7. ......... is the key we use to run the selected command. 1) SHIFT 2) TAB 3) ENTER 4) CTRL 5) None of these 8. ............ is the functional key to display save-as box. 1) F5 2) F6 3) F9 4) F12 5) None of these 9. ............ is the combination of keys to switch between the last four places that you have edited 1) ALT + CTRL + Z 2) ALT + CTRL + Y 3) ALT + TAB + Z 4) ALT + SHIFT + Z 5) None of these 10. ............ is the Keyboard shortcut key to insert auto sum 1) ALT 2) ALT= 3) ALT+ 4) ALT– 5) ALT+CTRL 11. Data becomes ................ when it is presented in a......

Words: 4753 - Pages: 20

Premium Essay

Computer

...Structure and Functions of a Computer "Hardware: the parts of a computer that can be kicked." ~ Jeff Pesis After completing this chapter, you will be able to: 1. Explain the importance of computer literacy. 2. Define the term computer. 3. Identify the components of a computer. 4. Compare the uses of various types of: input devices, output devices, and storage devices. 5. Describe categories of computers and their uses. Structure and Functions of a Computer 1 1.0 Introduction A computer is an electronic machine designed for the storage and processing of data. The machinery is called hardware, and this highly sophisticated equipment needs equally sophisticated programs (called software) to become a working computer system. Modern society has come to depend very heavily on the use of computer systems. Banks, businesses, government departments, industries, shops, people at home and school all rely on computer to play a vital role in their daily activities. These activities are centered on information. In business, the computer system has been used a lot and replaced filing cabinets as means of storing information, and clerical workers as a means of processing it. By storing and processing information on a computer system, these businesses can function more quickly and efficiently, because information can be found and collated much faster. Discovery Learning: A computer was also called a data processor. Why? 1.1 Major Parts and Functions A Computer is an......

Words: 47755 - Pages: 192

Premium Essay

Computer

...Computer crime Computer Crime Definition A computer crime is any illegal action where the data on a computer is accessed without permission. This access doesn't have to result in loss of data or even data modifications. Arguably the worst computer crime occurs when there are no indications that data was accessed. Computer crime is often attributed to rogue hackers and crackers, but increasingly organized crime groups have realized the relative ease of stealing data with relative low-level of risk. Government organizations are also rumored to be involved with hacking in to computer systems, but the legality of such actions is far too grey an area to be discussed here. Computer crime, or cybercrime, refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime.[1] Netcrime refers, more precisely, to criminal exploitation of the Internet.[2] Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise. On the global level, both governments and non-state actors continue to grow in importance, with the ability to engage in such activities as espionage, financial theft, and other cross-border crimes sometimes referred to as cyber warfare. The international legal system......

Words: 7299 - Pages: 30

Premium Essay

Computer

...Computer Animation and Technology University of Maryland University College 1433 words Computer Animation and Technology Computer animations have been a great source of entertainment for along period of time. They have recently been introduced in the educational sector as a learning tool. Those who have constantly enjoyed computer animation can also benefit from the technology by using the video games as a learning tool. There are two main genres of computer video games, such as RPGs and role playing games. Most of these games are structured in a way that the players or player need to complete a certain task. It is also required that the participant to engage with the other quests or characters to be in a position to win the game for him or her self or for the team. In most computer video games there are two to eight participants. Though a single participant may be able to fight or play at a time, there is need for skills and experience to win these games. The characters to play in a single game may be fictional, present or available through online RPGs. Online RPGs is supported by MMORPGs (Massive Multiplayer online RPGs) which make it possible for people to interact all over the world to act as custom characters and interact in playing a world video game. In strategy games the player assists in controlling several characters with an aim of directing the characters to defeat, weaken another party or complete a mission.......

Words: 1449 - Pages: 6

Free Essay

Computer

...University of Bahri Collage of computer science and information technology Subject is Artificial Intelligence Assignment no (1) Topic is Chapter 1 Presented by : Alrasheed Alsadg omer abdalla Class three EXERCISES These exercises are intended to stimulate discussion, and some might be set as term projects. Alternatively, preliminary attempts can be made now, and these attempts can be reviewed after the completion of the book. 1.1 Define in your own words: (a) intelligence, (b) artificial intelligence, (c) agent, (d) rationality, (e) logical reasoning. 1.2 Read Turing’s original paper on AI (Turing, 1950). In the paper, he discusses several objections to his proposed enterprise and his test for intelligence. Which objections still carry weight? Are his refutations valid? Can you think of new objections arising from developments since he wrote the paper? In the paper, he predicts that, by the year 2000, a computer will have a 30% chance of passing a five-minute Turing Test with an unskilled interrogator. What chance do you think a computer would have today? In another 50 years? 1.3 Are reflex actions (such as flinching from a hot stove) rational? Are they intelligent? 1.4 Suppose we extend Evans’s ANALOGY program so that it can score 200 on a standard IQ test. Would we then have a program more intelligent than a human? Explain. 1.5 The neural structure of the sea slug Aplysia has been widely studied (first by Nobel Laureate Eric Kandel) because it has only about......

Words: 1034 - Pages: 5

Free Essay

Computers

...by the fastest-growing computer virus in history. Worldwide systems were buckling after the 'Sobig.F' spread to 134 countries in just 96 hours, generating tens of millions of e-mails. Experts fear it could increase the volume of electronic traffic by a staggering 60per cent, slowing the internet to a crawl. It is believed to have cost British businesses alone hundreds of millions in lost orders and system crashes. The global cost will be immense. Individual companies have been bombarded with millions of copies of the virus, while home users have seen their machines "jammed" by up to 6,000. The PC World chain said tens of thousands of customers had brought in computers to be "cleaned" by technicians. Experts say Sobig appears to have been written by senders of "spam" - unwanted junk e-mail - trying to find ways past internet filters which block their messages. The new digital onslaught comes hard on the heels of two other major viruses, Blaster and Nachi. "This is the worst barrage of viruses in the history of computing," said Graham Cluley of Sophos Anti-Virus. "Even companies who are properly protected are feeling a slowdown. "Sobig. F is the fastest-spreading virus of all time and if it carries on at this pace for a few more days it will become the most prevalent too." MessageLabs, a British-based Internet security firm, said it had intercepted more than a million copies of Sobig.F in 24 hours, more than for any other virus. One in 17 of all e-mails sent since......

Words: 506 - Pages: 3

Premium Essay

Computer

...ASPECTS OF COMPUTER L I T E R A C Y Violence and Technology, are never good bed fellows. 1 2 6/6/2013 Aspects of computer literacy What is a computer?      what are its limitations what is a program (not necessarily how to program) what is a known as hardware? What is known as software? what a computer can and cannot do How computer illiterate am I?  3 6/6/2013 Aspects of computer literacy One problematic element of many (though not all) "computer literacy" or computer education programs is that they may resort too heavily on rote memorization. Students may be taught, for example, how to perform several common functions (e.g.: Open a file, Save a file, Quit the program) in very specific ways, using one specific version of one specific program. 1 06/06/2013 4 6/6/2013 Aspects of computer literacy When a graduate of such a program encounters a competing program, or even a different version of the same program, they may be confused or even frightened by the differences from what they learned. 5 6/6/2013 Aspects of computer literacy This is one reason why major computer and software firms such as Apple Computer and Microsoft consider the educational market important: The often time-limited computer education provided in schools most often lends itself to note memorization, creating a sort of vendor lock-in effect whereby graduates are afraid to switch to competing computer systems. 6 6/6/2013 Aspects of......

Words: 2401 - Pages: 10

Premium Essay

Computers

...In: Computers and Technology Computers Sergio Malone Chapter 1 Check Your Understanding Which of the following statements accurately describe differences between a LAN and a WAN? (Choose two) Companies can use a WAN to connect remote locations, and a LAN can make a local connection in a building D. Only WANs require a CSU/DSU to be used on the ends of the cable. Network professionals belong to organizations that plan and define standards used in networking. Which of the following are recognized industry organizations? (Choose two) A. IETF C. ISO D. EIA F. ITU Which of the following are true about a router? (Choose three) A. Routers enable different IP networks or IP subnets to communicate with each other. C. Path selection is one of the main functions of a router E. Routers have a central processing unit and memory. Which of the following are main components of a router? (Choose three) A. ROM B. Flash memory E. RAM Which of the following statements describe the function of RAM in a router? (Choose two) C. RAM stores the current configuration information. E. RAM stores routing tables for the router. Which of the following statements are true about DTE? (Choose two) C. DTE usually resides on the customer’s premises D. DTE is an acronym for data terminal equipment. Which of the following statements are true about DCE? (Choose two) B. DCE provides clocking to the DTE. C. DCE is an acronym for data circuit-terminating......

Words: 456 - Pages: 2

Premium Essay

Computer

...Hardware Theft and Vandalism Hardware theft and vandalism are other types of computer security risks. Hardware theft is the act of stealing computer equipment. Hardware vandalism is the act of defacing or destroying computer equipment. Hardware vandalism takes many forms, from someone cutting a computer cable to individuals breaking into a business or school computer lab and aimlessly smashing computers. Companies, schools, and other organizations that house many computers are at risk of hardware theft and vandalism, especially those that have smaller system units that easily can fit in a backpack: briefcase. Mobile users also are susceptible to hardware theft. It is estimated that more than 600,000 notebook computers are stolen each year. The size and weight of these computers make them easy to steal. Safeguards against Hardware Theft and Vandalism To help reduce the chances of theft, companies and schools use a variety of security measures. Physical access controls, such as locked doors and windows, usually are adequate to protect the equipment. Many businesses, schools, and some homeowners install alarm systems for additional security. School computer labs and other areas with a large number of semi-frequent users often attach additional physical security devices such as cables that lock the equipment to a desk, cabinet, r floor. Small locking devices also exist that require a key to access a hard disk or optical disc drive. Some businesses use a real time location...

Words: 3217 - Pages: 13

Kokoro Botan | Wilk morski / Sea Wolf | Kwok Cheung Tsang