Nt1310 Week 5 Assignment

Great Essays
This Week Five Assignment will focus on the components of the neuroscience aspects topic of the Post-traumatic Stress Disorder (PTSD). I will include the causes of it which is the theories of etiology. I will also review how the factors develops it’s genetic, environmental, familial or lifestyle. I will analyze the pathology, including genetics and biochemical aspects. Then, having to diagnose the research technologies on PSTD. Thesis: Having to analyze neuropsychological disorder, including epidemiology, the risk factors, the natural history of the condition, diagnostic methods, treatment options, nervous system structures and pathology, and neurotransmitter systems relating to the PTSD disorder. Therefore, the brain matters, it plays a role in behaviors and need to know the level of analysis. The types of of disorders are neurology, psychological disorder and neuropsychological disorder. Neurology is a disorder involving diseases that connect with brain, spine and nerves which body nervous system. The examples are many diseases; one of them is “neurological problem or remove a brain tumor at surgery” (Wilson, 2014, Sec. 8.1). An example on how Neurology …show more content…
Some examples of the risk factors would be environmental such as military personnel that exposed to traumatic events. Some risk factors can be: genetics, lifestyle and environmental factors. Sometime genes could affect a person because a personality gain from some of their family could be with someone who has PTSD, then cause someone with perhaps say a sensitive personality but, when it’s crushed they have a traumatic break down. The lifestyles of people with PTSD could put people at risk because sometimes people who get reminded of things from their past can cause danger towards others. Based on someone’s environment and past it could affect someone with PTSD because it could trigger some type of flashback from a bad memory or traumatic time in someone’s

Related Documents

  • Improved Essays

    On october 12, 2015 at or about 1102 hours i was dispatched to 1735 east young circle (publix supermarket), hollywood florida, in reference to a cellphone being taken. Upon further investigation it was later found that the cellphone would equal the amount to grand theft (over $300.00usd). Let it be also noted during the time of this investigation, i was working an off-duty detail at the above location. Upon arrival i made contact with the james othman, herein after referred to as the victim. The victim advised me that at approximately 1051 hours his phone was taken from the customer service counter (located at the south side of the store).…

    • 587 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Due to the age of the existing equipment, four new Cisco Catalyst 3560 V2 24 port switches will be use and configure for network redundancy by connecting each switch in a multiple links, single IP address with routing protocol Border Gateway Protocol (BGP). This multi-homing will detect when one of the links fail and not send traffic over that link anymore until the issue is resolved. This redundancy configuration will meet Western County Bank management requirement reducing unplanned outages and regular maintenance performed on the network equipment supporting 10 GB links as well as static or LACP-based (link aggregation control protocol) network interface controller (NIC) teaming. The Time Warner Cable, Business, Dedicated Internet Access, and AT&T Uverse Business Internet service will provide redundancy to the Internet…

    • 452 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Ilab 5 jerry Metcalf Keller Graduate School of Management Professor: Gregory Gleghorn 6/4/2017 VPN Connection The type of VPN connection solution that we will be using to connect user to the internet work will be the Cisco Any connect client and the RSA secureID. We will be going in to detail of how the connection process goes and also how to configure it. Both clients are required in order for the user to authenticate and connect to the company network. When the user is connected they will be able to do their job remotely and send and retrieve information remotely.…

    • 678 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Assignment 3

    • 1039 Words
    • 5 Pages

    Group I, Category 19 Incorrect RFC Decision ISSUE DDS proposed a denial determination. The evidence in file supports a more restrictive RFC, as a result, additional vocational documentation is required. CASE DISCUSSION & POLICY ANALYSIS (INCLUDING SPECIFIC REFERENCES) This 57-year old is filing a DIB claim alleging disability due to loss of right eye, COPD, high blood pressure, edema of both legs and feet, back surgery, weight gain, depression, and neuropathy, as of 10/22/2014.…

    • 1039 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Introduction The current information technology (IT) infrastructure consists of a mix of 2008 and 2008 R2 servers, with two legacy Windows 2000 servers, and four Windows Server 2012. In addition to the Windows server environment, the network consists of routers, switches, and security appliances, such as firewalls. The environment also consists of important services to ensure the security, and stability of the network.…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Charline Marcelle Unit 3 Assignment 1 Capella University Professor: Angela Wu Marketing Segments The drive behind marketing segments is to allow the marketing folks to concentrate on the subject and perspectives of their products. When marketing segments are done properly it helps ensure the highest return. This all depends on the sale of the product and the types of buyers for the product. A lot of companies mold their marketing segments by using results of analysis and research.…

    • 763 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Professor Doupé, Thank you for your reply, and for your questions. We are excited to potentially have your guidance in our research, and hope we have provided clear explanations to your questions below: 1. SSL/TLS encryption secures data flowing between client and server. Using SSL during an authentication attempt could provide a secure way for a non malicious server to authenticate with the device, while blocking out sign in attempts from malware. 2.…

    • 682 Words
    • 3 Pages
    Decent Essays
  • Superior Essays

    Nt1330 Unit 3 Assignment 1

    • 1006 Words
    • 5 Pages

    Create new scope of server, Assign scope name and description. Now define a range of IP address, start and end date Now use any excusive address that is server IP address Now select lease duration, now configure DHCP [3] options now Insert router IP address which is 192.168.1.1 in my case, press next---> Next--->activate scope now--->then finish 5) Roaming Profile [4]: For creating of centrally profile [4] of all domain users’ roaming profile [4] is use. In roaming profile we simply share and folder and assign it to all authorized domain user.…

    • 1006 Words
    • 5 Pages
    Superior Essays
  • Decent Essays

    Great news! In an effort to increase security, we have decided to add a layer of security with new technology called PhoneFactor. PhoneFactor allows you to authenticate to our network using only your network login credentials and your phone. Please take 5 minutes to configure your PhoneFactor account now. Visit the link and follow the instructions listed below under What do I need to do to begin using PhoneFactor?…

    • 429 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    ¥ 1. An IP address is an identifier for devices on a TCP/IP network. Usually, an IP address could be assigned using a 32-bit numeric address written as four numbers separated by periods. Each number can go from being zero to 255. For example, 1.160.10.240 could be an IP address.…

    • 611 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 3 Assignment 1

    • 1044 Words
    • 5 Pages

    Additionally, when remote workers are employed by organizations it is important to provide the employee with a secure connection to the network and server. By using a VPN, the establishment of a safe connection can ensue. For example, when buying locks to keep homes or businesses safe there is a different key for every lock. This means like keys; the VPN establishes a secure connection that does not allow for intrusions to occur by using the Internet (Stewart 19). The remote connection is established by using a tunneling protocol which adds security by encrypting data.…

    • 1044 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Describe the responsibility of the medical office specialist to protect all protected health information (PHI). Here are my thoughts based on all that I have learned in this program over past few months. The medical office specialist (MOS) has a legal responsibility/duty to maintain the security of protected health information (PHI). The sharing of PHI is controlled by the privacy rule contained in HIPAA.…

    • 957 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    1. As per my knowledge, students can --> contact the Student Help Desk by phone at 610.372.4721 ext. 5171, or by email at helpdesk@racc.edu and they will get help, or --> go to this website https://myracc.racc.edu/cas/login?service=https:%2F%2Fmyracc.racc.edu%2Fc%2Fportal%2Flogin and upon clicking on "Forgot Password", they should enter their username and click "OK". To reset the password, they should enter their username.…

    • 410 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Hello Mrs. Brannen, Brooklyn is so excited to be in your class this year and starting her first year with GCA! I had a few questions I was wondering if you could answer or direct me to the person I need to speak with. I spoke with the Lead Kindergarten teacher a few weeks ago about moving Brooklyn up in math and adding her to the Latin course. The lead teacher sent Brooklyn's information over to the Advanced Learner Teacher and said she would be in contact with me but I haven't heard anything from her. Brooklyn has already completed a kindergarten curriculum, Sonlight Core A, Handwriting without tears K, Singapore Math K and Latin though a co-op.…

    • 460 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Thesis Statement For PTSD

    • 1131 Words
    • 5 Pages

    Thesis Statement: PTSD can be caused by going through a traumatic, life-changing event and can result in reliving the experience, not communicating with those around you, being on edge due to the “stressors” of life, one’s way of thinking to be molded based on the experience, or even physical damage to one’s body. Bassett, Deborah, Dedra Buchwald, Spero Manson. “Post-traumatic Stress Disorder and Symptoms among American Indians and Alaskan Natives: A Review of the Literature.” Social Psychiatry & Psychiatric Epidemiology. Vol.…

    • 1131 Words
    • 5 Pages
    Great Essays