Tuesday, January 28, 2020

Preventing Blood Stream Infections Health And Social Care Essay

Preventing Blood Stream Infections Health And Social Care Essay National Patient Safety Goals (NPSG) were introduced in 2002 in order to help address some of the issues that were responsible for causing a majority of the situations that were responsible for creating patient safety issues. These goals were implemented in order to put focus on what were deemed to be the most preventable of these issues. One of these goals is the prevention of central line-associated blood stream infections (Lyles, Fanikos, Jewell, 2009). Literature Review Central venous catheters (CVC) are indispensable in the care of critically ill patients. However, their use is not without risk. Catheter-associated bloodstream infections (CA-BSI) are common healthcare-associated infections in intensive care unit (ICU) patients and have been estimated to occur in 3%-7% of all patients with CVC (Warren, et al., 2006). It is well documented that intravascular catheter related complications are associated with extending hospital length of stay, increasing direct costs and increasing ICU mortality. Clinicians insert approximately 7 million central venous access devices (CVAD) annually in the United States, and of these, 1 in 20 is associated with a CA-BSI, despite the use of the best available aseptic techniques during catheter insertion and maintenance. Overall, an estimated 250,000 CVAD-related CA-BSI occur annually, with an attributed mortality of 12.5% to 25% per occurrence. The national cost of treating CA-BSI equals $25,000 per infection, respecti vely, or $296 million to $2.3 billion in total. While the number of CA-BSI has remained relatively steady, vascular access device use has drastically increased, especially in nonhospital settings (Rosenthal, 2006). A vast amount of research is directed toward reducing these complications in an effort to improve patient outcomes. A review of the literature provides an overview of current recommendations concerning intravascular catheter care and research regarding the use of education programs to promote recommended practice. The Centers for Disease Control and Prevention (CDC) published the Guidelines for the Prevention of Intravascular Catheter-Related Infections in 2002, which is the benchmark for all intravascular catheter care recommendations. The guidelines for CVC suggest the replacement of dressings every 7 days or when soiled or loosened, intravenous tubing changes every 72 hours, and the replacement of tubing used to administer blood products and lipid emulsions within 24 hours of infusion initiation (East Jacoby, 2005). According to the CDC, approximately 53% of adult patients in intensive care units have a central venous catheter on any given day (Rupp, et al., 2005). Skin cleansing of the insertion site is regarded as one of the most important measures for preventing catheter-related infection. Historically, povidone-iodine is an antiseptic that has been used during the insertion and maintenance of the intravascular devices. It works by penetrating the cell wall of the microorganism. More recently, chlorhexidine has been studied and found to be more effective as a skin antiseptic to prevent catheter-related infection. It works in less time, retains its antibacterial effect against flora longer, is not inactivated by the presence of blood or human protein, and causes minimal skin irritation. Chlorhexidine works by disrupting the microbial cell wall. It is active against many gram-positive and to a slightly lesser degree gram-negative bacterium (Astle Jensen, 2005). A multistep process is recommended to prevent CA-BSI that includes: educating staff, using maximal barrier precautions (e.g. a sterile gown and gloves, mask, cap, and large sterile drape), performing infection surveillance, and replacing occlusive dressing every 7 days or when needed (Buttes, Lattus, Stout, Thomas, 2006). Other strongly recommended practices include proper hand hygiene, use of chlorhexidine gluconate for insertion site preparation, and avoidance of routine catheter changes. Catheters impregnated with antimicrobial agents are recommended when infection rates are high or when catheters will remain in place for a considerable time (Krein, et al., 2007). Education of staff on the proper care of CVC is paramount in reducing the amount of CA-BSI. This is perhaps one of the most cost-effective methods of reducing CA-BSI (Ramritu, Halton, Cook, Whitby, Graves, 2007). Implementation A staff education program was initiated for the nursing personnel that primarily deal with CVC. This education program was aimed at training the ICU and step-down unità ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢s nursing staff proper care and maintenance of the CVC. Education focused on proper care of the CVC, including when dressing changes should be performed e.g. every 7 days or when the dressing is soiled. Nurses were also trained in how to appropriately assist with CVC placement and the documentation tool that infection control utilizes to evaluate adherence to insertion guidelines. Posters were also placed in the nurseà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢s break and conference areas that had educational material related to proper care of CVC. Documentation was also placed in the physicianà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢s lounges that encouraged utilization of maximal barrier precautions during CVC insertion. The facility that was observed currently utilizes a few different means of measurement with regards to CA-BSI. First, a checklist is utilized during CVC insertion that evaluates adherence to insertion guidelines by the staff. This checklist is sent to infection control and entered into a database which is correlated with patient data regarding CA-BSI. Second, in patients that are identified as having a CA-BSI, after catheter removal, laboratory microbiological studies of the catheter, blood, and insertion site swabs are performed to identify causality of the infection. Implementation Compared to Literature Suggestions Practices that reduce the risk of CA-BSI include the following: (1) use of maximal barrier precautions during CVC insertion (i.e., a surgical mask, sterile gown, sterile gloves, and large sterile drapes), (2) placement of the catheter in the subclavian vein rather than the internal jugular or femoral vein, (3) changing catheters only when necessary, and (4) changing dressings on CVC exit sites when they become nonocclusive, soiled, or bloody. These practices have been incorporated into national guidelines. Currently, the Healthcare Infection Control Practices Advisory Committee (HICPAC) of the Centers for Disease Control and Prevention (CDC) recommends that hospitals implement comprehensive educational programs that teach proper CVC insertion and maintenance techniques (Warren, et al., 2006). These practices are mostly in line with what is implemented at the observed facility. One difference, which is not in line with these recommendations, is that the observed facility has a high nu mber of internal jugular insertions rather than utilizing the subclavian vein. When asked about this, many of the physicians stated that access was easier to identify utilizing ultrasound during insertion and they preferred this method over subclavian insertion. Recommended Changes First, implementation of an education program for providers that is focused on infection control, especially the recommendation of utilizing the subclavian vein insertion for CVC placement as a first choice in patients that have no contraindications to this placement. Second, procuring the second-generation antiseptic catheter, coated with chlorhexidine and silver sulfadiazine on the internal and external surfaces, to more effectively prevent microbial colonization in patients that are identified as being at risk. Decreased bacterial colonization, a critical step in the pathogenesis of catheter-associated infection, may correlate with prevention of catheter-related bacteremia (Rupp, et al., 2005). Third, education and training needs to be expanded to any nurses that may be responsible for caring for a patient with a CVC. These areas include non-critical care areas such as pediatric and medical floors. Larger numbers of patients with CVC are now found in non-ICUs than in ICUs and that CA-BSI rates in those settings are higher. Catheter types and insertion sites vary greatly among settings. For example, jugular and femoral insertion sites are common in ICUs; subclavian and peripheral sites are more common elsewhere. So strategies for reducing CA-BSI must be tailored to the setting (Hadaway, 2006).

Monday, January 20, 2020

MANAGEMENT :: essays research papers

Building Blocks Known as the 4th largest standing natural gas distributor, Southern Union Gas serves nearly 1.5 million customers Nationally, and Internationally, for over 50 years. They have four divisions in the United States, which are: Ø Southern Union Gas in Texas. (Corporate Headquarters) Ø Missouri Gas in Missouri. Ø PG Energy in Pennsylvania. Ø New England Gas in Rhode Island and Massachusetts. Focus: My focus for this report is the â€Å"building blocks† of the Management, and how it shapes the organizational functions of the Missouri division of Southern Union Gas. James H. Oglesby is the COO and President of the Missouri division. MGE (Missouri Gas) serves approximately 498,000 natural gas customers in central and western Missouri, including Kansas City, St. Joseph, Joplin and Monett. MGE has about 700 employees to serve its customers in 155 communities throughout Missouri. Before accepting the title of COO (Chief of Operations), he was Vice President of Operations. He was promoted to this position after being employed with the company for 34 Years. His effiecency and knowledge company has taken the organization to new heights. Objectives: James Oglesby’s objectives were to successfully achieve the critical mass needed to compete in a challenging, changing energy industry, and was successful in doing just that by offering electric and propane subsidiaries such as the newly opened PEI Power Corporation, a 25-megawatt co-generation plant which uses natural and methane gases to generate steam and electricity, to increase revenue and decrease competition. This compliments the already effective natural gas operations. In doing so annual revenue has increased to more than 10.8 million dollars just within the first quarter results. While continuing to strengthen the core operations, in Missouri, he focused on propelling the organization to the forefront of the gas industry, and amplified the focus on business growth. Of course this built value to shareholders, and created a notable reputation of safety and quality. Under new direction of new management, the Missouri division is expected to result in the annual addition of approximately 16.7 million in the next quarter, in pre-tax income to the company, due to new rates. The accomplishments of Oglesby show dedication to the rapid development, progression and outcome of Missouri Gas. Article: James H. Oglesby Named President and COO of Southern Union's MGE Division February 2002 (Newstream) -- Southern Union Company ("Southern Union") (NYSE: SUG) announces the promotion of James H. Oglesby to president and chief operating officer of its Missouri Gas Energy ("MGE") division. Oglesby joined MGE in 1968 as a service technician.

Sunday, January 12, 2020

Digital Rights Management

Technological innovation is drastically taking place in almost every field. Experts and engineers put their extraordinary effort to develop software or products that requires some kind of security to protect it from misuse. Digital Rights Management is the one which is used for technologies that controls the use of digital content. With the advancement of Internet and development of digital content, content owners are being impelled into a new arena where they can enhance their rights by using DRM technologies as a way to control the use of their content.The present paper focuses on DRM, argumentative views of various experts on it and effectiveness of DRM in radically changing Hi- tech world. Digital Rights Management (DRM) facilitates copyright holders to achieve value for their works. DRM is used variably in literature. According to Electronic Frontier Foundation, â€Å"Digital rights management technologies are aimed at increasing the kinds and/or scope of control that rights-ho lders can assert over their intellectual property assets.†DRM allows the copyright holder to control the ways consumer’s access and use the holder's work once the work is made available in a digital format. By controlling the access, a right holder is capable to offers an exclusively competent business model and his work will be protected from infringing uses. It is not possible for DRM at its own level to realize these aims because it is susceptible to the hackers, which is able to avoid DRM safeguards. That’s why, law enforcement is required to avert from hackers.These steps will strengthen DRM technology (Christopher D. Kruger, pg: 281). The focus of the first generation of Digital Rights Management (DRM) was mainly on security and encryption as a way of working out the problem of unauthorized copying of the content. It was performed by locking the content and to limit its distribution to only those who make payment. In the second-generation of DRM, major step s to cover the description, identification, trading, protection, monitoring and tracking of all forms of rights procedures over both tangible and intangible assets.DRM deals with all rights and not only the rights applicable to permissions over digital content. There are two significant architectures which must reflect on while designing and implementing DRM systems. The Functional Architecture is the first. This covers the high-level modules or components of the DRM system that together provide a management of rights till the end user. The Information Architecture is the second critical architecture. This covers the modeling of the entities within a DRM system as well as their relationships.In digital rights management, the licensing authority issues to the DRM licensee a certificate and a public/private key pair for use in service. The client will sign the certificate with the licensing authority private key and send it to the content server along with the public key. The content server then verifies the certificate and thereby authenticates the client. The server also checks the certificate with the list of revocation and if so, the client will not be able to receive or decrypt content. There are two algorithms used in signing.The Windows DRM for Network Devices and HDMI and the Open Mobile Alliance use the RSA algorithm. An Elliptic Curve algorithm being much lighter, are used in Windows DRM for Mobile Devices and DTCP. There are number of companies holding patents, which cause some concern for adopters and have delayed the introduction of ECC to wider use in DRM. Once the authentication of a device is complete and it is determined that it has the valid license authority certificate, then in a DRM design, the last step is to decrypt content – the symmetric cipher key. This is obviously very important.Consumers just can not break their head to manage a key for every song or video that they have licensed under a DRM scheme, nor would the owner of a br and new product wish to enter 40 hex digits into the new console before using it. It is to be noted that one tremendously imperative feature of DRM security design is the processes by which secret DRM values are stored. While these consumer electronic products can be accessed by consumers, hackers will pry the design looking for susceptibilities. It is better to use the key storage on chip non-volatile memory.The major problems with this approach are NVM memory is not available in every process, especially the advanced technology nodes, the license fees for NVM are fairly high and last of all the programming of the secret values in off-shore ODMs may encounter a security issue as the secret values are in plaintext (Al Hawtin, Embedded Technology Journal). DRM has many advantages such as one can make more investment in digital content. Digital copies are perfect no matter how many copies are to be made. Large corporations are not the only creators of content.The Internet provides low -cost distribution network globally from which thousands of software producers get advantage. Strong DRM ensures a revenue stream at lower rate. Furthermore, good DRM means more legal free media, and lower prices. (John Carroll, 2002ZDNet). Even though DRM has many positive aspects and it is legally protected, it is always a matter of argument. Debate over the issues of fair use and DRM at the 12th annual Computers, Freedom and Privacy (CFP) conference in San Francisco summarizes that it is too early in this period of technological modernization to begin locking down digital content.Peter Jaszi, law professor at American University's Washington College of Law referred to copyright holders' attempts to keep tight control over their digital content, such as some record companies' moves to distribute DRM-protected CDs that cannot be played on more than one device. But even more threatening to fair-use advocates is proposed legislation introduced by Senator Ernest â€Å"Fritz† Ho llings, which aims to incorporate a built-in copyright protection measure in all consumer digital devices. Most speakers at CFP established that DRM was not the solution to the copyright difficulty.Many of the advocates agreed that DRM would be more successful in harmonizing the rights of user and copyright holders than would be legislation. Stefan Bechtold, a Stanford Law School fellow and author of a book on digital rights management, argued that even though DRM can slow down fair use and free speech, the technology is more progressive than law. It develops speedily and can be installed on an international level. According to Microsoft Security Architect Barbara Fox, DRM technologies make easy to secure the content and setting rules for consumer use but it is much more intricate to guarantee that users have fair use of that content.Further he noted that copyright law is vague when it comes to fair-use rights and DRM would be incapable to settle on whether a user should be able to use content under certain state of affairs (CNN). Even so many controversies, various industries like the entertainment industry, led primarily by the Motion Picture Association of America (MPAA) and the Recording Industry Association of America (RIAA), are dynamically chasing DRM-friendly policy initiatives through federal legislation and regulations, the courts and standards organizations.Music and movies have grabbed most of the headlines around digital rights management (DRM). The â€Å"killer app† for enterprise DRM is document management, primarily for purposes of regulatory compliance. The relevant regulations include the Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach-Bliley Act (GLBA) and the Sarbanes-Oxley Act (SOA). These laws require that the confidentiality and/or integrity of certain types of documents be protected (E.John Sebes, Mark Stamp, Pg: 52). DRM is computer code that can be embedded in music and video files to dictate how th ese files are used. The best-known example is the music Apple Computer sells at its iTunes Music Store. Using a DRM system it invented called FairPlay, Apple has engineered its songs, at the insistence of the record companies, so that they can be played only on a maximum of five computers, which means that one can burn only seven CDs containing the same play list of purchased tracks.In fact, obtaining relatively liberal DRM rules from the labels was the key to Apple's success in selling music. But some other uses of DRM technology are not so benevolent. Some CD buyers are discovering to their dismay that new releases from certain record companies contain DRM code that makes it difficult to copy the songs to their computers, where millions prefer to keep their music.People who buy online music in Microsoft's Windows Media format too often run into the DRM error message â€Å"unable to obtain license† when try to transfer the songs to a music player. The theft of intellectual p roperty on the Internet is a real problem. Millions of copies of songs, TV shows and movies are being distributed over the Internet by people who have no legal right to do so, robbing media companies and artists of rightful compensation for their work (WALTER S.MOSSBERG, 2005). The premier provider of smart mobile content retailing solutions, announced the U. S. Patents and Trademarks Office has issued the company a patent in the area of mobile content and applications Digital Rights Management (DRM). To sum up, DRM standardization is now taking place in a number of open businesses. Digital Rights Management is rising as an alarming new confronts, and it is necessary for DRM systems to provide interoperable services.

Saturday, January 4, 2020

Comparing Wide Sargasso Sea by Jean Rhys and Jane Eyre by...

Comparing Wide Sargasso Sea by Jean Rhys and Jane Eyre by Charlotte Bronte In the novels Wide Sargasso Sea by Jean Rhys and Jane Eyre by Charlotte Bronte, the theme of loss can be viewed as an umbrella that encompasses the absence of independence, society or community, love, and order in the lives of the two protagonists. They deal with their hardships in diverse ways. However, they both find ways to triumph over their losses and regain their independence. The women in both novels endure a loss of personal freedom, both mental, and physical. Jane Eyre, in her blind infatuation with Mr. Rochester, allows her emotions to enslave her. She realizes her obsession when she states, My future husband was becoming to me my whole world; and†¦show more content†¦In her search for approval, Antoinette utilizes a voodoo potion to try and force Rochester to love her, which makes him despise her more than ever. He accuses Christophine of acting for Antoinette when he insists â€Å"You tried to poison me† (Rhys 153). Both Jane and Antoinette are prisoners of their intense feelings for the man they adore, leaving them open to pain and betrayal. Jane’s foster family, the Reeds, restrict her rights, refusing to treat her as an equal to the other members of the family. Jane, at a mere eight years old, is chastised by Mrs. Abbott, the nanny, who asserts, â€Å"you are less than a servant, for you do nothing for your keep† (Bronte 11). When Rochester imprisons Antoinette in England, he deprives her of any sense of humanity. The people in their lives who yielded power over them unjustly repressed both women. Jane and Antoinette are both ostracized by their respective communities as a direct result of their social positions. Jane is an orphan with no money and no close relatives. Although she is clearly a bright and unique girl, she is treated as an outcast due to her orphan status. She refuses to accept their low opinion of her however, and maintains â€Å"The more solitary, the more friendless, the more unsustained I am, the more I will respect myself. I will keep the law given by God, sanctioned by man. I will hold to the principles received by me when I was sane, and not mad--as I am now†, illustrating her desire to persevere through

Thursday, December 26, 2019

An Intoxicating Trip Into Madness - 1008 Words

Joseph Vaikness Dr. Angel ENGL 1301.P21 30 Sept. 2016 An Intoxicating Trip into Madness FUTURE, DS2 After breaking out into the mainstream in 2012 and 2013 with hits like â€Å"Tony Montana† and â€Å"Turn on the Lights,† 2014 was a rough year for Future. The autotuned, Atlanta rapper saw his second full-length commercial release, â€Å"Honest,† perform weakly on the charts and alienate his original fanbase. The Atlanta hip hop scene felt it was too commercialized, the project being loaded with every trending producer and big name feature, and that it drifted too far away from what made Future’s music compelling in the first place. On top of this, his high profile relationship with RB star, Ciara, saw its end shortly after â€Å"Honest† was released. Rumors of infidelity circulated. Starting in October, 2014, Future released a bevy of acclaimed mixtapes (Monster, Beast Mode, 56 Nights) over the course of six months. Having moved back to Atlanta from LA and working with producers with whom he came up with, these mixtapes resonated deeply with his initial fan base. By the time summer 2015 rolled in, the demand for â€Å"Dirty Sprite 2† was like that of a freshly shaken two liter. Upon release â€Å"DS2† was a smash on the hip hop charts, topping out at number 1 overall on Billboard on its way to becoming certified platinum. Undeniably, Future Hendrix succeeded commercially. Thankfully, the music is deserving of the commercial success. The overall aesthetic of the album is a big win. TheShow MoreRelatedThe Potent Mix Of Creativity And Madness2130 Words   |  9 Pagesâ€Å"The potent mix of creativity and madness is imposed on writers and creative artists by the randomness of a genetic dice roll, but many artists with healthy minds choose to accept the Faustian bargain and induce madness with drugs to reach new summits in their art.† (Fields, R. D) The destruction of a person of any intoxicating material can result in such beautiful outcomes. The human race has accepted their history and works because it’s their own choice by recreational intake, for productivityRead MoreA Person Of Any Intoxicating Material2092 Words   |  9 PagesThe destruction of a person of any intoxicating material can result in such beautiful outcomes. The human race has accepted their history and works because it is their own choice by recreational intake, for productivity, and self-medicating that has kept them alive for us to view their own life and such mentality that some may learn from or even follow. Without the self-induced madness and without the people who tried self-treating the psychiatric illnesses, we would not have the colorful historyRead MoreComparing Fyodor Dostoevsky s The Gambler And The Beautiful And Damned 3470 Words   |  14 Pageswhat he used to be and everything he detests about society. Much like Alexey, Dostoevsky h ad been madly in love with a â€Å"demonic† women named Polina, and the psychology of obsession and intoxicating humiliation described in the novel was also present in his own life. Dostoevsky became a compulsive gambler during his trip across Europe as Alexey did in Roulettenburg in the novel. Not only were Dostoevsky’s experiences apart of the novel, but his beliefs are ever-present. His love for the extremes hadRead MoreIgbo Dictionary129408 Words   |  518 Pagesof Edition II ala 2. á » gbà ²Ã¯â‚¬ ¥dà ²Ã¯â‚¬ ¥gbà ²Ã¯â‚¬ ¥ alÄ  nwaà  nyà ¬Ã¯â‚¬ ¬ á » gbà ²Ã¯â‚¬ ¥dà ²Ã¯â‚¬ ¥gbà ²Ã¯â‚¬ ¥ alÄ  n. (ala) –kpa onye alÄ  -pà ¹Ã¯â‚¬ ¥ ala -pà ¹Ã¯â‚¬ ¥ ala aghà ¹Ã¯â‚¬ ¥ghà ²Ã¯â‚¬ ¥ -yà ¬Ã¯â‚¬ ¬ ala, -wà ¬Ã¯â‚¬ ¬ ala abnormally heavy, large and long breasts woman with abnormally large and heavy breasts madness be mad (lit. be moved with madness) mad person become mad; be mad: ÃÅ'ï€ ¬ nà  -apà ¹Ã¯â‚¬ ¥ alÄ ? Are you mad? pretend to be mad (in order to cheat or trick) be mad; become mad: á »Å' nà  -ayà ¬Ã¯â‚¬ ¬ alÄ  He is mad Arabic language, named after the phrase in Moslem prayers ’AllÄ hu ’akbar: á »Å' nà  -à  sá » ¥

Wednesday, December 18, 2019

The War Of The Roses And Ends With Last English - 1476 Words

Covering a period which starts with the Hundred Years War already in full swing, contains the start of the Wars of the Roses and ends with last English king to die in battle the level of participation of the aristocracy and the roles which they fulfilled is a natural continuation of the topic, especially given how kings can be lauded or vilified for their participation or non-participation in military matters but it was the nobility who functioned as military commanders or otherwise notable figures in the battles who had much greater military command, often give entirely to their discretion. Whether the role changed drastically during the hundred and fifty year period is debatable, as it what would constitute a drastic change and how it†¦show more content†¦There were fewer high level aristocrats who went along with the Black Prince’s chevauchee’s in France during the early 1350’s and more Knights of the Garter, which was an honour often bestowed on tho se who came from minor nobility but who rode with the Black Prince. However the first expedition in the period involved the Earls of Warwick, Oxford and Stafford as well as a number of knights and each of the three earls was placed in charge of a battalion and, rather than fighting any French they instead sacked the town of Languedoc. The next was 1359-60 where far more nobles, the Earls of Northampton, Warwick, Oxford, Suffolk and the Duke of Lancaster although all bar the Earl of Suffolk were dead by 1361. The amount of higher aristocracy The Battle of Agincourt had the Dukes of Gloucester and York present who were given command of sectors which suggests a continuing role for the aristocracy in battles. K.B McFarlane talks about ‘professional military contractors’ meaning the upper aristocracy with earls being the most numerous military leaders and, although he admits that the course of war allowed the odd man from the gentry to distinguish himself it was

Tuesday, December 10, 2019

Hass And Technology Digital Resource Samples †MyAssignmenthelp.com

Question: Discuss about the Hass And Technology Digital Resource. Answer: Learnings This particular course is based on teaching the learners the basics of Humanities and Social Sciences (HaSS). HaSS and Technology is defined as the subject that deals with the humanities and social sciences aspect of technology i.e. it is used to learn about the humanities and social sciences factors that affect the development and implementation of technology (Yow 2014). This particular subject is extremely important to determine the outcomes of many other courses although most people have the misconception that HaSS is only general studies and have no useful purpose. However, in reality, HaSS plays a very major role for the development and implementation of the new technology (Herrmann 2018). For instance, if the research and development of a new medicine depends on the study of pathogens and the antidotes, very few people realize that the entire research also uses humanities and social sciences to determine the nature and behavioral trends among the people affected by the particul ar disease (Monmonier 2015). In the learning area for the foundation year of this course, the students will be gradually taught basic history and geography as the course will be gradually upgraded to the study of technology. Reasons for Teaching the Learning Areas There are a large number of reasons for teaching the specific learning areas to the learners especially the Early Years Learners (EYL). As per the Au curriculum, the main aim of the school is to promote equity and excellence in each of the students as the subjects are taught to them throughout the course. The main goal is to teach the students such that each and every Australian becomes successful learners, creative and confident and finally active and informed citizens of the country. Before the learners move on to the courses of technology and development, they need to learn about the Humanities and Social Sciences in order to understand the impact and importance of the subjects on technology and its development. While HaSS has many high level importance and significance in other technical fields of study, the beginning level learners need to learn about the basics to get a head start on their future lessons (Weber 2017). This is why, most of the elementary schools start the learni ng courses with humanities and social science subjects other than literature and language studies. For this module as well, the same trend will be followed as the learners will be taught HaSS with special emphasis on history and geography. The beginners mainly need to learn history in order to learn about past civilizations, their cultures, religions, economy and most importantly technology. From the lessons about ancient technology, the learners can have a basic idea regarding the gradual progress and development of technology that will help them in future for studying technology as well as working on it to develop even more advanced technology (Mohammadi and Thelwall 2014). On the other hand, the beginners are taught geography so that they have the basic idea of various landscapes, climate, weather conditions and others around the world and how these factors affect the type and quality of life on earth. The learners will be able to have a clear idea on how the geographical conditi ons have affected the development of technology throughout the history of mankind. Knowledge and Understandings There is a lot of knowledge as well as understanding that is related to the curriculum learning areas (design and technology). In this curriculum, the beginning level learners will be taught these knowledge and understandings for their educational as well as personal development. However, throughout the curriculum, the learners need to get hold of various concepts and their applications on various subjects in order to gather sufficient amount of knowledge and understanding. The curriculum is designed by following the standard Australian curriculum and is aimed to make the students well learned and confident individuals in the near future. The learning starts from the foundation stage and it gradually culminates into advanced learning process where the students learn to use technology in a practical environment. The entire course curriculum has been designed such that it benefits the EYLs and hence, the entire course has been built based on EYLF (Early Years Learning Framework) (Grusi n 2015). The concepts and ideas to be taught in this curriculum have selected in such a way that the beginners are easily able to catch the ideas and grow on the same. For instance, in the EYLF, none of the students will be taught about European Dark Age or the landscape of the Pampas in South America. Rather the courses will mainly include early human history and basic knowledge of landscapes. These basic lessons will act as the building blocks for the development of the early year learners. The entire module will be completed in a number of phases. The main purpose of the phase division is that it is necessary to evaluate the knowledge and understanding gathered by the learners throughout the course of the curriculum (Eve and Willinsky 2015). The first phase will include the teaching phase where a number of sessions will be undertaken to incorporate the lessons to the learners. The method of teaching may vary on the special requirements of some of the learners. The next phase will include the questioning phase where during the sessions; the learners will be asked simple questions that are based on the lessons taught. The objective of these questions is to find out how much the student has been able to progress and gain knowledge on the lessons taught during the session. In case the progress is not satisfactory, the teaching phase will again be repeated for certain period of time (Miletzki and Broten 2017). The next phase includes self research phase where the learners will need to undertake minor research and learning that will help their personal development. Due to the limitations of EYLF, the requirements are very minor and the learners are only expected to find two or three pieces of information from their own research using reference books and materials. The final phase is the evaluation phase where the learners are needed to go through a series of evaluation processes where their learnings and understandings are assessed. This evaluation phase is under taken at the end of each learning module and includes assessment from the entire learning curriculum. Role of the Stages of Inquiry Based Learning Inquiry based learning is an effective method of teaching that has been accepted in a large number of learning centers around the world. This particular method requires complete involvement of the learners during the sessions and they need to interact with the teachers on a constant basis. There are generally four stages of inquiry based learning that play a significant role in the learning of design and technology by the learners. These four stages are explained as follows. Interaction In this stage, the learners are required to spend significant amount of time in suitable media to conduct personal research and study on the particular topic provided to them (Lee Jr and Wallerstein 2015). Furthermore, with extensive research, the curiosity of the students will gradually increase and they will seek to learn even more by interacting with various types of media. Whenever they are unable understand certain concepts, they will be able to interact with the teachers in order to know more about the particular concepts and ideas that they did not understand. Clarification Clarification stage follows the interaction stage when the student or learner asks for clarification on a certain topic or idea that they have recently learnt. There may be a topic that a learner can only partially understand and does not know to categorize or explain the idea to get the actual concept embedded into it (Ossenblok, Guns and Thelwall 2015). In this case, the student can interact with his teacher and discuss about clarification regarding the same idea. With an interactive session, the student will be able to classify the data and understand the idea fully. Questioning While preparing clarification of the ideas, some more ideas may develop in the head of the learner based on the original idea he gathered. With the growth of new ideas, some conceptual based questions will also start to develop inside the head of the learner that must be answered properly for his learning and understanding on the particular topic (Gregory 2017). In this case also, the learner will need to interact with the teacher who will be able to answer their questions and fulfill the students curiosity and quest for learning. Design Finally comes the design stage where the learner will be to apply the ideas and concepts he gathered during the learning course in order to develop a practical design of his own (Davis, Torr and Degotardi 2015). This phase is the most important phase of the learner when he learns the practical implementation of the ideas, which is quite essential during the studies of design and technology. Processes and production skills are required in the higher level design and technology courses that generally build up from the four stages of inquiry based learning phase. The skills define the competency of a student in the development, design and implementation of creative ideas that are most sought after in the field of design and technology (Akers 2017). Once the student learns to develop new ideas and implement them in design and technology, he will able to grow rapidly and establish his own designs and frameworks for new technology. Learning Connections Apparently, there are no learning connections between HaSS and Design Technology. However, with in-depth search, it can be seen that both of these learning areas are intricately intertwined with each other (Arthur et al. 2017). With HaSS, design and technology would not have been much developed and without design and technology, HaSS would have no practical use in all actuality. In order to understand the connections and relations between the two, it is required to identify the main components of the two learning areas (Neumann and Neumann 2014). While HaSS deals with various aspects of human society like history, economy, psychology and others, design and technology involves the development and implementation of various technologies that are required in the near future. However, for the development and implementation of the new technologies, it is important to know about its impacts on the human society and vice versa (Clements and Sarama 2014). HaSS acts as the building block need ed to build up to the competency in design and technology. Hence, in all elementary sessions and learning centers, the main lessons start with humanities and social sciences. Summary This particular course aims at educating the learners in the importance and significance of Humanities and Social Sciences on future and advanced studies of design and technology. Since it is a very broad subject, the focus will be specifically on History and Geography. Learning history is important in order to understand the trend of changes of a particular community or a group of people in terms of politics, economy, religion and others. This knowledge is important to analyze the current society as well as make suitable predictions for the future. On the other hand, geography is another important that needs to be learned for understanding various landscapes, weather effects and others. However, geography is not limited to landscape or weather, rather it also includes the effects of landscape, climate and weather on the people of various regions and hence, it is included in Humanities and Social Sciences course. References Akers, R., 2017. Social learning and social structure: A general theory of crime and deviance. Routledge. Arthur, L., Beecher, B., Death, E., Dockett, S. and Farmer, S., 2017. Programming and Planning in Early Childhood Settings with Student Resource Access 12 Months. Cengage AU. Clements, D.H. and Sarama, J., 2014. Learning and teaching early math: The learning trajectories approach. Routledge. Davis, B., Torr, J. and Degotardi, S., 2015. Infants and toddlers: how visible are they in the Early Years Learning Framework?. International Journal of Child Care and Education Policy, 9(1), p.12. Eve, M.P. and Willinsky, J., 2015. Open access in humanities and social sciences: Visions for the future of publishing. College Research Libraries News, 76(2), pp.88-91. Gregory, E. ed., 2017. One child, many worlds: Early learning in multicultural communities. Routledge. Grusin, R., 2015. The nonhuman turn. University of Minnesota Press. Herrmann, A.C., 2018. Theorizing feminism: Parallel trends in the humanities and social sciences. Routledge. Lee Jr, R.E. and Wallerstein, I., 2015. Overcoming the Two Cultures: Science Vs. the Humanities in the Modern World-system. Routledge. Miletzki, J. and Broten, N., 2017. Development as freedom. Macat Library. Mohammadi, E. and Thelwall, M., 2014. Mendeley readership altmetrics for the social sciences and humanities: Research evaluation and knowledge flows. Journal of the Association for Information Science and Technology, 65(8), pp.1627-1638. Monmonier, M., 2015. Mapping it out: expository cartography for the humanities and social sciences. University of Chicago Press. Neumann, M.M. and Neumann, D.L., 2014. Touch screen tablets and emergent literacy. Early Childhood Education Journal, 42(4), pp.231-239. Ossenblok, T.L., Guns, R. and Thelwall, M., 2015. Supplementary material to Book editors in the social sciences and humanities: an analysis of publication and collaboration patterns of established researchers in Flanders. Weber, M., 2017. Methodology of social sciences. Routledge. Yow, V.R., 2014. Recording oral history: A guide for the humanities and social sciences. Rowman Littlefield.