The ethical standard which was violated by the IT staff at a hospital is: confidentiality.
What is PHI?PHI is an acronym for protected health information and it can be defined as any form of health information for a patient that mustn't be disclosed without the patient's knowledge, approval (consent) or used for the payment of health care insurance for employees.
This ultimately implies that, it is an ethical standard for all health workers to keep and protect protected health information under normal working conditions because they are confidential in nature with respect to Health Insurance Portability and Accountability Act (HIPAA).
Read more on PHI here: https://brainly.com/question/24439144
A person can only give blood to someone with compatible blood antigens. If a person receives blood from someone with an incompatible blood type, it can cause a life threatening immune system reaction. The blood transfusion will likely fail.
Your program should ask a user’s blood type first, then if she/he want to learn about giving or receiving blood. Based on the blood type and choice of give or receive, your program will print the corresponding compatible blood types.
NOTE, if the blood type or give/receive choice entered doesn’t exist, the program should promote the user to re-enter it again.
when doing a complex presentation which of the fallowing will be the best tool to begin designing your presentation
Answer:
Explanation:
The options are:
a) Open Office Writer
b) Open Office Impress
c) an outline
d) photographs
The most commonly used presentation software is Microsoft PowerPoint but it is not always available; as is the case here. Of the options, Open Office Impress is the closest in its functions to PowerPoint and is a good tool to design a complex presentation.
Discussion 5
Kris Allen runs a pet daycare center. She needs to keep track of contact information for her customers, their animals, the services provided (such as walking and grooming), and the staff who are assigned to care for them. She also must send out invoices for payment each month. What features of spreadsheets and/or database software might she use to facilitate her business?
The features of spreadsheets and/or database software that she can use to facilitate her business are;
Rows and columns in spreadsheet's can make her information to be neatly organized.The use of Formulas and functions. Data filtering Accounting.Analytics, etc.Why does business use database software?Businesses can known to use database software to make a good and well manage data output. They also use it to work with their data.
Note that in almost all kinds of businesses, there is the use database software just to keep a track of contacts, addresses, payrolls and other kind of functions to is linked to business and customers.
Learn more about database software from
https://brainly.com/question/1022352
IM a bit confused on what this is asking for exactly.
Answer:
im not sure can you ask someone for help
Explanation:
Suppose that you have a computer with a memory unit of 24 bits per word. In this
computer, the assembly program’s instruction set consists of 198 different operations.
All instructions have an operation code part (opcode) and an address part (allowing for only one address). Each instruction is stored in one word of memory.
1. How many bits are needed for the opcode?
2. How many bits are left for the address part of the instruction?
3. How many additional instructions could be added to this instruction set without
exceeding the assigned number of bits? Discuss and show your calculations.
4. What is the largest unsigned binary number that the address can hold?
Answer:
a ) The amount of bits required for the opcode
8 bits
2^8= 256
256>198
We get the next lower number, which is 2^7 = 128 bits, because it is greater than 198. As a result, the operation code necessitates 8 bits.
b) The number of bits reserved for the instruction's address.
16 bits
24-8 = 16
c)
65536
2^16 = 65536
Maximum number = 65535
2^15 = 32768-1
= 32767
Explanation:
A new robot is created to explore volcanoes on other planets. Which robot is
most likely to have been referenced in the design of the new robot?
A. Dante
B. Roomba
C. ASIMO
D. Sophia
Answer:
A
Explanation: Dante II is a unique walking robot that provides important insight into high-mobility robotic locomotion and remote robotic exploration. Dante's uniqueness stems from its combined legged and rappelling mobility system, its scanning laser rangefinder and its multi-level control scheme.
Draw a rectangle, give its perimeter and Area
Ask the user for a length and width of a rectangle.
Draw the rectangle
find and show the perimeter
find and show the Area
I am assuming this is in python, so I will use comments to explain each step
l=int(input('What is the length of the rectangle')
w=int(input('What is the width of the rectangle')
#here use whatever graphics code required to draw the rectangle
#will probably be similar to rect=Rectangle(l,w)
print('Perimeter is' +(2*l+2*w))
print('Area is' +(l*w))
Which part of the Word application window should the user go to for the following activities?:
Answer:
what are the activities
Similarities in off-site and On-site
Answer:
Off prevents the page from finding your easy search terms; basically what you search for, while On page will help you improve the quality of your newly designed web page.
▬▬▬Casual Terms▬▬▬
Off page means that you are not actively viewing a page; unlike On, it would mean the exact opposite.
▬▬▬Conclusion▬▬▬
I Hope you have a great day!
Answer:
onsite is on or at a site while offsite is away from a mail location in a place not owned by a particular organization.
An IT infrastructure manager is reviewing his company's computer assets, particularly the mean time to failure (MTTF) of the PC and server hard drives. The manufacturer of the hard drives typically used in the company states that the MTTF is approximately 11 years. Because servers and some high-priority workstations must operate continuously except for brief periods of maintenance, how many hours, on average, can these hard drives be expected to operate before failure
The numbers of hours, on average, can these hard drives be expected to operate before failure is 24 hours a day, also seven days a week and 365 days a year.
How many hours can Hard drive last?The total life-time of a hard disk is said to be 5 years" that is about 43,800 hours of been in constant use.
Note that a key reliability-linked criterion for the selection of storage components is based on its operating duty that is the numbers of many hours in a day a drive can be active for.
A lot of HDDs used by Enterprise-class applications are said to be optimized for constant use that is 24 hours a day, seven days a week, and 365 days a year.
Note that a Managed Service Provider (MSP) have to plan for a failure in every 1000 hours that is about 42 days.
Learn more about hard drives from
https://brainly.com/question/1558359
Complete the sentence.
For self-driving cars, both the programmers of the software and governments who regulate them must adhere to
intellectual property laws
ethical principles
noncompete agreements
- to safeguard that the software that controls the car is capable of making life-or-death
Answer:
[ C ] governments who regulate the car industry
[ D ] the programmers who create the software that control the car
Proof:
Governments who regulate the car industry, the programmers who create the software that control the car are the complete sentence.
What is car industry?Car industry is the place where the manufacturing of the cars and automobile parts are placed. Car industry do manufacturing work for the selling purpose. The company may be directly or indirectly engage in the selling industry.
Thus, sentences are completed.
For more details about car industry, click here:
https://brainly.com/question/1139792
#SPJ2
13. In cell B16, use the SUMIF function and structured references to display the total wins for teams in the Youth league.
Using the SUMIF function and structured references to display the total wins for teams in the Youth league is gotten as; 65
How to make use of the SUMIF Function?
The SUMIF function in excel combines a condition and a sum of the values which meets the stated condition. That is; SUMIF(row_range, condition)
From the attached image we can see the number of times youth won the league in column D. Also, we can see the total number of youth wins in column H under Total.
Thus, using SUMIF function for the total number of wins, we have;
B6 = SUMIF(SwimTeams[League], "youth",H3:H12
B6 = 21 + 16 + 12 + 9 + 7
B6 = 65
Read more about the SUMIF Function at; https://brainly.com/question/19595606
True or false: the HTTPs means that the information on a website has been fact-checked
True
False
Answer:
False
Explanation:
Which statement best characterizes under what circumstances you should add your social media profile to a resume? You should add your profile even if it is not entirely professional. You should add your profile even if it is not entirely professional. You should add your profile, but it should be entertaining and help you stand out. You should add your profile, but it should be entertaining and help you stand out. You should not add your profile under any circumstances—it is unprofessional. You should not add your profile under any circumstances—it is unprofessional. You should add your profile, but it should be professional and positive.
Answer:
You should add your profile, but it should be professional and positive.
Explanation:
this is the most reasonable response... resumes are for careers and professions.. so you must be professional and positive (if it is for example linkedin)
Dalton completed a research project with Word Online. He would like to print and show it to a family member. Which ribbon tab does Dalton need to select to print a document with Word Online a review b file c home d view
The ribbon tab that Dalton needs to select to print a document with Word Online is: B. file.
What is Word Online?Word Online can be defined as a word processing software application that is designed and developed by Microsoft Inc., so as to enable its end users type, format and save text-based documents over the internet.
Generally, the print command is located in the file section of the ribbon tab in Word Online and as such Dalton needs to select it from there.
Read more on Word Online here: https://brainly.com/question/18272535
Take any software or Application that you have recently purchased, this can be a video game or any other application helping you to complete you educational objectives or professional purposes. Go through about the copyright, license policies [you will find this information on the leaflet or on the packaging] and answer the following questions]
Can you make copies? What does the license agreement say about the number of copies you can make? Explain in detail [ 2Marks]
Does it specify penalties for making unauthorized copies if yes give the brief detail on that?
[1 Mark]
Do you consider the license agreement to be clearly stated? Reasonable? Explain with two reasons. [ 2 Marks]
A good product should have copyright protection which prevents others from using the product without permission.
Some products specify the penalties which are given to a person who makes unauthorized copies of their product and this is done to clearly educate to avoid ignorance claims.
A good product should have clear lettering which are legible and can be easily read, and should also have reasonable copyright protection.
What is Copyright?This refers to the licensing which is done for a product and is also legally backed which prevents a person from illegally using or redistributing the work of a creator without their explicit consent.
Read more about copyright infringement here:
https://brainly.com/question/1078532
You have been asked to investigate a web server for possible intrusion. You identify a script with the following code. What language is the code in and does it seem likely to be malicious? import os, sockets, syslog def r_conn(ip) s=socket.socket(socket.AF_INET,socket.SOCK_DGRAM) s.connect(("logging.trusted.foo",514))
The code below is written in JavaScript and does not seem malicious.
What is a Malicious Code?A Malicious code is one that is not designed for any productive end but to cause disruptions in the computer with the objective of
harming the workstation; or destroying the data stored therein.There are numerous classifications of malicious codes and they can be identified and removed by an application called an Anti-Virus or malicious app remover.
Learn more about JavaScript at:
https://brainly.com/question/16698901
You work as an assistant in your school’s computer lab. A student asks you to help her install a program on her laptop using an installation disc she borrowed from a friend. You read the EULA and notice that it provides only a single-user license. What are the ethical and legal issues surrounding using a single-user license on more than one computer? What should you do?
The ethical and legal issues surrounding using a single-user license on more than one computer is that if caught, it can lead to termination of the software package that you are in.
The ethical implication is that one cannot be trusted, our integrity has have brought down to zero. The right thing to do is to explain to the student and if you can, get her another software.
What is single user License agreement?Single User License is a term that connote that there shall be only one person to use, receive and access a product or software and it cannot be shared with other individuals.
In Single user, the software is said to be licensed for a single user and not for Multi-user.
Learn more about User License from
https://brainly.com/question/13502276
When you are hired to develop a system for an organization. Is it important to follow all the requests/wants of the system owner rather than of the system user?
If you are hired to develop a system, note that Is it vital to follow all the requests or needs of the system's owner.
The company knows what they want and it is good you do comply with their directives. You can only give your suggestions if need be.
Who can develop an information system?The information systems field is one that is made up of people in organizations that are skilled and can design and build information system.
Note that to be hired to develop a system, one has to follow all the requests/wants of the system owner instead of the system user as the one who needs it knows what he or she wants so you have to comply with it. You can only give your suggestions.
Learn more about system from
https://brainly.com/question/13603602
What is the purpose of memory address?
Answer:
A memory address is a unique identifier used by a device or CPU for data tracking.
state the name of the following computer components
Answer:
Memory.
Hard Drive or Solid State Drive.
Video card.
Motherboard.
Processor.
Power Supply.
Monitor.
Keyboard and Mouse.
Explanation:
Why do you want to work for Rev?
People do have reasons why they want to work for a particular company. It may be due to what they company stands for, what they make or about your dream.
I can therefore say that I want to work for Rev because they are revolutionizing the industry and I want to be part of the change process.
How do you answer why do you want to work?Note that when looking for a job, job experience do matter. When ask the reason for looking for this job.
One can answer that they have the experience or the needed expertise and skills required for this job as they want to be aligned with what the company stands for.
Learn more about work from
https://brainly.com/question/25573309
answer quickly!!!!! please answer as soon as you see this!
Which feature of a database displays data in a certain sequence, such as alphabetical order?
Chart
Filter
Search
Sort
In C, What is the #line used for?
The #line is mainly used to reset the line number and also the filename in the code.
What does a line in C mean?The c in code is written in lower-case. The c that has a line over it means "with".
The C preprocessor is known to be macro processor that is often used often by the C compiler to change one's program before actual compilation. This #line means that one can do any reset any line of code to an arbitrary line number or a filename that is said to have been stated by the user.
Learn more about code from
https://brainly.com/question/25605883
how do you create 2 dimensional array with c++?
2 dimensional arrays in C++ are arrays that have 2 dimensions i.e. rows and columns
How to create the array?To create a 2-dimensional array in C++, you make use of the following syntax
data_type array_name[rows][columns];
Assume the following parameters:
The data type of the array is integerThe array name is StudentsThe array has 10 rows and 20 columns.The declaration of an array with the above properties would be:
int Students[10][20];
Read more about arrays at:
https://brainly.com/question/22364342
5. How would you reorder the animation on a slide using the Animation
Pane?
Answer:
undo button
Explanation:
I hope this helps
You're a consultant for a large enterprise that needs a comprehensive IP addressing and DNS management solution for its physical and virtual networks. The enterprise has a primary office in Pittsburgh and three branch offices in Los Angeles, New York, and Miami. It has IT support staff only in the branch offices.The enterprise's server specialists are located in Pittsburgh. The IT directory in Pittsburgh wants to offload some of the IPAM management functions to some of the IT staff without giving them broader domain or forest administrative right. Which type of IPAM architecture do you recommend? Which features of IPAM are you likely to recommend using to address the requirements?
The type of IPAM architecture that I will recommend is the Centralized IPAM. The centralized IPAM server when deploy can help to address the issue.
What is IPAM?IPAM (IP Address Management) is known to be a kind of administration of DNS and DHCP. This is known to be a network services that helps and handles IP addresses to machines in a TCP/IP network.
The Centralized Repository can help administrators to maintain or keep a good, correct and current records of all their IP assignments and left over addresses.
Learn more about IPAM from
https://brainly.com/question/24930846
Write the pseudocode for the following scenario. The final exam marks for 10 students are 65, 45, 78, 65, 89, 65, 79, 67, 75, and 63. The marks are stored in an array. Find: • The student with the highest mark. • The student with the lowest mark. • The total marks for all the students. • The overall average.
The pseudocode of the program serves as a prototype of the program
How to determine the pseudocode?The pseudocode of the program is as follows:
StartDeclare array MARKSInput MARKS[0] to MARKS[9]Sort MARKSPrint MARKS[9] ----- this prints the highest markPrint MARKS[0] ----- this prints the least markFOR I = 0 TO 9; ADD MARK[I] TO TOTALPrint TOTALPrint TOTAL/10StopThe above pseudocode gets input for the array; then sorts the array before performing the required operations
Read more about pseudocodes at:
https://brainly.com/question/24735155
This is an example of what type of formula? =AVERAGE(D1:D17) A. ADDITION
B.SUBTRACTION C.RANGE D.AVERAGE
Answer:
d average
Explanation:
average as it already shows it says average
You ran your email by a few colleagues, and they think it is perfect for your audience – professional, technical, and informative. Your email is ready to send out, so you schedule it for 8AM the next day to reach customers’ inboxes as they start their day. How should you include the email addresses?
You should include in the email addresses by CC all recipients.
What does it mean to CC recipients?The CC abbreviation is a term that stands for “carbon copy.”
The CC recipients is known to get or receive also the same copy of the email and any kinds of other “Reply All” responses that one can see in the thread. Note that all recipients of the email will also see who has been given the CC' message.
See options below
-CC all recipients.
-BCC all recipients
Learn more about email from
https://brainly.com/question/14236855