Which data must be protected from disclosure?

Answers

Answer 1

Social Security numbers, which need to be kept private to stop identity theft. Passwords, which need to be kept secret to safeguard systems and accounts.

What is data ?

Data is gathered via methods like measurement, observation, querying, or analysis, and is frequently expressed as numbers or characters that can then be processed further.

Data collected in an uncontrolled in-situ environment are referred to as field data.

Data that is created during a carefully planned scientific experiment is known as experimental data.

Techniques like calculation, reasoning, discussion, presentation, visualization, and other types of post-analysis are used to analyze data. Raw data (or unprocessed data) is often cleaned before analysis: Outliers are eliminated, and glaring instrument or data entry errors are fixed.

Data are the smallest pieces of factual information that can be utilized as the foundation for an analysis, argument, or computation.

Data can range from physical measures to abstract concepts, including but not limited to.

Hence, Social Security numbers, which need to be kept private to stop identity theft. Passwords, which need to be kept secret to safeguard systems and accounts.

Learn more Data click here:

https://brainly.com/question/26711803

#SPJ4

Answer 2

In order to be used or kept on portable devices, to be withdrawn from a secure university location, or to be sent electronically, restricted or sensitive data, including protected health information, must be encrypted.

The majority of the time, maintaining secrecy just requires adhering to a few standard procedures:

Research identification codes (ID Codes) for PPII are used in place of PPII.PPII-containing face sheets are taken off of finished survey equipment.Neither master code lists nor key codes are widely accessible.Master lists are kept apart from the data and are disposed of as soon as is practical.

When they are no longer needed for the research, contact lists, recruitment records, or other documents containing PPII are destroyed.

Electronic data files are encrypted and password-protected (at least when data are transferred or transported).

Research samples and data are kept safely in chambers or cabinets that are locked. Computers or files that require a password to access contain electronic data. When computers will be left unattended, electronic data files are closed.

Forms for consent and HIPAA permission are safely kept in secured cabinets or spaces. The consent and HIPAA authorization paperwork are kept secure from the research data in closed cabinets or rooms.

The IRB-approved procedures for handling and keeping research data/specimens are taught to research employees.

To learn more about Sensitive data click here:

brainly.com/question/30123464

#SPJ4


Related Questions

Web and Data Security
What type of attack exploits a lack of bounds checking on the size of data stored in an array?
a.ActiveX control
b.phishing
c.buffer overflow
d.SQL injection

Answers

Buffer overflow is  type of attack exploits a lack of bounds checking on the size of data stored in an array.

Is buffer overflow malicious software?

An program that had a buffer overflow often crashes because the overflow raised a memory access violation. If an attacker is successful in exploiting an overflow, it may be possible for malware to be installed through the execution of arbitrary code.

Why does buffer overrun get used by hackers?

A buffer overflow attack happens when a hacker takes advantage of the coding mistake to carry out a harmful action and breach the impacted system. The hacker alters the app's execution path and overwrites some of its memory, resulting in the corruption or exposure of confidential data in already-existing files.

To know more about Buffer overflow visit:-

https://brainly.com/question/14369388

#SPJ4

when you print to the microsoft xps document writer printer, it creates a(n) ____ file.

Answers

The actual document is not printed to paper when you print to the Microsoft XPS Document Writer; instead, an XPS file is created on your computer from the original document.

Printing to the Microsoft XPS Document Writer is what it means.

On Windows versions beginning with Windows XP with Service Pack 2, a print-to-file driver called the Microsoft XPS Document Writer (MXDW) enables a Windows application to produce XPS document files (SP2).

Microsoft XPS Document Writer: Is it necessary?

In the event that your app does not offer the option to store its content in the XPS format, you as an application developer would advise users to use the Microsoft XPS Document Writer to create XPS files.

To know more about Microsoft XPS Document visit :-

https://brainly.com/question/28393226

#SPJ4

____ are utility programs that search for documents and other files on a user’s hard drives.

Answers

Search tools are utility programs that search for documents and other files on a user’s hard drives.

In technology, A search engine  or also known as search tools generally can be defined as a software system designed to carry out web searches. A search engine  or also known as search tools search the World Wide Web in a systematic way for particular information specified in a textual web search query. There are several types of search engine, such as Internet Directories,  Meta-Search Engines, and also Search Engines.

Here you can learn more about search engine marketing in the link https://brainly.com/question/30112665

#SPJ4

________________ is access to the internet through your tv connection. A. FTTH B. DSL C. Dial-up. D.

Answers

A cable modem is an access to the internet through your TV connection. The correct option is D.

What is a cable modem?

A modem is a device that links your home to your Internet service provider (ISP), such as Xfinity, typically over a coax cable connection. The modem converts signals from your ISP into signals that can be used by your local devices and the other way around.

A modem, often known as an ISP, is a device that links your home network to your internet service provider. A router is a device that enables all of your wired and wireless devices to access the internet simultaneously and to communicate with one another.

Therefore, the correct option is D. a cable modem.

To learn more about cable modems, refer to the link:

https://brainly.com/question/29487909

#SPJ1

The question is incomplete. Your most probably complete question is given below:

D. a cable modem.

you can create or modify a table's field names and data types in ________ view.

Answers

The correct answer is you can create or modify a table's field names and data types in design view.

You may make a table more quickly and easily with Design View.On the Create tab, click. Tap Table Design. The Design View window gains a new table. If the table is not open, you may change it by right-clicking it in the Navigation Pane and selecting Design View from the shortcut menu. Choose a new data type from the list in the Data Type column, locate the field you wish to edit, and then click OK. Save your edits. By selecting Datasheet view from the shortcut menu when you right-click the desired table in the Navigation Pane, you may create or open a table in this view.

To learn more about design view click the link below:

brainly.com/question/13261769

#SPJ4

By how many levels will Excel allow you to sort? O 32 O 128 O 64 O 16

Answers

Sort data using many columns and rows

Up to 64 columns can be used for sorting. Note: The range of cells you sort should contain column headings for best results. Any cell in the data range can be chosen.

How to sort in Excel?

With MS Excel, the sorting feature aids in data organization. A text column can be sorted alphabetically (A-Z or Z-A). A number column can be sorted either from largest to smallest or from smallest to largest. A date and time column can alternatively be sorted from oldest to newest or from newest to oldest.

Choose just one cell in the desired column.

To execute an ascending sort, click in the Sort & Filter group on the Data tab (from A to Z, or smallest number to largest).

To carry out a descending sort, click (from Z to A, or largest number to smallest).

To know more about sort in excel, refer:

https://brainly.com/question/17186471

#SPJ4

What are 2 limitations of the Reclassify transactions tool? quickbooks online

O You cannot change the location when reclassifying expense transactions
O You cannot change the account for inventory adjustments
O You cannot change the class when reclassifying expense transactions
O You cannot change the class on deposit transactions
O You cannot change the payment bank account when reclassifying expense transactions

Answers

Answer:

- You can’t change the payment bank account when reclassifying expense transactions

- You can’t change the account for inventory adjustments

Explanation:

It says so on the official Intuit Quickbooks page.

The top two targets for ransomware attacks are the _____a. Internal Revenue Service and the Social Security Administration b. petroleum industry and nuclear facilities c. healthcare industry and financial institutions d. aviation and aerospace industries

Answers

Financial institutions and the healthcare sector are the two main targets of ransomware attacks.

What do ransomware users want most?

Usually by encrypting your files, ransomware is a sort of software that keeps you from accessing your device and the data stored on it. In order to unlock the data, a criminal organization will then demand a ransom.

Which is two factors cause a ransomware attack?

Ransomware is frequently transmitted via drive-by downloads or phishing emails with malicious attachments. Drive-by downloading happens when a person accesses an infected website without their knowledge, at which point malware is downloaded and installed.

To know more about ransomware visit :-

https://brainly.com/question/14455233

#SPJ1

_____ is a wireless standard that enables temporary, short-range connection between mobile devices.

Answers

Bluetooth is a wireless standard that allows temporary, short-range connection between mobile devices.

Bluetooth technology enables mobile devices to communicate with each other without wires or cables. Bluetooth is relied on short-range radio frequency, and any mobile device that incorporates the bluetooth technology can communicate as long as it is within the specified distance.

It means that bluetooth is a wireless technology based on radio frequency to share data through mobile devices over a short distance, thus eliminating the need for cables or wires.

You can learn more about Bluetooth at

https://brainly.com/question/28778467

#SPJ4

What attack uses a precomputed list of all probable plaintext dictionary passwords and their matching hashes

Answers

Rainbow table attack uses a precomputed list of all probable plaintext dictionary passwords and their matching hashes.

What is meant by dictionary?

A dictionary is a list of words from the lexicon of one or more particular languages that is frequently alphabetized and may contain details about usage, pronunciation, etymologies, definitions, etc.It is a lexicographical reference that illustrates how the data are related to one another.The categories of general and specialized dictionaries are broadly distinguished. Instead of including every word in the language, specialized dictionaries include words in specific domains.There is some debate over whether lexicology and terminology are two distinct academic disciplines, however lexical elements that express concepts in certain fields are typically referred to as terms rather than words.Typically, when the word dictionary is used, a general-purpose monolingual dictionary is meant.

To learn more about dictionary refer to

https://brainly.com/question/18523388

#SPJ4

93.0% complete question a security operations center (soc) analyst investigates the propagation of a memory-resident virus across the network and notices a rapid consumption of network bandwidth, causing a denial of service (dos). what type of virus is this?

Answers

A worm virus causes a rapid consumption of network bandwidth, causing a denial of service (dos).

What is a worm virus?

Worms are a self-replicating form of malware, as well as a form of virus that infiltrate networks by taking advantage of openings and quickly moving from one machine to another. As a result, worms have the capacity to multiply and spread rapidly, potentially causing global system disruption in addition to local disruption. There are many similarities between a computer virus and worm symptoms.

Software flaws are the means by which worms spread. Additionally, they might be distributed via instant messaging, spam emails, or email attachments. When a file is opened, it may take the user to a malicious website or automatically download a worm on their device. The worm infects the device without the user's knowledge once it is there.

To learn more about worm virus, visit:

https://brainly.com/question/23463888

#SPJ4

The Bureau of Labor Statistics tracks U.S. productivity on a(n) _____ basis. a. monthly b. annual c. semiannual d. quarterly

Answers

The correct answer is  a. monthly The Bureau of Labor Statistics tracks U.S. productivity.

The Bureau of Labor Statistics (BLS) assesses labor productivity for the commercial and non-farm business sectors using value-added measures of production, which are closely tied to real gross domestic product (GDP). To aid in public and commercial decision-making, the Bureau of Labor Statistics collects data on the labor market, working conditions, price fluctuations, and productivity in the US economy. They use a range of techniques to collect information from Occupational Requirements Survey (ORS) respondents, including in-person visits, mail, phone, email, and video conversations.

To learn more about Labor click the link below:

brainly.com/question/14348614

#SPJ4

Question 6 computer 1 on network a sends a packet to computer 2 on network c. What's the last step that router z does after receiving the ethernet frame?.

Answers

A packet is sent from Computer 1 on Network A to Computer 2 on Network C. Reading the packet's header is the first thing Router Z does after receiving it.

What is a Router?

Data packets are routed through one or more networks using routers, which are network devices.

Data packets are routed by routers from their source to their destination.

For instance, in the example described in the statement, a computer on network A might send a packet to a computer on network C.

This router is responsible for receiving a packet from a computer on network A and transmitting it to the right computer on network C.

The way a router functions:

To decide how to route a packet, routers use internal routing tables.

As an illustration, when a router receives a packet, it scans the header to ascertain the packet's final destination.

The router then chooses where to route the packet based on the data in its routing table.

Therefore, a packet is sent from Computer 1 on Network A to Computer 2 on Network C. Reading the packet's header is the first thing Router Z does after receiving it.

Know more about a Router here:

brainly.com/question/24812743

#SPJ4

the size and shape of the _____ influences what a system component may look like.

Answers

A system component may have a design that depends on the motherboard's size and form.

In a computer, what exactly is the motherboard?

It is the circuit board that links all of your hardware to your processor, disperses electricity from your power supply, and establishes the several kinds of storage devices, memory modules, and graphics cards (among other expansion cards) that can connect to your PC.

Can you repair a damaged motherboard?

When this happens, many laptop users feel they need to buy a new one. A motherboard may, however, frequently be easily fixed in many situations. In other situations, you might be able to keep your current components while upgrading just the motherboard, saving you a ton of money.

To know more about motherboard's  visit :-

https://brainly.com/question/29834097

#SPJ4

Which attack embeds malware-distributing links in instant messages?
a. Spim

b. Spam

c. Tailgating

d. Phishing

Answers

Phishing attack embeds malware-distributing links in instant messages. The correct option is d.

What is phishing?

Phishing is an assault that tries to steal your money or your identity by tricking you into disclosing personal information on websites that look authentic but are actually fake, such as credit card numbers, bank account information, or passwords.

Phishing is the act of an attacker trying to get a user to do "the wrong thing," such as opening a malicious link or visiting a dubious website.

It may be one of the following kinds:

Sword PhishingWhaling.Vishing.Phishing in email.

Phishing operates by sending communications that appear to be from a reliable business or website.

The link in phishing mails typically directs the visitor to a bogus website that mimics the real thing.

Thus, the correct option is d.

For more details regarding phishing, visit:

https://brainly.com/question/24156548

#SPJ2

to calculate the total of the values in an array, a loop is used with an accumulator variable. T/F

Answers

True. A loop and an accumulator variable are used to calculate the sum of the values in an array.

Describe an array with an example.

A combination of corresponding data types generally called as array. For instance, if we need to store the names of 100 people, we can create a string type array that can hold 100 names. new String[] array String[100]; The array mentioned above is limited to 100 names.

We use arrays because...

When utilizing several variables, it might be confusing to keep big collections of data under one variable name. Arrays help prevent this. Data elements' organization: Distinct array algorithms, such as bubble sort, selection sort, and insertion sort, can aid in the clear organization of various data items.

To know more about Array visit:

https://brainly.com/question/29999458

#SPJ4

the value in a(n) ________ variable persists between function calls.

Answers

Although persistent variables are local to the function in which they are declared, their values persist across function calls.

What are persistent variables?

Between function calls, persistent variables in a function will keep their current state.

This indicates that for Simulink, the values will be maintained from one time-step to the next.

Storing a target's position so you can alter it dynamically throughout a task is an illustration of how to use a persistent variable.

A persistent variable must be defined as such and initialized before it may be used. It must be initialized with caution to the appropriate size (i.e. the size that it will be used in that function).

The isempty(x) function can be used to determine whether the variable x has been initialized, and if not, you can take advantage of the opportunity to initialize the persistent variable.

Hence, Although persistent variables are local to the function in which they are declared, their values persist across function calls.

learn more about persistent variables click here:

https://brainly.com/question/12947339

#SPJ4

many browsers and websites do not require the http:// and www portions of a web address.T/F

Answers

True. Many browsers and websites do not require the http:// and www portions of a web address.

The http:// and www portions are known as the protocol and subdomain respectively, and they are used to specify the type of connection and the specific server that hosts the website. However, most modern browsers automatically assume that a web address uses the HTTP protocol, so the http:// portion of the web address can often be omitted. Similarly, many websites do not require the www portion of the web address and can be accessed without it. This is because many website owners have set up their server to redirect any request to the website without the www subdomain to the version with the www subdomain.

Learn more about http, here https://brainly.com/question/13152961

#SPJ4

Your design team has recommended the need to distribute incoming traffic across multiple EC2 instances and also across multiple availability zones. Which AWS service can accomplish this

Answers

In the given situation Elastic Load Balancing AWS service will help the best to accomplish the target.

What is Elastic Load Balancing?

Our incoming traffic is automatically split among numerous targets, including EC2 instances, containers, and IP addresses in one or more Availability Zones, thanks to elastic load balancing.

It keeps track of the well-being of the registered targets, only sending traffic to those that are in good shape.

Application load balancers, network load balancers, and classic load balancers are all supported by elastic load balancing.

These load balancers can be used with Amazon ECS services.

HTTP/HTTPS (or Layer 7) traffic is routed via application load balancers.

Therefore, in the given situation Elastic Load Balancing AWS service will help the best to accomplish the target.

Know more about Elastic Load Balancing here:

https://brainly.com/question/29807059

#SPJ4

Correct question:

Your design team has recommended the need to distribute incoming traffic across multiple EC2 instances and also across multiple availability zones.

_____  AWS service can accomplish this.

Use the ______ element to associate a web page with an external style sheet.Question options:targetaincludelinklink

Answers

Utilize the CSS element to link a web page to an external style sheet. Web pages' backgrounds can be customised using CSS.

A web page's embedded styles are coded using this tag?

When you incorporate style sheet data using the tags in your document's head, you are referring to the use of embedded style sheets.

What component links an external style sheet to a web page?

The tag inside the head element is used by outside stylesheets. Relativity of the connection to our document is described by the rel property. Stylesheet will always be the value here.

To know more about CSS visit:-

https://brainly.com/question/29580872

#SPJ4

the field in a table that is used to relate that table to other tables is called the ____.

Answers

The field in a table that's used to link it to other tables is referred to as the . crucial first. An object-oriented database management system is one that blends relational and object database technologies (OODBMS).

What phrase describes a field in one database table that is utilized to link to another table?

To create the connections between the data in several tables, key fields are used.

How are a table and a database related?

Relational databases, which include two-dimensional tables containing connected data, are the most popular type of modern database. A relation is another name for a database table. Tables have columns and rows: A column is known as an attribute, and a row is known as a database record, or tuple.

To know more about database management system visit :-

https://brainly.com/question/13041278

#SPJ4

to increase the font size of selected text, chose the increase font size button, located ____.

Answers

To increase the font size of selected text, chose the increase font size button, located on the mini toolbar. Mini toolbar is one of the features in the Microsoft PowerPoint.

In technology, Microsoft PowerPoint generally can be defined as a presentation program, created by Dennis Austin and also Robert Gaskins at a software company named Forethought, Inc. Power point has several features, such as Adding, removing, and rearranging slide, Adding, removing, and changing slide transitions, Playing slide animations, and also font size. If we want to increase or decrease the size of font in the Power Point, we can edit in on the mini toolbar.

Here you can learn more about font size in Microsoft Excel https://brainly.com/question/1176902

#SPJ4

A vending machine that serves coffee pours a varying amount of liquid into a cup with varying mass. Assume that the masses of the liquid and the cup are independent. Here are summary statistics for the masses of the liquid and the cups:.

Answers

The expected weight of a selected cup filled with liquid is T's mean. T has a mean value of 400.

The table's data is as follows:

              Mean    Standard Deviation

Liquid      250g              20g

Cup         150g                10g

The liquid is represented by L, and cup by C.

The following formula for expected value is used to calculate the mean of T.

E(L + C)

Because L and C are unrelated random variables,

E(L+C)=E(L)+E(C)

Where E(L) and E(C) are the mean liquid and cup values, respectively.

The equation is transformed into

E(L+C)=250g+150g

E(L+C)=400g

Hence, the mean of T is 400

In mathematics, particularly in statistics, there are several types of means. Each mean serves to summarise a given group of data, often to better understand the overall value (magnitude and sign) of a given data set.

The arithmetic mean, also known as "arithmetic average," is a measure of the central tendency of a finite set of numbers: specifically, the sum of the values divided by the number of values.

Learn more about mean here:

https://brainly.com/question/19168419

#SPJ4

all of the following are types of multimedia and entertainment software except ________.

Answers

The exception is productive software; the rest of the list is made up of multimedia and entertainment software.

What kind of software does multimedia software fall under?

Software in the multimedia software category is used to view, produce, edit, and manage media, including animation, audio, video, and photographs. Users can combine several types of information into a single file or presentation using this feature as well.

What form of software program is not a productivity software application?

To edit photographs, apply filters, crop them, and do other things, we utilize software for image editing. Since it cannot be called productivity software, Multimedia is made up of the following five fundamental components: text, graphics, audio, video, and animation.

To know more about productive software visit :-

https://brainly.com/question/21279421

#SPJ4

You are installing a Redundant Array of Independent Disks 1 (RAID 1) and want to ensure that the controller card is not a single point of failure. What technique do you need to employ in this configuration

Answers

You need to use a RAID 1+0 (RAID 10) configuration. RAID 10 is a combination of RAID 1 and RAID 0, providing a high level of fault tolerance and performance.

Using RAID 10 for Redundancy and Performance in a RAID 1 Configuration

RAID 10 is a combination of RAID 1 and RAID 0.

It offers a high level of fault tolerance, as it mirrors data across multiple drives, while also striping data across multiple drives to increase performance. This configuration ensures that data is safe even if a drive fails, as the data is stored in multiple locations, and the controller card is not a single point of failure. RAID 10 does come at a cost, as it requires at least four drives, and the capacity is reduced due to the mirroring of data. However, it is an ideal solution for those looking for a high level of redundancy and performance.

Learn more bout RAID 10: https://brainly.com/question/19340038

#SPJ4

PLEASE HELP QUICK
1. What are the advantages and disadvantages of a career in the hospitality and tourism industry? Compare and contrast what you believe to be the most prominent advantages and disadvantages and evaluate whether the advantages outweigh the disadvantages or vice versa.
2. Jannah is teaching a course on hospitality and tourism. She wants to demonstrate to the class what a positive attitude and good work habits look like by acting out a scene or two. She knows at least one scene should be demonstrating proper phone etiquette. Describe what this would look like. Then, come up with another scene that she could act out to demonstrate characteristics and etiquette that are important to success in the hospitality and tourism industry and why.
3. Todd knows that he wants to work in hospitality and tourism, but he isn’t sure that he wants to attend college. Compare and contrast the education or training and certifications needed for several different careers in the hospitality and tourism industry that could help Todd decide what his next steps are.
4. Remember Michael? Turns out he took the job as a dishwasher so he could get restaurant experience and move closer to his dream of becoming a chef. Think about Michael in ten years. He is applying to be chef de cuisine at a local fine dining restaurant. This is a management and leadership position. Thinking about Michael’s likely career trajectory from dishwasher to chef, what elements might Michael include in a digital portfolio to make him a competitive candidate for the chef de cuisine job? Why might it be important for Michael to create a portfolio when applying for this job?
5. Why are ethics important in the hospitality and tourism industry? Compare and contrast appropriate/inappropriate workplace social behavior and work ethics.

Answers

Advantages of a career in the hospitality and tourism industry can include:

Variety of job opportunities: The industry offers a wide range of jobs such as hotel management, event planning, culinary arts, travel planning, and more.Opportunity to travel: Many jobs in the industry involve traveling to different locations and experiencing new cultures.Interacting with people: Many jobs in the industry involve interacting with people and providing excellent customer service.

Disadvantages of a career in the hospitality and tourism industry can include:

Long and irregular hours: Many jobs in the industry require working evenings, weekends, and holidays.Stressful environment: The industry can be fast-paced and demanding, which can lead to stress and burnout.

2. Jannah could act out a scene in which she demonstrates proper phone etiquette by portraying a customer service representative answering a call. She would greet the caller with a friendly and professional tone, clearly state the company's name, listen actively and attentively to the caller's inquiry, provide accurate and helpful information, and end the call politely.

3. There are several different careers in the hospitality and tourism industry that Todd could consider. A few options include:

Hotel management: This career path typically requires a college degree in hotel management or a related field. Additionally, many hotels offer on-the-job training programs for management positions.Event planning: This career path can be pursued with a college degree in event planning or a related field, but it is also possible to enter this field with experience and on-the-job training.

4. Michael would likely include the following elements in his digital portfolio to make him a competitive candidate for the chef de cuisine job:

Examples of his culinary skills, such as photographs of dishes he has created or videos of him preparing foodTestimonials from past supervisors and colleaguesDetails of his education and training, such as culinary school or apprenticeship programsA list of his past work experience, including his time as a dishwasher and any other relevant positions he held in the restaurant industry

5. Ethics are important in the hospitality and tourism industry because the industry relies on providing good service to customers. Inappropriate workplace social behavior and work ethics can lead to poor customer experiences and damage the reputation of the business. Examples of appropriate workplace social behavior include treating customers and colleagues with respect,

What is the career about?

Jannah could act out is a role play of a server in a restaurant. She should demonstrate excellent customer service skills, such as active listening, taking accurate orders, handling complaints with tact and professionalism, and providing a warm and welcoming atmosphere.

Therefore, It is important for Michael to create a portfolio when applying for this job because it allows him to showcase his skills, experience, and qualifications in a clear and organized way, making it easier for potential employers to see why he would be a good fit for the position.

Learn more about hospitality from

https://brainly.com/question/618712

#SPJ1

Which of the following statements illustrates Patient Safety with data-entry? O Always validate/confirm the patient's date of birth (DOB) is accurately written on all hard copies presentod and obtain/ record on all hardcopies if not present. O Retrieve the product from the inventery shelf to type the NDC in the drug search field on R×Connect. O Never retrieve product from the inventory shey in order to type the NDC in the druff seareh field on RxConneet instead of typing in drug name, strength. O Always double check quality alerts and look-alike drug pairings. O Always validate/confirm patient allergy statis on each interaction to ensure an up-to-dare pasient record and document No Known Drug Autory pes (NKKD) whon idonetied)

Answers

The  statement that illustrates Patient Safety with data-entry is option A: "Always validate/confirm patient allergy status on each interaction to ensure an up-to-date patient record and document No Known Drug Allergies (NKDA) when identified."

What is Patient Safety  about?

Accurate and complete patient records are important for ensuring patient safety. By confirming the patient's allergy status on each interaction, the healthcare provider can ensure that the patient's record is up-to-date and that any known allergies are properly documented.

This can help prevent errors, such as prescribing a medication that the patient is allergic to, which could have serious consequences.

Therefore, Other practices that can help ensure patient safety with data-entry include validating the patient's date of birth (DOB) on all hard copies, double-checking quality alerts and look-alike drug pairings, and avoiding the use of abbreviations or slang when entering data.

Learn more about Patient Safety from

https://brainly.com/question/28077991

#SPJ1

The EPA limit for lead in the soil of play areas is 400 ppm. This is the same as A) 400 μg lead in each kilogram of soil. B) 400 μg lead in each milligram of soil. C) 400 mg lead in each gram of soil. D) 400 mg lead in each kilogram of soil. E) 400 g lead in each kilogram of soil.

Answers

The EPA has set a 400 ppm lead soil limit for play areas. For every kilogram of soil, this equates to 400 milligrams of lead.

What is the lead allowed limit?

For lead, the NIOSH Recommended Exposure Limit (REL) is a time-weighted average of 50 g/m3 of air over an 8-hour period. Lead's Permissible Exposure Limit (PEL), as mandated by OSHA, cannot be more than 50 g/m3 averaged over an 8-hour period.

The amount of lead in the soil?

All soils contain lead by nature. It typically ranges from 15 to 40 milligrams of lead per kilogram of soil (mg/kg), or parts per million (ppm) of lead in the soil.

To know more about EPA visit :-

https://brainly.com/question/29644646

#SPJ1

Digital signatures should be created using processes and products that are based on the ____________.
A) DSS
B) NIST
C) HTTPS
D) SSL

Answers

The DSS should be used to create digital signatures utilizing procedures and tools.

How does cryptography work to establish a digital signature?

Using public key cryptography, also referred to as asymmetric cryptography, digital signatures are generated and confirmed. A public key scheme, like RSA, can be used to create two keys that are mathematically linked: a private key and a public key.

What criteria must a digital signature system meet?

There are two essential qualities needed. First, by utilizing the associated public key, the validity of a signature produced from a fixed message and fixed private key may be confirmed. Second, it should be computationally impossible to produce a legal signature for a party that is unaware of the transaction.

To know more about Digital signatures visit:-

https://brainly.com/question/29804138

#SPJ4

After choosing a location for your art exhibition, what can you do or use to impart your intention on the space itself?


models, hired attendees, and an overall lack of effort


decorations, lighting, and pouring love into your effort


signage, other people’s art, and family photos


appetizers, beverages, and balloons

Answers

Answer:

We’ve created seven key steps when it comes to how to make an exhibition successful.

Set Your Goals

Pick a Desirable Venue or Space

Research Your Competitors

Get the Word Out

Create Helpful Promotional Material

Design a Great Display

Utilise Innovative Technology

Other Questions
An ideal gas is contained in a vessel of fixed volume at a temperatureo of 300.0 K. The tempterature is increased to 900.K. By what factor is the pressure in the vessel multiplied Please help me !!! 250 ml to infuse over 90 min . How many ml per hr will infuse Acellus Chem HELP Question in picturee I WILL GIVE BRAINLIEST A dolphin has a kinetic energy of 2800 [J] and a mass of 75 [kg]. What is the velocity of the mammal? for a large part of russian history, the russian territory was being controlled by which group?A. The ottomans B. The RomansC. The EgyptiansD. The mongols five digit numbers divisible by 12 13. carries all sorts of molecules to the extracellular space a. Find the area of the region enclosed by one loop of the curve. r = sin(10)b. Find the area that it encloses r = 4 + 2 cos() Read the excerpt of the following poem."A Dialogue between Old England and New" By Anne BradstreetNew England.Alas, dear Mother, fairest Queen and best,With honour, wealth, and peace happy and blest,What ails thee hang thy head, and cross thine arms,And sit i' the dust to sigh these sad alarms?What deluge of new woes thus over-whelmThe glories of thy ever famous Realm?What means this wailing tone, this mournful guise?Ah, tell thy Daughter; she may sympathize.Old England.Art ignorant indeed of these my woes,Or must my forced tongue these griefs disclose,And must my self dissect my tatter'd state,Which Amazed Christendom stands wondering at?And thou a child, a Limb, and dost not feelMy weak'ned fainting body now to reel?This physic-purging-potion I have takenWill bring Consumption or an Ague quaking,Unless some Cordial thou fetch from high,Which present help may ease my malady.If I decease, dost think thou shalt survive?Or by my wasting state dost think to thrive?Then weigh our case, if 't be not justly sad.Let me lament alone, while thou art glad.Why is New England referred to as a "daughter" and a "Limb" of Old England? Because it's younger than Old England Because it's a territory of Old England Because it's trying to be just like Old England Because it's in opposition to Old England in war one of the important properties of a column is whether or not it is ________. Last year your salary for your full-time job was $23,000. Youcontributed $1,000 to your company's retirement plan. Yoursavings account interest totaled $35. And Your healthinsurance premiums totaled $2,400. You are married andtook the standard deduction of 24,000. What is your taxableincome? mark!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! discuss the steps to create a spotlight effect using maskingplease give me answer A researcher designs an experiment to test the effects of playing video games on memory. The experimental group in this study would ________. Solve.12. x + 6 / 2 = 12 "That any attempts by congress to interfere with the institution of slavery in any of the territories of the United States would create just grounds of alarm in many of the States of the union; and that such interference is unnecessary, inexpedient, and in violation of good faith; since, when any such territory applies for admission in to the union as a state, the people thereof alone have the right, and should be left free and unrestrained, to decide such question for themselves."-Source: State Senator Broderick, Journal of the California Legislature, 1850The ideas about slavery in the territories expressed in the excerpt are most consistent with which of the following?O the belief in Manifest DestinyO the ideas of the Second Great AwakeningO the principle of popular sovereigntyO the theory of nullification sing the 28/36 ratio, determine the maximum allowable recurring debt for someone with a monthly income of $3,200. a. $256 b. $512 c. $640 d. $896 from a Discount City store, and downloads $300 worth of digital music from . Circuit Stereo City. To be enforceable, the contract that must be in writing is the purchase of "The Mystery of the Broken Vase"By Caitlin MitchellMrs. McEnroe's crystal vase was her most prized possession, a gift from her husband on their 10th wedding anniversary. It was specially handmade in Italy and shipped all the way over to their home in Cleveland, Ohio. It sat by their bedside table, and all the McEnroe children knew that they were not allowed anywhere near it -they couldn't even breathe near it -that's how much their mom loved the vase. Last Saturday, at 10:42am, a loud CRASH! was heard from the kitchen, and Mrs. McEnroe's heart dropped, knowing that it could only be the vase. She threw down her dishtowel and ran upstairs, taking the stairs two at a time. Upon entering her bedroom, her worst fears were confirmed. There lay the vase smashed into a thousand tiny pieces -there would be no possible way to glue it all back together.Mrs. McEnroe's eyes slowly turned away from the vase and settled upon her two sons -James and Trevor. Much to her surprise, James was holding a baseball bat in his hands and staring wide-eyed in disbelief. James was her golden child, who always followed the rules and had never gotten into trouble at school or at home. He was so honest that he once confessed to accidentally leaving the back door open and allowing their dog, Huckleberry, to escape, knowing full-well that he would be grounded for two weeks for that mistake! Trevor, the family superstar, who was a shortstop for the Bears Baseball Club, was angrily looking toward James. Trevor always seemed to be getting himself into trouble. None of his new toys stayed new for long -they always ended up broken within hours of being opened. He rarely listened to his parents or followed the rules in school."Mom! It wasn't me!" yelled Trevor loudly while pointing his finger at James, "He did it! I promise it wasn't me." "Mom, you know I would never do something like that!" James exclaimed, "I know we're not supposed to go anywhere near your vase. I was walking past your bedroom when I saw Trevor in here with his baseball bat. I grabbed it from him as fast as I could!" he cried."Trevor! Go to your room immediately," Mrs. McEnroe shouted, "You are grounded for the rest of the month. I am so disappointed in you. That was my favorite vase," she whined as tears began to run down her face. As Trevor stomped out of the room while staring with squinted eyes at James, James ran and gave his mom a big hug. "Mom! I can't believe Trevor did that to you. I'm going to start saving my allowance to buy you a new vase," James said. While James wrapped his arms around his mom's waist, a small smirk curled across his face.1.what is the first reason (premise) for your claim?Introduce your evidence and include a quote from the text that supports your claim. Don't forget quotation marks. *Challenge yourself: add background information and "set the scene" for the quote. 1.Choose a sentence starter to begin your sentence:According to the text, The author states, The author writes, According to the author1.Justify your evidence by writing at least two sentences that explain why the quote you chose from the piece of literature supports your premise and your claim?2.Justification Sentence #1 (connect your evidence to your premise)?1.Justification Sentence #2 (connect your evidence to your claim)?