1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VladimirAG [237]
1 year ago
15

The field that uses technology to manipulate and use information to improve healthcare is known as:_______

Computers and Technology
1 answer:
Sergeu [11.5K]1 year ago
7 0

Answer:

Health informatics

Explanation:

You might be interested in
Everybody at a company is assigned a unique 9 digit ID. How many unique IDs exist?
timama [110]

Answer:

3,265,920 unique ID exist.

Explanation:

The nine digits are from 0 to 9, there are ten bits from 0 -9,

0, 1, 2, 3, 4, 5, 6, 7, 8, 9

The first is select from the highest bit (9), and the second is selected at random from 0 - 9, the third bit to the last must be unique and different from each other;

number of unique IDs = 9 × 9 × 8 × 7 × 6 × 5 × 4 × 3 × 2

Multiplying the nine bits of unique IDs = 3,265,920.

3 0
2 years ago
What type of video games do you prefer buying?
Tamiku [17]
Mine is minecraft maybe
6 0
3 years ago
What is local area network​
otez555 [7]

Explanation:

local area network is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building. By contrast, a wide area network not only covers a larger geographic distance, but also generally involves leased telecommunication circuits.

<em><u>hope</u></em><em><u> </u></em><em><u>it</u></em><em><u> </u></em><em><u>helps</u></em>

3 0
3 years ago
Read 2 more answers
Apart from the challenges of heterogeneity, business and social change and trust and security, identify other problems and chall
Klio2033 [76]

Answer:

The challenge of cost control

The challenge of competence

The challenge of reduced system delivery times.

Explanation:The Challenge of Cost control is a major challenge affecting the software engineering in the 21st century,the cost of Microchips and other hardware are constantly rising.

The challenge of competence is another major challenge affecting software engineering in the 21st century,as most software engineers lack the required competence to handle some of the issues facing softwares.

The challenge of reduced system delivery times is a major challenge likely to affect software engineering in the 21st century,as people required the software to be available in the shortest possible time.

7 0
3 years ago
Melanie needs to ensure that readers are able to locate specific sections within a document easily. What should she include in t
kozerog [31]

Answer:

in this case is table of contents

Explanation:

If Melanie want to organize the content, she can use index or table of content, but for specific sections table of content is easier to use.

For example:

Melanie can organize the titles in different levels like subtitle at the same page.

1 History..................................1

1.2 USA History....................1

 1.3 California History..........1

Melanie have to mark every title and subtitle in the document like "History -title 1", "USA History - title 2", "California History - title 3".

Melanie can create the table on content automatically in Word: at the section -> Reference -> table of content.

Readers can locate every important section by page, title and subtitle.

5 0
2 years ago
Read 2 more answers
Other questions:
  • What is a programming method that provides for interactive modules to a website?
    12·1 answer
  • Write the definition of a function typing_speed, that receives two parameters. The first is the number of words that a person ha
    9·1 answer
  • A new computer workstation has been installed in a small office. the user of the workstation can print a document using a networ
    9·1 answer
  • The United States Army retains a history of all equipment acquisition from approval of requirements through funding, authorizing
    13·1 answer
  • What Active Directory object enables an administrator to configure password settings for users or groups that are different from
    9·1 answer
  • Assume that ip has been declared to be a pointer to int and that enrollment has been declared to be an array of 20 elements . As
    13·1 answer
  • is used to reduce the chance of an individual violating information security and breaching the confidentiality, integrity, or av
    6·1 answer
  • Explain the look of a document which contains several different font sizes and font colors​
    13·1 answer
  • Write a Python function that join the two string and print it ​
    14·2 answers
  • A person who breaks into a computer, network, or online site is called
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!