1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
damaskus [11]
3 years ago
7

After an entry in the medical record has been written or keyed and an error is discovered, what procedure should be followed to

correct the error? (A) Use a pencil eraser to remove the entry on a written record; then write in the correction. (B) Use the delete or backspace key if the entry was keyed in; then key in the correction. (C) Draw a line through the error; then call the patient’s physician. (D) None of the above.
Computers and Technology
1 answer:
Readme [11.4K]3 years ago
5 0

Answer:

(C) Draw a line through the error; then call the patient’s physician.

Explanation:

According to my research on medical procedures, I can say that based on the information provided within the question the best procedure that should be taken in this situation would be to draw a line through the error; then call the patient’s physician. By doing so you get rid of the the error and by telling the patient's physician you get rid of any possibility of the physician still thinking that the error was something that was already done.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

You might be interested in
How is communication within healthcare different than communication within other industries ?
vfiekz [6]

Answer:

It has to be more specific and easier to understand because of its importance.

Explanation:

7 0
4 years ago
Why is internet download speed slower on a computer vs phone
oee [108]

Answer:

The difference in tech.

Explanation:

The biggest gap here is the computer's ability to be hardwired (ethernet). It is almost always faster.

3 0
2 years ago
Create a Python script that takes two parameters to do the following:-
tekilochka [14]

Answer:

import sys, time

from os import walk, remove

from os.path import exists, join, getsize, getctime

file_counter = [ ]

folder_name, file_size = argv

isExist = exists( folder_name )

if folder_name == True:

    for root, folder, files in walk( folder_name ):

          for file in files:

               if getsize( join ( root, file ) ) >= file_size:

                   file_log = [ ]

                   file_log.append( file )

                   file_log.append( join ( root, file) )

                   file_log.append( time.ctime( getctime( file ) ) )

                   file_counter.append( file_log )

               else:

                   remove ( join ( root, file ) )

Explanation:

The python script above output the filename, size and file creation date of any folder passed to it.

6 0
3 years ago
Five varieties of software​
Georgia [21]

Answer:

accounting software

project management software

time tracking software

communication software

product pricing software

Explanation:

8 0
3 years ago
A 32-bit number that's used to keep track of where you are in a sequence of TCP segments is known as a(n) ______ number.
scoray [572]

A <u>sequence</u> number is a 32-bit number that's used to indicate where you are in a sequence of TCP segments.

<h3>What is TCP?</h3>

TCP is an acronym for Transmission Control Protocol and it is an essential and important standard protocol of the Internet protocol network.

In Computer technology, TCP is an essential part of the transmission control protocol and internet protocol (TCP/IP) network which has a wide range of applications in the following areas:

  • File transfers
  • World wide web (WWW).
  • Remote administration
  • E-mail

In TCP segments, a <u>sequence</u> number is a 32-bit number that's typically used to indicate where an end user is in a sequence.

Read more on TCP here: brainly.com/question/17387945

8 0
2 years ago
Other questions:
  • Jenny needs to record the names of 30 students, write down the subjects they studied, and note their grades in each subject afte
    14·2 answers
  • Jen wants to protect the schools network from hackers,worms,and viruses.she also wants to regulate access to certain websites th
    15·2 answers
  • A type of font that has a decorative tail is A.Serif font B. Sans serif font C. Bubbles font D. Reading font
    7·1 answer
  • Ron wants to install an energy efficient and long lasting device for lighting in his new home. Which device should he use?
    11·2 answers
  • How do Filament 3D printers build a model?
    8·1 answer
  • You will extend zyLab3, by adding a Player class and extending the PokemonField class. You will be working with three.java files
    13·1 answer
  • Which feature enables you to make changes to all the slides of your presentation at the same time?
    8·1 answer
  • Why are Quick Parts useful in an Outlook message?
    10·2 answers
  • What type of loop allows you to indicate the starting value for the loop control variable, the test condition that controls loop
    14·1 answer
  • Which of the following is/are used in multimedia?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!