1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lilit [14]
4 years ago
14

How is a correction made to an Electronic health record?

Computers and Technology
1 answer:
Tresset [83]4 years ago
4 0

By adding an addendum to the record. Usually you can mark the entry as an error and then 
add and addendum in the system and electronically sign it. There is usually a reference or link to the erroneous documentation within, at or near the addendum.
You might be interested in
Name and summarize the four levels of administration necessary to keep human services organization operating smoothly
aliina [53]
The four levels of organization incorporate official chiefs, program executives, improvement chiefs, and give essayists. The meaning of business organization is a program of study offered at colleges and schools that attention on business hypothesis, practices, and administration. A case of business organization is a class on the standards of bookkeeping.
3 0
4 years ago
Read 2 more answers
Hodaya missed several days of her online nursing class and needs to catch up. The most effective way she can do
Snowcat [4.5K]

Answer

send an individual e-mail to her teacher for advice.

8 0
3 years ago
Read 2 more answers
Write a set of directions that tells an operating system’s dispatcher what to do when a process time slice is over.
tatyana61 [14]
<span> Directions that tells an operating system's dispatcher what to do when a process's time slice is over.Wait for the interrupt handler to be execute. Allow the scheduler to update the process table. Select the process form the process table that has the highest priority, restart the time, and allow the selected process to begin its time slice. Directions that tells an operating system's dispatcher what to do when a process's time slice is over. Signal an interrupt, save the current position, execute the current position, execute the interrupt handler, and switch to the next process until the process or processes is complete. If a process executes an I/O request, the time slice of that process will be terminated because it would waste the remaining time waiting for the controller to perform the request. A situation in a time-sharing system in which a process does not consume the entire time slice allotted to it. Client/server model Defines the basic roles played by the processes as being that of either a client, which makes requests of other processes Components of the email address </span>
6 0
4 years ago
Read 2 more answers
Detailed ___ highest risk warnings can incude identifiying which vendor updates apply to which vulnerablities as well as which t
BigorU [14]

Answer:

Intelligence  is the correct answer.

Explanation:

Because the high-risk intelligence is the complicated warning that can be involved in recognizing those vendors who update the following and apply it to the exposure in which defenses have been founded to work against the particular report of the vulnerability. So, that's why the following answer is not false.

4 0
3 years ago
An IT engineer is planning a website upgrade with load balancing features. What technology is used? A) Web Proxy B) Round Robin
BlackZzzverrR [31]

Answer: (B): Round Robin

Explanation: Load Balancing refers to the systemic and effective distribution of network or application traffic across multiple severs in a sever farm. Every algorithm that balances load sits between the client's device and the back end severs.

Load Balancers are majorly used to increase the reliability and capacity of applications.

Round Robin is a type of algorithm that can be used to upgrade a website with load balancing features. It is the most widely used load balancing algorithm and it is a simple way to distribute requests across a group of servers.

3 0
3 years ago
Other questions:
  • While configuring a new 802.11g wireless network, you discover another wireless network within range that uses the same channel
    13·1 answer
  • Microsoft words spell checker
    8·1 answer
  • In python:
    8·1 answer
  • On a hard disk each track is divided into invisible wedge-shaped sections called _______
    15·1 answer
  • At what x position are the ellipses drawn??? thanks ♡​
    6·1 answer
  • What is the primary means by which attackers infect computers with these attacks? How do these attacks commonly occur?
    8·1 answer
  • When do I use while loops
    12·1 answer
  • What types of actions exist in activity diagrams?<br>​
    8·1 answer
  • Explain the concept of “survival of the fittest”
    15·1 answer
  • UCLA Extension's marketing department wants
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!