1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vagabundo [1.1K]
3 years ago
7

The first step to accurate coding is to identify the ___________ in the diagnostic statement.

Computers and Technology
1 answer:
jeka943 years ago
5 0

Answer: Main term

Explanation:

The first step and main step of the accurate coding is to identify the main term in diagnostic statement, that are typically find in the medical records of the patient.

The programmer while coding the data locating main term in the front of the data that is index. So, it make easy to analysis the given statement.

Main term included any type of diseases, alphabets and symptoms which is important to highlight.

You might be interested in
Wanda wants to find some basic information about her computer, for example, what operating system and how much RAM are installed
Gnoma [55]

Answer:

Its very simple you just need to go on your desktop there right click on Computer/This PC icon and then click on properties. Here you can have all the basic information of the PC including OS version processor and RAM.

6 0
3 years ago
In a pinhole camera, the image seen in the camera will be inverted<br><br> true<br> false
Sati [7]
Hey there,

Based on my research, I believe that your correct answer may be "True".<span>the image seen in the camera will be inverted because it is a pinhole camera.

~Jurgen</span>
6 0
3 years ago
Read 2 more answers
Most network cards contain a port that accepts a(n) ____, which looks similar to a telephone connector but is larger.
Vadim26 [7]
YOUR ANSWER IS -------- It accepts a RJ-45 connector
hope i helped you :).
take care
8 0
4 years ago
Help ASAP please ?
mylen [45]
Okay, so since I don't completely understand your question, I'll just try my best to explain each of them.

1. Someone can find your location based on a photo that you posted; If you tagged the location, obviously they can find the location. If you put in the caption where you were when you took the photo, again yes, they would be able to find the location. If you were in a well known location when you took the picture and you can clearly see the background or the setting, with context clues you can figure it out, but as far as the social media platform telling the public where the picture was taken or posted, it is not authorized to give out the location.

2. Colleges use social media during the admission process; Some colleges do check the social media, not all but some. Mostly the platforms where you are most careless, so watch out. You can decide if you want your account to be public or private in the account settings.

3. items posted online can be removed at anytime; yes it can be removed, but depending on how popular the post was, people will still remember it.

4. Things you post online become public information; yes and no. On any and all social media platforms, there is a setting where you can choose the audiences the post reaches. There is the public setting where it's completely public and out into the world, there is the privacy setting where you are the only one who can view it, there is the friends setting where your friends can view your posts, and on some there are the friends/followers except... where you can choose specific people that can't view your post/s, and finally there is the specific friends that can view the post. You can also decide if you want your account in general to be public or private, which you can go into the settings and decide.

5. Employers screen job candidates based on social medias; like number 2 up there, some employers do check your social medias, but if you have you account settings as private they will have to request access.

I hope I helped at least a little! If I didn't i'm sorry i didn't completely understand the question so I tried my best.
If I did help, I'd appreciate it if you would give me brainliest! Thank you!
5 0
3 years ago
Read 2 more answers
8.17 Lab: Strings of a Frequency Write a program that reads whitespace delimited strings (words) and an integer (freq). Then, th
gavmur [86]

Answer:

def occurencesOfWords(words,freq):

  frequency_dictionary={}

  matched_frequency_words=[]

  for i in range(len(words)):

      counter=1

      a=words[i].lower()

      for j in range(len(words)):

          if(i==j):

              continue

          b=words[j].lower()

          if(a==b):

              counter+=1

      frequency_dictionary[words[i]]=counter

  for key in frequency_dictionary:

      if(frequency_dictionary[key]==freq):

          matched_frequency_words.append(key)

  return matched_frequency_words

if __name__=='__main__':

  user_input=input()

  freq=int(input())

  words=user_input.split(" ");

  required_words=occurencesOfWords(words,freq)

  for s in required_words:

      print(s)

Explanation:

  • Inside the occurencesOfWords function, initialize a frequency_dictionary that is used to store the string and the frequency of that specific string .
  • matched_frequency_words is an array that is used to store each string whose frequency matches with the provided frequency
  • Run a nested for loop up to the length of words and inside the nested for loop, skip the iteration if both variables i and j are equal as both strings are at same index.
  • Increment the counter variable, if two string are equal.
  • Loop through the frequency_dictionary to get the matching frequency strings .
  • Finally test the program inside the main function.
5 0
3 years ago
Other questions:
  • (Microsoft excel) The data selected to create a table must include
    6·2 answers
  • Which osi model layer manages data encryption?
    14·1 answer
  • Which of the following types of copyright license is most appropriate if you write a novel and would like to post it online for
    11·1 answer
  • Do rats smell good? what do you think
    8·2 answers
  • A network resource is masquerading as a network server and is causing hosts on the network to send requests to the attacker rath
    11·1 answer
  • The first thing you should select if you're using an Address Block or Greeting Line is
    11·1 answer
  • Host to IP address lookup and its reverse lookup option are very important network services for any size network. It is also how
    9·1 answer
  • Hardware refers to programs and protocols used on a computer system.<br><br> True<br> False
    8·2 answers
  • Need help ASAP <br><br> Thankss + BRAINLIST only for correct answers
    10·1 answer
  • What does the following code print to the console?<br> if 88 * 100:<br> print("cardio")
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!