1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ExtremeBDS [4]
2 years ago
8

WHAT TYPES OF ACTIVITIES ARE PERFORMED BY HEALTH CARE SOFTWARES

Computers and Technology
1 answer:
Makovka662 [10]2 years ago
6 0

Answer:

lectronic Health Record (EHR) Software. ...

Medical database software. ...

Medical research software. ...

Medical diagnosis software. ...

Medical imaging software. ...

E-prescribing software. ...

Telemedicine software. ...

Appointment scheduling (booking) software.

You might be interested in
Bob flys a drone which has a 20 megapixel camera attached, what is the definition of "megapixel in this context? Why does it mat
Verizon [17]

Answer:

megapixel refers to the unit of resolution i.e. one million

Explanation:

Interestingly the higher the pixels does not mean higher quality of image, it's more about the camera and it's sensor.

I am a photographer and a licensed drone pilot and have researched the subject to help with camera choice, both DSLR and drone.

5 0
2 years ago
In the context of computer crimes, those who attempt to destroy the infrastructure components of governments and financial insti
elixir [45]

In the context of computer crimes, those who attempt to destroy the infrastructure components of governments and financial institutions are known as <u>d. cyber terrorists</u>.

<u>Explanation</u>:

Cyber crime means crime committed with the help of computer and internet. Cyber terrorism means crime that causes damage to infrastructure components of financial institutions and government office and causes threat to the society.

Cyber terrorists are person who involve in cyber terrorism. The systems used in the governments and financial institutions should be protected with hardware and software to avoid cyber terrorism.

This kind of cyber terrorism is very dangerous, as they hack the system and destroy the valuable information stored in it.

5 0
2 years ago
Which tool should you use to modify firewall rules on a windows server?
vovikov84 [41]

Click Tools and select Windows Firewall with Advanced Security. Review the current configuration settings by selecting Windows Firewall Properties from the MMC landing page. You can access and modify the settings for each of the three firewall profiles, Domain, Private, and Public, as well as IPSec settings.

3 0
3 years ago
The following is not an example of a character device:_____.
melisa1 [442]

The following is not an instance of a character device:  <u>mouse sound card.</u>

<h3>What is a char machine?</h3>

Character machines are devices that do not have physically addressable storage media, such as tape purposes or serial ports, where I/O is normally served in a byte stream.

<h3>What are feeling and block devices?</h3>

The block machines access the disk using the system's normal buffering mechanism. The surface devices provide for direct communication between the disk and the user's read or write buffer.

To learn more about Character machines, refer

brainly.com/question/25280941

#SPJ4

6 0
1 year ago
Which of the following is not an operating system?
Arturiano [62]

Answer:

4

Explanation

internet explore is a browser

4 0
3 years ago
Read 2 more answers
Other questions:
  • Some files appear dimmed in one of the default folders on your computer. What would be the best course of action? A. Leave the f
    11·1 answer
  • What is an example of how pseudo - randomness is used to creative variation​
    5·1 answer
  • What happens when the following code segment executes if test.txt does not exist?:<br> A,B,C,D?
    7·1 answer
  • Hi weegy, what is the latest android os?
    9·1 answer
  • What are the elements of a good study environment? Check all that apply.
    9·2 answers
  • A jackhammer uses pressurized gas to transmit force to the hammer bit. What type of mechanical system is it?
    13·1 answer
  • The pay of an hourly worker is calculated by multiplying the hours worked by the hourly rate—up to 40 hours; any hours worked be
    11·1 answer
  • On his website, Mario has a video that visitors must click to play. He wants the video to play automatically when the page loads
    9·1 answer
  • What is obamams last name
    9·2 answers
  • 11. Explain different types of program control with suitable flow chart.<br> N
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!