1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jok3333 [9.3K]
2 years ago
9

A co-worker is called away for a short errand and leave the clinical PC logged onto the Confidential Information System. You nee

d to look up information using the same computer system to provide treatment. What should you do
Computers and Technology
1 answer:
Bogdan [553]2 years ago
7 0

Since you need to look up information on the same computer system to provide treatment, you should do the following: Log your co-worker off and then login with your Username (User ID) and Password.

<h3>What is a Confidential Information System?</h3>

A Confidential Information System can be defined as a database that contains the personal information that are electronically created or shared with a company by a grantee or client, especially for specific purposes such as:

  • Treatment
  • Contract bid
  • Employment

In this scenario, you should do the following: Log your co-worker off and then login with your Username (User ID) and Password since you need to look up information on the same computer system to provide treatment.

Read more on confidential information here: brainly.com/question/25530020

You might be interested in
You may have come across websites that not only ask you for a username and password, but then ask you to answer pre-selected per
raketka [301]

Answer:

The questions are used to secure and identify you furthermore. Answering personal questions that only you can answer will deter someone from hacking into your account that easily.

Explanation:

5 0
3 years ago
class student_record { public: int age; string name; double gpa; }; Implement a void function that has five formal parameters: a
Setler79 [48]

Answer:

void delete_record(student_record *arr, int &size, int age, string name, double gpa) {

int index = -1;

if (arr != NULL && size > 0) {

for (int i = 0; i < size; ++i) {

if (arr[i].age == age && arr[i].name == name && arr[i].gpa == gpa) {

index = i;

break;

}

}

}

if (index != -1) {

for (int i = index; i < size - 1; ++i) {

arr[i] = arr[i + 1];

}

size--;

}

}

8 0
3 years ago
Which of the following is an example of an access object?
Julli [10]

Answer:

The Data Access Object pattern is a structural pattern that allows us to isolate the application/business layer from the persistence layer

<h2>I'm not sure but tell me if its right or wrong in order to help others</h2>

Explanation:

4 0
3 years ago
Which text format is this “The transcribed text does not include speech errors, false starts and various filler words, such as:
AnnZ [28]

The answer is Clean Verbatim. In Clean Verbatim, the transcription does not include speech errors, false starts, and various filler words. It removes all of the so-called ‘extras’ that you may hear in an audio or video recording – “umms,” “likes,” “you knows” and other filler words, as well as stuttering. Clean Verbatim is ideal for business and marketing transcription purposes.

6 0
3 years ago
Using the flowchart diagram, identify the decision point of this solution. Identify vendors. Calculate amount due. Determine dat
andreev551 [17]

Answer:

answer is "is there an early pay discount"

Explanation:

3 0
4 years ago
Read 2 more answers
Other questions:
  • 20 points/ When creating a storyboard, in which section do you mention how you move from one shot to the next?
    11·1 answer
  • Using a wireless network without the network owner's permission is known as ________.
    15·1 answer
  • What does a graphic organizer do
    6·1 answer
  • Unix is called a(n) ___________ operating system because it can run on a desktop pc or a server. operating systems installed on
    7·1 answer
  • Python: Write a program that generates 8 random scores (between 0 and 100), store them in an array,
    8·1 answer
  • By using password-stealing software, ________ capture what is typed on a keyboard and easily obtain enough personal information.
    5·1 answer
  • _______ data would be useful for creating a weekly status report for your manager that should reflect changes in real time.     
    10·2 answers
  • Question 6 of 10
    11·1 answer
  • Pls help will mark brainliest as soon as u awnser
    15·1 answer
  • Budgeting for a Computer
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!