Preview

Unit 2 Labs

Powerful Essays
Open Document
Open Document
571 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 2 Labs
Lab 2.1 – Identify Business Rules, Attributes, and Candidate Keys
Step2

Are your patient records in a computer system already?
How is patient info followed and updated?
How do you process your reports?
How do you separate the dropped patients from the ones still in the program?
Do you classify patients by their health status?

Step 3

Business Rules:
The doctor must login to database and select patient’s records that he/she is seeing for that day.
Front Office workers are able to view medical history.
Nurses are able to view medical history and enter patient vital signs.
Doctors must complete form upon completion of appointment with patient.
Nurses can drop patients from program with the doctor’s approval.

Step 4

Security Rules:

Patient entity PatientVisit entity
a) Last, First MI Vitals, Doctors Notes

b) Last Name last name, date of visit, and time

c) Surrogate Key – Auto-Incremented numbers
Composite Key – a combination of patients’ last name, date of visit, and time

d) I chose the Surrogate Key because it can’t be traced back to any of the patient’s personal information and it will always be unique but it offers less protection against repeating the number.

I chose the Composite Key for the PatientVisit entity because it is a combination of the patient’s last name and their visit which makes it easier for reports and to view the document.

Lab 2.2 – Identify Entities, Attributes, and Business Rules

Step 3:
List Data Requirements
1. Allow IT Staff to edit all the Types of Software to be tracked. This includes type of software, licensing dates, status, and location.
2. Allow IT staff to enter, edit, and delete New Software Requests.
3. Allow IT staff to view the different licensing agreements and types. This includes viewing the license pricing per agreement.
4. Allow IT staff to sign out software to users with administrative privileges.
5. Allow IT Staff to update the status of software licenses.
6. Allow users, assigned users,

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 1 Labs JM

    • 964 Words
    • 5 Pages

    Exercise 1.4.4 – UCS is a standard of characters, it was created so that there would be…

    • 964 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 5 Lab JM

    • 625 Words
    • 5 Pages

    802.1 handle architecture, security, management, and internetworking of LAN, MAN, and WAN standardized by IEEE802. It provides internetworking, audio/video bridging, data center bridging and security.…

    • 625 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 8 Lab 8

    • 1017 Words
    • 8 Pages

    If you used the number of bytes instead you would get a whole different amount of possible networks which isn’t right.…

    • 1017 Words
    • 8 Pages
    Satisfactory Essays
  • Good Essays

    6 How many different methods of changing the date in the program are available in Medisoft?…

    • 484 Words
    • 4 Pages
    Good Essays
  • Good Essays

    unit 7 lab 10

    • 595 Words
    • 3 Pages

    Task 1: Hardware firewalls provide a strong degree of protection from most forms of attack coming from the outside to the internal network. Hardware firewalls can protect computers on a local area network and they can be implemented without much configuration difficulty.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    UNIT 2

    • 470 Words
    • 3 Pages

    5.) Write the pseudocode for a program that will determine the average miles per gallon a car gets. (Inputs should be miles driven and gallons of gas used)…

    • 470 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Lab

    • 293 Words
    • 2 Pages

    10. In order to craft back-up and recovery procedures, you need to review the IT systems, hardware, software and communications infrastructure needed to support business operations, functions and define how to maximize availability. This alignment of IT systems and components must be based on business operations , functions, and prioritizations. This prioritization is usually the result of a risk assessment and how those risks, threats, and vulnerabilities impact business operations and functions. What is the proper sequence of development and implementation for these following plans?…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Electronic health records are a health record for patients that are used between different health facilities and agencies. This system is used to improve effectiveness, quality care, and reduce cost (long term). This record of information contains the history of the patient’s visits to the healthcare facility all pertaining to documenting the contact information to patient histories and allergies. The record also contains a listing of medications, billing information, and additional data pertaining to the patient’s visit. The Computerized Physician Order Entry allows the physician to electronically enter patient’s orders and view patients care results. It can detect adverse effects of medical errors and reduce less patient suffering from receiving wrong medications.…

    • 363 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1 Lab 1

    • 422 Words
    • 3 Pages

    Unit 1 Lab 1.1 – Explore the AdventureWorks Database Using the SQL Server Management Studio…

    • 422 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Hipaa Assignment

    • 1613 Words
    • 7 Pages

    Privacy Rules: The privacy rule is a standard rule that addresses the use and disclosure of individual healthcare information. Your job as a health care organization is to implement, enforce, and protect the individual private information. They are important because it the organization responsibility to understand and control how the individual health information is well protected, while allowing the flow of health information needed to provide and promote high quality health care and to protect the public's health and well being. The regulations require providers to make a reasonable effort to disclose only that information which is necessary for securing payment and conducting standard health care operations such as audits and data collection. Security Rules: The security rule is created to protect the privacy of individual health information, while allowing covered healthcare organization to adopt new technologies to improve the quality and efficiency of patient care. The rule is designed to be flexible and scalable so a covered entity can implement policies, procedures, and technologies that are appropriate for the organization particular size, structure, and risks to individuals. The rule is national standards rule established to protect individuals’ electronic personal health information that is created, received, used, or maintained by the organization. Standardized transaction code sets rules (TCS): The TCS rule is created as a standard use of electronic transaction format. It is important because it is a set standard formats that helps ensure that claims, health care enrollment, health care payment, refer certification and authorization for health care are uniformed. It impacts staff duties and the organization by keeping the transaction organized and allows the process of a claim easier to manage.…

    • 1613 Words
    • 7 Pages
    Good Essays
  • Better Essays

    The Joint Commission

    • 1167 Words
    • 5 Pages

    The first goal listed by the Joint Commission (2013) includes improving the accuracy of resident identification. This primary goals focuses on helping to identifying a resident by using two specific identifiers. These identifiers are what help identify patients who are being treated with services and when given care (Joint Commission, 2013). Joint Commission’s safety goals confirm that wrong-resident mistakes can happen all stages of patient diagnosis and treatment.” For this reason, it is even more important to be able to get the proper identification to avoid such errors. The first goal in place was specifically set to identify the resident as the person who would be receiving care and to verify the service that the patient would be receiving at the same time. The Joint Commission (2013) allows for a residents name, identification number, and date of birth, telephone number or other person-specific identifiers to be acceptable.…

    • 1167 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Master Patient Index

    • 416 Words
    • 2 Pages

    When it comes to health records a lot of the problem of having a lot of duplicate records is the fact that people don’t take the time to search to see if there is a record of that patient or not. Because of this then the health system ends up with doubles of the same patient. It is important to identify duplicates so that the same patient doesn’t have two separate records. Failure to correctly identify an individual in the master patient index may result in one or more integrity problems. Several problems can arise if patient information is not located. For example these may include billing errors, performance of unnecessary duplicate tests, and increased legal exposure in the area of adverse treatment outcomes.…

    • 416 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    (2) The patient must be advised prior to the release of the medical information to the entity or entities maintaining the computer data bases. On the other hand, the patient has a right to know who has access to their medical records.…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Use And Maintain It

    • 4626 Words
    • 24 Pages

    Upskill Central Using Information Technology Access and Maintain the Use of Information Technology This page is intentionally Blank Access and Maintain the Use of Information Technology Candidate’s Name ___________________________________________________ This page is intentionally Blank Contents Gain authority to use IT equipment when required 7 The reasons why authority may be needed to access IT equipment 7 The relevant content of applicable regulations 7 Regulations can include: 7 Legislation can include: 8 Health & Safety at Work Act 1974 8 Display Screen Equipment Act 1992 8 Data Protection Act 1984 8 Copyright, Designs and Patents Act 1988 8 Control of Substances Hazardous to Health ( COSHH ) 8 Enter the IT equipment system 9…

    • 4626 Words
    • 24 Pages
    Good Essays
  • Powerful Essays

    Organization Software Management and Usage Guidelines [Organization] licenses the use of computer software from a variety of third parties. Such software is normally copyrighted by the software developer and, unless expressly authorized to do so, [organization] has no right to make copies of the software. The purpose of this policy is to prevent copyright infringement and to ensure proper software asset management. 1. General Statement of Policy. It is the policy of [organization] to respect and adhere to all computer software copyrights and to adhere to the terms of all software licenses to which [organization] is a party. It is also the policy of [organization] to manage its software assets and to ensure that [organization] installs and uses only legal software on its PCs (including portables) and servers. [Organization] will take all steps necessary to prohibit its users from duplicating any licensed software or related documentation for use either on [organization’s] premises or elsewhere unless [organization] is expressly authorized to do so by agreement with the licensor. Unauthorized duplication of software may subject users and/or [organization] to both civil and criminal penalties under the United States Copyright Act. [Organization] must not permit any employee to use software in any manner inconsistent with its applicable license agreement, including giving or receiving software from clients, contractors, customers and others. It is the policy of the [organization] to acquire, copy, distribute, transmit and use software in accordance with the software management policies of the [organization] and the terms and conditions in any…

    • 1741 Words
    • 7 Pages
    Powerful Essays