Questions
—Urology and Obstetrics & Gynecology Departments By the due date assigned you will write 2 reports...

—Urology and Obstetrics & Gynecology Departments

By the due date assigned you will write 2 reports referring to the departments of

Urology (Genitourinary System) and Obstetrics and Gynecology (Female Reproductive System). For the UrologyDepartment, you write a 2 paragraph report and use that for the script of your Oral Report. For the FemaleReproductive System, there are 2 audio clips containing spoken medical terms. See Instructions below for the special directions for this section only.

In order to earn the maximum credit for the written report you need to incorporate at least 10 medical terms for each department, using them in a manner that demonstrates your knowledge of their meaning.

Include the major or most common diseases or conditions seen in each department.

Include at least three of the principal procedures that are relevant to each department.

Highlight pertinent laboratory and radiological diagnostic services relevant to each department.

Limit your analysis of each department to two paragraphs.

Special Addition of QEP Assignment for Spoken Medical Terminology.

In addition, we have something for you auditory learners who prefer to listen for understanding. (This week only!) This only applies to the Female Reproductive Body System.

Instructions: click on the audio clips to hear a Healthcare Professional describing 2 patients admitted to your fictitious hospital. One is a patient with a gynecological problem, and one is a patient with an obstetric problem. There are many medical terms used. You are to identify at least 20 (10 from each patient) medical terms, and list them with correct spelling, and a definition in your own words (to verify understanding! Copying a definition can bypass the brain altogether!) Put your list in an MS Word doc. File and place that into the Submissions Area. (This might push down your other assignments already submitted, but the files are still safely in there and retrievable by your Instructor.)

Don’t forget your references!

Obstetric Patient Audio https://curdevstaging.courseassets.com/LIVEcourse/suo/AHS1001/Media/2016_Obstetric_Patient.mp3

Gynecology Patient Audio  https://curdevstaging.courseassets.com/LIVEcourse/suo/AHS1001/Media/2016_Gynecology_Patient.mp3

For your Oral Report for this week, read aloud and record your Written Report for the Urology Department

Submission Guidelines:

By the due date assigned place the report as a Microsoft Word file in the Submissions Area. Name your document Lastname_W4_Project_report.doc.

By the due date assigned place your oral report mp4 file in the Submissions Area. Name your file Lastname_W4_Project_report.mp4 (or .m4a).

In: Nursing

Which internal control procedure would be most cost-effective in dealing with the following expenditure cycle threats?...

Which internal control procedure would be most cost-effective in dealing with the following expenditure cycle threats?

A purchasing agent orders materials from a supplier that he partially owns.

Receiving-dock personnel steal inventory and then claim the inventory was sent to the warehouse.

An unordered supply of laser printer paper delivered to the office is accepted and paid for because the “price is right.” After all of the laser printers are jammed, however, it becomes obvious that the “bargain” paper is of inferior quality.

The company fails to take advantage of a 1% discount for promptly paying a vendor invoice.

A company is late in paying a particular invoice. Consequently, a second invoice is sent, which crosses the first invoice’s payment in the mail. The second invoice is submitted for processing and also paid.

Inventory records show that an adequate supply of copy paper should be in stock, but none is available on the supply shelf.

The inventory records are incorrectly updated when a receiving-dock employee enters the wrong product number at the terminal.

A clerical employee obtains a blank check and writes a large amount payable to a fictitious company. The employee then cashes the check.

A fictitious invoice is received and a check is issued to pay for goods that were never ordered or delivered.

The petty cash custodian confesses to having “borrowed” $12,000 over the last five years.

A purchasing agent adds a new record to the supplier master file. The company does not exist. Subsequently, the purchasing agent submits invoices from the fake company for various cleaning services. The invoices are paid.

A clerk affixes a price tag intended for a low-end flat-panel TV to a top-of-the-line model. The clerk’s friend then purchases that item, which the clerk scans at the checkout counter.

Read Chap 13 Introduction and replicate the following diagrams and flowcharts in EITHER Word/Excel/software or in hand-writing (rather than copy and paste or even print from the textbook) and then make submission by (1) uploading Word/Excel/software file, (2) converting into PDF file and then submiting, or (3) taking pictures and then turning in. (Note: A student will receive zero if copying and pasting or even printing from the textbook).   

Figure 13-1 Context Diagram of the Expenditure Cycle

Figure 13-2 Level 0 Data Flow Diagram for the Expenditure Cycle

Figure 13-3 Overview of ERP System Design to Support the Expenditure Cycle

In: Accounting

I'm having trouble understanding a CS assignment. I would appreciate it if you all code do...

I'm having trouble understanding a CS assignment. I would appreciate it if you all code do this for me. The template for the lab is below which you must use. You're only supposed to create/edit the product function. The assignment has to be written in asm(Mips)

You will need to create a NOS table and use the structure below and write a function called product.

The structure used in this program is:

struct Values {
   short left;
   short right;
   int result;
};

The product function has the following C++ prototype:

int product(Values values[], int num_values);

This function will take an array of Values structures and multiply every Value structure's left times right and store the result in the result field. You will be doing this for num_values number of elements.

This is why the structure is NOT constant. It will be modified in place. Finally, when this function is done, it will return the sum of all results. Make sure that your function does not use any global variables.

Testing

As always, I recommend you write your logic in C++, then translate. If you ask for help with the TAs (or me), we may ask you to show us your logic. Do not change the prototype and do not change the Values structure.

Template:

.data
values:
   # element 0
   .half  20   # short left
   .half  3    # short right
   .word  0    # int result
   # element 1
   .half  7    # short left
   .half  5    # short right
   .word  0    # int result

.text
j  main
product:
   # Write your product function here

main:
   la $a0, values
   li $a1, 2
   jal product

   # Print out the sum
   move $a0, $v0
   li $v0, 1
   syscall
   # Put a newline character to separate
   li $v0, 11
   li $a0, '\n'
   syscall

   # Print out the product of the first element
   li $v0, 1
   la $a0, values
   lw $a0, 4($a0)
   syscall
   # Put a newline character to separate
   li $v0, 11
   li $a0, '\n'
   syscall

   # Print out the product of the second element
   li $v0, 1
   la $a0, values
   lw $a0, 12($a0)
   syscall
   # Put a newline character to separate
   li $v0, 11
   li $a0, '\n'
   syscall

In: Computer Science

Updated! Python Code 4. Enhanced transmission method Use the same probabilities ?0 ; ?0; and ?1...

Updated! Python Code

4. Enhanced transmission method

Use the same probabilities ?0 ; ?0; and ?1 as before and consider the following experiment: p0=0.6 ; e0=0.05; e1=0.03

• You create and transmit a one-bit message S as before. In order to improve reliability, the same bit “S” is transmitted three times (S S S) as shown in Figure 2.

• The received bits “R” are not necessarily the same as the transmitted bits “S” due to transmission errors. The three received bits, shown as (R1 R2 R3) in Figure 2 will be equal to one of the following eight triplets: (R1 R2 R3) ={ (000), (001), (010), (100), (011), (101), (110), (111) } When you look at the received triplet (R1 R2 R3) you must decide what was the bit “S” originally transmitted by using voting and the majority rule. Here are some examples of the majority rule.

• For example, if the three received bits are (R1 R2 R3)=(001), then the majority rule will decide that the bit must be a “0”. We denote this as the decoded bit D=0.

• As another example if the three received bits are (R1 R2 R3)=(101), then the majority rule will decode the bit as D=1.

• Another example: If you send S=0 three times, i.e. (S S S) = ( 0 0 0 ) and the received string is (R1 R2 R3) = (000), (001), (010), or (100) then the symbol will be decoded as D=0 and the experiment is a success, otherwise it is a failure.

• Another example: If you transmit S=1 three times, i.e. (S S S) = ( 1 1 1 ) and the received string is (011), (101), (110), or (111) the symbol will be decoded as D=1 and the experiment is a success, otherwise it is a failure.

• This procedure as described above is considered one experiment.

• Repeat the experiment N=100,000 times and count the number of successes.

• Find the probability that the transmitted bit "S" will be received and decoded incorrectly.

• Comment on whether the voting method used in this problem provides any improvement as compared to the method of Problem 1.

• SUBMIT your report in a Word or PDF file. Use the table below for your answer. Note: You will need to replicate the table in your Word file, in order to provide the answer in your report. Points will be taken off if you do not use the table. Probability of error with enhanced transmission Ans. p = ?

In: Computer Science

Lab Text Manipulation Inside the main method, do the following: Create an ArrayList of strings and...

Lab Text Manipulation

Inside the main method, do the following:

  • Create an ArrayList of strings and call it parks.
  • Read in the names of national parks from the user until the user enters done(or DONE,
    or dOnE, .. ) Keep in mind, that the names of some national parks consist of more than one word, for example, Mesa Verde.
    As you read in the national parks, add them to the list.
  • Next, we are going to build a string based on the elements in the list parks. Since the text keeps changing as we add one park at a time, we use class StringBuilder for this task.
    • Use a StringBuilder called sb to create the string  nationalParks .
    • Loop through all the elements of the list  parks and add them one at a time.
      The resulting string should have the following format:
      Favorite National Parks: {park1} | {park2} | . . . | {parkN}
      The parks are separated by a space, a vertical bar, and another space. However, there is no vertical bar after the last element. {park1}, {park2}, {parkN} are the various list elements with updated spelling.
    • Create a private method to update the spelling.
      We can't control whether the user enters the park names in uppercase or lowercase letters. However, we can change the names to a spelling where all letters are lowercase except for the first letters of each individual word. In order to make those changes, create a private method called updateSpelling. It has the following method header:
      private static String updateSpelling(String text)
      E.g.: When you pass the string "MESA VERDE" the method returns "Mesa Verde"
      E.g.: When you pass "yEllOwstOnE" it returns "Yellowstone"
      E.g.: Passing "black canyon of the gunnison" returns "Black Canyon Of The Gunnison"
      E.g.: Passing "Denali" returns "Denali"
    • When you are done building the specified string in SringBuilder, print it.

The output depends on the information provided by the user.

Please enter your favorite National Park or DONE to stop: mesa verde
Please enter your favorite National Park or DONE to stop: black CANYON of ThE gunnisON
Please enter your favorite National Park or DONE to stop: DENALI
Please enter your favorite National Park or DONE to stop: yellowStone
Please enter your favorite National Park or DONE to stop: Done

Favorite National Parks: Mesa Verde | Black Canyon Of The Gunnison | Denali | Yellowstone

In: Computer Science

Program #1: You will be writing code for several different examples of conditional execution. Each example...

Program #1: You will be writing code for several different examples of conditional execution. Each example should be written as a unique method. Each method should include a method header. So the basic outline of your code is: public class Branching { /** * This is an example method header. Notice how it's multi-line and written * using college-level English and not fragments - this is for the Human to * read and not the compiler to parse, so be verbose here. The purpose of this * main method is call the methods written for each of the parts of the *assignment. */ public static void main(String[] args) { methodA(); } public static void methodA() { /** *methodA header */ } A. Prompt the user with: "Enter a whole number". a. Determine if the number is negative and if so, print: "The number is negative." b. Determine if the number is positive and if so, print: "The number is positive." B. Ask the user for another whole number, and then determine if the number is even or odd. a. Hint: modulo might help. b. Print out a message that includes the number the user input as well as indicating if the number the user input was odd or even. C. Ask the user for a temperature, stored as an integer. Write an if/else statement that asks: Is the temperature higher than 78 degrees? If it is not, is the temperature less than (or equal to) 78 degrees? a. Describe the current temperature as “higher than 78 degrees” or “less than or equal to 78 degrees” D. Prompt the user for a letter grade and store this in a char. Then, write a multi-way if statement that ends in a tail-test, that asks the following questions: Is the grade an “A”? Else is the grade a “B”? Else is the grade a “C”? Else is the grade a “D”? Else is the grade an “F”? a. Notice the use of the word else in the sentence above, which provides for a more precise meaning. In spoken English we might use the word “or” instead, but of course, English is terribly ambiguous and Java needs to be discrete, deterministic, and precise. E. Rewrite your code for number D, but use a switch statement to accomplish the same thing. F. Prompt the user for two integer values and store them as “firstInteger” and “secondInteger”. a. Write an if/else statement that outputs either: “ firstInteger was larger than secondInteger” or “secondInteger was larger than firstInteger” on the console, based on the values provided by user that also includes the integer values in the output stament. b. If the values are equal, indicate this in an output that includes the values of the integers.

In: Computer Science

Step 1: Identify and Solve a Typical Problem There are a number of typical models in...

Step 1: Identify and Solve a Typical Problem
There are a number of typical models in the Operations Research field which can be applied to a wide range of supply chain problems. Select one of the following typical models:
• Travelling Salesperson Problem (TSP)
• Multiple Traveling Salesman Problem (mTSP)
• Knapsack Problem
• Vehicle Routing Problems (VRP)
• Job Shop Scheduling
• Parallel Machine Scheduling
• Christmas lunch problem
• Newsvendor problem
• Pickup and delivery
• Travelling thief problem
• Eight queens problem
• Minimum Spanning Tree
• Hamiltonian path problem

1.1. Background:
• Provide a detailed explanation of the selected problem.

1.2. Model
• Provide typical mathematical model of the selected problem and clearly explain different aspects of the model (e.g. decision variable, objective function, constraints, etc.)

1.3. Solving an Example
Develop a mathematical model for a workable and reasonable size of the problem.
– For many typical problems, when size of the problem increases, it becomes NP-Hard. In other words, your computer will not be able to solve it mathematically. Therefore, ‘workable and reasonable size’ here means that size of the selected problem should not be too small or too large.
• Solve the problem in Excel and transfer your solution to Word. It is required that details and steps of getting the solution are provided in the Word document.
• Interpret the findings and discuss.


Step 2: LR on Application of Selected Typical Model in Design and Analysis of Supply Chain
Identify at least 5 peer reviewed articles in which your selected typical problem has been employed to address knowledge gaps in supply chain field.
– At least one of the selected articles should be published after 2010. • Write a comprehensive literature review on the application of “your selected” typical model in design and analysis of supply chain and address the following (but not limited to) points:
- What type of problems in supply chain can be addressed by the selected typical problem?
– Compare similarities and differences of selected articles.
– Discuss the suitability of using the selected typical model in design/analysis of various supply chains. – What are the limitations of your selected typical problem? – Undertaking any additional critical and/or content analysis on the application of selected typical problem in design and analysis of supply chain is highly recommended.

Step 3: Summary of Findings


• A summary of findings regarding the strengths and weaknesses of the selected typical problem in design and analysis of supply chain should be summarised in this section.

In: Math

Racism, juries, and interactions: In a study of racism, Nail, Harton, and Decker (2003) had participants...

Racism, juries, and interactions: In a study of racism, Nail, Harton, and Decker (2003) had participants read a scenario in which a police officer assaulted a motorist. Half the participants read about an African American officer who assaulted a European American motorist, and half read about a European American officer who assaulted an African American motorist. Participants were categorized based on political orientation: liberal, moderate, or conservative. Participants were told that the officer was acquitted of assault charges in state court but was found guilty of violating the motorist’s rights in federal court. Double jeopardy occurs when an individual is tried twice for the same crime. Participants were asked to rate, on a scale of 1–7, the degree to which the officer had been placed in double jeopardy by the second trial. The researchers reported the interaction as F(2, 58) = 10.93, p < 0.0001. The means for the liberal participants were 3.18 for those who read about the African American officer and 1.91 for those who read about the European American officer. The means for the moderate participants were 3.50 for those who read about the African American officer and 3.33 for those who read about the European American officer. The means for the conservative participants were 1.25 for those who read about the African American officer and 4.62 for those who read about the European American officer. ***This prompt requires certain formatting so that you can draw tables and bar graphs. You can use Microsoft Excel or Microsoft Word, or any other word processing software to create your post/ post it as an attachment in the discussion. Draw a table of cell means that includes the actual means for this study. Do the reported statistics indicate that there is a significant interaction? If yes, describe the interaction in your own words. Draw a bar graph that depicts the interaction. Include lines that connect the tops of the bars and show the pattern of the interaction. Is this a quantitative or qualitative interaction? Explain. Change the cell mean for the conservative participants who read about an African American officer so that this is now a quantitative interaction. Draw a bar graph that depicts the pattern that includes the new cell means. Change the cell means for the moderate and conservative participants who read about an African American officer so that there is now no interaction. Draw a bar graph that depicts the pattern that includes the new cell mean

In: Math

Write a Python program called “exam.py”. The input file, “input.txt”, is given to you in the...

  1. Write a Python program called “exam.py”. The input file, “input.txt”, is given to you in the Canvas exam instructions.
  2. Name your output file “output.txt”.
  3. Ensure the program consists of a main function and at least one other function.
  4. Ensure the program will read the input file, and will output the following information to the output file as well as printing it to the screen:
  • output the text of the file to screen
  • output the number of words in the file
  • output the number of sentences in the file
  • output the first sentence in the file
  • output the last sentence in the file
  • output the length of the first sentence
  • output the length of the last sentence
  • output the first word in the file
  • output the first letter in the file
  • output the last word in the file
  • output the last letter in the file

The input file, “input.txt” is called parse Text.txt

Four score and seven years ago our fathers brought forth on this continent, a new nation, conceived in Liberty, and dedicated to the proposition that all men are created equal. Now we are engaged in a great civil war, testing whether that nation, or any nation so conceived and dedicated, can long endure. We are met on a great battle-field of that war. We have come to dedicate a portion of that field, as a final resting place for those who here gave their lives that that nation might live. It is altogether fitting and proper that we should do this. But, in a larger sense, we can not dedicate — we can not consecrate — we can not hallow — this ground. The brave men, living and dead, who struggled here, have consecrated it, far above our poor power to add or detract. The world will little note, nor long remember what we say here, but it can never forget what they did here. It is for us the living, rather, to be dedicated here to the unfinished work which they who fought here have thus far so nobly advanced. It is rather for us to be here dedicated to the great task remaining before us — that from these honored dead we take increased devotion to that cause for which they gave the last full measure of devotion — that we here highly resolve that these dead shall not have died in vain — that this nation, under God, shall have a new birth of freedom — and that government of the people, by the people, for the people, shall not perish from the earth.

In: Computer Science

//JAVA //basic please for learning programming 2. Thank you. Write the Class Variables Class Box is...

//JAVA
//basic please for learning programming 2. Thank you.

Write the Class Variables
Class Box is to have the following private data members:

  • height of type double
  • width of type double
  • length of type double

Write the following Overridden Method
Class Box is to have an overridden equals() method that does the following:​​​​

  • tests to see if the parameter represents an object (null test)
  • tests to see if the parameter object is of the same class type as the calling object (class test)
  • determines if the calling object and the parameter object store identical data values for the corresponding data members (variable to variable test)

Write the Get and Get Methods
Class Box is to have standard get/set methods for each data member
Write the following Auxiliary Method
Class Box is to have an auxiliary method getVolume( ). The method is to have an access of public and return a value of type double. The method is to do the following:

  • calculate and return the volume of the box
  • volume is calculated by multiplying the length of the box by the width of the box by the height of the box

Write the Constructors
Class Box is to have two constructors with the following specifications:

  • a no-arg constructor that initializes each double data member to zero
  • a constructor that takes three parameters, each representing one of the class data members. the arguments are to be listed in the order of (height, width, length)

Class: Box
Write the class header
Write the following Overridden Method
Class Box is to have an overridden toString() method that does the following:

  • displays the following information in the format presented:

Height: display height of the object
Width: display the width of the object
Length: display the length of the object
Write the following application class: BoxApp.

Class BoxApp is to do the following:

  • create an object of type Box named smallBox that has a height of 3, a width of 4 and a length of 5;
  • create an object of type Box named mediumBox that has a height of 6, a width of 7 and a length of 8;
  • create an object of type Box named unknownBox that has a height of 0, a width of 0 and a length of 0;
  • test to see if smallBox equals unknown box. If they are equal, display the word true. If they are not equal, display the word false.
  • output the following information for smallBox

Height: the value of the height property
Width: the value of the width property
Length: the value of the length property

In: Computer Science