—Urology and Obstetrics & Gynecology Departments
By the due date assigned you will write 2 reports referring to the departments of
Urology (Genitourinary System) and Obstetrics and Gynecology (Female Reproductive System). For the UrologyDepartment, you write a 2 paragraph report and use that for the script of your Oral Report. For the FemaleReproductive System, there are 2 audio clips containing spoken medical terms. See Instructions below for the special directions for this section only.
In order to earn the maximum credit for the written report you need to incorporate at least 10 medical terms for each department, using them in a manner that demonstrates your knowledge of their meaning.
Include the major or most common diseases or conditions seen in each department.
Include at least three of the principal procedures that are relevant to each department.
Highlight pertinent laboratory and radiological diagnostic services relevant to each department.
Limit your analysis of each department to two paragraphs.
Special Addition of QEP Assignment for Spoken Medical Terminology.
In addition, we have something for you auditory learners who prefer to listen for understanding. (This week only!) This only applies to the Female Reproductive Body System.
Instructions: click on the audio clips to hear a Healthcare Professional describing 2 patients admitted to your fictitious hospital. One is a patient with a gynecological problem, and one is a patient with an obstetric problem. There are many medical terms used. You are to identify at least 20 (10 from each patient) medical terms, and list them with correct spelling, and a definition in your own words (to verify understanding! Copying a definition can bypass the brain altogether!) Put your list in an MS Word doc. File and place that into the Submissions Area. (This might push down your other assignments already submitted, but the files are still safely in there and retrievable by your Instructor.)
Don’t forget your references!
Obstetric Patient Audio https://curdevstaging.courseassets.com/LIVEcourse/suo/AHS1001/Media/2016_Obstetric_Patient.mp3
Gynecology Patient Audio https://curdevstaging.courseassets.com/LIVEcourse/suo/AHS1001/Media/2016_Gynecology_Patient.mp3
For your Oral Report for this week, read aloud and record your Written Report for the Urology Department
Submission Guidelines:
By the due date assigned place the report as a Microsoft Word file in the Submissions Area. Name your document Lastname_W4_Project_report.doc.
By the due date assigned place your oral report mp4 file in the Submissions Area. Name your file Lastname_W4_Project_report.mp4 (or .m4a).
In: Nursing
Which internal control procedure would be most cost-effective in dealing with the following expenditure cycle threats?
A purchasing agent orders materials from a supplier that he partially owns.
Receiving-dock personnel steal inventory and then claim the inventory was sent to the warehouse.
An unordered supply of laser printer paper delivered to the office is accepted and paid for because the “price is right.” After all of the laser printers are jammed, however, it becomes obvious that the “bargain” paper is of inferior quality.
The company fails to take advantage of a 1% discount for promptly paying a vendor invoice.
A company is late in paying a particular invoice. Consequently, a second invoice is sent, which crosses the first invoice’s payment in the mail. The second invoice is submitted for processing and also paid.
Inventory records show that an adequate supply of copy paper should be in stock, but none is available on the supply shelf.
The inventory records are incorrectly updated when a receiving-dock employee enters the wrong product number at the terminal.
A clerical employee obtains a blank check and writes a large amount payable to a fictitious company. The employee then cashes the check.
A fictitious invoice is received and a check is issued to pay for goods that were never ordered or delivered.
The petty cash custodian confesses to having “borrowed” $12,000 over the last five years.
A purchasing agent adds a new record to the supplier master file. The company does not exist. Subsequently, the purchasing agent submits invoices from the fake company for various cleaning services. The invoices are paid.
A clerk affixes a price tag intended for a low-end flat-panel TV to a top-of-the-line model. The clerk’s friend then purchases that item, which the clerk scans at the checkout counter.
Read Chap 13 Introduction and replicate the following diagrams and flowcharts in EITHER Word/Excel/software or in hand-writing (rather than copy and paste or even print from the textbook) and then make submission by (1) uploading Word/Excel/software file, (2) converting into PDF file and then submiting, or (3) taking pictures and then turning in. (Note: A student will receive zero if copying and pasting or even printing from the textbook).
Figure 13-1 Context Diagram of the Expenditure Cycle
Figure 13-2 Level 0 Data Flow Diagram for the Expenditure Cycle
Figure 13-3 Overview of ERP System Design to Support the Expenditure Cycle
In: Accounting
I'm having trouble understanding a CS assignment. I would appreciate it if you all code do this for me. The template for the lab is below which you must use. You're only supposed to create/edit the product function. The assignment has to be written in asm(Mips)
You will need to create a NOS table and use the structure below and write a function called product.
The structure used in this program is:
struct Values {
short left;
short right;
int result;
};
The product function has the following C++ prototype:
int product(Values values[], int num_values);
This function will take an array of Values structures and multiply every Value structure's left times right and store the result in the result field. You will be doing this for num_values number of elements.
This is why the structure is NOT constant. It will be modified in place. Finally, when this function is done, it will return the sum of all results. Make sure that your function does not use any global variables.
Testing
As always, I recommend you write your logic in C++, then translate. If you ask for help with the TAs (or me), we may ask you to show us your logic. Do not change the prototype and do not change the Values structure.
Template:
.data values: # element 0 .half 20 # short left .half 3 # short right .word 0 # int result # element 1 .half 7 # short left .half 5 # short right .word 0 # int result .text j main product: # Write your product function here main: la $a0, values li $a1, 2 jal product # Print out the sum move $a0, $v0 li $v0, 1 syscall # Put a newline character to separate li $v0, 11 li $a0, '\n' syscall # Print out the product of the first element li $v0, 1 la $a0, values lw $a0, 4($a0) syscall # Put a newline character to separate li $v0, 11 li $a0, '\n' syscall # Print out the product of the second element li $v0, 1 la $a0, values lw $a0, 12($a0) syscall # Put a newline character to separate li $v0, 11 li $a0, '\n' syscall
In: Computer Science
Updated! Python Code
4. Enhanced transmission method
Use the same probabilities ?0 ; ?0; and ?1 as before and consider the following experiment: p0=0.6 ; e0=0.05; e1=0.03
• You create and transmit a one-bit message S as before. In order to improve reliability, the same bit “S” is transmitted three times (S S S) as shown in Figure 2.
• The received bits “R” are not necessarily the same as the transmitted bits “S” due to transmission errors. The three received bits, shown as (R1 R2 R3) in Figure 2 will be equal to one of the following eight triplets: (R1 R2 R3) ={ (000), (001), (010), (100), (011), (101), (110), (111) } When you look at the received triplet (R1 R2 R3) you must decide what was the bit “S” originally transmitted by using voting and the majority rule. Here are some examples of the majority rule.
• For example, if the three received bits are (R1 R2 R3)=(001), then the majority rule will decide that the bit must be a “0”. We denote this as the decoded bit D=0.
• As another example if the three received bits are (R1 R2 R3)=(101), then the majority rule will decode the bit as D=1.
• Another example: If you send S=0 three times, i.e. (S S S) = ( 0 0 0 ) and the received string is (R1 R2 R3) = (000), (001), (010), or (100) then the symbol will be decoded as D=0 and the experiment is a success, otherwise it is a failure.
• Another example: If you transmit S=1 three times, i.e. (S S S) = ( 1 1 1 ) and the received string is (011), (101), (110), or (111) the symbol will be decoded as D=1 and the experiment is a success, otherwise it is a failure.
• This procedure as described above is considered one experiment.
• Repeat the experiment N=100,000 times and count the number of successes.
• Find the probability that the transmitted bit "S" will be received and decoded incorrectly.
• Comment on whether the voting method used in this problem provides any improvement as compared to the method of Problem 1.
• SUBMIT your report in a Word or PDF file. Use the table below for your answer. Note: You will need to replicate the table in your Word file, in order to provide the answer in your report. Points will be taken off if you do not use the table. Probability of error with enhanced transmission Ans. p = ?
In: Computer Science
Lab Text Manipulation
Inside the main method, do the following:
The output depends on the information provided by the user.
Please enter your favorite National Park or DONE to stop: mesa
verde
Please enter your favorite National Park or DONE to stop: black
CANYON of ThE gunnisON
Please enter your favorite National Park or DONE to stop:
DENALI
Please enter your favorite National Park or DONE to stop:
yellowStone
Please enter your favorite National Park or DONE to stop:
Done
Favorite National Parks: Mesa Verde | Black Canyon Of The Gunnison
| Denali | Yellowstone
In: Computer Science
Program #1: You will be writing code for several different examples of conditional execution. Each example should be written as a unique method. Each method should include a method header. So the basic outline of your code is: public class Branching { /** * This is an example method header. Notice how it's multi-line and written * using college-level English and not fragments - this is for the Human to * read and not the compiler to parse, so be verbose here. The purpose of this * main method is call the methods written for each of the parts of the *assignment. */ public static void main(String[] args) { methodA(); } public static void methodA() { /** *methodA header */ } A. Prompt the user with: "Enter a whole number". a. Determine if the number is negative and if so, print: "The number is negative." b. Determine if the number is positive and if so, print: "The number is positive." B. Ask the user for another whole number, and then determine if the number is even or odd. a. Hint: modulo might help. b. Print out a message that includes the number the user input as well as indicating if the number the user input was odd or even. C. Ask the user for a temperature, stored as an integer. Write an if/else statement that asks: Is the temperature higher than 78 degrees? If it is not, is the temperature less than (or equal to) 78 degrees? a. Describe the current temperature as “higher than 78 degrees” or “less than or equal to 78 degrees” D. Prompt the user for a letter grade and store this in a char. Then, write a multi-way if statement that ends in a tail-test, that asks the following questions: Is the grade an “A”? Else is the grade a “B”? Else is the grade a “C”? Else is the grade a “D”? Else is the grade an “F”? a. Notice the use of the word else in the sentence above, which provides for a more precise meaning. In spoken English we might use the word “or” instead, but of course, English is terribly ambiguous and Java needs to be discrete, deterministic, and precise. E. Rewrite your code for number D, but use a switch statement to accomplish the same thing. F. Prompt the user for two integer values and store them as “firstInteger” and “secondInteger”. a. Write an if/else statement that outputs either: “ firstInteger was larger than secondInteger” or “secondInteger was larger than firstInteger” on the console, based on the values provided by user that also includes the integer values in the output stament. b. If the values are equal, indicate this in an output that includes the values of the integers.
In: Computer Science
Step 1: Identify and Solve a Typical
Problem
There are a number of typical models in the Operations Research
field which can be applied to a wide range of supply chain
problems. Select one of the following typical
models:
• Travelling Salesperson Problem (TSP)
• Multiple Traveling Salesman Problem (mTSP)
• Knapsack Problem
• Vehicle Routing Problems (VRP)
• Job Shop Scheduling
• Parallel Machine Scheduling
• Christmas lunch problem
• Newsvendor problem
• Pickup and delivery
• Travelling thief problem
• Eight queens problem
• Minimum Spanning Tree
• Hamiltonian path problem
1.1. Background:
• Provide a detailed explanation of the selected problem.
1.2. Model
• Provide typical mathematical model of the selected problem and
clearly explain different aspects of the model (e.g. decision
variable, objective function, constraints, etc.)
1.3. Solving an Example
• Develop a mathematical model for a workable and
reasonable size of the problem.
– For many typical problems, when size of the problem increases, it
becomes NP-Hard. In other words, your computer will not be able to
solve it mathematically. Therefore, ‘workable and reasonable size’
here means that size of the selected problem should not be too
small or too large.
• Solve the problem in Excel and transfer your solution to Word. It
is required that details and steps of getting the solution are
provided in the Word document.
• Interpret the findings and discuss.
Step 2: LR on Application of Selected Typical Model in
Design and Analysis of Supply Chain
• Identify at least 5 peer reviewed articles in
which your selected typical problem has been employed to address
knowledge gaps in supply chain field.
– At least one of the selected articles should be published after
2010. • Write a comprehensive literature review on the application
of “your selected” typical model in design and analysis of supply
chain and address the following (but not limited to) points:
- What type of problems in supply chain can be addressed by the
selected typical problem?
– Compare similarities and differences of selected articles.
– Discuss the suitability of using the selected typical model in
design/analysis of various supply chains. – What are the
limitations of your selected typical problem? – Undertaking any
additional critical and/or content analysis on the application of
selected typical problem in design and analysis of supply chain is
highly recommended.
Step 3: Summary of Findings
• A summary of findings regarding the
strengths and weaknesses of the
selected typical problem in design and analysis of supply chain
should be summarised in this section.
In: Math
Racism, juries, and interactions: In a study of racism, Nail, Harton, and Decker (2003) had participants read a scenario in which a police officer assaulted a motorist. Half the participants read about an African American officer who assaulted a European American motorist, and half read about a European American officer who assaulted an African American motorist. Participants were categorized based on political orientation: liberal, moderate, or conservative. Participants were told that the officer was acquitted of assault charges in state court but was found guilty of violating the motorist’s rights in federal court. Double jeopardy occurs when an individual is tried twice for the same crime. Participants were asked to rate, on a scale of 1–7, the degree to which the officer had been placed in double jeopardy by the second trial. The researchers reported the interaction as F(2, 58) = 10.93, p < 0.0001. The means for the liberal participants were 3.18 for those who read about the African American officer and 1.91 for those who read about the European American officer. The means for the moderate participants were 3.50 for those who read about the African American officer and 3.33 for those who read about the European American officer. The means for the conservative participants were 1.25 for those who read about the African American officer and 4.62 for those who read about the European American officer. ***This prompt requires certain formatting so that you can draw tables and bar graphs. You can use Microsoft Excel or Microsoft Word, or any other word processing software to create your post/ post it as an attachment in the discussion. Draw a table of cell means that includes the actual means for this study. Do the reported statistics indicate that there is a significant interaction? If yes, describe the interaction in your own words. Draw a bar graph that depicts the interaction. Include lines that connect the tops of the bars and show the pattern of the interaction. Is this a quantitative or qualitative interaction? Explain. Change the cell mean for the conservative participants who read about an African American officer so that this is now a quantitative interaction. Draw a bar graph that depicts the pattern that includes the new cell means. Change the cell means for the moderate and conservative participants who read about an African American officer so that there is now no interaction. Draw a bar graph that depicts the pattern that includes the new cell mean
In: Math
The input file, “input.txt” is called parse Text.txt
Four score and seven years ago our fathers brought forth on this continent, a new nation, conceived in Liberty, and dedicated to the proposition that all men are created equal. Now we are engaged in a great civil war, testing whether that nation, or any nation so conceived and dedicated, can long endure. We are met on a great battle-field of that war. We have come to dedicate a portion of that field, as a final resting place for those who here gave their lives that that nation might live. It is altogether fitting and proper that we should do this. But, in a larger sense, we can not dedicate — we can not consecrate — we can not hallow — this ground. The brave men, living and dead, who struggled here, have consecrated it, far above our poor power to add or detract. The world will little note, nor long remember what we say here, but it can never forget what they did here. It is for us the living, rather, to be dedicated here to the unfinished work which they who fought here have thus far so nobly advanced. It is rather for us to be here dedicated to the great task remaining before us — that from these honored dead we take increased devotion to that cause for which they gave the last full measure of devotion — that we here highly resolve that these dead shall not have died in vain — that this nation, under God, shall have a new birth of freedom — and that government of the people, by the people, for the people, shall not perish from the earth.
In: Computer Science
//JAVA
//basic please for learning programming 2. Thank you.
Write the Class Variables
Class Box is to have the following private data members:
Write the following Overridden Method
Class Box is to have an overridden equals() method that does the
following:
Write the Get and Get Methods
Class Box is to have standard get/set methods for each data
member
Write the following Auxiliary Method
Class Box is to have an auxiliary method getVolume( ). The method
is to have an access of public and return a value of type double.
The method is to do the following:
Write the Constructors
Class Box is to have two constructors with the following
specifications:
Class: Box
Write the class header
Write the following Overridden Method
Class Box is to have an overridden toString() method that does the
following:
displays the following information in the format presented:
Height: display height of the object
Width: display the width of the object
Length: display the length of the object
Write the following application class: BoxApp.
Class BoxApp is to do the following:
Height: the value of the height property
Width: the value of the width property
Length: the value of the length property
In: Computer Science