Careers in Accounting, accounting homework help Business Finance Assignment Help

Careers in Accounting, accounting homework help Business Finance Assignment Help. Careers in Accounting, accounting homework help Business Finance Assignment Help.


(/0x4*br />

Accounting is the study of how businesses track their income and assets over time. Accountants engage in a wide variety of activities in addition to preparing financial statements and recording business transactions. These activities include computing costs and efficiency gains from new technologies, participating in strategies for mergers and acquisitions, quality management, developing and using information systems to track financial performance, tax strategy, and health care benefits management.

Use the Internet or the Strayer Online database to research career options within the accounting field and accounting job postings in your local area to respond to the questions in the assignment.

Write a one to two (1-2) page paper in which you:

  1. Describe at least two (2) career options someone with an accounting education can pursue. Be sure to reference sources such as the Bureau of Labor Statistics and the American Institute of Certified Public Accountants.
  2. Describe one (1) researched accounting position, and explain the essential skills that would make a candidate successful in the position. Articulate the primary manner in which the researched accounting positions could add value to the company seeking candidates.
  3. Use at least two (2) quality academic resources in this assignment. Note: Wikipedia and other Websites do not qualify as academic resources.
  4. Format your assignment according to the following formatting requirements:
    • Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
    • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page is not included in the required page length.

Careers in Accounting, accounting homework help Business Finance Assignment Help[supanova_question]

health info, health and medicine homework help Health Medical Assignment Help

Per Joint Commission standards, all inpatient hospital records must be completed within ____ days after discharge, regardless of the storage media of the record. A.

In 2008 Medicare implemented APCs and relative payment weights to reimburse ________ for surgical procedures performed

Question 3

Suzie Smith wants to obtain a copy of her medical record. She can obtain a copy of all reports in her record EXCEPT for the

A. admission history and physical.

B. dental record.

C. psychotherapy notes.

D. treatment plan.

Question 4

The health information director is writing a policy to ensure the accuracy of an automated master patient index. The two departments that should be allowed to enter or update information in the master patient index are

A. admissions and nursing.

B. admissions and health information.

C. health information and nursing.

D. health information and medical staff.

Question 5

Ms. RHIT is analyzing and assembling a patient’s record and notices that a copy of a history and physical from the attending physician’s office was used in the record instead of an inpatient history and physical. The office H&P was completed on January 2 (this year) and the patient was admitted to the hospital on January 5 (this year); the office H&P was placed on the record at the time of admission. According to Medicare CoP regulations, the office H&P is

A. acceptable as the H&P for this admission because it was placed on the record within 24 hours.

B. acceptable as the H&P for this admission because it was completed no more than seven days prior to admission.

C. unacceptable because only a newly documented inpatient history and physical is acceptable.

D. unacceptable because the office H&P was not completed within 24 hours prior to admission

Question 6

Which characteristic of electronic data interchange (EDI) below is incorrect?

A. determines claim status within 14 hours

B. faster payment of electronic claims

C. lower administrative costs result

D. on-line receipt is generated

Question 7

In which of the following cases would documentation of an interval history be acceptable?

A. Newborn admitted four days after birth for dehydration who is treated with IV fluids.

B. 17-year-old patient admitted for appendicitis who undergoes routine surgery during admission.

C. 34-year-old woman readmitted for chest pain following delivery of a baby girl three days ago.

D. 74-year-old readmitted for pneumonia seven days following discharge for this condition.

Question 8

Tom Top was admitted to Fresh Start, a drug and alcohol rehabilitation facility. A friend of his calls the facility to speak with him and to get his room number. The facility’s response should be

A. to provide only the patient’s room number.

B. to state that patients are not allowed to accept calls.

C. to say that the facility cannot confirm that Tom is a patient.

D. to transfer the call to Tom’s room phone.

Question 9

A common item not found on an admission data entry screen is:

A. admission diagnosis

B. date of birth

C. patient’s admission

D. discharge diagnosis

Question 10

When a patient is transferred to a different level of care within the same hospital, the summary report is called a:

A. discharge summary

B. progress summary

C. transfer summary

D. level of care summary

Question 11

Hillcrest Hospital is conducting research on Alzheimer’s disease and wishes to obtain information from its state’s registry. Which information below would be unavailable from the registry?

A. incidence of disease

B. number of cases

C. patient names

D. types of patients

Question 12

Ms. RHIT is writing a policy for filing alphabetic records. Which statement below should be included in the policy?

A. Arrange patient names according to given name, then surname.

B. When a hyphen is used in a patient’s name, ignore the letters that follow the hyphen.

C. Prefixes included as part of the patient’s last name are filed alphabetically.

D. When a patient is a senior or junior, file the record using senior or junior as the surname.

Question 13

Which of the following documents that the patient acknowledges the nature of treatment, risk, and complications of care?

A. admission face sheet

B. consent

C.history and physical

D. discharge summary

Question 14

The medical record must be maintained according to

A. accreditation standards and case law.

B. case laws and regulations.

C. common laws and professional practice standards.

D. professional practice standards and federal/state regulation

Question 15

Which statement regarding the patient record is true?

A. All entries must be legible and complete.

B. An alias cannot be used in a patient record.

C. Only the front page of a two-page document must contain patient identification.

D. The author of each entry does not have to sign the note if another supervising professional has signed it.

Question 16

Information about the provision, coordination, and management of health care and services is known as _____ under HIPAA.

A. payment information

B. operational information

C. treatment information

D. patient information

Question 17

Sally Smith, a health information department employee, is placed on the witness stand during a court hearing. She may testify that

A. the patient’s cardiac arrest was drug-induced.

B. Dr. Top was the best physician to cover this case.

C. The patient was comatose upon arrival in the emergency room.

D. The progress notes were kept in the normal course of business.

Question 18

Ms. RHIT is developing an audit tool to be used to review records in preparation for the Joint Commission survey. Which of the following is a standard that should be included on the audit tool?

A. Each record needs to include a statistical summary sheet.

B. The attending physician must sign an attestation statement.

C. The record needs to document evidence of appropriate informed consent.

D. The discharge summary must be completed within 35 days of discharge.

Question 19

Which of the following is not documented as a part of a consultation report?

A. consulting physician’s signature

B. diagnosis and findings

C. recommendations and opinions

D. signature of requesting physician

Question 20

Dr. Smith documents in a patient’s record that the patient may be released from the recovery room. This would be documented as part of the

A.

operative report.

B.

postanesthesia note.

C.

postoperative note.

D.

progress notes.

Question 21

Dr. Sharp, a surgeon, has designed a new form that she wants to use when she completes cataract surgery. Final approval of the form would be given by the

A.

executive board

B.

forms committee.

C.

medical staff.

D.

surgery committee.

Question 22

Hillcrest Hospital and Endwell Hospital are merging. The new health information director for both hospitals needs to ensure that the two master patient indexes are accurately merged. Each hospital currently uses manual MPIs, and they will convert to one automated MPI. Which activity below should the director avoid?

A.

establish a merger plan for the hospital MPIs

B.

perform a manual alphabetical search to identify duplicate MPI files

C.

shred the manual MPI within four weeks after the conversion

D.

Use software to identify and correct errors in the automated MPI

Question 23

Dr.Smith enters the following information as part of a progress note: “2/3/YYYY Patient complains of right upper abdominal pain of four days’ duration.” This information represents the

A.

chief complaint.

B.

history of present illness.

C.

interval history.

D.

physical examination.

Question 24

The premature newborn death rate is calculated by dividing the _____by the number of premature newborn patients and multiplying by 100.

A.

number of newborns admitted

B.

number of premature newborn deaths

C.

number of newborn deaths

D.

number of newborn patients

Question 25

The admission and discharge date is considered:

A.

demographic information

B.

financial information

C.

medical information

D. clinical information

[supanova_question]

Java. fix the code. explain to me why my code isn’t correct, programming homework help Programming Assignment Help

Need this asap

I wrote the code for the Knight’s tour. fix the code so that it finds a correct solution, do not start from scratch. Explain why my code isn’t correct. Why does it appear to have 15 four times in the solution? I know the number is only suppose to be there once. My code does not give the correct solution, because what I just explain before, why is this?

public class Knight

{

int[][] m_board;

int m_count = 0;

Knight(int nrRows, int nrCols)

{

m_board = new int[nrRows][nrCols];

for(int i = 0; i < nrRows; ++i)

for(int j = 0; j < nrCols; ++j)

m_board[i][j] = 0;

}

public int GetNrRows() { return m_board.length;}

public int GetNrCols() { return m_board[0].length;}

public void Solve(int r, int c)

{

m_board[r][c] = 1;

Tour(r,c);

Print();

}

public boolean Tour(int r, int c)

{

if(m_board[r][c] == GetNrRows() * GetNrCols())

return true;

int[] mr = {-1,-2,-2,-1,+1,+2,+2,+1};

int[] mc = {-2,-1,+1,+2,+2,+1,-1,-2};

for(int k = 0; k < mr.length; ++k)

{

int newr = r + mr[k];

int newc = c + mc[k];

if(IsValid(newr, newc))

{

m_board[newr][newc] = m_board[r][c] + 1;

Tour(newr, newc);

}

}

return false;

}

public boolean IsValid(int newr, int newc)

{

return

newr >= 0 && newr < GetNrRows() &&

newc >= 0 && newc < GetNrCols() &&

m_board[newr][newc] == 0;

}

public void Print()

{

for(int r = 0; r < m_board.length; ++r)

{

for(int c = 0; c < m_board[0].length; ++c)

System.out.format(“”, m_board[r][c]);

System.out.println();

}

System.out.println(” …. count = ” + m_count);

}

}

[supanova_question]

An anthology project, biology homework help Science Assignment Help

Fossil Map

Instructions:
Please find a world map and map fossils at the location where it was firstdiscovered. Your map will be judged based on accuracy. Please turn in a hard copy bydue date (11/30)Fossils:1. Contenders of the earliest hominins Sahelanthropus tchadensis
Orrorin Tugenensis

Ardipithecus kadabba & A. ramidus
2. AustralopithecusA. anamensisA. afarensis (Lucy)A. bahrelghazaliA. garhiA. africanusA. sedibaP. aethiopicusP. boiseiP. robustus3. Homo H. habilisH. rudolfensis H. erectus: Java man Peking man

Turkana boy Sibling species of H. erectus: H. georgicusH. antecessor H. floresiensis Neanderthals (location of first discovery) Oldest modern human

[supanova_question]

Between the World and Me, history assignment help Humanities Assignment Help

Please read Parts II and III of the Ta-Nehisi Coates book, Between the World and Me. In other words, read everything from pages 75 to 152.

1. Based on your reading of Coates, and your understanding of African Diaspora history from the Haitian Revolution to the post-slavery era, answer the following:

There is systemic (also known as institutional) racism and there is individual racial prejudice.The two things are not the same.

HERE IS THE QUESTION: What is the difference between systemic racism and individual racial prejudice?

When writing your answer, you must provide three examples from the Coates book and three additional examples from course lectures since the mid-term exam that illustrate systemic racism.

2. Basing your answer on historical facts (specific laws, policies, institutions, traditions, and ideas), we have covered in class, and not on anecdote, answer the following:

HERE IS THE QUESTION: Are the problems and obstacles that blacks collectively face problems of their own making?

3. QUESTION: (a) What does Coates mean when he wrote: “They made us into a race. We made ourselves into a people.” and (b) What evidence from class lectures support his claim?

follow the instruction

[supanova_question]

[supanova_question]

Compare and contrast research as APA format, writing homework help Writing Assignment Help

Hi, good evening

I want someone to write a research Compare and contrast about :

Earthquakes vs. volcanoes 

First ; I want the outline in different file

Second; It should have intro and a good thesis to show us what the under paragraphs about

Third , Point by Point method or Black method . and you should use 3 paragraphs

Fourth; you have to use three resources

1- Website 2- Periodical 3- image

Also it should has 400 to 500

it should has citation In-text

So the research should have intro then three paragraph then conclusion.

The most important , is should be formatted as APA Format. The plagiarism percentage must be below 8%

Compare and contrast research as APA format, writing homework help Writing Assignment Help[supanova_question]

System Security Plan Project, computer science homework help Computer Science Assignment Help

Project #3: System Security Plan

Company Background & Operating Environment

The assigned case study and attachments to this assignment provide information about “the company.”

Use the Baltimore field office as the target for the System Security Plan

Use Verizon FiOS as the Internet Services Provider (see http://www.verizonenterprise.com/terms/us/products/internet/sla/ )

Policy Issue & Plan of Action

A recent risk assessment highlighted the need to formalize the security measures required to protect information, information systems, and the information infrastructures for the company’s field offices. This requirement has been incorporated into the company’s risk management plan and the company’s CISO has been tasked with developing, documenting, and implementing the required security measures. The IT Governance board also has a role to play since it must review and approve all changes which affect IT systems under its purview.

The CISO has proposed a plan of action which includes developing system security plans using guidance from NIST SP-800-18 Guide for Developing Security Plans for Federal Information Systems. The IT Governance board, after reviewing the CISO’s proposed plan of action, voted and accepted this recommendation. In its discussions prior to the vote, the CISO explained why the best practices information for security plans from NIST SP 800-18 was suitable for the company’s use. The board also accepted the CISO’s recommendation for creating a single System Security Plan for a General Support System since, in the CISO’s professional judgement, this type of plan would best meet the “formalization” requirement from the company’s recently adopted risk management strategy.

Your Task Assignment

As a staff member supporting the CISO, you have been asked to research and then draft the required system security plan for a General Support System. In your research so far, you have learned that:

A general support system is defined as “an interconnected set of information resources under the same direct management control that shares common functionality.” (See NIST SP 800-18)

The Field Office manager is the designated system owner for the IT support systems in his or her field office.

The system boundaries for the field office General Support System have already been documented in the company’s enterprise architecture (see the case study).

The security controls required for the field office IT systems have been documented in a security controls baseline (see the controls baseline attached to this assignment).

Research:

  • Review the information provided in the case study and in this assignment, especially the information about the field offices and the IT systems and networks used in their day to day business affairs.
  • Review NIST’s guidance for developing a System Security Plan for a general support IT System.This information is presented in NIST SP 800-18. http://csrc.nist.gov/publications/nistpubs/800-18-Rev1/sp800-18-Rev1-final.pdf Pay special attention to the Sample Information System Security Plan template provided in Appendix A.
  • Review the definitions for IT Security control families as documented in Federal Information Processing Standard (FIPS) 200: Minimum Security Requirements for Federal Information and Information Systems (see section 3).
  • Review the definitions for individual controls as listed in Appendix F Security Control Catalog in NIST SP 800-53 Security and Privacy Controls for Federal Information Systems and Organizations. http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf You should focus on those controls listed in the security controls baseline provided with this assignment.

Write:

  • Use the following guidance to complete the System Security Plan using the template from Appendix A of NIST SP 800-18.
    • Sections 1 through 10 will contain information provided in the assigned case study. You may need to “interpret” that information when writing the descriptions.“Fill in the blanks” for information about the company or its managers which is not provided in the case study, i.e. names, email addresses, phone numbers, etc.). Make sure that your fictional information is consistent with information provided in the case study (name of company, locations, etc.).
    • Section 11 should contain information about the field office’s Internet connection Do not include the table. Use the business Internet Services Provider listed at the top of this assignment file. Describe the system interconnection type in this section and service level agreement.
    • Section 12 should contain information derived from the case study. You will need to identify the types of information processed in the field office and then list the laws and regulations which apply. For example, if the case study company processes or stores Protected Health Information, then this section must include information about HIPAA. If the company processes or stores credit card payment information, then this section must include information about the PCI-DSS requirements.
    • Section 13 of the SSP will take the most editing time. Use the information about required security controls as provided security controls baseline.
      • Create 3 sub sections (13.1 Management Controls, 13.2 Operational Controls, and 13.3 Technical Controls). You must provide a description for each category (see the definitions provided in Annex 11.B Minimum Security Controls in NIST SP 800-100 Information Security Handbook: A Guide for Managers).
      • Using the information provided in the security controls baseline, place the required control families and controls under the correct sub section.
      • Use the exact names and designators for the security control families and individual security controls. BUT, you MUST paraphrase any and all descriptions. Do NOT cut and paste from NIST documents.
    • Section 14: use the due date for this assignment as the plan complete date.
    • Section 15: leave the approval date blank. You will not have any other text in this section (since the plan is not yet approved).
  • Use a professional format for your System Security Plan. Your document should be consistently formatted throughout and easy to read.
  • Common phrases do not require citations. If there is doubt as to whether or not information requires attribution, provide a footnote with publication information or use APA format citations and references.
  • You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.

Submit For Grading

Submit your System Security Plan in MS Word format (.docx or .doc file) for grading using your assignment folder. (Attach the file.)

[supanova_question]

Fast Food Nation, english assignment help Humanities Assignment Help

Gather research for an essay about one of the topics explored in Fast Food Nation.
Specifically, your assignment must show that you have a strong research
question and at least five sources that might help you answer that
question. You won’t actually draft your essay until Lesson 2, however.

A research question will give your research a clear
goal. Each source you find should have the potential to answer at least
part of the research question and bring you closer to understanding the
issue that you’ve decided to explore. Your assignment will list these
sources on an annotated works-cited page.

Your assignment should include the following elements:

  • A research question related to a topic that Eric Schlosser explores in Fast Food Nation
  • A works-cited page that lists at least five sources with the potential to answer the research question
  • An annotation for each entry on the works-cited page that summarizes
    the source’s purpose, evaluates its credibility, and explains how it is
    related to your research question

This writing guide will help you write a rough draft of the writing assignment that you will revise later on.

Plan an expository essay by creating a research
question about a topic addressed in the lesson’s reading and by
conducting research to help answer that question. To do this, you will
complete the following steps:

1. Write a research question about any topic that Schlosser addresses in Fast Food Nation.

2. Find five sources that help answer the research question in some way (one of which may be Fast Food Nation itself).

3. Provide your sources in a works-cited list that follows MLA guidelines.

4. Write a short paragraph next to each source that does the following:

a. Summarizes the purpose of the source (“This source argues that fast food has benefited the country overall.”)

b. Evaluates its credibility (“This source is not
very credible because it does not list an author or state where it got
its information.”)

c. Explains how it helps answer the research
question (“This source has no information about salmonella, which is my
topic, but it does give information about E. coli, which might still be useful.”)

[supanova_question]

Threat on software development, writing homework help Writing Assignment Help

Threats to the Software Development Security Domain

Actions for ‘Threats to the Software Development Security Domain’

Subscribe

After reading/viewing this week’s materials, please respond to one or more of the following questions.

  1. Describe the following threats to the application environment: Buffer Overflow, Denial of Service, Time of Check/Time of Use, Malformed input attacks, Object reuse, Garbage collection, and Trap door.
  2. Explain the following terms: file infector, boot sector infector, system infector, email virus, multipartite, macro virus, script virus, and hoax
  3. Explain the difference between a virus and a worm. Describe what a Trojan Horse and a Logic Bomb are.

    Software Development Security Countermeasures

    Actions for ‘Software Development Security Countermeasure

    After reading/viewing this week’s materials, please respond to one or more of the following questions.

    1. What is a View-based access control in database? What is a Data warehouse? What is Online Transaction Processing (OLTP)?
    2. What is Change Management and how is it used to control security breaches? What is Configuration Management and how is it used to control security breaches? What is Patch management and how is it used to control security breaches?
    3. In a database, to control security, lock controls are implemented and tested using the ACID test. Explain the following terms for each letter within the ACID method: Atomicity, Consistency, Isolation, Durability.
      Week 7:Security Operations Practices.
      After reading/viewing this week’s materials, please respond to one or more of the following questions.

      1. Describe the administrative management practices of separation of duties, job rotation, and mandatory vacations and their role within operations security.
      2. Describe the differences between the following sanitization methods of media control: clearing, purging, zeroization, and degaussing. What is data remanence?
        Operation Security Attack and Countermeasures
        After reading/viewing this week’s materials, please respond to one or more of the following questions.

        1. Describe the different methods of RAID. What is RAIT?
        2. Define the different types of trusted recovery. What is meant by the term “fail secure”?
        3. Describe three of the following attack types in the Operation Security domain: man-in-the-middle, mail bombing, war-dialing, ping-of-death, teardrop, and slamming-and-cramming

[supanova_question]

Retrieve the full-text version of the article from the library, science homework help Science Assignment Help

2.Retrieve the full-text version of the article from the library. Read it thoroughly.

3.Write
a brief introduction to your paper, however do not label it as an
“Introduction” in accordance with the rules of APA scholarly writing.

4.State the research question for this study in a paragraph.

5.Describe the research design of this study.

6.Explain
how the sample was selected and include the number of participants.
Make a judgment as to whether the sample size was adequate, and defend
your answer why or why not.

7.Describe the data collection method(s) including who collected data, what tools were used, and other pertinent information.

8.Identify the limitations of the study, and describe how the limitations could be overcome in subsequent studies.

9.Describe
the findings reported in the study. What is the answer to the research
question based on these findings? If the study fails to answer the
research question, what do you believe is the reason?

10.Summarize
the article. Based on these findings, is the evidence that you found on
your topic strong enough to suggest a change in practice, or an idea
for practice? Please provide the rationale for your answer.

11.List
your references, formatted in APA style, On the References page.
Guidelines and a sample paper on APA may be found under Course Home in
the Course Resources link. Follow the guidelines for writing
professional papers using APA formatting as described in the 6th edition of the manual.

Hairr,
D. C., Salisbury, H., Johannsson, M., & Redfern-Vance, N. (2014).
Nurse staffing and the relationship to job satisfaction and retention. Nursing Economic$, 32(3), 142-147.(6 pages)

Permalink: http://proxy.chamberlain.edu:8080/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=heh&AN=96936408&site=eds-live

[supanova_question]

https://anyessayhelp.com/

[supanova_question]

https://anyessayhelp.com/

[supanova_question]

https://anyessayhelp.com/

[supanova_question]

Careers in Accounting, accounting homework help Business Finance Assignment Help

Careers in Accounting, accounting homework help Business Finance Assignment Help

× How can I help you?