Medical prescriptions for all patients

Assignment Help Basic Computer Science
Reference no: EM131349873

Microsoft Word - Tutorial.doc

The pharmacy at Mercy Hospital fills medical prescriptions for all patients and distributes these medications to the nurse stations responsible for the patient's care. Medical prescriptions are written by doctors and sent to the pharmacy. A pharmacy technician reviews the prescriptions and sends them to the appropriate pharmacy station. Prescriptions for drugs that must be formulated (made on site) are sent to the lab stations, prescriptions for off the shelf drugs are sent to the shelving station, and prescription for narcotics are sent to the secure station.

At each station, a pharmacist reviews the order, check the patient's file to determine the appropriateness of the prescriptions, and fills the order if the dosage is at a safe level and is will not negatively interact with the other medications or allergies indicated in the patient's file. If the pharmacist does not fill the order, the prescribing doctor is contacted to discuss the situation. In this case, the order may ultimately be filled or the doctor may write another prescription depending on the outcome of the discussion. Once filled, a prescription label is generated listing the patient's name, the drug type, and dosage, an expiration date, and any special instructions. The label is placed on the drug container and the orders are sent to the appropriate nurse stations. The patients admission number, the drug type and amount dispensed, and the cost of the prescription are then sent to the billing department.

From the problem statement above, answer the following questions.

  1. Draw a DFD context diagram for the system.
  2. Draw a DFD level 0 diagram.
  3. Draw a DFD level 1 diagram.

Reference no: EM131349873

Questions Cloud

Define the term safety climate : Briefly outline the legal responsibilities that employers have to ensure a safe workplace. Define the term 'safety climate' (drawing on appropriate academic literature) and Explain how a safety climate can improve safety behaviours of employees (draw..
What activities are required to complete a project : What activities are required to complete a project and in what sequence should they be carried out - When should each activity be scheduled to begin and end?
Describe the most common forms of digital crime : Next, describe the most common forms of digital crime, and give your opinion as to why those forms you described are so common. Provide a rationale for your response.
Procedural programming and object-oriented programming : Describe the difference between procedural programming and object-oriented programming?
Medical prescriptions for all patients : The pharmacy at Mercy Hospital fills medical prescriptions for all patients and distributes these medications to the nurse stations responsible for the patient's care.
How the company manages production or delivery of service : Identify the company's competitors and determine who owns what market share for the product. Evaluate how the company manages production or delivery of service. Defend your choice of questions and support your selection with scholarly articles.
Assignment-doorstep treats gui : Assignment: Doorstep Treats GUI This assignment will assess the competency: 1. Explain Windows Command Line and Forms applications
List all heat transfer processes associated : Discuss the modes of heat transfer that determine the equilibrium temperature of a space shuttle when it is in orbit. What happens when it re-enters the earth's atmosphere?
How many kgs of ramal should the company order for june : How many kgs of Ramal should the company order for June? Which of the following statements about the Statement of Financial Position is not true? How would an increase in administration costs affect reported profits?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write a program that computes the nth fibonacci number

Fibonacci sequence begins: 1, 1, 2, 3, 5, 8, 13,. . .. Write a program that computes the nth Fibonacci number where n is a value input by the user. For example, if n = 6, then the result is 8.

  What is your interest in this leader

For Leader Analysis Paper #1, please submit a 4-5 page (minimum) double-spaced paper that details the following: 1. Who is your leader and what leadership role/s has this person had? 2. What is your interest in this leader? Why do you want to choose ..

  Appropriate active directory replication topology

How do you choose the appropriate Active Directory replication topology for your company? What kinds of problems do you want to prevent? Give examples. Please explain in approximately in two paragraphs.

  Try to improve the text cleaning in find msg words ()

Try to improve the text cleaning in find Msg Words ()

  Research design flaws in cellular networks

Use the Internet to research design flaws in cellular networks that affect performance or security and find alternative designs that can improve capabilities.

  Design an algorithm to simulate multiplication by addition

Design an algorithm to simulate multiplication by addition. Your program should accept as input two integers (they may be zero, positive, or negative).

  What is risk management

What is risk management? Why is the identification of risks, by listing assets and their vulnerabilities, so important to the risk management process?

  Determine whether the expression is balanced

Given a sequence consisting of parentheses, determine whether the expression is balanced

  Create the header comment and the prototype for the function

Create the header comment and the prototype for the function.

  The table number and waiter''s name must be entered

o The table number and Waiter's name must be entered. The restaurant has only 10 tables, therefore, the only valid table numbers are 1-10. After the user enters the table number and waiters name, then the table number and the waiters name shou..

  Define frequency shift keying

Define Frequency Shift Keying used in communication systems and draw a block diagram of a basic FSK transmitter and receiver systems.

  Write down some of the merits of using a distributed

what are some of the advantages of using a distributed network management system in the corporate enterprise? what are

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd