• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/86

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

86 Cards in this Set

  • Front
  • Back

Commercial documents

Invoices

Also known as bill

Invoices

To show the products and services that were sold or provided by the buyer

Invoices

The person is receiving the delivery

Signing for deliveries

Submit the packing list

Signing for deliveries

Refuse to accept shipments

Refusing delivery

Takes physical possession and legal ownership of the shipment

Record retention

Provide packing list for all shipments

Record delivery

Acknowledging receipt of an order

Inspecting a shipment

Received as partial delivery

Partial delivery

Managed by setial or batch

Tracking of goods

Purchase returns along with returnable

Defective


Incorrect order


Deteriorated purchase


Repair

Reaching expiration dates

Expired stocks

Temporarily hohse them

Quarantine stock

FIFO

First In First Out

LIFO

Last In First Out

FEFO

First Expired First Out

Inventory items are sold in the order they are purchased

FIFO

Last to enter the system are sold first

LIFO

Non-perishable, petroleum, minerals, and metals

LIFO

Materials are sold based on the date they should consumed

FEFO

Kinds of changes

Operational


Strategic


Cultural


Political

Influence the way dynamic business

Operational changes

Changing the business technique

Strategic changes

Influenced by organizational culture

Cultural changes

Primarily due to political reasons

Political changes

Series of tools, techniques and processes aimed at successfully effecting change

Change management

Change management process models

Kurt unfreeze-change-refreeze


Proski’s ADKAR


Kotter 8-step model of change

ADKAR

Awareness


Desire


Knowledge


Ability


Reinforcement

Should be used in clinical practice only

Computer program

General Ethics

Autonomy


Beneficence


Non-Maleficence

Make their own decision

Autonomy

Usage of stored data

Beneficence

Stored data is protected

Non-maleficence

Ethical behavior anyone handling data and information

Information ethics

Person have a fundamental right to privacy

POI-Privacy and Disposition

Disclosed in an appropriate and timely fashion

POI- Openness

Legitimately collected about persons or groups’ data should be protected

POI- Security

Subject of electronic health records

Access

Fundamental right of privacy

Legitimate infringement

Any infringement of the privacy rights

Least intrusive alternative

Justified to the latter in good tine and jn an appropriate fashion

Accountability

aversion of eavesdropping

Privacy

unintended disclosure of information

Confidentiality

Levels of security

Administrative security


Physical security


Technical security

Accurate and up to date

Availability

Helping to ensure that health care providers

Accountability

Knowing and controlling the boundaries

Perimeter identification

Enabling access for health care

Controlling access

Understand and have effective control

Comprehensibility and control

Levels of security in the laboratory information system

Register


Order


Collect


Receive


Run


Review


Release


Report

Aims to protect the fundamental human right of privacy

Philippine data privacy act of 2012

Philippine data privacy act of 2012 is also known in RA?

RA No. 10723 Ch.1 Sec.2

Penalities?

Imprisonment from 3 to 6 years not less that 1M not more than 5M

Penalties what RA section?

RA No. 10723 Ch.8 Sec.33

RA No. 10725

Cybercrime Prevention Act of 2012

RA No. 10725 is approved when?

September 12, 2012

Address legal issues concerning Online interactions and the internet in the Philippines

Cybercrime Prevention Act of 2012

Instruction, communication with, storing data

Access

Modification or change

Alteration

Transmission of information

Communication

Electronic, magnetic, optical and electrochemical

Computer

Representation of facts, information

Computer data

Set of instruction executed by computer

Computer program

Device or group of interconnected or related devices

Computer system

Which online communication takes place

Cyber

Incapacity or destruction of or interference with the system and security

Critical infrastructure

Protect the cyber environment and organization and users assets

Cyber security

Stored in formalized manner

Database

Refers to listening, recording, etc

Interception

Manage functions

Purchasing


Accounting


Inventory management


Patient supply charges

Purchasing Process

Purchase request


Purchase quotation


Purchase order


Goods receipt


AP invoice


Outgoing payment

Used internally to identify a need for an item

Purchase request

Requesting prices and delivery information

Purchase quotation

Legally binding contract; accepted the order

Purchase order

Minimum quantity of an item that a company has stock

Reorder level

Minimum quantity of an item that a company has stock

Reorder level

Prompts a reorder

Min value

new target stock

Max value

Beginning of the purchasing process

Enquiries

Relationship between entity and the right suplier

Enquires

Contains vital information

Quotation

Buyer shows the intention to purchase

Orders

PO

Purchasing order

PO

Purchasing order

Contract to the health catr institution and supplier

Purchase order