Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
86 Cards in this Set
- Front
- Back
Commercial documents |
Invoices |
|
Also known as bill |
Invoices |
|
To show the products and services that were sold or provided by the buyer |
Invoices |
|
The person is receiving the delivery |
Signing for deliveries |
|
Submit the packing list |
Signing for deliveries |
|
Refuse to accept shipments |
Refusing delivery |
|
Takes physical possession and legal ownership of the shipment |
Record retention |
|
Provide packing list for all shipments |
Record delivery |
|
Acknowledging receipt of an order |
Inspecting a shipment |
|
Received as partial delivery |
Partial delivery |
|
Managed by setial or batch |
Tracking of goods |
|
Purchase returns along with returnable |
Defective Incorrect order Deteriorated purchase Repair |
|
Reaching expiration dates |
Expired stocks |
|
Temporarily hohse them |
Quarantine stock |
|
FIFO |
First In First Out |
|
LIFO |
Last In First Out |
|
FEFO |
First Expired First Out |
|
Inventory items are sold in the order they are purchased |
FIFO |
|
Last to enter the system are sold first |
LIFO |
|
Non-perishable, petroleum, minerals, and metals |
LIFO |
|
Materials are sold based on the date they should consumed |
FEFO |
|
Kinds of changes |
Operational Strategic Cultural Political |
|
Influence the way dynamic business |
Operational changes |
|
Changing the business technique |
Strategic changes |
|
Influenced by organizational culture |
Cultural changes |
|
Primarily due to political reasons |
Political changes |
|
Series of tools, techniques and processes aimed at successfully effecting change |
Change management |
|
Change management process models |
Kurt unfreeze-change-refreeze Proski’s ADKAR Kotter 8-step model of change |
|
ADKAR |
Awareness Desire Knowledge Ability Reinforcement |
|
Should be used in clinical practice only |
Computer program |
|
General Ethics |
Autonomy Beneficence Non-Maleficence |
|
Make their own decision |
Autonomy |
|
Usage of stored data |
Beneficence |
|
Stored data is protected |
Non-maleficence |
|
Ethical behavior anyone handling data and information |
Information ethics |
|
Person have a fundamental right to privacy |
POI-Privacy and Disposition |
|
Disclosed in an appropriate and timely fashion |
POI- Openness |
|
Legitimately collected about persons or groups’ data should be protected |
POI- Security |
|
Subject of electronic health records |
Access |
|
Fundamental right of privacy |
Legitimate infringement |
|
Any infringement of the privacy rights |
Least intrusive alternative |
|
Justified to the latter in good tine and jn an appropriate fashion |
Accountability |
|
aversion of eavesdropping |
Privacy |
|
unintended disclosure of information |
Confidentiality |
|
Levels of security |
Administrative security Physical security Technical security |
|
Accurate and up to date |
Availability |
|
Helping to ensure that health care providers |
Accountability |
|
Knowing and controlling the boundaries |
Perimeter identification |
|
Enabling access for health care |
Controlling access |
|
Understand and have effective control |
Comprehensibility and control |
|
Levels of security in the laboratory information system |
Register Order Collect Receive Run Review Release Report |
|
Aims to protect the fundamental human right of privacy |
Philippine data privacy act of 2012 |
|
Philippine data privacy act of 2012 is also known in RA? |
RA No. 10723 Ch.1 Sec.2 |
|
Penalities? |
Imprisonment from 3 to 6 years not less that 1M not more than 5M |
|
Penalties what RA section? |
RA No. 10723 Ch.8 Sec.33 |
|
RA No. 10725 |
Cybercrime Prevention Act of 2012 |
|
RA No. 10725 is approved when? |
September 12, 2012 |
|
Address legal issues concerning Online interactions and the internet in the Philippines |
Cybercrime Prevention Act of 2012 |
|
Instruction, communication with, storing data |
Access |
|
Modification or change |
Alteration |
|
Transmission of information |
Communication |
|
Electronic, magnetic, optical and electrochemical |
Computer |
|
Representation of facts, information |
Computer data |
|
Set of instruction executed by computer |
Computer program |
|
Device or group of interconnected or related devices |
Computer system |
|
Which online communication takes place |
Cyber |
|
Incapacity or destruction of or interference with the system and security |
Critical infrastructure |
|
Protect the cyber environment and organization and users assets |
Cyber security |
|
Stored in formalized manner |
Database |
|
Refers to listening, recording, etc |
Interception |
|
Manage functions |
Purchasing Accounting Inventory management Patient supply charges |
|
Purchasing Process |
Purchase request Purchase quotation Purchase order Goods receipt AP invoice Outgoing payment |
|
Used internally to identify a need for an item |
Purchase request |
|
Requesting prices and delivery information |
Purchase quotation |
|
Legally binding contract; accepted the order |
Purchase order |
|
Minimum quantity of an item that a company has stock |
Reorder level |
|
Minimum quantity of an item that a company has stock |
Reorder level |
|
Prompts a reorder |
Min value |
|
new target stock |
Max value |
|
Beginning of the purchasing process |
Enquiries |
|
Relationship between entity and the right suplier |
Enquires |
|
Contains vital information |
Quotation |
|
Buyer shows the intention to purchase |
Orders |
|
PO |
Purchasing order |
|
PO |
Purchasing order |
|
Contract to the health catr institution and supplier |
Purchase order |