Concept explainers
(Computerization of Health Records) A health-care issue that has been in the news lately is the computerization of health records. This possibility is being approached cautiously because of sensitive privacy and security concerns, among others. [We address such concerns in later exercises.] Computerizing health records could make it easier for patients to share their health profiles and histories among their various health-care professionals. This could improve the quality of health care, help avoid drug conflicts and erroneous drug prescriptions, reduce costs and, in emergencies, could save lives. In this exercise, you’ll design a “starter” HealthProfile class for a person. The class attributes should include the person’s first name, last name, gender, date of birth (consisting of separate attributes for the month, day and year of birth), height (in inches) and weight (in pounds). Your class should have a constructor that receives this data. For each attribute, provide set and get methods. The class also should include methods that calculate and return the user’s age in years, maximum heart rate and target-heart-rate range (see Exercise 3.16), and body mass index (BMI; see Exercise 2.33). Write a Java app that prompts for the person’s information, instantiates an object of class HealthProfile for that person and prints the information from that object—including the person’s first name, last name, gender, date of birth, height and weight—then calculates and prints the person’s age in years, BMI, maximum heart rate and target-heart-rate range. It should also display the BMI values chart from Exercise 2.33.
Want to see the full answer?
Check out a sample textbook solutionChapter 3 Solutions
Java How to Program, Early Objects (11th Edition) (Deitel: How to Program)
- Computer science Q #29) What do you believe is preventing testers from automating their work? Is there any way to get around it?arrow_forward6) Decryption (Substitution Cipher): The following is a substitution cipher. The letters are substituted randomly. Remember that this is a not shift cipher like the Caesar cipher. What does the following quote say? Who said it? Do this by hand. How long did it take you to decipher this message? D'Y JR EAWPD GTCTZ OTTA DYIRZBWGB, DB PRTJ KRYIADKWBT ADOT! TATWGRZ ZRRJTCTABarrow_forwardpizza (python)Mario owns a pizzeria. Mario makes all of his pizzas from 10 different ingredients, using 3 ingredients on each pizza. Mario’s cousin Luigi owns a pizzeria as well. Luigi makes all his pizzas from 9 ingredients, using 4 ingredients on each pizza. Mario and Luigi have made a bet: Mario believes that customers can order a larger selection of pizzas in his pizzeria than they can order in Luigi’s pizzeria. Use functions for this assignment. Implement a factorial() function yourself (do not use the one from the math module) When choosing k items from n possible items, the number of possibilities can be obtained using the following formula: (??)=?!?!(?−?)!(nk)=n!k!(n−k)! Make a function called choose with two parameters n and k, that implements the above formula. Write a program that calculates the number of pizzas Mario and Luigi can make. The outcome should look like this: Mario can make 120 pizzas.Luigi can make 126 pizzas. Luigi has won the bet.arrow_forward
- Problem C. Front Tooth ConcealmentYou have recently been appointed vice principal of a high school, and as such, you have the honor of helping out with their graduation ceremony. You will alternate reading off the names of the graduates with the principal. Unfortunately, you got your front teeth knocked out last night while fighting crime as a masked vigilante, so you are unable to pronounce any name containing the letters ‘s’ or ‘z’. Since you don’t want your enemies to learn of your secret identity, and you suspect that some of them may be present at graduation, you need to avoid saying any names containing the letters ‘s’ or ‘z’. You will read the first name from the list of graduates, meaning that you will also read the third, the fifth, the seventh, and so on. Therefore, you must ensure that all names at odd positions in the list of names (or at even indexes, since we start indexing at 0), do not contain the letters ‘s’ or ‘z’. Write a function avoid_sz(names_list) which takes in…arrow_forward(Please do not give solution in image format thanku) Question 4) A healthcare organisation wants to implement a new electronic health record (EHR) system to improve patient care and streamline operations. The business problem is that the current paper based system is time-consuming, prone to errors, and makes it difficult to access patient information in real-time. Using the OSCAR mnemonic can assist business analysts in investigating the situation to complete the above project. Explain briefly how the OSCAR mnemonic can be used to investigate how a new electronic health record system can be implemented.arrow_forward(SQL Table) ERD for the University database Narrative Description of the University Database Students take courses at the university. A student can serve as a mentor for one or more other students, but he/she is not required to do so. Further, each student can have one other student as his/her mentor, but this, too, is not required. A student, however, is required to be assigned to one and only one faculty member. In turn, a faculty member advises many students but is not required to advise any students. Courses are offered in multiple sections. A course consists of a prefix as well as a course number. For example, in this course, CSIS is the course prefix, and 325 is the course number. CSIS 325 is offered in multiple sections, some residentially and some online. All residential sections must be taught in a classroom on a campus; whereas online classes are not assigned to a classroom. Sections are represented by a three-digit section number such as 001, 002, B01, etc. A given…arrow_forward
- (MASTERY CHECKIN Sp1) Spreadsheet Use Response Read the following passage below. Then describe the 3 important ways spreadsheets can help you or a professional do their job. I will use this response for your Mastery Check! What does spreadsheet software do? Spreadsheet software is used to store, organize and analyze data. Most of the time, the data that is entered is numerical, though spreadsheets can also store addresses and contact information. Spreadsheets automatically calculate data based on the formula or function that you create and modify for them. For example, let's say you're using a spreadsheet to track how much money you're using from a budget. You can set up the spreadsheet so every time you enter an item you purchased from the budget, the software automatically subtracts the cost from the total budget. Íf the budget starts at $5,000 and you buy a product that is $400, you input the product and its cost into the spreadsheet, and it automatically does the calculation,…arrow_forwardv "ID Theft" or "identity theft" refers to crimes in which a person gets and utilises another person's data without permission. Theft of a person's name, date of birth, unique identity number, bank account number, credit/debit card number, phone number, and other personal information in some way that involves fraud or deception is one example.arrow_forwardAssociations between variables: (Python + Report) Compute the sample correlation coefficient between the time spent on the website, the number of pages viewed, and the dollar amount spent using Python. Include your findings in your report and comment on your findings. You should calculate pairwise correlation between these three variables (three correlation coefficients in total) and comment on all. What types of relationships exist between these variables?arrow_forward
- (C LANGUAGE ONLY) 5. Sorting My Todo List by CodeChum Admin Thanks to your help, Programmer. I have reached this point in my life where I feel like I could bounce back and fight again. Thank you for being a good friend ? I just need one last help please, if it's still okay with you. You see, I already have a plan for my life, all that's left to do is to prioritize these things. I want to tackle the biggest items in the list first. Can you help me sort these in descending order please? Instructions: You are given an array which contains predefined elements. Your task is to sort the array in descending order and then print all the elements in 1 line. Output 101·100·99·99·98·91·89·78·77·69·69... source code:arrow_forward( C PROGRAMMING ONLY) 1. Red Stringby CodeChum Admin For the Japanese, who know so much and intuit more, human relations are predestined by a red string that the gods tie to the pinky fingers of those who find each other in life. Legend has it that the two people connected by this thread will have an important story, regardless of the time, place or circumstances. The red string might get tangled, contracted or stretched, as surely often happens, but it can never break. A red string is basically like a connection. And in programming, a connection from one variable to another can be simulated by a pointer. Let's do that! Instructions: In the code editor, you are provided with an initial code where a constant variable is declared.Your only task is to assign the address of this variable to the first pointer found at line 9.Output My·destiny·=·11arrow_forward(Logical access, network security, environmental controls, and physical security) protects an organization’s information and information systems. Discuss in your own words how these controls can be implemented to support the defense in depth (DiD) strategy.arrow_forward
- C++ for Engineers and ScientistsComputer ScienceISBN:9781133187844Author:Bronson, Gary J.Publisher:Course Technology Ptr