This course prepares the medical coding student for detailed procedural coding in …
This course prepares the medical coding student for detailed procedural coding in integumentary, musculoskeletal, respiratory, and cardiovascular systems. Additionally, this course prepares the student to use ICD-10 diagnostic codes as principal, primary, secondary, and tertiary medical necessity justification. This course also prepares students to competently select accurate HCPCS codes for supplies, medications, transportation, etc.
Course Outcomes: 1. Identify and locate clinical information in patient charts which pertain to reimbursable data in all outpatient settings, and closely approximate the proper 2. Evaluation and Management code for reimbursement. 3. Demonstrate competency in procedural and diagnostic coding for the following systems: Integumentary; Respiratory; and Cardiovascular. 4. Demonstrate knowledge of Insurance, Billing and Coding Regulations. 5. Demonstrate accurate Diagnostic Coding. 6. Demonstrate accurate HCPCS Coding. 7. Demonstrate knowledge of CPT Coding Conventions.
Students are presented with information relating to stand alone Python programs, stdin, …
Students are presented with information relating to stand alone Python programs, stdin, stdout, and command line arguments. This is a lab exercise. After completion students should be able to create executable Python programs which can accept input from stdin or command line arguments.
This course introduces terminology and gives an overview of the computer and …
This course introduces terminology and gives an overview of the computer and information science. It focuses on the basic concepts of computer hardware and software systems, software applications, online inquiry, and evaluation of materials including ethical decisions. It also includes concepts reinforced in a laboratory environment. Through specific hands-on experience you will gather, evaluate, and solve real-world problems and form decisions based upon critical examination of today's technology.
This class is designed to teach you how to use a computer running a Windows Operating System. If you do not have access to a Windows computer or have problems doing assessments, please contact your Navigator to discuss your options.
Course Outcomes: 1. Identify current and future trends in computing and recognize various computing devices and their uses. 2. Identify the parts of a computer and their features and functions and recognize the advantages and limitations of important peripheral devices. 3. Identify and describe the features of desktop and specialized computer operating systems and understand the importance of system utilities, backups, and file management. 4. Explain why the web is important in today's society and why fluency in the tools and language of the Internet is necessary to be an educated consumer, a better student, an informed citizen, and a valuable employee. 5. Understand what a computer network is, identify different types of networks, and recognize threats to security and privacy. 6. Demonstrate the proper use of basic word processing, spreadsheet and presentation software features.
This course is designed as a survey course to familiarize students with …
This course is designed as a survey course to familiarize students with computer concepts including software and hardware, software applications, and living online leading towards digital computer literacy. Instruction in this course is provided through demonstration and discussion. Class time will be provided for practicing concepts as well as working through assignments; however, additional time outside of class will be essential to improve skills and complete the assignments.
This course presents an overview of the Microsoft Windows Operating System (OS), …
This course presents an overview of the Microsoft Windows Operating System (OS), with emphasis on the OS design, configuration, operations, and applications. This course will also cover PowerShell scripting and includes researching, documenting, and presenting a key OS function.
This is the first of two courses in the administration of Microsoft …
This is the first of two courses in the administration of Microsoft Windows® client/server networked operating systems. The courses CS 240A and CS 240B are laboratory-intensive courses that provide hands-on experience in the planning, installation, and administration of Microsoft Windows® client/server networks. The two courses provide partial preparation for the MCSA® and MCSE® exams.
This is the second of two courses in the administration of Microsoft …
This is the second of two courses in the administration of Microsoft Windows® client/server networked operating systems. The courses CS 240A and CS 240B are laboratory-intensive courses that provide hands-on experience in the planning, installation, and administration of Microsoft Windows® client/server networks. The two courses provide partial preparation for the MCSA® and MCSE® exams.
This course in an introduction to project management. The art and science …
This course in an introduction to project management. The art and science of project management has evolved much over the last 1-2 decades. At this point, 2017, all small, medium and large companies use structured project management methodologies and guidelines to run their internal and external projects. My objective is not to teach you how to become a project manager, that will require many courses and hands-on experience, but to teach you how to become an effective team player on a structured project.|A practice-oriented course with examples, applications and proven techniques that demonstrate systems analysis and design. Actual organization, business settings, and project management software are used to show how systems concepts can apply to many different types of enterprises. Project lifecycle as well as project management software, terminology and concepts are discussed.
This book is a guide to Cascading Style Sheets (CSS), a technique …
This book is a guide to Cascading Style Sheets (CSS), a technique widely used in web pages including Wikipedia to describe their visual style and appearance. CSS can take HTML to new places creatively and functionally. Once you learn how to style mark-up, you can additionally learn JavaScript functions that make dynamic web pages.
Short Description: This book goes over a wide range of cataloging schemata, …
Short Description: This book goes over a wide range of cataloging schemata, tools, and norms. It presents a concise but thorough view of the basics of library cataloging practice.
Word Count: 24530
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
These slides are used to guide a discussion with students introducing them …
These slides are used to guide a discussion with students introducing them to the notion of public interest technology and coding for the public good. The lesson is intended to spark a discussion with students about different sorts of technology and their societal ramifications.
Comments Note that these slides use Poll Everywhere polls; to use them, you will need to create your own Poll Everywhere account.
This activity helps student design and develop a front-end of a website, …
This activity helps student design and develop a front-end of a website, from wireframes through HTML/CSS/Javascript. It includes design questions for students, including the invocation of Ben Schneiderman's eight golden rules for interface design.
Note: this activity assumes prior knowledge of web development. Since this activity is designed for an HCI course, with a focus on interface design, students are not expected to create a back-end for it. This activity can obviously be modified for a full-stack experience.
Comments Although this activity can be used in isolation, it is intended to be part of a series guiding students towards the creation of a front-end of a website. The series (all published as OER) consist of:
a) Needfinding b) Personas, Scenarios and Storyboards c) Front-end Website Design and Development d) Accessibility Evaluation
For all intents and purposes, this show is the fourth edition of …
For all intents and purposes, this show is the fourth edition of the textbook Computer Organization and Design Fundamentals by David Tarnoff. Since the first edition came out in 2005, the PDFs have been made free for download to anyone interested in computer organization. With the trend toward audio and video instructional material, it was time for an update.
The presentation of the material in this series will be similar to that of the original textbook. In the first third, we will discuss the mathematical foundation and design tools that address the digital nature of computers. This will include an introduction to the differences between the physical world and the digital world, how those differences affect the way the computer represents and manipulates data, and the use and design of digital logic and logic gates. In the second third, the fundamentals of the digital logic and design will be used to design common circuits such as binary adders, describe checksums and cyclic redundancy checks, network addressing, storage devices, and state machines. The final third will examine the top-level view of the computer. This will include a discussion of the memory hierarchy and its components, the components of a CPU, and maybe even a discussion of assembly language along with some examples.
The text, labs, and review questions in this book are designed as …
The text, labs, and review questions in this book are designed as an introduction to the applied topic of computer security (cybersecurity). With these resources students will learn ways of preventing, identifying, understanding, and recovering from attacks against computer systems. This text also presents the evolution of computer security, the main threats, attacks and mechanisms, applied computer operation and security protocols, main data transmission and storage protection methods, cryptography, network systems availability, recovery, and business continuation procedures.
Word Count: 17425 (Note: This resource's metadata has been created automatically by …
Word Count: 17425
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
This webinar (recorded Sept. 27, 2017) introduces how to connect other services …
This webinar (recorded Sept. 27, 2017) introduces how to connect other services as add-ons to projects on the Open Science Framework (OSF; https://osf.io). Connecting services to your OSF projects via add-ons enables you to pull together the different parts of your research efforts without having to switch away from tools and workflows you wish to continue using. The OSF is a free, open source web application built to help researchers manage their workflows. The OSF is part collaboration tool, part version control software, and part data archive. The OSF connects to popular tools researchers already use, like Dropbox, Box, Github and Mendeley, to streamline workflows and increase efficiency.
This video will go over three issues that can arise when scientific …
This video will go over three issues that can arise when scientific studies have low statistical power. All materials shown in the video, as well as the content from our other videos, can be found here: https://osf.io/7gqsi/
This archive contains a series of lessons on cryptography suitable for use …
This archive contains a series of lessons on cryptography suitable for use in a CS0 course. The only requirement is familiarity with Python, particularly dictionaries, lists, and file IO. It is also assumed that students know how to create stand-alone Python programs and interact with them through the terminal. Most of the work is done in Jupyter notebooks.
The material found in the notebooks is a combination of reading material, exercises, activities and assignments. Below are descriptions of each lesson or assignment and links to notebooks on Cocalc. The same files are available for batch download in this archive.
This economics course provides an introduction to the field of cybersecurity through …
This economics course provides an introduction to the field of cybersecurity through the lens of economic principles. Delivered by four leading research teams, it will provide you with the economic concepts, measurement approaches and data analytics to make better security and IT decisions, as well as understand the forces that shape the security decisions of other actors in the ecosystem of information goods and services.
Systems often fail because the organizations that defend them do not bear the full costs of failure. In order to solve the problems of growing vulnerability to computer hackers and increasing crime, solutions must coherently allocate responsibilities and liabilities so that the parties in a position to fix problems have an incentive to do so. This requires a technical comprehension of security threats combined with an economic perspective to uncover the strategies employed by cyber hackers, attackers and defenders.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.