Course Outcome for Assignment: Evaluate research designs, data sources, data collection, and analytical methods. Apply health informatics research

 

Course Outcome for Assignment: 

  • Evaluate research designs, data sources, data collection, and analytical methods.
  • Apply health informatics research using standard design, tools, and techniques.

Assignment Instructions:

  • The most common Excel functions used for data analytics are VLOOKUP (), CONCATENATE, LEN, COUNTA, COUNTIFS, SUMIFS, FIND/SEARCH, AVERAGEIFS. IFERROR, LEFT/RIGHT, RANK, MINIFS, MAXIFS, SUMPRODUCT. Provide a Response to the Following: (Note: The answer can be presented in a table format.) 
    • What are these Excel functions that are listed above, and what purpose would you use them in data analytics for your facility?  
  • Submit an Excel Spreadsheet, showing your work on the following:
    • Perform the statistical calculations (Average, Min, Max, Mean, Mode, Median, Standard Deviation) on the provided Patient Healthcare Data file for each of the parameter (weight, height, pulse, age)
    • Use this Excel File for the Patient Healthcare Data (Excel Worksheet)
    • Analyse what this data and your calculations mean for this specific patient healthcare dataset. How your analysis can be used for HC managerial decision making. 
    • Revised
      1. Most common Excel functions used for data analytics are VLOOKUP (), CONCATENATE, LEN, COUNTA, COUNTIFS, SUMIFS, FIND/SEARCH, AVERAGEIFS. IFERROR, LEFT/RIGHT, RANK, MINIFS, MAXIFS, SUMPRODUCT.
        •  Explain these Excel functions and how would you use them in data analytics for your facility?  
      2. Using data on weight, height, pulse, age (columns B, C, D, E and rows 2-21) in the attached Excel file (Patient Healthcare Data (Excel Worksheet): /content/enforced/1061132-M_026921-01-2242/Patient Healthcare Data2.xlsx
      3. Perform calculations for each parameter (weight, height, pulse, age) with the built-in Excel functions and enter in columns A against each function: Average, Min, Max, Mean, Mode, Median, Standard Deviation
      4. As a healthcare manager, how would you use these data in healthcare decision-making for facility you may be working for? 

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

200 word response 1 reference due 6/8/2024 Franco 2-1: Aligning an IT Security Assessment The Gramm-Leach-Bliley Act (GLBA) was established in 1999 a

200 word response 1 reference due 6/8/2024 Franco 2-1: Aligning an IT Security Assessment The Gramm-Leach-Bliley Act (GLBA) was established in 1999 and was enacted to assist reform the financial industry and address consumer financial privacy concerns (Federal Trade Commission, 2023). GLBA possesses requirements for the Federal Trade Commission and

200 word response 1 reference Due 6/8/2024JacksonDiscussion 2-2: Conducting an IT

200 word response 1 reference Due 6/8/2024 Jackson Discussion 2-2: Conducting an IT Infrastructure Audit for Compliance IT security policies have a high level of importance for a compliance audit. As defined by Fortinet, and IT Security Policy “identifies the rules and procedures for all individuals and using an organization’s

Find videos showing a real-world health system. Then, conduct research for each following items:Provide the title of the video, and the Web link. Then,

Find videos showing a real-world health system. Then, conduct research for each following items: Provide the title of the video, and the Web link. Then, summarize it–including details, features, functions, contents, etc.), stakeholders, markets, and elaborate business value(s) it delivers and/or enables. Imagine you are the owner or the system analyst

300 words due 6/5/50242 referencesDiscussion 2-1: Aligning an IT Security Assessment

300 words due 6/5/5024 2 references Discussion 2-1: Aligning an IT Security Assessment How does the Gramm-Leach-Bliley Act (GLBA) impact information systems security and the need for information systems security practitioners and professionals? If an organization is a financial institution or insurance company that is also publicly traded, what other