___ pin. (6)
Kicks off. (6)
Combined effort by a group. (8)
___ hazards include stress, fatigue, bullying, violence and aggression. (12)
It is important to practice ___(4) ___ (4) as much as you can. Things like exercise, meditation, and healthy eating all are ways to take care of yourself. (8)
"___ is being able to see that there is light despite all of the darkness": Desmond Tutu (4)
At least eight hours of ___ can drastically improve your mental health. (5)
Sometimes it is important to get help with your mental health. Talking to a ___ can be a great way to work through your emotions. (12)
In case of a workplace fire, look to me for guidance regarding safe evacuation of the workplace. (6)
Something dangerous that can hurt you. (6)
To avoid a serious shock, this should not be mixed with water. (11)
A blessing is the name given to a group of which magnificent creature? (7)
You and I. (2)
Catch some rays. (3)
Atkins rarity. (4)
Wise Bird? (3)
When a disease is always present no matter how small in a community we refer to it as an _____.
If there are usually only 20 cases per year of Measles but in 2021, there were 50 cases of Measles, What is this called?
COVID-19 which affects countries throughout the world is considered a _____.
What is the cause of a disease or health condition?
What is the organism that becomes infected by a disease called?
Where does an agent exist?
what is in the middle of the epidemiological triangle?
The capacity of an agent to enter a host and cause infection: a disease that easily spreads from one host to another has high _____.
When symptoms are very noticeable, the disease has high ____.
The capacity of an agent to produce poison is called ____.
When an agent can survive in many adverse environments, they have high ____.
A type of direct transmission whenever anyone coughs, sneezes, or talks.
A type of indirect transmission spread by food, water, or inanimate objects.
This type of prevention is implemented before there is evidence of disease or injury.
This type of prevention is implemented after a disease or injury is established, the goal is to reduce morbidity or mortality.
What type of prevention is a community-level weight loss program?
When you have been exposed to a contagious pathogen like COVID-19 but not showing any symptoms yet you have to go into ____.
When you have been exposed to a contagious pathogen like COVID-19 and are showing symptoms you have to go into ____.
True positive / (True positive + False negative)
True negative / (False positive + True negative)
Systematic error often introduced by a researcher; two types are information and selection.
The number of existing and new cases of a disease/ health-related condition is the ____.
The number of new cases of a disease/ health-related condition is the ____.
Diseases like cardiovascular disease, cancer, or diabetes are ____ diseases.
The incidence among exposed divided by the incidence of unexposed.
Which ratio is used in case-control studies to test the hypothesis?
The leading cause of death with risk factors including hypertension, obesity, and physical inactivity.
The second leading cause of death in the US which has stages 0-IV.
This is a cross-sectional study that uses data that describes groups of individuals.
This study includes individuals used as cases and as controls to test a hypothesis.
A shortcoming of this study is that they are not well-suited for studying very rare diseases and are also time-consuming and expensive. These studies can be performed in the past or future.
The goal of this study is to monitor a population to gather the information that can be used to prevent health threats. There are two kinds: passive and active.
The first point when an individual is exposed to or infected by a disease; point of ____.
When you are fully recovered from the disease or infection you just experience is the ____ period.
The point of the first symptom of a disease or infection is the ____ point.
The energy providing food constituents which consist of starch, sugars and fibres are called…
A healthy diet throughout life promotes healthy pregnancy outcomes, supports normal growth, development and ageing, helps to maintain a healthy body weight, and reduces the risk of chronic disease leading to overall health and well-being.
What do you call when you can’t eat meat?
a special course of food to which one restricts oneself, either to lose weight or for medical reasons.
When you reach for your toes
the branch of knowledge concerned with the diet and its effects on health, especially with the practical application of a scientific understanding of nutrition.
Jumping up and down while moving your arms up and down
The addition of nutrients to foods at such a level as to make a major contribution to the diet.
When you March and you reach for the opposite arm and leg
When you pretend to sit down in the air and have your arms either crossed or in front of you
What is the measurement of 6 laps? (In Mater Academy Bay)
the action or fact of maintaining or supporting oneself at a minimum level.
food or provisions
A liquid that hydrates
A mix of greens, protein, etc.
A shake that includes protein
A bar with granola
When you’re in a weight loss journey
A period where you exercise
When you run to lose weight
I am a testable prediction
I am the scientific study of thoughts feelings and behaviours
Any observable action made by a living person
Ideas or opinions created by thinking
An emotional state or reactions
The variable manipulated by the experimenter
The mental process of organising sensations into meaningful patterns
An expert in psychology that does not prescribe drugs to patients
A medical practitioner specializing in the diagnosis and treatment of mental illness
A person who influenced psychology
A variable (often denoted by y) whose value depends on that of another
The entire group of individuals to be studied.
A subset of the population being studied.
A method of procedure that has characterized natural science since the 17th century, consisting in systematic observation, measurement, and experiment, and the formulation, testing, and modification of hypotheses.
The word Psych can mean
Any variable other than the IV that causes a change in the DV (there is an attempt to control these)
Patient ________________ is your right to decide when, how, and to what extent others may access your health information
The privacy rule all healthcare workers must abide by
PHI stands for__________________ ________________ Information
A provider must post the notice of privacy practices in a clear and ______________-to-find location where patients are able to see it
The state of keeping or being kept secret or private
This must be signed by the patient in order to receive a copy of their medical records
Must be included when sending PHI via fax
An act of breaking or failing to observe a law, agreement, or code of conduct
The action or act of complying with rules and standards
This is a digital version of medical records
All learners feel this
treating all learners
inclusion is about attitudes as well as
recognising and valuing individuals
using wide range of teaching , learning and ________ approaches
using _____________ assessment
encouraging _________ work
creating safe ___________ environment
inclusive environment is important for ________ teaching and learning to take place.
if learners are ______ they might not feel involved and therefore not learn
The practice of keeping one's mouth clean and free of disease and other problems (2 words, but write it with no space)
The thin, tough shell that acts as the outer covering of a tooth and is the hardest tissue in the human body
A sticky film of bacteria that forms on our teeth
Damage to a tooth's enamel due to attacking acids that bacteria in our mouth make (2 words, but write it with no space)
A mineral found in milk, yoghurt and cheese and helps promote strong teeth and bones
A mineral found in eggs, fish, lean meat and dairy which is good for strong teeth
A vitamin which promotes gum health, is found in citrus fruits but is quite acidic, so can weaken the enamel
A vitamin which helps calcium be absorbed into the body and can be gained from sunlight, oily fish and fortified foods
A mineral that teams up with calcium and phosphate to create a defence system in the enamel and is found in baked potatoes and UK tap water
A carbohydrate that is often added to processed foods, and leads to plaque on the teeth
A drink that helps cleanse the mouth and neutralise plaque acids
Who should take care in looking after their teeth, brush twice a day and floss and visit the dentist regularly?
something that is difficult to kill
bacteria is prokaryote because it lacks a __________
division of bacteria into two equal parts
ideal conditions for bacteria reproduction
a virus needs this to reproduce
smallest pathogen
viruses inject this into a host cell
example of a bacterial infection
example of a virus
you treat a bacterial infection with this
viruses can be prevented with this
one way a virus can spread
a shape of bacteria
another name for single-celled organisms
another name for many-celled organisms
can be friendly or harmful to people and animals
the process of virus reproduction
part that helps bacteria stick to surfaces
structure that viruses and bacteria have in common
bacteria or virus that can cause a disease
a change to DNA
prescription medication
detoxification
hypothyroidism
illicit drugs
immune system
loss of taste
mental health
multivitamins
healthy fats
hypoglycemia
irritability
weight gain
addiction
addictive
fast food
headaches
junk food
magnesium
nutrients
nutrition
potassium
shakiness
caffeine
chromium
cravings
function
alcohol
calcium
fatigue
insulin
protein
brain
drugs
meals
sugar
water
acne
iron
Something that shows up in a email
Hard to detect both by Users
Identity and Privacy Protection
Someone attempting to create Identity fraud
A security mechanism prohibiting the execution of those programs on a known malicious or undesired list of software
The occurrence of disclosure of confidential information, access to confidential information, destruction of data assets or abusive use of a private IT environment. Generally, a data breach results in internal data being made accessible to external entities without authorization.
A security tool, which may be a hardware or software solution that is used to filter network traffic.
A form of identity theft in which a transaction, typically financial, is performed using the stolen identity of another individual. The fraud is due to the attacker impersonating someone else.
he likelihood or potential that an employee or another form of internal personnel may pose a risk to the stability or security of an organization
Any code written for the specific purpose of causing harm, disclosing information or otherwise violating the security or stability of a system. Malware includes a wide range of types of malicious programs including: virus, worm, Trojan horse, logic bomb, backdoor, Remote Access Trojan (RAT), rootkit, ransomware and spyware/adware.
The likelihood or potential that an outside entity, such as an ex-employee, competitor or even an unhappy customer, may pose a risk to the stability or security of an organization. An outsider must often gain logical or physical access to the target before launching malicious attacks.
A form of unwanted or unsolicited messages or communications typically received via e-mail but also occurring through text messaging, social networks or VoIP. Most SPAM is advertising, but some may include malicious code, malicious hyperlinks or malicious attachments.
A form of malware that often attaches itself to a host file or the MBR (Master Boot Record) as a parasite. When the host file or MBR is accessed, it activates the virus enabling it to infect other objects. Most viruses spread through human activity within and between computers
a dishonest scheme; a fraud.
The act of falsifying the identity of the source of a communication or interaction. It is possible to spoof IP address, MAC address and email address.
A form of malware that monitors user activities and reports them to an external their party. Spyware can be legitimate in that it is operated by an advertising and marketing agency for the purpose of gathering customer demographics. However, spyware can also be operated by attackers using the data gathering tool to steal an identity or learn enough about a victim to harm them in other ways.
An attack focusing on people rather than technology
Alerts used as a warning of danger.
an attempt by hackers to damage or destroy a computer network or system.
a specific aspect of broader concepts such as cybersecurity and computer security, being focused on the specific threats and .
the ultimate call control center that gives customers full control of all T-Mobile's scam protection options.
Malware is defined as any device software that aims to cause damage and steal data. Malware is an abbreviation for malicious software. Ransomware and trojan, for example, are types of malware widely used in email attacks