0 penilaian0% menganggap dokumen ini bermanfaat (0 suara)
8 tayangan1 halaman
This document is a form for recording observations from a visit to a dietary department at a healthcare facility. It includes fields to document details about the facility size and meal service, staffing levels in foodservice, type of menu used, use of standardized recipes and diet modifications offered, who is responsible for documentation and participating in care conferences, and whether any aspects of nutrition care differ from the visitor's own process. Space is also provided to make notes on any useful forms the department may have.
This document is a form for recording observations from a visit to a dietary department at a healthcare facility. It includes fields to document details about the facility size and meal service, staffing levels in foodservice, type of menu used, use of standardized recipes and diet modifications offered, who is responsible for documentation and participating in care conferences, and whether any aspects of nutrition care differ from the visitor's own process. Space is also provided to make notes on any useful forms the department may have.
Hak Cipta:
Attribution Non-Commercial (BY-NC)
Format Tersedia
Unduh sebagai ODT, PDF, TXT atau baca online dari Scribd
This document is a form for recording observations from a visit to a dietary department at a healthcare facility. It includes fields to document details about the facility size and meal service, staffing levels in foodservice, type of menu used, use of standardized recipes and diet modifications offered, who is responsible for documentation and participating in care conferences, and whether any aspects of nutrition care differ from the visitor's own process. Space is also provided to make notes on any useful forms the department may have.
Hak Cipta:
Attribution Non-Commercial (BY-NC)
Format Tersedia
Unduh sebagai ODT, PDF, TXT atau baca online dari Scribd
Hacking for Beginners: Comprehensive Guide on Hacking Websites, Smartphones, Wireless Networks, Conducting Social Engineering, Performing a Penetration Test, and Securing Your Network (2022)