logo image

Combo with "HITT 1311 Final" and 6 others

*Which of the following elements is NOT considered a basic component of every information system:
none of the above
*What is the main focus of the system planning and analysis phase of the systems development life cycle:
implementation planning
*A system that manages data for an entire healthcare business is referred to as:
enterprise wide system
*An information system consists of:
data
people
process
*Which of the following should a system analyst use to collect information about the requirements of an IS project:
Review existing forms
Review existing databases
Observe end users performing their jobs
*Use case and sequence diagrams are an example of a:
modeling language
*What basic components make up every communication system:
transmitters, receivers, media, and data
*Which of the following connects devices across a large geographical area, such as a state:
WAN
*In a network environment, a database shared among several end-user workstations would be stored on a:
server
*Which of the following is a type of computer network specifically designed to allow direct communication between the networks of separate companies:
extranet
*Which of the following is a fifth generation programming language that uses human language to allow users to speak to computers in a more conversational way:
natural language
*I am looking for a method of data security. Which of the following would be one choice:
cryptography
*An information system that alerts a physician when a laboratory value is outside of the normal range is called a(n):
decision support system
*Which of the following can be described as an organized collection of data saved in a file on a computer:
database
*What is the purpose of databases:
to store and retrieve data
Which of the following provides organizations with the ability to access data from multiple databases and to combine the results into a single questions and reporting interface:
data warehouse
*Which of the following includes computers that share resources such as printers or disk space across a computer network:
servers
*Which of the following enable(s) computer on a network to communicate with each other:
protocols
*Which of the following would be an example of two factor authentication:
password and retinal scan
*My computer is acting strange. My technical support said that I have been infected with a trojan horse. What does he mean by this:
I have been infected by a computer that gains unauthorized access by masquerading as software that is useful when it can compromise data.
*Identification, authentication, and certification are standards that:
Cover the use of personal ID numbers that restrict the use to a system
*Standards that dictate how the organization’s IT resources are protected from theft and damage are referred to as ___ standards:
physical security
*Which of the following is used as sketch of the user interface during system development:
screen prototype
Systems testing of a new information system should be performed by:
using actual patient data
*Which of the following were the only computers available prior to the late 1960’s:
mainframes
*These computers are used to handle intensive input/output business transactions:
mainframes
*Which of the following is a snap shot in time and consolidates data from multiple sources to enhance decision making:
data warehouse
*I just received a new job. I have the responsibility of leading physicians in the adoption of clinical information systems. My title must be:
chief medical informatics officer
*I am looking to purchase an information system that identifies patterns in data. What system should I purchase:
data mining
*I am looking to purchase a system that will be used by the physicians to order medications, tests, and other treatment. This system must use alerts and reminder. I must be looking to purchase what type of system:
clinical provider order entry
*As an HIM professional, I am involved in data collection, developing the data dictionary and building edits. What role do I have:
data quality
*What system would you expect to perform drug compatibility checks, have information on contraindications and control inventory:
pharmacy information system
As an HIM professional, I am involved in screen design and system functionality. What role do I have:
electronic system design and development
*Which of the following is an example of data collected by a patient monitoring system:
vital signs
*In the HL7 EHR functional model, the section that provides the functionality for public health and performance improvement is:
supportive
*I work for a 10-hospital chain that is purchasing five more hospitals. Many of these hospitals have different vendors supplying their information systems. This has resulted in concerns regarding:
interoperability
*As a nurse, there are clinical practice guidelines that I should follow in caring for my patients. Where can I find these:
embedded in EHR
*I have been asked to justify my request for an electronic document management system. Which of the following would I use:
space savings
Why is an ideal EHR system one that requires point of care charting:
supports clinical decision making
Which of the following is a transition strategy to achieve an EHR:
Electronic document mgmt system
To ensure that a computerized provider order entry (CPOE) system supports patient safety, what other system must also be in place:
pharmacy information system
When was the concept of an EHR first conceived:
1960s
Which statement is TRUE concerning CDR and EHR:
CDR supports mgmt of data for an EHR
The situation used to describe a combination of paper and electronic health record content is:
a hybrid record
Electronic prescribing is a special case of:
CPOE
Which of the following is not a database:
interface
Which of the following describes the content of information that should be exchanged among referring providers:
continuity of care record
A vocabulary is described as being controlled when it:
establishes meaning for terms used in the EHR
LOINC is a terminology that is used for coding:
lab results and other observations
Which of the following may be managed in an electronic document mgmt system (EDMS):
document images
email
PACS
A critical element of data retrieval planning is designing:
screen layout
Structured data may be entered into an EHR via:
macro
point and click
voice command
Natural language processing:
converts narrative information to structured data
A local area network using internet based protocols is an:
intranet
A tool that helps identify all costs associated with implementing an EHR is a(n):
total cost of ownership
As part of an EHR system selection, due diligence should be done:
before contracting for an EHR product
Which of the following would not be document on an EHR migration path:
training physicians on how to use the new CPOE
System build is the process where:
data tables are loaded and screen layouts customized
Our team is testing our new EHR. Currently we are testing whether or not all of the components will work together. This type of testing is called:
system testing
Chart conversion includes:
deciding what paper-based content should be automated
Which of the following is not an element of data quality:
data backup
The primary user of computerized provider order entry is a:
physician
Data security programs include a variety of measures for safeguarding data and computer programs, including:
technical measures such as using password protection
mgmt practices such as prohibiting the sharing of passwords
physical safeguards such as locking computer rooms
Some of the greatest threats to the security of health information and information systems come from:
employees who make unintentional mistakes
employees who steal computer equipment
employees who deliberately introduce computer viruses into the system
The primary reason that healthcare organizations develop business continuity plans is to minimize the effects of:
computer shutdowns during natural disasters
Critique this statement: HIPPA represents an attempt to establish best practices and standards for health information security:
This is a true statement
An information system security program should include:
protection for data privacy
protection for data integrity
protection for data availability
A risk analysis is useful to :
identify security threats
These are safeguards that protect equipment, media, and facilities:
physical access controls
Which of the following is true regarding HIPPA security provisions:
covered entities must establish a contingency mgmt plan
Which of the following techniques should be used to determine what information access privileges an employee should have:
user-based
context-based
role-based
The HIPAA data integrity standard requires that organizations:
keep documented logs of system access and access attempts
Which of the following is required by HIPAA standards:
data must be encrypted when deemed appropriate from the results of a risk assessment
Which of the following is required by HIPAA standards:
a written contingency plan
Security controls built into a computer software program are:
application controls
This type of controls is designed to prevent damage caused by computer hackers:
network controls
Policies and procedures that address the mgmt of computer resources and security are:
administrative contols
Match the following concepts embodied by information security programs with their functions:
safeguarding system reliability=availability
safeguarding system access=privacy
safeguarding system accuracy=integrity
Which of the following best describes information security:
the mechanisms for safeguarding information and information systems
Which of the following terms means that data should be complete, accurate and consistent:
data integrity
What is the biggest threat to the security of healthcare data:
employees
What does the term access control mean:
identifying which data employees should have a right to use
Which of the following is considered an application control:
password mgmt
edit check
audit trail
Which of the following is a software program that tracks every access to data in the computer system:
audit trail
Which of the following is true about HIPAA security requirements:
they require that a security official be appointed to take responsibility for the entire information security program of the organization
they require that employees security awareness training be conducted
they require that there be a business continuity plan in place
Which of the following is an organization’s planned response to protect its information in case of a natural disaster:
business continuity plan
Though the Security Rule does not specify audit frequency, an organization’s security policies and procedures should be reviewed:
once a year
The three elements of a security program are ensuring data availability, protection, and:
integrity
Within the context of data security, protecting data privacy basically means defending or safeguarding:
access to information
According to an FBI study, most security breaches occur:
from employees
In addition to people, threats to data security include:
natural disasters
power surges
hardware malfunctions
The first and most fundamental strategy for minimizing security threats is to:
establish a security organization
Administrative controls include policies and procedures that address the ___ of computer resources:
management
The individual responsible for ensuring that everyone follows the organization’s data security policies and procedures is the:
chief security officer
An employee accesses PHI on a computer system that does not relate to her job functions. What security mechanism should have been implemented to minimize this security breach:
access controls
A visitor to the hospital looks at the screen of the admitting clerk’s workstation when she leaves her desk to copy some admitting documents. What security mechanism would best have minimized this security breach:
automatic logoff controls
A laboratory employee forgot his user ID badge at home and uses another lab employee’s badge to access the computer system. What controls should have been in place to minimize this security breach:
workforce security awareness training
A dietary dept. donated its old microcomputer to a school. Some old patient data were still on the microcomputer. What controls would have minimized this security breach:
device and media controls
HIPAA requires that policies and procedures be maintained for a minimum of:
six years from date of creation or date when last in effect; whichever is later
A visitor walks through the computer dept. and picks up a CD from an employee’s desk. What security controls should have been implemented to prevent this security breach:
facility access controls
The act of limiting disclosure of private matters is a definition of:
confidentiality
The right of an individual to keep information about themselves from being disclose to anyone is a definition of:
informational privacy
The protection measures and tools for safeguarding information and information systems is a definition of:
data security
An employee in the physical therapy department arrives early morning to snoop through the clinical information system for potential information about neighbors and friends. What security mechanisms should have been implemented that could minimize this security breach:
information access controls
An employee observes an outside individual putting some computer disks in her purse. The employee does not report the security breach. What security measures should have been in place to minimize this threat:
security incident procedures
Locks on computer room doors is a type of:
physical control
A business continuity plan should have policies and procedures to:
run the business during the emergency period
restore data and files on the computer system
resume normal operation after a disaster
A coding analyst consistently enters the wrong patient gender while entering data in the billing system. What security measures should be in place to minimize this security breach:
edit checks
These are automatic controls that help preserve data confidentiality and integrity:
application controls
The ___ provide the objective and scope for the HIPAA Security Rule as a whole:
general rules
Which of the following statements is TRUE regarding HIPAA security:
HIPAA allows flexibility in the way an institution implements the security standards
For HIPAA implementation specifications that are addressable, the covered entity:
must conduct a risk assessment to determine if the specification is appropriate to its environment
Which of the following is an example of an ancillary system:
lab system
Structured data are generally entered into an EHR via:
templates
In order for organizations to earn Stage 1 Meaningful Use incentives, they must:
use certified EHR technology
What technology is used to manage data from different source systems, including structured data, scaled document images, and digital forms of medical data:
CDR
In a health information exchange organization (HIO) patients would most likely be identified using:
identity matching algorithm
A special web page that offers secure access to data is a(n):
portal
To run an analysis on a large set of data from many patients, the best tool is a(n):
CDW
An interface is:
program to exchange data
Standards from which organization would be used for enabling exchange of clinical images:
DICOM
Semantics refers to:
meaning of clinical concept
Which of the following vocabularies is likely to be used to describe drugs in clinically relevant form:
RxNorm
When some computers are used primarily to enter data and others to process data the architecture is called:
client/server
The ability for a computer to evaluate narrative speech and structure it given sophisticated rules for addressing context is:
natural language processing
discrete reportable transcription
What can a hc organization implement to help significantly reduce downtime:
use redundant serves with server failover
Data that describes data to be entered into an EHR is called:
metadata
When a hospital uses many different vendors to support its information system needs, the IT strategy being is called:
best of breed
Which form of system testing ensures that each data element is captured correctly:
unit testing
Which of the following describes the step during implementation when data from an old system are able to be incorporated into the new system:
data conversion
A health information exchange organization that compiles data into one central store of data is called:
consolidated
A system that is designed to ensure the medication five rights is:
bar-code medication administration record (BC-MAR)
Which of the following forms of clinical decision support is most likely to be included in a basic HER system:
drug-drug contraindication checking
A high level overview of when EHR components will be implemented is:
migration path
Ensuring accurate and timely data entry is:
data quality
Which clinical information system assists the physician in recording orders and in the decision-making process:
clinical decision support system
I need a system that allows me to treat patients located at a different site. I should use:
telematics
A medication being ordered is contraindicated due to a patient allergy. The physician is notified. This is an example of a(n):
alert
Dr. Rogers is sitting in his home office and reviewed digital images from a patient’s MRI. He must be using a(n):
picture archival communication system
Which of the following system would be an intermediate step toward the EHR:
electronic document mgmt. system
I need to look up results in an H1N1 blood test. I would look this up on an emergency medical system:
false
A clinical decision support system will identify a medication contraindication:
true
Electronic document mgmt. system is the same as the EHR:
false
Telematics is an example of a clinical information system:
true
Which of the following systems would be used to manage productivity:
human resource system
What is the difference between the executive information system and decision support system:
the executive information system is designed to be used by high level mgmt
I will be conducting some analysis of data, but I only need a limited amount of data that are contained in the data warehouse. What system should I utilize:
data mart
We receive a report each morning listing all of the admissions from the day before. This is an example of what type of report:
periodic scheduled
Which of the following is an example of when an executive decision support system should be used:
to identify a new service for the hospital to implement
Uses models and statistical analysis to help decision makers solve problems:
decision support system
Display concise information and may be called a dashboard report:
executive information system
Tracks productivity and turnover:
human resource mgmt. system
Is updated periodically and used for strategic decision support:
data warehouse
Creates reports needed to manage the day-to-day activities of the organization:
mgmt. information system
What individual or group is responsible for developing the strategic vision for the organization’s information:
chief information officer
Information resource mgmt. addressed information in what form:
information stored in any format
Which role works w/physicians to assist in the implementation of the EHR:
chief medical information system officer
What individual or group is knowledgeable on accreditation and classification systems:
health information mgmt. dept.
Fifty percent of patients treated at our facilities have Medicare as their primary payer. This is an example of what type of information:
aggregate
What HIM role determines what functions should be added to an information system:
electronic system design and development
What HIM role is involved w/the personal health record:
consumer health informatics
Critique the following statement: Ambulatory information systems are the same as inpatient information systems:
this is a false statement. they have many functions in common, but they each have unique functions as well
In what type of setting(s) are mobile devices critical to the efficient use of information systems:
home-health
As data quality coordinator for our facility, when does my responsibility/concern for data quality begin:
at the time that the data are collected
Embedded guidelines are recommendations for patient care:
true
The first computer systems used in hc were used primarily to perform payroll and ___ functions:
patient accounting
The concept of systems integration refers to the hc org. ability to:
combine information from any system w/in the org.
In addition to patient care, clinical information systems may be used for:
peer review
research
quality improvement
In hospitals, automated systems for registering patients and tracking their encounters are commonly known as ___ systems:
ADT
I am entering free text and structured data. This is called:
template based entry
Which of the following systems is designed primarily to support patient care by providing hc professionals access to timely, complete and relevant information for patient care purposes:
clinical information systems
Which of the following information systems is used for collecting verifying, and reporting test results:
laboratory information system
Which of the following information systems is used to assist hc providers in the actual diagnosis and treatment of patients:
clinical decision support system
Which of the following information systems is considered an administrative information system:
financial information system
Who is the top information executive responsible for strategic, information systems planning and overseeing the org’s information resources mgmt.:
chief information officer
Which of the following systems focuses on providing reports and information to managers for day-to-day operations of the organization:
mgmt. information system
The concept of information resource mgmt. assumes:
that information is a valuable resource that must be managed no matter what form it takes
Which of the following IS positions has evolved into a more important position since the passage of HIPAA regulations:
CSO
Which of the following best describes the function of a mgmt. information system:
supports day-to-day activities
Which of the following is not a characteristic of a DSS:
provides day-to-day reports
Which of the following is used primarily for monitoring performance:
MIS
Which of the following best describes an EIS:
produces periodic, exception and demand reports
Which of the following best describes a data warehouse:
a large storage of data used for strategic decision support
The coding supervisor want a daily report of health records that need to be coded. Which of the following systems would be best in meeting the supervisor’s needs:
MIS
Which of the following is a driving force for the EHR in LTC:
quality of care and patient safety
The average length of stay for Hospital A is 4.3 and for Hospital B is 5.1. This is an example of what type of information:
comparative information
A number of hc orgs. share information. These orgs. have disparate systems. This describes a(n):
health information exchange
The physician records his findings while still in the patient’s room. This is called:
point of care documentation
What is an information system:
a collection of related components that interact to perform a task in order to accomplish a goal
the integration of several elements in a business process to effect a specific outcome
a process that refines raw facts into meaningful information
What are the components of an information system:
a combination of hardware, software, and communications technology
What is the difference between data and information:
data represent raw facts and figures, and information represents the meaningful interpretation of data
Which of the following is an information system activity:
input
A physician ordering a lab test is an example of:
business process
Dr. J is treating a patient with a rare disease. He enters the patient’s signs and symptoms into a computer program that indicates the probability of the correct diagnosis with its treatment regime. The dr. then uses this information to determine the best treatment protocol for the patient:
Expert system
Every week, an HIM dept. director receives statistical information on the number of incomplete medical records for discharged patients. Summary reports show totals and trends by the physician responsible for completing each patient record:
management information system
Dr. J orders a series of lab tests on his patient with a rare disease. The computer generated results signal several abnormal values. This prompts the physician to add 3 new medications to the patient’s treatment protocol. The computer then reminds Dr. J that serious drug interactions could occur when the new medications are combined w/the original drug protocol. In response to this reminder, he stops the order for the new meds:
decision support system
The HIM dept. directors receives daily reports on the number of new admissions to and discharges from the hospital:
transaction processing system
The systems development life cycle (SDLC):
is the traditional way to plan and implement an IS
The 1st phase of the SDLC is the ___ phase:
planning
End-user requirements are identified in the ___ phase of the SDLC:
analysis
The method(s) used to identify requirements for a proposed IS is (are):
conducting site visits
conducting a JAD
developing a prototype
Testing the new IS system is part of the ___ phase:
implementation
Tasks to implement an automated coding system 1-5:
1. determine whether the proposed coding program is in line with the organization’s strategic plan and mission
2. conduct cost-benefit analysis of the different products or systems being considered
3. establish an implementation team and develop a project timeline
4. assess the coder’s needs
5. identify problems w/current coding processes and opportunites for improvement
Tasks to implement an automated coding system 6-10:
6. submit an RFI to potential vendors
7. prepare a list of users’ specifications
8. submit an RFP to potential vendors
9. hold bidders’ conferences for potential vendors
10. contact other sites that use the products/systems being considered
Tasks to implement an automated coding system 11-16:
11. negotiate a contract w/the system vendor
12. determine conversion plans
13. prepare documentation and procedures to support the new system
14. test the new system
15. determine the date of implementation
16. train staff on how to use the new system
Computer peripherals such as mice, printers and monitors control the computer’s operating system:
false
Common utility programs include virus checkers, backup and recovery:
true
DOS stands for disk operating standard:
false
The user communicates with the computer thru an interface (eg Windows):
true
Machine languages use a standard set of abbreviations to replace some of the ones and zeros used in assembly language:
false
The increasing use of wireless technology is one of the hottest technology trends today:
true
Artificial intelligence is one type of natural programming language:
true
Education and reference software is one category of application software:
true
The tree basic pieces of system software are the operating system, the language translator and the utility program:
true
Intranet:
type of network that works as a private Internet
World Wide Web:
system of internet servers that supports specially formatted documents
Extranet:
type of network that allows networks of separate organizations to communicate with one another
LAN:
computer network that connects devices in a small geographical area
WAN:
computer network that connects device across a large geographical area
Data warehouse:
storage device for multiple databases that can be accessed via a single question and report interface
Clients:
computers that are used to access shared resources in a network
Telecommunications:
term used to describe a system of voice and data transmission
Relational database:
type of database that stores data in predefined tables made up of rows and columns
Data dictionary:
description of the structure of a specific database
An ___ can be defined as a collection of relate components that interact to perform a task in order to accomplish a goal:
information system
The user supplies the input to an information system as:
raw facts
Which of the following is a secondary storage device:
disk
CD
magnetic tape
____ is a traditional manner of planning and implementing an information system:
SDLC
The first phase of the SDLC is the ____ phase:
system analysis (SB planning)
What phase of the SDLC creates the object model of the solution environment:
system design
An ___ is the role the user plays in the system:
actor
____ is a 5th generation programming language:
natural
____ is a 1st generation programming language:
machine
An ____ manages the day-to-day operations of a business:
transaction processing system
An organized collection of data is :
a database
An ____ stores data in predefined tables consisting of rows and columns:
relational database
____ allows a user to insert, update, delete, and query data from a database:
SQL
A ____ uniquely identifies each row in a table and ensures that it is unique:
primary key
The LAST_ NAME column of the patients table is considered a:
column
___ is a term used to describe voice and data communications:
telecommunications
___ connect computers together in a way that allows for the sharing of information and resources:
networks
A ___ is a task that runs on a server computer:
service
The ___ function of a computer allows access to its shared resources and services:
server
A(n) ___ is a network that connects computers in a relatively small area, such as a room or a building:
LAN
A(n) ___ is a network that connects LANS or other networks together across a large geographical area:
WAN
Network computers use ___ to communicate using the same language:
protocols
The phase of the system development life cycle that defines how the system will work is:
design
The RFP generally includes a detailed description of the systems requirements and provides guidelines for vendors to follow in:
bidding for the contract
The most common approaches to converting from an old information system to a new one are the parallel approach, the phased approach, and ___ approach:
direct cutover
Which of the following is not considered a basic component of every information system:
0000
What is the main focus of the system planning and analysis phase of the systems development life cycle:
0000
A system that manages data for an entire healthcare business is referred to as:
enterprise-wide system
An Information system consists of :
hardware, software, data, procedures and people
Which of the following should a systems analyst use to collect information about the requirements of an IS project:
100
Use case and sequence diagrams are an example of a:
modeling language
What basic components make up every communication system:
transmitters, receivers, media, and data
Which of the following connects devices across a large geographical area, such as a state:
WAN
Which of the following allows corporations to supply internet service over their LANs:
LAN connections
In a network environment, a database shared among several end-user workstations would be stored on a:
server computer
Which of the following is a type of computer network specifically designed to allow direct communication between networks of separate companies:
Extranet
Which of the following is a fifth-generation programming language that uses human language to allow users to speak to computers in a more conversational way:
natural language
I am looking for a method of data security. Which of the following would be one choice:
firewall
password protection
encryption
physical security
An information system that alerts a physician when a laboratory value is outside of the normal range is called an:
decision support system
Which of the following can be described as an organized collection of data saved in a file on a computer:
database
What is the purpose of database:
mgmt and storage of data
Which of the following provides organizations with the ability to access data for multiple databases and to combine the results into a single question and reporting interface:
data warehouse
Which of the following includes computers that share resources such as printers or disk space across a computer network:
servers
Which of the following enable(s) computers on a network to communicate with each other:
protocols
Which of the following would be an example of two-factor authentication:
username and password
My computer is acting strange. My technical support said that I have been infected with a Trojan horse. What does he mean by this:
Identification, authentication and certification are standards for:
labeling websites (encryption technologies)
Standards that dictate how the organization’s IT resources are protected from theft and damage are referred to as ___ standards:
Which of the following is used as sketch of the user interface during system development:
screen prototype
Systems testing of a new information system should be performed by:
Which of the following were the only computers available prior to the late 1960’s:
These computers are used to handle intensive input/output business transactions:
mainframe system
Which of the following is a snap shot in time and consolidates data from multiple sources to enhance decision making:
data warehouse CDW
I just received a new job. I have the responsibility of leading physicians in the adoption of clinical information systems. My title must be:
chief medical informatics officer
I am looking to purchase an information system that identifies patterns in data. What systems should I purchase:
data mining
I am looking to purchase a system that will be used by physicians to order medications, tests, and other treatment. This system must use alerts and reminders. I must be looking to purchase what type of system:
clinical provider order entry
As an HIM professional, I am involved in data collection, developing the data dictionary and building edits. What role do I have:
data quality
What system would you expect to perform drug compatibility checks, have information on contraindications and control inventory:
pharmacy information system
As an HIM professional, I am involved in screen design and system functionality. What role do I have:
electronic system design and development
Which of the following is an example of data collected by a patient monitoring system:
vital signs
In the HL7 EHR functional model, the section that provides the functionality for public health and performance improvement is:
supportive section
I work for a 10-hospital chain that is purchasing five more hospitals. Many of these hospitals have different vendors supplying their information systems. This has resulted in concerns regarding:
interoperability
As a nurse, there are clinical practice guidelines that I should follow in caring for my patients Where can I find these:
embedded in EHR
I have been asked to justify my request for an electronic document management system. Which of the following would I use:
a collection of technologies that work together to provide a comprehensive solution for managing the creation, capture, indexing, storage, retrieval, and disposition of records and information assets of the organization.
The three elements of a security program are ensuring data availability, protection, and:
integrity
Within the context of data security, protecting data privacy basically means defending or safeguarding:
access to information
According to an FBI study, most security breaches occur:
from employees
In addition to people, threats to data security include:
natural disasters
power surges
hardware malfunctions
The first and most fundamental strategy for minimizing security threats is to:
establish a security organization
Administrative controls include policies and procedures that address the ___ of computer resources:
management
The individual responsible for ensuring that everyone follows the organization’s data security policies and procedures is the:
chief security officer
An employee accesses PHI on a computer system that does not relate to her job functions. What security mechanism should have been implemented to minimize this security breach:
access controls
A visitor to the hospital looks at the screen of the admitting clerk’s workstation when she leaves her desk to copy some admitting documents. What security mechanism would best have minimized this security breach:
automatic logoff controls
A laboratory employee forgot his user ID badge at home and uses another lab employee’s badge to access the computer system. What controls should have been in place to minimize this security breach:
workforce security awareness training
A dietary dept. donated its old microcomputer to a school. Some old patient data were still on the microcomputer. What controls would have minimized this security breach:
device and media controls
HIPAA requires that policies and procedures be maintained for a minimum of:
six years from date of creation or date when last in effect; whichever is later
A visitor walks through the computer dept. and picks up a CD from an employee’s desk. What security controls should have been implemented to prevent this security breach:
facility access controls
The act of limiting disclosure of private matters is a definition of:
confidentiality
The right of an individual to keep information about themselves from being disclose to anyone is a definition of:
informational privacy
The protection measures and tools for safeguarding information and information systems is a definition of:
data security
An employee in the physical therapy department arrives early morning to snoop through the clinical information system for potential information about neighbors and friends. What security mechanisms should have been implemented that could minimize this security breach:
information access controls
An employee observes an outside individual putting some computer disks in her purse. The employee does not report the security breach. What security measures should have been in place to minimize this threat:
security incident procedures
Locks on computer room doors is a type of:
physical control
A business continuity plan should have policies and procedures to:
run the business during the emergency period
restore data and files on the computer system
resume normal operation after a disaster
A coding analyst consistently enters the wrong patient gender while entering data in the billing system. What security measures should be in place to minimize this security breach:
edit checks
These are automatic controls that help preserve data confidentiality and integrity:
application controls
The ___ provide the objective and scope for the HIPAA Security Rule as a whole:
general rules
Which of the following statements is TRUE regarding HIPAA security:
HIPAA allows flexibility in the way an institution implements the security standards
For HIPAA implementation specifications that are addressable, the covered entity:
must conduct a risk assessment to determine if the specification is appropriate to its environment
Which of the following is an example of an ancillary system:
lab system
Structured data are generally entered into an EHR via:
templates
In order for organizations to earn Stage 1 Meaningful Use incentives, they must:
use certified EHR technology
What technology is used to manage data from different source systems, including structured data, scaled document images, and digital forms of medical data:
CDR
In a health information exchange organization (HIO) patients would most likely be identified using:
identity matching algorithm
A special web page that offers secure access to data is a(n):
portal
To run an analysis on a large set of data from many patients, the best tool is a(n):
CDW
An interface is:
program to exchange data
Standards from which organization would be used for enabling exchange of clinical images:
DICOM
Semantics refers to:
meaning of clinical concept
Which of the following vocabularies is likely to be used to describe drugs in clinically relevant form:
RxNorm
When some computers are used primarily to enter data and others to process data the architecture is called:
client/server
The ability for a computer to evaluate narrative speech and structure it given sophisticated rules for addressing context is:
natural language processing
discrete reportable transcription
What can a hc organization implement to help significantly reduce downtime:
use redundant serves with server failover
Data that describes data to be entered into an EHR is called:
metadata
When a hospital uses many different vendors to support its information system needs, the IT strategy being is called:
best of breed
Which form of system testing ensures that each data element is captured correctly:
unit testing
Which of the following describes the step during implementation when data from an old system are able to be incorporated into the new system:
data conversion
A health information exchange organization that compiles data into one central store of data is called:
consolidated
A system that is designed to ensure the medication five rights is:
bar-code medication administration record (BC-MAR)
Which of the following forms of clinical decision support is most likely to be included in a basic HER system:
drug-drug contraindication checking
A high level overview of when EHR components will be implemented is:
migration path
Ensuring accurate and timely data entry is:
data quality
Which clinical information system assists the physician in recording orders and in the decision-making process:
clinical decision support system
I need a system that allows me to treat patients located at a different site. I should use:
telematics
A medication being ordered is contraindicated due to a patient allergy. The physician is notified. This is an example of a(n):
alert
Dr. Rogers is sitting in his home office and reviewed digital images from a patient’s MRI. He must be using a(n):
picture archival communication system
Which of the following system would be an intermediate step toward the EHR:
electronic document mgmt. system
I need to look up results in an H1N1 blood test. I would look this up on an emergency medical system:
false
A clinical decision support system will identify a medication contraindication:
true
Electronic document mgmt. system is the same as the EHR:
false
Telematics is an example of a clinical information system:
true
Which of the following systems would be used to manage productivity:
human resource system
What is the difference between the executive information system and decision support system:
the executive information system is designed to be used by high level mgmt
I will be conducting some analysis of data, but I only need a limited amount of data that are contained in the data warehouse. What system should I utilize:
data mart
We receive a report each morning listing all of the admissions from the day before. This is an example of what type of report:
periodic scheduled
Which of the following is an example of when an executive decision support system should be used:
to identify a new service for the hospital to implement
Uses models and statistical analysis to help decision makers solve problems:
decision support system
Display concise information and may be called a dashboard report:
executive information system
Tracks productivity and turnover:
human resource mgmt. system
Is updated periodically and used for strategic decision support:
data warehouse
Creates reports needed to manage the day-to-day activities of the organization:
mgmt. information system
What individual or group is responsible for developing the strategic vision for the organization’s information:
chief information officer
Information resource mgmt. addressed information in what form:
information stored in any format
Which role works w/physicians to assist in the implementation of the EHR:
chief medical information system officer
What individual or group is knowledgeable on accreditation and classification systems:
health information mgmt. dept.
Fifty percent of patients treated at our facilities have Medicare as their primary payer. This is an example of what type of information:
aggregate
What HIM role determines what functions should be added to an information system:
electronic system design and development
What HIM role is involved w/the personal health record:
consumer health informatics
Critique the following statement: Ambulatory information systems are the same as inpatient information systems:
this is a false statement. they have many functions in common, but they each have unique functions as well
In what type of setting(s) are mobile devices critical to the efficient use of information systems:
home-health
As data quality coordinator for our facility, when does my responsibility/concern for data quality begin:
at the time that the data are collected
Embedded guidelines are recommendations for patient care:
true
The first computer systems used in hc were used primarily to perform payroll and ___ functions:
patient accounting
The concept of systems integration refers to the hc org. ability to:
combine information from any system w/in the org.
In addition to patient care, clinical information systems may be used for:
peer review
research
quality improvement
In hospitals, automated systems for registering patients and tracking their encounters are commonly known as ___ systems:
ADT
I am entering free text and structured data. This is called:
template based entry
Which of the following systems is designed primarily to support patient care by providing hc professionals access to timely, complete and relevant information for patient care purposes:
clinical information systems
Which of the following information systems is used for collecting verifying, and reporting test results:
laboratory information system
Which of the following information systems is used to assist hc providers in the actual diagnosis and treatment of patients:
clinical decision support system
Which of the following information systems is considered an administrative information system:
financial information system
Who is the top information executive responsible for strategic, information systems planning and overseeing the org’s information resources mgmt.:
chief information officer
Which of the following systems focuses on providing reports and information to managers for day-to-day operations of the organization:
mgmt. information system
The concept of information resource mgmt. assumes:
that information is a valuable resource that must be managed no matter what form it takes
Which of the following IS positions has evolved into a more important position since the passage of HIPAA regulations:
CSO
Which of the following best describes the function of a mgmt. information system:
supports day-to-day activities
Which of the following is not a characteristic of a DSS:
provides day-to-day reports
Which of the following is used primarily for monitoring performance:
MIS
Which of the following best describes an EIS:
produces periodic, exception and demand reports
Which of the following best describes a data warehouse:
a large storage of data used for strategic decision support
The coding supervisor want a daily report of health records that need to be coded. Which of the following systems would be best in meeting the supervisor’s needs:
MIS
Which of the following is a driving force for the EHR in LTC:
quality of care and patient safety
The average length of stay for Hospital A is 4.3 and for Hospital B is 5.1. This is an example of what type of information:
comparative information
A number of hc orgs. share information. These orgs. have disparate systems. This describes a(n):
health information exchange
The physician records his findings while still in the patient’s room. This is called:
point of care documentation
What is an information system:
a collection of related components that interact to perform a task in order to accomplish a goal
the integration of several elements in a business process to effect a specific outcome
a process that refines raw facts into meaningful information
What are the components of an information system:
a combination of hardware, software, and communications technology
What is the difference between data and information:
data represent raw facts and figures, and information represents the meaningful interpretation of data
Which of the following is an information system activity:
input
A physician ordering a lab test is an example of:
business process
Dr. J is treating a patient with a rare disease. He enters the patient’s signs and symptoms into a computer program that indicates the probability of the correct diagnosis with its treatment regime. The dr. then uses this information to determine the best treatment protocol for the patient:
Expert system
Every week, an HIM dept. director receives statistical information on the number of incomplete medical records for discharged patients. Summary reports show totals and trends by the physician responsible for completing each patient record:
management information system
Dr. J orders a series of lab tests on his patient with a rare disease. The computer generated results signal several abnormal values. This prompts the physician to add 3 new medications to the patient’s treatment protocol. The computer then reminds Dr. J that serious drug interactions could occur when the new medications are combined w/the original drug protocol. In response to this reminder, he stops the order for the new meds:
decision support system
The HIM dept. directors receives daily reports on the number of new admissions to and discharges from the hospital:
transaction processing system
The systems development life cycle (SDLC):
is the traditional way to plan and implement an IS
The 1st phase of the SDLC is the ___ phase:
planning
End-user requirements are identified in the ___ phase of the SDLC:
analysis
The method(s) used to identify requirements for a proposed IS is (are):
conducting site visits
conducting a JAD
developing a prototype
Testing the new IS system is part of the ___ phase:
implementation
Tasks to implement an automated coding system 1-5:
1. determine whether the proposed coding program is in line with the organization’s strategic plan and mission
2. conduct cost-benefit analysis of the different products or systems being considered
3. establish an implementation team and develop a project timeline
4. assess the coder’s needs
5. identify problems w/current coding processes and opportunites for improvement
Tasks to implement an automated coding system 6-10:
6. submit an RFI to potential vendors
7. prepare a list of users’ specifications
8. submit an RFP to potential vendors
9. hold bidders’ conferences for potential vendors
10. contact other sites that use the products/systems being considered
Tasks to implement an automated coding system 11-16:
11. negotiate a contract w/the system vendor
12. determine conversion plans
13. prepare documentation and procedures to support the new system
14. test the new system
15. determine the date of implementation
16. train staff on how to use the new system
Computer peripherals such as mice, printers and monitors control the computer’s operating system:
false
Common utility programs include virus checkers, backup and recovery:
true
DOS stands for disk operating standard:
false
The user communicates with the computer thru an interface (eg Windows):
true
Machine languages use a standard set of abbreviations to replace some of the ones and zeros used in assembly language:
false
The increasing use of wireless technology is one of the hottest technology trends today:
true
Artificial intelligence is one type of natural programming language:
true
Education and reference software is one category of application software:
true
The tree basic pieces of system software are the operating system, the language translator and the utility program:
true
Intranet:
type of network that works as a private Internet
World Wide Web:
system of internet servers that supports specially formatted documents
Extranet:
type of network that allows networks of separate organizations to communicate with one another
LAN:
computer network that connects devices in a small geographical area
WAN:
computer network that connects device across a large geographical area
Data warehouse:
storage device for multiple databases that can be accessed via a single question and report interface
Clients:
computers that are used to access shared resources in a network
Telecommunications:
term used to describe a system of voice and data transmission
Relational database:
type of database that stores data in predefined tables made up of rows and columns
Data dictionary:
description of the structure of a specific database
An ___ can be defined as a collection of relate components that interact to perform a task in order to accomplish a goal:
information system
The user supplies the input to an information system as:
raw facts
Which of the following is a secondary storage device:
disk
CD
magnetic tape
____ is a traditional manner of planning and implementing an information system:
SDLC
The first phase of the SDLC is the ____ phase:
system analysis (SB planning)
What phase of the SDLC creates the object model of the solution environment:
system design
An ___ is the role the user plays in the system:
actor
____ is a 5th generation programming language:
natural
____ is a 1st generation programming language:
machine
An ____ manages the day-to-day operations of a business:
transaction processing system
An organized collection of data is :
a database
An ____ stores data in predefined tables consisting of rows and columns:
relational database
____ allows a user to insert, update, delete, and query data from a database:
SQL
A ____ uniquely identifies each row in a table and ensures that it is unique:
primary key
The LAST_ NAME column of the patients table is considered a:
column
___ is a term used to describe voice and data communications:
telecommunications
___ connect computers together in a way that allows for the sharing of information and resources:
networks
A ___ is a task that runs on a server computer:
service
The ___ function of a computer allows access to its shared resources and services:
server
A(n) ___ is a network that connects computers in a relatively small area, such as a room or a building:
LAN
A(n) ___ is a network that connects LANS or other networks together across a large geographical area:
WAN
Network computers use ___ to communicate using the same language:
protocols
The phase of the system development life cycle that defines how the system will work is:
design
The RFP generally includes a detailed description of the systems requirements and provides guidelines for vendors to follow in:
bidding for the contract
The most common approaches to converting from an old information system to a new one are the parallel approach, the phased approach, and ___ approach:
direct cutover

Need essay sample on "Combo with "HITT 1311 Final" and 6 others"? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy