CAHIMS Review Questions

¡Supera tus tareas y exámenes ahora con Quizwiz!

A __________ is a free protocol analyzer software tool that can display unencrypted network traffic on a monitor screen. a. packet sniffer b malware-analyzer c. spyware tracer d. server

A

A workflow is a Process. True or False? a. True b. False

A

According to the Instructional Systems Design method, which of the following is the first step in the recommended training cycle? a. Analyze b. Design c. Develop d. Evaluate

A

According to the lecture, which confidentiality measure is typically in place in EHR systems but often not activated or monitored? a. Audit-trail mechanisms b. Biometric authentication procedures c. Two-stage authentication procedures d. Remote monitoring devices

A

Copying a patient's records to a flash drive is an example of a. data leakage b. espionage c. a backup

A

One of the advantages of "best of breed" approaches over single vendor options is that: a. massive process reengineering is avoided b. contract management is streamlined c. software maintenance is easier d. competency development is facilitated

A

Only patients care about the privacy of their health information. a. True b. False

A

Stronger authentication is provided by a. Multiple factors b. Handprint geometry c. Strong passwords d. Keyless entry locks

A

The critical path is the longest activity path in the project schedule. a. True b. False

A

A breach notification list is maintained by a. Office of the National Coordinator b. Department of Health and Human Services c. HIMSS d. American Health Information Management Association

B

A patient is taking Digoxin for his atrial fibrillation. Which data standard would be MOST appropriate in this situation? a. Technical b. Medication terminology c. Privacy and security d. Clinical data representation

B

There are federal requirements which define your backup methodology. a. True b. False

B

Common causes which allow system exploits include (select all that apply) a. Validating all function input b. Failing to check for input length c. Hard-cording credentials d. Missing authorization

B, C, D

A password is a. always secure. b. always memorable. c. frequently used. d. always mnemonic.

C

Process redesign includes which of the following? Choose the best answer: a. A change in a process b. Anticipation of a good outcome c. Both d. Neither

C

What is an appropriate length of time for staff education and training before system implementation? a. Two hours b. Two days c. Two weeks d. Two months e. Two years

C

Which of the following is an important structural characteristic of effective teams? a. individual contribution b. trust c. appropriate culture d. flexibility

C

Which of the following is not the purpose of an objective? a. Guides the teacher; helps with the preparation of assessment tools to measure student achievement b. Guides the learner; helps him/her focus and set priorities c. Statements about what students will gain from instruction d. Allows for analysis in terms of the levels of teaching and learning

C

What are key factors in project failure? a. Lack of planning b. Lack of resources c. Unwieldy scope d. All of the above

D

What are the steps in the initial planning and project development for an EHR implementation? a. identifying stakeholders b. determining appropriate members for a steering committee c. develop a strategic plan d. all of the above

D

A central problem with the waterfall model is that: (multiple choice) a. It does NOT allow for iterative design with user feedback b. It does NOT allow for changes in requirements that ensue during development c. It does NOT consider software designers' work practices d. a and b only e. All of the above

E

Allowing cancer researchers to use the existing data in hospital systems, without asking each patient for permission, illustrates which of the following principles underlying the HIPAA privacy rule? a. Boundaries b. Security c. Consumer Control d. Accountability e. Public Responsibility

E

The most appropriate training strategy is: a. Classroom-style. b. Web-based. c. One-on-one. d. Train the trainer. e. All of the above.

E

A coordinated group of infected systems is a a. botnet b. phantom cloud c. drone army

A

A fake antivirus is a. Rogueware b. Adware c. Spyware d. a trojan

A

A needs assessment helps to identify the critical aspects of EHR utilization that will drive implementation. a. True b. False

A

A neighbor becomes aware of a medical condition you have been privately battling for the past six months. The neighbor says that if you do not pay her $5,000, she will use a pay phone to disclose this information to your father. This is an example of __________. a. blackmail b. compromised data c. identity theft d. impersonation

A

A passphrase a. Is a mnemonic to remember a password b. Needs to changed weekly c. Is immune to social engineering d. Protects from keystroke loggers

A

A signature-based antivirus system will not detect a. Zero-day attacks b. Trojans c. Conficker d. Spyware

A

A workflow analysis enables assessment of how work is being done in an organization. a. True b. False

A

According to the lecture, which is a possible drawback to EHR regulation? a. Decrease in innovative designs b. Increased levels of problems in contracting processes that discourage reporting flaws in EHR systems c. Decrease in the application of the "competent human intervention" principle d. Increase in healthcare costs to the consumer

A

According to the lecture, which of the following statements explains why education and training programs for healthcare organizations' employees are crucial in the implementation and maintenance of security for HIPAA expectations? a. Healthcare organizations are held responsible for the actions of their employees. b. Customer satisfaction is directly related to the security of personal health records. c. Healthcare employees are not familiar with the standards set by the HITECH act. d. Security policies and procedures are often ignored if not taught formally.

A

An analyst needs to show the context in which a process operates. Which of the following methodologies is the most appropriate? a. Yourdon b. Unified Modeling Language c. Flowchart d. Entity-relationship diagram

A

Designing the work schedule for healthcare workers to ensure that they receive adequate breaks is an example of which ergonomic domain? a. Organizational b. Physical c. Cognitive d. a and b e. All of the above

A

Effective change and transition management are critical to effective implementation planning. Each of the following strategies ensures effective change and transition management EXCEPT: a. ensuring that professionals work side-by-side b. understanding and respecting team member roles c. communication d. recognizing that teamwork requires work

A

Electrical power, water and fire are elements of a. physical security b. an element review c. action plans

A

End user testing is best suited for less-experienced staff and should represent a cross-section of the end-user environment. a. True b. False

A

Functional Requirements can best be defined as: a. those processes that you want a system to perform. b. the attributes of the system as a whole or its environment. c. the requirements needed for the hardware to function.

A

HIPAA requires protection not only of information that explicitly links to the patient (e.g., social security number), but also of information that could reasonably be used to identify the patient (e.g., ZIP code). a. True b. False

A

In Overcautious Community, Oklahoma there has been a recent outbreak of an infectious disease which is spreading rapidly. Subsequently, there is more public demand for a software system which provides speedy results for lab tests. This scenario best demonstrates which of the following factors in the process of purchasing HIT systems? a. Time b. Money c. Resources d. None of the above

A

Indicate which statement is true: a. Multiple process aspects may be represented on some diagrams b. There is only one type of diagram for each process aspect c. There is not any overlap in the symbols used in different notations d. There is only one correct representation for any process

A

Macro viruses usually infect Microsoft Office files and __________. a. install themselves when users click files b. delete all hard disk files on a specified date c. install themselves when the computer reboots d. None of the above

A

The 1996 HIPAA legislation related to a. portability of health insurance across state lines. b. privacy of health information held in government institutions. c. the principle in the Hippocratic Oath of "First, do no harm." d. promoting electronic health records.

A

The CIO of a health organization has been informed that new government regulations require reports formatted in a manner in which the current operating system does not support. In order to comply with regulations and meet the new reporting formats, new software is needed. This is an example of which of the following purchasing factors for HIT systems? a. External pressures b. Congruency between overall strategic goals and IT strategic planning c. Resource acquisition d. Competition

A

The __________ establishes national standards for administrative, physical and technical safeguards for electronic PHI. a. HIPAA Security Rule b. NSF c. POTUS

A

The purpose of which of the following is to provide uniformity to the availability of different types of systems and communication methods in public health informatics? a. Data Standards b. Architecture c. Data Configuration d. None of the Above

A

The success of the implementation and roll-out is most evidenced by the: a. End users. b. Expert analysis. c. Technical staff. d. Professional evaluators.

A

The user acceptance testing phase of a project usually occurs immediately before: a. Rollout. b. Project description. c. System backup. d. Project sign-off.

A

This is an example of hardware fault tolerance: a. Redundant hard drives in the server b. Multiple-version programs c. Both a and b d. Neither a nor b

A

This type of backup allows a complete system restore with just one source: a. Full backup b. Incremental backup c. Differential backup d. Synthetic full backup

A

This type of fault tolerance compensates for a failed power supply: a. Hardware fault tolerance b. Software fault tolerance c. System fault tolerance d. Dynamic fault tolerance

A

True or false? Business practices may have to be modified for, and workflow often has to be adapted to, the particular design of the COTS product. a. True b. False

A

Two approaches that have been used successfully for HIT implementations are the big bang and staggered, or incremental, approaches. Which of the following correctly depicts big bang implementation strategies? a. high risk, high anxiety b. high risk, low anxiety c. low risk, high anxiety d. low risk, low anxiety

A

What does HL7 stand for? a. Health Level 7 b. High Load 7 c. EHR Code of ethics guaranteeing safety

A

What is one of the key responsibilities of a Project Manager? a. Deliver the project on time, on budget, and within defined specifications b. Entertain the clients c. Make sure everyone is happy d. Force everyone to do his/her work

A

What is one suggestion to consider when forming a EHR selection committee? a. Invite "movers and shakers" onboard in the decision-making process. b. Invite patients on your committee. c. Exclude as many top administrators as possible since their skill set with regards to EHR systems is often too limited. d. Be sure to limit physician input only to relevant topics such as workflow.

A

What was one of the recommendations from the 1996 FDA workshop on regulating clinical software? a. Software quality audits b. Competent human intervention as a guiding principle c. FDA regulation of EHRs d. Establishment of a certification process for EHRs

A

Which is NOT a reason why integration is an important consideration when installing an EHR? a. Existing systems can usually share data with newer systems without additional programming or configuration. b. Many existing systems are too expensive to replace. c. Many different isolated systems currently exist within healthcare infrastructures. d. Many existing systems are tailored to meet specific departmental needs and not easily duplicated.

A

Which is NOT a reason why the SDLC is important for EHR systems? a. Because poorly designed software has not yet been linked to security risks. b. Need for user satisfaction and high quality c. In-house development or integration of an EHR d. Because failure to plan adequately for software integration can limit efficiency and be costly in project over-runs and lost productivity.

A

Which is NOT a type of safeguard required by HIPAA? a. Virtual requirements b. Technical safeguards c. Physical safeguards d. Administrative safeguards

A

Which is NOT an important tool for transmission security? a. Solid-state drive b. Firewall c. Encryption d. Virtual Private Network (VPN) e. Virtual Local Area Network (VLAN)

A

Which is NOT commonly considered a phase of the SDLC? a. Requisition phase b. Requirements analysis phase c. Concept development phase d. Operations and maintenance phase e. Testing phase

A

Which is NOT true of HL7? a. Creates communication standards for use only in American healthcare applications. b. Promotes open system architecture. c. Created a structured, message-oriented framework for communication between healthcare applications. d. Created a messaging standard that uses segment headers and delimiters to communicate information.

A

Which of the following identify the three styles of learning? a. Visual, auditory, and kinesthetic b. Affective, cognitive, psychomotor c. Visual, affective, and cognitive d. Auditory, psychomotor, and visual

A

Which of the following is NOT a dimension that differentiates the discipline human factors from human computer interaction (HCI)? a. Human factors places an emphasis on innovative design b. Human factors has a focus on the study of devices and technology c. Safety issues are a central concern in human factors d. Study of the workplace is central to human factors analysis

A

Which of the following is a focus of human computer interaction? a. Cutting edge design and technology b. Patient safety issues c. Range of systems and technology d. A and B e. All of the above

A

Which of the following is an example of Stage 3 criteria for 'meaningful use'? a. Advanced decision-support and population health b. Submission of 80% of provider orders electronically c. Structured data exchange and continuous quality improvement d. Use of EHR data to track conditions and coordinate care

A

Which of the following is an example of a non-functional verb that should NOT be used when constructing learning objectives? a. Understands b. Modify c. Applies d. Describes

A

Which of the following is an example of two-factor authentication? a. requiring a user to provide a password along with a smart card to access an EHR b. a physician having access to more patient information in an EHR than an administrative user c. enforcing complexity requirements when changing a password d. biometric authentication

A

Which of the following is the best reason to read every IT contract? a. to assure an advantageous system and service for the organization b. to understand the limits of liability c. to assess the project's impact on market value d. to be able to track the budget of the project

A

Which of the following is used to indicate that a flowchart continues on another page? a. Circle connector b. Process box c. Dotted line d. Curved arrow

A

Which of the following options provides the best solution when dealing with a vendor on negative issues after a deal is made? a. Beneficial "out" clauses within the contract b. Third party negotiators c. Long-term friendly relationships between the organization and the vendor d. Documentation of the negative issues and attempted resolutions

A

Which of the following processes varies most by clinical specialty? a. Diagnostic tests b. Billing c. Office visits d. Appointment scheduling

A

Which of the following security management system standards is specific to the health care sector? a. HIPAA Security Rule b. ISO 27001 c. NIST 800-53 d. PCI DSS

A

Which of the following was a change with the HITECH Privacy Regulations? a. Tracking disclosures for TPO was now required. b. Authorization for use of information for advertising purposes was now required. c. Patient acknowledgement that they had read a hospital's privacy practices was no longer required. d. Reporting breaches to the media was no longer required.

A

Which phase of the ADDIE model of instructional design includes establishing instructional goals and objectives? a. Analysis b. Design c. Development d. Implementation e. Evaluation

A

Which selective attention factor refers to the fact that events that are relevant to us tend to capture our attention? a. Salience b. Expectancy c. Effort d. Cognition

A

Which statement is NOT true of an HIE? a. "HIE" stands for Health Improvement Enterprise. b. It maintains the meaning of healthcare information as it moves between disparate systems. c. It can be used for integration between EHRs. d. It can be set up privately or regionally.

A

__________ is who or what is allowed access to a particular resource and what level of access they are allowed. a. Access Control b. Authentication c. Accessibility d. Authorization

A

__________ maintenance diagnoses and fixes errors in an operational system. a. Corrective b. Adaptive c. Perfective d. Preventive

A

__________ means that the data on a system is the same as the data from the original source. It has not been altered. a. Integrity b. Availability c. Confidentiality d. Nonrepudiation

A

A project is typically open ended, meaning that it has a definite beginning but not a definite end-point. a. True b. False

B

A project management plan is developed as a collaborative effort between the project manager and the project stakeholders. a. True b. False

B

A responsibility assignment matrix is used to correlate the project organizational structure to which other project document? a. Project charter b. Work breakdown structure c. Risk management plan d. All of the above

B

A risk must be mitigated at any cost. a. True b. False

B

A strong password that must be frequently changed is always a more secure password. a. True b. False

B

A user-centered approach is characterized by ALL these elements EXCEPT for: a. Considers users' tasks and goals from inception through development b. Uses a linear lifecycle model to clearly delineate tasks c. Is based on empirical measurements of user performance d. Is developed via an iterative design process

B

According to James Reason, which of the following conditions refers to the enduring systemic problems that lay dormant for some time and combine with other system problems to weaken the systems defenses and make errors possible? a. Active conditions b. Latent conditions c. Cognitive conditions d. Human conditions

B

According to the lecture, which of the following is the critical factor when deciding between dual thread negotiations and single thread negotiations? a. Realistic expectations for vendors b. Time deadlines c. Regulatory requirements d. Software versus hardware needs

B

All of the following are benefits of including a functional owner on an evaluation and selection team within a state-owned healthcare facility EXCEPT: a. understanding of the day-to-day functions that the new system will replace b. assurance of successful implementation c. knowledge of the workflow of the organization d. knowledge of the current system's capabilities

B

An analyst needs to show detailed process steps. Which of the following diagrams is the most appropriate? a. UML diagram b. ISO data flow diagram c. Context diagram d. E-R diagram

B

An analyst needs to show information content. Which of the following notations would be appropriate? a. Flowchart b. E-R diagram c. Data flow diagram d. Workflow diagram

B

An example of authorization is when a user __________. a. logs into a computer b. can print a document c. Both A and B d. None of the above

B

As an institutional official responsible for privacy, we should obtain our information on current federal requirements from a. Wikipedia. b. the CFR. c. Google Scholar. d. Washington Post official notices.

B

Authentication ensures that a user is permitted access to specific PHI. a. True b. False

B

Before the HIPAA Privacy Rule was implemented, state laws were a. less strict than the federal laws. b. very variable. c. more strict than the federal laws. d. only applicable to sensitive conditions like mental health or sexually transmitted disease information.

B

Designing the nurse workplace station to facilitate and support usability is an example of which ergonomic domain? a. Organizational b. Physical c. Cognitive d. a and b e. All of the above

B

Development of the project schedule is the project manager's sole responsibility. a. True b. False

B

During project planning, the tasks of developing the schedule, determining budget, and making procurement decisions are carried out prior to any remaining activities. a. True b. False

B

Estimating activity resources is a function of cost management. a. True b. False

B

Examining the protected health information of a celebrity without cause will, at worst, result in your employer terminating your employment. a. True b. False

B

HITECH mandates certification of EHRs to assure that a. unsafe EHRs are not permitted. b. EHRs include functionality for meaningful use. c. good manufacturing practices are followed by EHR vendors. d. EHRs are implemented properly.

B

HITECH requires healthcare institutions to switch to some sort of EHR system by this year to avoid financial penalties: a. 2013 b. 2015 c. 2020 d. 2025

B

In __________ it is completely up to the owner of the object who has access to them and what access they have. a. Mandatory Access Control b. Discretionary Access Control c. Role Based Access Control d. Privileges

B

In analyzing the time course of error, a "near miss" refers to: a. An adverse event in which the damage is limited b. An error was committed, but was corrected before damage resulted c. A minor problem resulting from normal routine work that resulted in minor damage d. An error that can be viewed as distributed in the social world and thereby diffused before tragedy strikes

B

Local and state laws governing privacy of health information tend to supersede federal laws. a. True b. False

B

Malware that works to create a lot of network traffic is referred to as a(n) __________. a. Macro virus b. worm c. adware d. phishing

B

Mark the symbol(s) that are common flowchart symbols: a. Pentagon b. Arrow c. Triangle d. Dodecahedron

B

Network security revolves around the setup and use of __________ to control who and how objects are utilized. a. identification b. authentication, authorization, and permissions c. authentication and permissions d. packet sniffers

B

Project management is organized into how many process groups? a. Three b. Five c. Seven d. None of the above

B

State healthcare privacy laws always supersede federal privacy laws. a. True b. False

B

Systems performance is measured with __________. a. Fault management b. Benchmark testing c. System faults d. Capacity planning

B

The Certification Commission for Health Information Technology (CCHIT) can best be described as: a. A consortium of EHR vendors b. An independent, non-profit organization c. A professional society d. A regulatory agency of the U.S. Government

B

The lowest level of the work breakdown structure is called the _____. a. Scope Statement b. Work Package c. Task Analysis d. None of the Above

B

The members of the negotiating team should include all EXCEPT: (a/an) a. Finance team member b. CEO c. Owner/user d. Evaluation team member

B

The noise level and lighting of a room where a software system will be implemented reflects which specific requirement type? a. Data requirements b. Environmental requirements c. Organizational requirements d. Technological requirements e. User characteristics

B

The procedure for sign-off for testing activities identifies the person who will manage defects in the project. a. True b. False

B

The recommended training cycle of the Instructional Systems Design method can best be described as which kind of process? a. Bi-directional b. Cyclic c. Linear d. None of the above

B

There are a variety of strategies for effective implementation planning. Which of the following is a limitation of the single vendor strategy? a. It requires a wide range of skills to manage the applications. b. If it fails, the organization can incur significant losses. c. It is a fragmentation of work. d. A single contract makes it difficult to manage initial capital outlays and ongoing operating costs.

B

Through which of the following tools would an organization learn the most about a potential vendor? a. RFI b. RFP c. RFQ d. Quick Bid

B

Time, cost, and procurement management take place in which project management process? a. Project Initiation b. Project Planning c. Project Execution d. Monitoring and Control

B

Triage is an important step in: a. Baseline testing. b. Help desk activity. c. Creating the production support team. d. Upgrading the EHR application.

B

True or False: A performance baseline is helpful in troubleshooting because it contains a backup of system critical data. a. True b. False

B

True or false? A gap is another type of workflow analysis. a. True b. False

B

What is a use case? a. Background information including organization size and specialty and current systems and hardware in place. b. A technique for documenting the potential requirements of a new system or any type of system change. c. The defined learning curve for users/ administrators. d. Both a and c

B

What is the major challenge with the changes to HIPAA in the HITECH Act? a. Patients will not accept the changes. b. They will require major changes in work processes. c. They cannot be enforced. d. They will cost the government more money.

B

What symbol should be used to diagram the following process step: "If the patient is a new patient ..." then a. Pentagon b. Diamond c. Oval d. Rectangle

B

Which HITECH Privacy regulation creates the greatest public relations challenge? a. Tracking all disclosures including those for TPO b. Notification to media of security breaches if more than 500 individuals are affected c. Transferring electronic medical records directly to other entities upon patient request d. Responding to patient requests for electronic medical records in an encrypted format

B

Which definition is incorrect? a. An interface is a point of interaction between components. b. Point-to-point interfacing involves connecting systems end to end, as if in a chain, so that each connects to no more than two others. c. Integration is the process of connecting various subsystems into the larger system, ensuring that subsystems function together as a whole. d. An interface engine routes data through a centralized location.

B

Which is NOT a function of the cost management plan? a. Estimate costs b. Determine project funding contingencies c. Determine budget d. Control Costs

B

Which is NOT an important step in creating a testing strategy? a. Identify testing environment. b. Create test scenarios and scripts. c. Identify participants. d. Identify required equipment.

B

Which of the following aids would be most useful when purchasing a complex and extremely costly IT system? a. Customer reference call b. Site visit c. Peer recommendations d. Consulting firm's report

B

Which of the following are NOT steps in process analysis as described in this unit? a. Create process inventory b. Conduct process redesign c. Report analysis findings d. Identify EHR functionality

B

Which of the following best describes a process? Choose the best answer: a. A small batch of work b. A series of activities that produce work c. A group of people that undertake work d. An organization that performs work

B

Which of the following best describes the purpose of a boilerplate contract? a. to simply state the terms of a complex contract b. to provide an advantageous contract for one party c. to provide a base point to start negotiations d. to define the contested issues in a contract

B

Which of the following data collection methods is best suited to understand procedures and regulations? a. Cognitive research b. Documentation analysis c. Focus groups d. Interviews e. Questionnaires

B

Which of the following explains why FDA or CDRH pre-market and post-market reviews are difficult to perform on EHR software programs? a. The standard for "meaningful use" continues to change. b. Problems caused by related sources and configuration designs are not easily tested. c. Congressional debates concerning jurisdiction delays the reviewing process. d. Testing the software does not ensure proper use of the software.

B

Which of the following is NOT an example of a slip? a. Nurse neglects to change the dose of medication as requested by the resident b. Physician mistakenly dismisses early signs of congestive heart failure as asthma due to allergies c. Pharmacist mixes up medication labels causing the wrong medication to be given to a patient d. Nurse prepares an infusion pump drip and executes every step except pressing the start key to initiate the process e. All of the above are examples of slips.

B

Which of the following is NOT an example of an Instructional Systems Design Model? a. ADDIE b. Blooms c. Kemp d. Dick & Carey

B

Which of the following is NOT typically used to categorize types of security safeguards? a. administrative safeguards b. complacent safeguards c. physical safeguards d. technical safeguards

B

Which of the following is a good example of meeting the functionality criterion, as given by the Certification Commission for Health Information Technology (CCHIT). a. An EHR that requires authorized access. b. An EHR has a Computerized Provider Order Entry (COPE) c. An EHR uses HL Seven standards d. All of the above are good examples of meeting the "functionality criterion".

B

Which of the following is an example of "competent human intervention" as described in the 1989 FDA policy? a. A nurse stopping a patient from taking the wrong drug b. A physician deciding not to follow the advice of a clinical decision support system c. A chairperson of an FDA panel helping the panel to reach consensus on approving a piece of clinical software d. A health IT professional assuring that an electronic medical record is configured properly

B

Which of the following is the most critical concern for use of off-site storage? a. Type of RAID in use b. Network robustness and accessibility c. UPS and backup power provision d. Type of storage media

B

Which of the following terms describes the practices a provider employs to protect patients' privacy rights? a. privacy b. confidentiality c. security d. integrity

B

Which of the following would be exceptions in a prescription process? a. ePrescribing b. potential drug interaction identified by pharmacy c. use of online medication service/pharmacy d. prescription refill needed

B

Which of the following would be exceptions in the lab result receipt process? a. Lab results received b. Practice account is locked out c. Abnormal lab results received d. Receipt of lab results by mail

B

Which of the following would be variations of an appointment scheduling process? a. Miscommunication of the date or time of appointment b. Online appointment scheduling c. Appointment scheduling session timed out d. Appointment not found within necessary time window

B

Which prioritization level is appropriate for a non-functional device that is not impacting patient care? a. Routine (low) b. Important (medium) c. Urgent (high) d. Critical

B

Which selective attention factor refers to the fact that we tend to sample the world where we expect to find information? a. Salience b. Expectancy c. Effort d. Cognition

B

You may never have a security incident. a. True b. False

B

__________ is software designed to infiltrate a computer system without the owner's informed consent. a. Hackware b. Malware c. Phishing d. Spyware

B

__________ is the process of taking data applying a cipher to create ciphertext. a. Hashing b. Encryption c. Scrambling d. Ciphering

B

A risk assessment must be performed a. once. b. annually. c. in response to changes. d. on a schedule determined by the provider.

C

A trojan a. Copies itself across networks b. Infects the boot sector c. Is installed by the user d. Protects against adware

C

A work breakdown structure sets the project boundaries, and _____. a. Is created immediately before the scope statement b. Is used primarily on projects of large size or complexity c. Breaks the scope statement down into small manageable components through a technique called decomposition d. Is the starting point for building the project charter

C

According to PMI PMBOK, what is the appropriate sequence of processes in project management? a. Planning, initiation, completion, monitoring and controlling, execution b. Completion, planning, monitoring and controlling, execution, initiation c. Initiation, planning, execution, monitoring and controlling, completion

C

According to the lecture, which means is the best way to insure top management approval of software application? a. Dutifully research the latest products that address the problem to be solved b. Allow the expert CIO and the Information System team to evaluate and select software c. Use a multidisciplinary team to evaluate and select a software system that addresses the needs of all areas affected by the initiative d. Maintain high levels of executive oversight for computer hardware and software system selections

C

According to the lecture, which of the following is the primary purpose of the scripted demonstration scenario? a. to narrow down the choices of vendors to two or three b. to determine the financial viability of the vendor c. to evaluate the product in relation to specific functionality d. to reduce the vendor's ability to disguise weaknesses in their products

C

All of the following are attributes of a successful project except_____. a. Clearly defined and assigned roles and responsibilities b. Stakeholder buy-in c. A 20-plus percent increase in company profitability at the end of the current business cycle d. Risks are identified, assessed for severity and impact, and a risk response plan exists

C

All of the following are subdisciplines of human factors/ergonomics EXCEPT for which one? a. Organizational Ergonomics b. Physical Ergonomics c. System-Centered Ergonomics d. Cognitive Ergonomics

C

All of the items cited below represent HIT projects except _____. a. The implementation of an electronic medical record over the course of a year b. The design of software enhancement for your electronic medical record to support clinical decision support tools c. The ongoing maintenance of a clinic's hardware

C

An authenticated object is an object that __________. a. is able to print a document b. in a directory c. proved its identity d. can delete a file in a folder

C

At which point in the scenario could more than one path be taken? a. When the medical assistant logs into the lab website b. When the lab results are printed c. When the lab results are reviewed d. When the patient is contacted

C

Before sending unneeded computer equipment containing EPHI away for surplus or resale, you should: a. Delete files containing EPHI from the computer simply using the delete function of the operating system. b. Change the passwords of all users accessing the system, preventing access to all EPHI. c. Remove the hard drives from the computer equipment for destruction, or perform a secure deletion of all data using special methods that ensures data on magnetic media is completely unreadable. d. Make sure that whoever acquires the computer equipment agrees not to hold you liable for any EPHI contained on the equipment.

C

Consumer control includes all of the following EXCEPT a. patients can learn who has accessed their records. b. patients can correct errors in their medical records. c. covered entities must honor the request to not report a visit to insurance companies regardless of payment methods. d. patients have the right to request a copy of their personal electronic medical record.

C

Designing a computer software program to enhance the ability of physicians to make decisions is an example of which ergonomic domain? a. Organizational b. Physical c. Cognitive d. a and b e. All of the above

C

Healthcare Facility First has determined that it needs a new computer hardware system but it cannot afford to dedicate the man hours needed to implement the best system for their needs. According to the lecture, which option represents the best solution for their problem? a. Update the current operational systems and renegotiate the current contract b. Schedule conferences with peer organizations CIO's to evaluate and select the necessary computer system c. Hire consultants to provide the evaluation and selection groundwork d. Schedule educational demonstrations of possible products for the Information Services team

C

Process analysis includes which of the following? Choose the best answer: a. Knowledge of process components and relationships between them b. Identification of opportunities for improvement c. Both d. Neither

C

Selective attention is characterized by an ability to do which of the following? a. Make the right decision in the right context b. Reduce errors by concentrating on the correct feature set c. Ignore extraneous information and focus on relevant inputs d. Reduce visual noise in one channel while concentrating one's efforts on an auditory channel

C

The __________ is a centralized resource staffed by IT professionals who provide user support. a. Systems maintenance b. User trainers c. Help desk d. Database

C

The availability of resources for training users to adopt a new software system reflects which specific requirement type? a. Data requirements b. Environmental requirements c. Organizational requirements d. Technological requirements e. User characteristics

C

The process of Certification Commission for Health Information Technology (CCHIT) includes all of the following EXCEPT which one? a. Providing system vendors with certification handbooks b. Providing system vendors with test scripts c. Providing system vendors with example EHRs d. None of the above

C

The project scope statement describes all of the following except _____. a. A description of the project scope b. Project assumptions and constraints c. A contingency plan for eventual project scope expansion d. A description of the project work

C

The recommendations for sanctions for privacy or security violations relates to which principle: a. Boundaries b. Consumer Control c. Accountability d. Public Responsibility

C

The support team for a production EHR system should do all of the following EXCEPT: a. Manage user requests for access to the system. b. Review daily interface error logs for problems with the system. c. Develop software and new environments to respond to customer needs. d. Provide rapid response to customer issues.

C

This type of backup saves only the changes since the last full backup: a. Full backup b. Incremental backup c. Differential backup d. Synthetic full backup

C

Though the number or order of these steps is not set in stone, we suggested this number of steps for your selection process: a. 6 b. 10 c. 12 d. 24

C

To enhance implementation team effectiveness: a. regular meetings should be scheduled, but unstructured agendas are desirable since they allow for free-flowing conversation b. regular meetings are not required, just as long as the team gets its work done c. regular meetings should be scheduled and a standard agenda set d. meetings should only be conducted when the chair has something to communicate to the team

C

What is NOT a category of stage 1 meaningful use criteria? a. Improve care coordination b. Improve population and public health c. Define minimum EHR functionality d. Ensure adequate privacy and security protections for personal health information.

C

What is NOT a true statement regarding the CCHIT? a. CCHIT stands for Certification Commission for Health Information Technology. b. CCHIT has partnered with the US Department of Health and Human Resources. c. It is a government regulatory agency. d. It is becoming increasingly relevant in the EHR arena.

C

What is a disadvantage to building your own in-house software solution? a. Fewer software "bugs" incurred b. Shorter development time c. Training must be developed in house d. A and B

C

What is the correct order of steps for Process Analysis? 1-Create process inventory 2-Report analysis findings 3-Identify variations and exceptions 4-Identify needed EHR functionality a. 1, 2, 3, 4 b. 3, 1, 2, 4 c. 1, 3, 4, 2 d. 4, 1, 3, 2

C

Which is NOT a characteristic of the HITECH Act? a. HITECH Act initially rewards institutions for switching to EHRs. b. Starting in 2015, HITECH imposes penalties for noncompliance. c. HITECH helps narrow the initial field of vendors.

C

Which is NOT one of the "triple constraints" of project management? a. Scope b. Time c. Procurement d. Cost

C

Which is not an aspect of the project manager's role? a. Leading the project team b. Developing the project schedule c. Managing project stakeholders d. Managing project risks

C

Which of the decisions are made in the scenario? a. Which lab to contact for the results b. Whether or not the lab results are correct c. Whether or not the results are out-of-range d. Whether or not to call the patients with the results

C

Which of the following are activities stated in the scenario? a. Receive lab print-out in the mail b. Email lab results to patient c. Identify out-of-range results d. Call lab to obtain results

C

Which of the following data collection methods may provide many views, but some voices may not be heard? a. Cognitive research b. Documentation analysis c. Focus groups d. Questionnaires

C

Which of the following is NOT a characteristic of Meaningful Use of Health IT? Choose the best answer: a. Refers to the use of Health IT to improve patient care b. Includes ePrescribing and provider order entry c. Has been in legislation for over 20 years d. Includes incentives for meeting requirements for care and Health IT

C

Which of the following is NOT a criterion used by the Certification Commission for Health Information Technology (CCHIT) for EHR systems? a. Functionality b. Interoperability c. Return on investment d. Security

C

Which of the following is NOT a reason why Electronic Health Record (EHR) system should be certified by the Certification Commission for Health Information Technology (CCHIT)? a. Evaluate patient care through quality assurance measures b. Foster information exchange among clinicians and patients c. To ensure adoption of the system by all clinicians in a facility d. To support clinical decision making by clinicians and patients

C

Which of the following is NOT a type of dependency (or relationship) between activities? a. Mandatory b. Discretionary c. Exclusionary d. External

C

Which of the following is NOT one of the IOM characteristics of quality health care? Choose the best answer: a. Efficient b. Timely c. Provider centered d. Equitable

C

Which of the following is NOT part of the Security Management Process? a. risk analysis b. risk management c. risk prevention d. system activity review

C

Which of the following is a commonality between human factors and human computer interaction (HCI)? a. Both emphasize innovative design and technology b. Both share a main focus of patient safety issues c. Both emphasize a user-centered approach to design d. Both share the same history and academic societies

C

Which of the following is an advantage of electronic health records compared to paper records? a. Electronic records can be transported over networks as long as encryption is not used during transport. b. With electronic records, it is not necessary to prepare for potential disasters, such as fires and natural catastrophes, which affect paper records. c. Electronic records allow for fine-tuned control of access permissions, potentially putting patients in control of their health information.

C

Which of the following is an example of Stage 2 for implementing 'meaningful use' criteria of ARRA? a. Advanced decision-support and population health b. Submission of 80% of provider orders electronically c. Structured data exchange and continuous quality improvement d. Use of EHR data to track conditions and coordinate care

C

Which of the following is an example of a component to consider when developing technology architecture? a. Applications b. Databases c. Infrastructure d. Integration

C

Which of the following is the standards development organization responsible for the interchange of clinical and financial information? a. Accredited Standards Committee X12 b. American Society for Testing & Materials c. Health Level 7 d. Institute of Electrical and Electronics Engineers

C

Which of the following process variations should be further investigated, i.e., there is not enough information in the scenario to determine which variation(s) may be in use? a. Tracking and access of paper charts b. Patient payment as part of clinic exit c. Billing performed in practice management system d. Pre-exam data collection by Nurse

C

Which of the following processes does NOT occur at most clinics? a. Billing b. Labs c. Surgery d. Prescriptions

C

Which of the following publications served as a catalyst for valuing HIT in relation to patient safety? a. Ross Koppel's study in JAMA b. Dual review reports in the Annals of Internal Medicine and JAMIA in the late 90's c. Institute of Medicine report, "To Err is Human" d. Leapfrog's "Development of a Consumer Communications Toolkit"

C

Which of the following roles DOES NOT participate in the scenario? a. Lab technician b. Receptionist c. Patient d. Physician assistant

C

Which of the following should be used to diagram the following text: "...the new patient intake form is received, the information is confirmed with the patient, then entered into the EMR." a. Terminal symbol, then two parallel process boxes b. Circle, process box, then a diamond c. Document symbol, then two sequential process boxes d. Document box, then a diamond followed by a terminal symbol

C

Which of the following terms refers to the specific safeguards or controls that are put in place to ensure the confidentiality of patient data? a. privacy b. confidentiality c. security d. Integrity

C

Which of the following was NOT one of the factors that led to changes in HIPAA as a result of the HITECH Act? a. There were reports of breaches of information security. b. Enforcement was not being done well. c. The 1997 security recommendations were outdated. d. Privacy advocates felt there was not enough consumer control.

C

Which organization was already an EHR certification organization prior to the establishment of the current ONC Authorized Testing and Certification Bodies? a. Drummond b. CDRH c. CCHIT d. FDA

C

Which phase of the ADDIE model of instructional design is marked by the integration of technologies and project revision? a. Analysis b. Design c. Development d. Implementation e. Evaluation

C

Which selective attention factor refers to the fact that an extreme effort to accomplish a task may inhibit attention? a. Salience b. Expectancy c. Effort d. Cognition

C

Which statement is true of the point-to-point interface method? a. It is a newer, less traditional method. b. Data is routed through a centralized location. c. Its direct linkages can provide secure transmission. d. Both b and c

C

Workflow analysis includes which of the following? Choose the best answer: a. Knowledge of process components and relationships between them b. Identification of opportunities for improvement c. Both d. Neither

C

You receive an email that appears to be from eBay asking you to login to verify a transaction. This is an example of (a) __________ attack. a. worm b. virus c. phishing d. buyware

C

__________ are used to verify the identity of the source. It binds a public key with information about the source. a. PKI b. Encryption c. Certificates d. Hashes

C

__________ is making sure that only authorized individuals have access to information. a. Integrity b. Availability c. Confidentiality d. Nonrepudiation

C

__________ use Internet technology to transmit data between sites. Data is encrypted as it travels from site to site. a. WANs b. Intranets c. VPNs d. Extranets

C

A multidisciplinary computer system selection and evaluation team would consist of all of the following EXCEPT: a. an executive oversight member b. a functional representative of the primary affected area c. a technical representative d. a customer service representative of the prospective vendor

D

A project management plan is used _____. a. As the roadmap used by the project team members to guide them through project execution b. As a communication document for stakeholders to inform them as to how the project will be performed and managed. c. To integrate strategic and other planning processes into a consistent and coherent document. d. All of the above

D

A security incident may be identified by a. automated systems b. unusual network traffic patterns c. system users d. all of the above

D

According to Bloom's Hierarchy of Cognitive and Affective Learning Outcomes, which of the following is at the lowest level? a. Apply b. Create c. Understand d. Remember

D

According to the lecture, which of the following decreases the negotiating team's leverage? a. neglecting to document discussions prior to and during negotiations b. having a willingness to walk away from negotiations c. maintaining friendly relationships with the prospective vendor d. alluding to the vendor's ranking in the competition

D

All of the following are reasons for design requirements EXCEPT for which one? a. Clarity of communication between users and development team b. Evaluate the functions of a system during design testing c. Reduce the time and costs involved in system development d. Increase security measures of patient records in system design

D

All of the following are reasons why implementation of EHRs in the healthcare setting is a challenge EXCEPT for which one? a. Learned helplessness of clinicians b. Political and power struggle of administration c. Lack of clinician input at design d. The socially distributed nature of the facility

D

All of the following should be considered in selection of the pilot group EXCEPT: a. Advice of the steering committee. b. Representativeness of a cross-section of the user community. c. Readiness for the technology. d. Age.

D

An __________ is a list that is associated with a file, directory or object that lists who has access to it and what access they have. a. Authentication b. Accessibility c. Authorization d. Access Control List

D

An analyst needs to show information movement and the order of the steps. Which of the following diagram notations should be used? a. Use case scenario b. Stakeholder diagram c. Context diagram d. Data flow diagram

D

Choose the answer that best describes a process inventory. a. Counting and tracking available stock b. Objectifying and measuring processes c. Analyzing and improving stock processes d. Identifying and recording processes

D

Designing the test scenarios is best performed by: a. Less-experienced staff. b. Program experts. c. Workflow experts. d. b and c. e. All of the above

D

EPHI is a common acronym in health care, which stands for: a. employer protected health inquiry b. employer processed health information c. electronic processed health information d. electronic protected health information

D

Effective implementation teams learn from mistakes. Which of the following is essential to support teams in learning from mistakes? a. safety committee b. risk management c. quality improvement d. culture of transparency

D

FDA regulation of EHRs is UNLIKELY to reduce errors due to a. faulty hardware. b. faulty software. c. design flaws. d. implementation flaws.

D

HIPAA stands for: a. Health Investment Protection and Availability Act b. Health Information Protection and Access Act c. Health Information Portability and Accountability Act d. Health Insurance Portability and Accountability Act e. Health Insurance Prosperity and Access Act

D

Indicate which statement is true: a. Information flow and workflow are the same thing b. Information flow and workflow can be shown on a context diagram c. Information flow and process flow can be shown on an E-R diagram d. Information flow and process flow can be shown on a flowchart

D

It is important to certify that EHRs are up to certain quality standards for all of the following reasons EXCEPT for which one? a. Acceptance of records by clinicians b. Health information exchange c. Impact on patient safety d. Mandated regulations by governing bodies

D

PHI is: a. Public Health Information b. Private Health Information c. Personal Health Index d. Protected Health Information

D

Projects are initiated in order to create a unique_____. a. Product b. Service c. Result d. All of the above

D

SDLC stands for: a. System Development List Creation b. System Depreciation Lifetime Cost c. Software Depreciation Listed Costs d. Software Development Life Cycle

D

Security is __________. a. the quality or state of being secure b. freedom from fear or anxiety c. measures taken to guard against espionage or sabotage, crime, attack or escape d. all of the above

D

Select the appropriate sequence for developing an enterprise architecture plan: a. Information architecture, business process, technology architecture b. Business process, technology architecture, information architecture c. Technology architecture, information technology, business process d. Business process, information architecture, technology architecture

D

States may __________ providers to disclose health information without patient permission. a. allow b. not allow c. sometimes allow d. not clearly allow or not allow

D

Survey data from the pilot users should include all of the following EXCEPT: a. What changed? b. What went wrong? c. What are suggestions for interface changes? d. Would you like to go back to the old system?

D

The compatibility of a software program with existing programs in a system reflects which specific requirement type? a. Data requirements b. Environmental requirements c. Organizational requirements d. Technological requirements e. User characteristics

D

The following quote "When human error is viewed as a cause rather than a consequence, it serves as a cloak for our ignorance," suggests which of the following? a. Posthoc evaluations of error are affected by hindsight bias that masks the dilemmas, uncertainties, and demands of factors. b. Humans are essentially blameless when you closely scrutinize the latent conditions c. Active errors, which are human-based, are qualitatively different from latent errors, which are computer-based. d. Human error often reveals a long chain of events and conditions that greatly increase the likelihood of human error e. All of the above

D

The principle of boundaries includes all EXCEPT a. software programs for access validation. b. authentication procedures. c. audit-trail mechanisms. d. off-site storage of data.

D

The project team can estimate the likely number of work periods required to perform an activity by using which method? a. Analogous b. Expert judgment c. PERT d. Any of the above

D

The role of the Food and Drug Administration (FDA) in overseeing patient safety problems include all the following EXCEPT for which of the following? a. Collaborate about certification criteria b. Focus on areas of EHR implementation that have safety risks c. Monitor patient safety problems d. Verify that a healthcare organization is using an EHR correctly

D

This support team member is expert in EHR applications and is able to troubleshoot difficult issues: a. Super user b. Help desk analyst c. Production support consultant d. Application support specialist

D

Under the American Recovery and Reinvestment Act (ARRA) of 2009, hospitals and health care professionals are required to become 'meaningful users' of certified EHR technology in order to do which of the following? a. Avoid financial penalties b. Practice medicine c. Receive incentive payments d. A and C only e. A and B only

D

What is NOT something typically found in a RFP? a. System Implementation plan b. Proposed costs c. Shorter development time d. Institution's financial statement

D

What kind of people need to be represented in the implementation project team? a. clinicians b. technologists c. administrators d. all of the above

D

Which are advantages to using COTS software? a. Development costs are typically lower b. Integrates best with your present IT system components c. Easier learning curve for users and administrators d. A and C

D

Which are recommended steps for using HL7 as a baseline for your EHR requirements? a. Learn the language: Understand how key words are used within the model. b. Review and select relevant sections relevant to your healthcare setting. c. Understand that no organizational structure exists to the document as it is meant to be loosely interpreted. d. Both a and b

D

Which is NOT an advantage of integrating EHRs? a. Enables hospitals to share patient information. b. Enables providers to meet the HITECH "meaningful use" criteria. c. Enhances billing/payment and reform initiatives. d. Improves security and privacy of patient data. e. Streamlines workflows between hospitals and clinics.

D

Which of the following EHR functionality is indicated by the scenario? a. Lab sample tracking b. Lab sample acquisition c. Referral to external lab d. Interface with the local lab

D

Which of the following EHR functionality is indicated by the scenario? a. Pulling and tracking paper charts b. Receipt of lab results from external lab c. Appointment scheduling d. Clinical documentation

D

Which of the following are elements of project management? a. Making sure a project gets done b. Controlling cost and scope in a project c. An approach to planning and guiding the project process from start to finish d. All of the above

D

Which of the following are examples of functional requirements? a. EHR is Certification Commission for Health Information Technology (CCHIT) certified b. EHR is HIPAA compliant c. EHR meets meaningful use criteria and is eligible for incentives d. all of the above

D

Which of the following best depicts the purpose of an affinity diagram? a. To measure the affinity of different actors in the organization b. To depict the overall flow of activities and the relation between parts of a system c. To organize focus group data into affinity cells d. To organize and display a grouping of ideas and data e. To illustrate the latent conditions operating in a setting

D

Which of the following cannot be considered as a capital expense? a. the development of training materials b. software in which the license is purchased c. hardware d. staff training

D

Which of the following factors has been shown to adversely affect performance? a. An upcoming deadline b. An increase in workload c. An increase is compensation d. a and b e. All of the above

D

Which of the following is NOT a National Patient Safety Goal? a. Accurately reconcile medications b. Identify patients correctly c. Improve the safety of using medications d. Improve tracking of public health data

D

Which of the following is NOT a characteristic of a well-written objective? a. Specific b. Concise c. Measurable d. Systematic

D

Which of the following is NOT a dimension of a workflow analysis? a. Temporally b. Availability of technologies c. Use of artifacts to structure work d. Proximity of affinity cells

D

Which of the following is NOT a lifecycle model of software development? a. Waterfall b. Spiral c. Star d. Cluster

D

Which of the following is NOT a principle that guides contextual inquiry? a. Context of workplace and users b. Focus on goals and questions c. Interpretation of observations d. Iterative design process e. Partnership between user and developer

D

Which of the following is a benefit of Joint Commission Accreditation? a. To achieve the National Patient Safety Goals b. To be eligible for Medicare reimbursement c. To verify correct use of EHRs in providing patient care d. All of the above

D

Which of the following is a factor to consider for grammar data standards for communicating public health information? a. The order of data b. The structure of data c. The environment of the data d. a and b e. All of the above

D

Which of the following is a reason why stress and burnout can have a negative impact on performance with respect to the effect of heavy workload on performance? a. It can lead to frustration and negative attitudes towards one job. b. Nurses will often fail to administer the appropriate medication dosages c. It depletes ones attentional resources and leaves an employee with insufficient time to perform tasks safely. d. It results in reduced physical and cognitive resources to perform adequately e. It invariably results in numerous adverse events

D

Which of the following is an example of 'meaningful use' of EHRs? a. Keeping track of patient appointments using an EHR system b. Keeping track of patient demographic information using an EHR system c. Keeping track of practitioner work schedules using an EHR system d. Keeping track of medications administered to a patient using an EHR system.

D

Which of the following is an example of a workstation as defined in the HIPAA Security Rule? a. desktop computer b. laptop c. USB drive d. all of the above

D

Which of the following is the organization responsible for data standards applicable to pacemakers or insulin pumps? a. Accredited Standards Committee X12 b. American Society for Testing & Materials c. Health Level 7 d. Institute of Electrical and Electronics Engineers

D

Which of the following is true of incremental implementation strategies? a. They have a quicker return on investment. b. They are high risk, high anxiety. c. They require greater numbers of resources. d. They have higher training costs.

D

Which of the following may indicate needed EHR functionality? a. Generic processes used by a clinic b. Process variations used by a clinic c. Process exceptions likely encountered by a clinic d. All of the above

D

Which of the following reflects a functional requirement? a. Describe the capabilities of the system b. Describe what the user should be able to do with the system c. Describe the general and technical constraints of the system d. A and B e. All of the above

D

Which of the following represent limitations in the use of mobile health devices with patients a. They are surprisingly heavy for older adults b. The small screen diminishes visibility and interactivity c. Complex hierarchical menu systems makes navigation challenging d. b and c e. All of the above

D

Which of the following was NOT a security principle for health information proposed in the 1997 "For the Record" report? a. Use two-factor authentication b. Establish security education and training c. Develop policies for software discipline d. Avoid storage on portable drives e. Use encryption to protect information in transit

D

Which of the following would be an exception to a document receiving process? a. receipt of fax documents b. receipt of electronic documents c. receipt of documents within a week of patient visit d. receipt of documents with no patient identifiers

D

Which of the following would be variations of a Diagnostic test process? a. Patient cannot tolerate the test b. Patient is not compliant with preparatory instructions c. Test returns a false positive d. Test is conducted by referral to an external facility

D

Which phase of the ADDIE model of instructional design includes ensuring that all equipment needed for the training is in place and that all technological applications are functional? a. Analysis b. Design c. Development d. Implementation e. Evaluation

D

Which statement is true of an interface engine? a. More separate connectivity points than point-to-point b. More flexible and scalable than point-to-point c. Easier to install and maintain than point-to-point d. Both b and c

D

Which was not a reaction by the Office of the National Coordinator to the anticipated use of EHRs? a. Collaboration with NIST to develop EHR usability measures b. Overseeing the establishment of Authorized Testing and Certification Bodies c. Initiating a panel discussion by the Institute of Medicine on HIT and safety d. Recommending stricter regulations by the FDA on EHR design and implementation

D

Why did Congress fail to pass privacy legislation in 1999? a. There was almost unanimous disagreement with what had been proposed. b. Congress did not agree with the privacy principles put forth by the Secretary of Health and Human Services. c. Congress felt existing state laws were sufficient to protect privacy. d. The legislators could not agree among themselves about what to propose.

D

Why is requirements-gathering a part of the design process? It provides: a. An explanation of what the system should "be" or should "do" b. Documentation of "needs" in order to communicate between everyone involved in system development c. A set of goals that define objectives for design d. All of the above

D

You were asked to configure wireless configuration. Which protocol should you select? a. WEP b. NTFS c. WLAN d. WPA2

D

__________ provides proof that a certain action has taken place or that something/someone is what they claim to be. a. Integrity b. Availability c. Confidentiality d. Nonrepudiation

D

__________ testing focuses on the system as a whole. a. Unit b. Integration c. Module d. System

D

According to Knowles' Principles of Adult Learning, adults must be which of the following in order for learning to take place? a. Partners in their own educational plans b. Invested in their educational experience c. Presented with relevant material d. A and B e. A, B, and C

E

All of the following are characteristic of the human interface dimension as it applies to the analysis of adverse events EXCEPT for which one? a. Medical Devices b. Equipment Location c. Paper/electronic Charts d. Distractions e. All of the above are characteristics

E

All of the following are reasons why human factors have become increasingly important EXCEPT for which one? a. Increase in use of technology by diverse users b. A growing awareness of safety concerns c. The cost to humans in technology error d. Increase in need for quality control e. All of the above are reasons

E

Data standards specific to Information include all of the following EXCEPT for which one? a. Extensible markup language b. Fiber-optics c. Networks d. Intranet e. E-commerce

E

In order to understand the context of requirements in the workplace, which of the following factors must be taken into consideration? a. Social structure b. Cultural structure c. Key stakeholders d. A and B e. All of the above

E

What are key factors in project success? a. Strong executive support b. User involvement c. An experienced project manager d. Clear business objectives e. All of the above

E

Which is NOT a common form of security breach? a. Password-based attack b. Identity spoofing c. Application layer attack d. Eavesdropping e. Parasite attack

E

Which of the following best characterizes the importance of usability in the implementation of electronic health records? a. It contributes to the science of the field b. It helps clinicians do their work better c. It means users will have a positive attitude to implementation of electronic health records d. It can help prevent medical errors e. All of the above

E

Which of the following data collection methods may be administered to a large group of people, but typically has a low response rate? a. Cognitive research b. Documentation analysis c. Focus groups d. Interviews e. Questionnaires

E

Which of the following is a component to consider when implementing context and data standards required for communication in informatics? a. Hardware b. Software c. Confidentiality requirements d. a and b e. All of the above

E

Which of the following is a factor that affects the usability of an EHR system in a healthcare facility? a. Screen display b. Software design c. Workflow d. a and b e. All of the above

E

Which of the following is an example of a Clinical Data Representation? a. ICD-9-CM b. SNOMED-CT c. ICD-10-PCS d. a & c e. All of the above

E

Which of the following is an example of a component to consider when developing information architecture? a. Printers b. Databases c. Business process d. b & c e. All of the above

E

Which of the following is an example of a public health classification system? a. ICD-9-CM b. ICD-10-CM c. ICD-0 d. a and b e. All of the above

E

Which of the following is the strongest example of authentication? a. Having a username that is not related to your real name b. Having both a username and a password c. Memorizing your password so you don't have to write it down d. Keeping information encrypted e. Using both a password and a device with changing unique numbers

E

Which statement accurately describes a SDLC model? a. The waterfall model emphasizes sequential development. b. The iterative model emphasizes that the product may need to pass through the same phase multiple times, in a cyclical fashion. c. The spiral model emphasizes prototyping as part of the cyclical process. d. Both B and C e. All of the above (A, B, and C)

E

Why are projects authorized and initiated? a. Technological advances b. Customer requests c. Legal/regulatory requirements d. Market demands e. All of the above

E

"An electronic record of patient health information containing care received in all health facilities" is the definition of a. an Electronic Health Record. b. an Electronic Medical Record. c. a Personal Health Record. d. a Healthcare Information Record.

a

A ____ is a term used to describe the movement of data from one router to another. a. hop b. skip c. route d. jump

a

A __________ IP address can change when you reboot your ISP device. a. dynamic b. static c. DNS d. public

a

A __________ interface is one where the user types in all the commands. a. Command line b. Graphical User c. BIOS d. Windows

a

A domain name is an identification label that defines a realm of administrative autonomy, authority, or control on the Internet, based on the __________. a. Domain Name System b. IEEE 802.3 standard c. Whitehouse d. ICANN

a

A factor in the future direction of imaging systems is the development of exchange standards.

a

A government agency that is an important source on research about patient safety and privacy is: a. AHRQ b. JC c. OCR d. FDA

a

A major barrier to CPOE adoption is its cost. a. True b. False

a

A patient is admitted to the hospital for appendicitis and has an appendectomy. Which of the following would be used to report the diagnosis and procedure? a. ICD-9-CM b. HL7 c. CDT d. CPT

a

A primary care physician typically provides routine care including health maintenance and management of new and chronic disease. Which specialty was specifically mentioned as delivering primary care by default? a. Emergency Medicine b. Family Medicine c. Internal Medicine d. Pediatrics

a

A role of genomics in consumer health informatics is the connection to personalized medicine. a. True b. False

a

According to the lecture, in addition to directly and indirectly incentivizing health IT among providers, payors can also influence health IT adoption by a. making available claims data from health information exchange. b. lobbying Congress for more stringent health IT requirements for providers. c. convening stakeholders to discuss data standards. d. hiring nurses to be health IT liaisons to doctors.

a

According to the lecture, which is one of the ways payors may "directly" incentivize the need for health IT? a. Sponsor programs that reward physicians for achieving certain clinical measures of excellence b. Sponsor programs that reduce waiting times for patients seeking care c. Encourage improvements in quality of care by including patients in decisions that affect them d. Encourage physicians to participate in health IT "steering committees"

a

According to the presentation, which of the following BEST describes why CHINs failed in the 1990s? a. A lack of focus on community stakeholders resulted in competitors being unable to agree on key issues. b. Technology was not yet available to accomplish the goals of CHINs. c. HIPAA regulations made the sharing of protected health information too burdensome. d. Privacy concerns among patients led to a grassroots political movement.

a

Administrative Hearings would be held for: a. Social Security Appeals b. Civil litigation c. Criminal Cases d. Malpractice Claims

a

CPOE implemented independent of other technologies is likely to have limited benefits. a. True b. False

a

Computerized provider order entry requires health care information systems integration. a. True b. False

a

Episode of care reimbursement types include all of the following except: a. self-pay b. prospective payment c. capitation d. global payment

a

Fraud is: a. The intentional misrepresentation or concealment of relevant facts b. Unnecessary costs as a result of poor management, practices, or controls c. Excessively or improperly using government resources d. Pre-determined non-economic damage

a

HIPAA regulations require unique identification numbers that can be used across information systems. a. True b. False

a

HITECH addresses which of the following barriers to using health information technology? a. There is a shortage of health IT support staff. b. Patients cannot afford Personal Health Records. c. Doctors prefer to use paper charts. d. Patients don't trust doctors who use computers. e. There are not enough electronic health record vendors.

a

Hard disk storage is known as __________ storage. a. secondary b. volatile c. RAM d. primary

a

Hardware can be defined as: a The physical components that make things work. b. Data needed to tell the computer what to do and how to behave. c. Fast, low cost PC systems that permeate the workplace often less than $500 each. d. A computer designed to efficiently run server applications.

a

Healthcare is the prevention and treatment of illness a. True b. False

a

Image modalities differ in their storage requirements, depending on a. The contrast and spatial resolution needed b. The number of integrations with other systems c. Whether data expansion techniques are used d. Both a and b

a

In the binary number "01011010", the rightmost value of "0" is a placeholder for __________. a. 20 b. 21 c. 22 d. 27

a

Information systems in hospitals include dozens of systems involving every aspect of business operations and healthcare. a. True b. False

a

Java uses a hybrid approach of compiling and interpreting. a. True b. False

a

MIIS is a language that was developed for healthcare applications. a. True b. False

a

Most people in the US get health insurance through: a. An employer b. Their county health department c. Their state health department d. The federal government

a

Observational data like the history, results of the physical exam and a summary of a surgery or procedure is recording using what type of data. a. Narrative b. Recorded Signals c. Numerical Measurements d. Images

a

Of the following types of plans, costs for the patient are lowest, but choice of providers is most restricted, in a: a. Health maintenance organization b. Indemnity plan c. Preferred provider organization d. Point-of-service plan

a

One of the three processes used in imaging systems in health care is interpretation of the images. a. True b. False

a

One way in which data integration assists in medical decision making is by accelerating the flow of critical information. a. True b. False

a

Secondary Care Organizations are also known as Specialty Organizations. a. True b. False

a

Select the classification of nursing diagnoses that is organized around 13 domains that includes examples such as nutrition, and activity or rest. a. NANDA b. NIC c. NOC d. PNDS

a

Select the true statement about a standardized terminology or healthcare language. a. It facilitates the measure of patient outcomes. b. It inhibits the linking of diagnoses. c. It is only useful with exchange of information within organization d. It interferes with education and practice.

a

Starting with the layer closest to the network media/medium what is the correct order of the layers of the TCP/IP model? a. Network Access, Internetwork, Transport, Application b. Network Access, Network, Transport, Application c. Application, Transport, Internet, Network Access d. Physical, Transport, Internet, Application

a

The HITECH Act provides funding for collaborative research projects known as: a. SHARP b. HITCR c. CRPIT d. SECURE

a

The Joint Commission (formerly known as JCAHO) accredits: a. Entire healthcare organizations b. Outpatient healthcare providers c. Just nurses d. Just physicians

a

The challenges to achieving the five rights to clinical decision support (CDS) differ depending on how closely the CDS is tied to what the clinician already intends to do. a. True b. False

a

The clinical decision support system generates an alert for a needed therapeutic intervention based on a clinical practice guideline and patient-specific factors. The benefit this alert would have is in helping to enforce standards of care. a. True b. False

a

The device driver for your printer will probably need to be updated when you do a major upgrade of your operating system. a. True b. False

a

The equal sign is the assignment operator in Java. a. True b. False

a

There are two types of software: application and __________ software. a. System b. Multimedia c. Process d. Utility

a

True or False: Server applications and client applications can exist on the same physical device. a. True b. False

a

What are three things to consider when purchasing an EHR server? a. Reliability, performance, scalability b. Size of the unit, performance, power consumption c. Client-Server, Service Requester, client requests

a

What is a likely future outcome from the clinical and translational science awards? a. Systems for using EHR data for research will be developed. b. Academic informatics professionals will be less needed. c. Informatics research will focus on supporting basic science discoveries. d. Informatics applications for translating scientific papers from other languages into English will get more attention.

a

What is the MAJOR difference between the RHIOs of the 2000s and the CHINs of the 1990s? RHIOs focus on a. quality rather than cost savings. b. cost savings rather than efficiency. c. efficiency rather than patient safety. d. patient safety rather than community stakeholders.

a

What type of communication can allow data to easily be viewed throughout the institution? a. Digital b. Film c. Verbal d. Paper

a

Which CPOE function is considered advanced functionality? a. Drug-drug interaction checks b. Transmit the order to the appropriate location c. Return status of order d. Return results of order execution

a

Which is a strategy used by health care organizations to ensure integration of functions? a. Data preservation b. Data destruction c. Data scrutiny d. Data testing

a

Which of the following is an example of how the Internet has affected consumer health informatics? a. Provided the opportunity to contact the health care provider via e-mail. b. Created the ability to generate a physician bill. c. Afforded the option to opt out of supplying personal health information to drug companies. d. Given the ability to merge all data from health care providers and health plans into their personal health record.

a

Which of the following is not true of HIPAA? a. New employer plan may limit coverage due to pre-existing condition b. Improves access to long term care c. If health insurance is lost, improves access to group health plan d. Protects use of health savings accounts

a

Which of the following is one of the main roles of the FDA? a. Regulate drug safety b. Prevent wrong-site surgery c. Encourage patients to participate actively in their healthcare d. Develop performance measures for hospitals

a

Which of the following is part of smart technology as it would be used in the home? a. Remote patient monitoring b. Patient monitoring c. Physician monitoring d. Payer monitoring

a

Which of the following is used for diagnosis coding and reporting on claims regardless of the provider? a. ICD-9 b. CPT c. HCPCS d. CDT

a

Which of the following standards can be used across various healthcare settings to address the capture of data structure and message exchange associated with diagnostic images? a. DICOM b. ANSI ASCX12N c. HL 7 d. CHI

a

Which of the following statements BEST describes the current state of the National Health Information Network (NHIN)? a. NHIN is in its early developmental stages. b. NHIN is in "beta testing" mode and is getting ready to be deployed for national use. c. Planning for the NHIN has been authorized by the HITECH Act and is scheduled to begin in fiscal year 2011. d. NHIN is fully operational.

a

Which of the following was not a significant barrier to the formation of RHIOs in the early 2000s? a. Technology b. Politics c. Market competition d. Regulations

a

Which of the following was the main source of information on U.S. informatics during the late 60's through the mid 80's? a. SCAMC, Fall Symposium b. The American Association of Medical Systems and Informatics, Spring Congress c. The International Medical Informatics Association, Annual World Congress d. The American College of Medical Informatics, winter retreat

a

Which of the following, according to the IOM, is a software element of an EHR? a. Patient support b. Software c. Hardware

a

Which of the statements about epidemiology is FALSE? a. Epidemiology is a qualitative science built around concepts of probability and statistics b. Epidemiology is a tool for public health action c. Epidemiology assists in preventing morbidity and mortality d. Epidemiology, at times, involves common sense as much as it does causal reasoning

a

Which organization has always had a focus on clinical computing as early as the 1970s? a. AMIA b. HIMSS c. AHIMA d. NAHIT e. JHITA

a

Which term best describes the grouping of similar or related data for the purpose of external reporting? a. Classification systems b. Clinical terminologies c. Categories and subcategories d. Compilation Coding

a

Which type of professional was largely responsible for overseeing and managing the use of computers in clinical and administrative systems in hospitals during the 1990s? a. Chief Information Officer b. Head Nurse c. Chief Executive Officer d. Health Information System Manager

a

Which use of technology is indicated by the following scenario? Cheryl, age 74, has mobility problems. She uses an electronic blood pressure cuff and transmits, via a telephone connection, her daily blood pressures to a nurse who reviews the blood pressure trends and notifies her if she need to see her doctor. She avoids frequent trips to the physician's office for simple blood pressure monitoring. a. Telehealth b. Telemedicine c. Telecardiology d. Bioinformatics

a

Why was there increased interest in the 1990s in standardized clinical vocabularies? a. There was more interest in using EHR data for research. b. Good standardized vocabularies were not around earlier. c. Doctors were buying electronic health records and they need to understand what is in the EHR. d. Doctors preferred to dictate using standardized terminologies.

a

__________ are control structures that allow code to repeat. a. Loops b. If statements c. Assignments d. Objects

a

__________ is an example of a third generation programming language. a. FORTRAN b. SQL c. Machine code d. Assembly language

a

__________ provides information hiding in Object Oriented Programming. a. Encapsulation b. Inheritance c. Polymorphism d. Expressions

a

The sectors of healthcare spending that utilize the most resources include (choose all that apply): a. hospitals b. physician services c. pharmaceutical costs d. nursing homes

a, b, c

Which of the following characteristics is part of the definition of a disease? a. A combination of symptoms and physical findings attributed to a specific cause b. Impairment of a specific structure of the body producing symptoms c. Impairment of a specific function of the body producing physical findings d. A combination of symptoms and physical findings not easily attributable to a specific cause

a, b, c

Which of the following is currently used to code claims for healthcare services (choose all that apply): a. CPT b. ICD-9-CM c. NDC - National Drug Codes d. ICD-10-PCS

a, b, c, d

(Choose all that apply) Factors that contribute to escalating healthcare expenditures in the US include: a. Technology. b. Chronic disease. c. Increased demand and utilization. d. An excess of primary care doctors. e. New pharmaceutical treatments. f. Administrative costs. g. The uninsured.

a, b, c, e, f, g

132.16.9.0 is what class of IPv4 address? a. Class A b. Class B c. Class C d. Class D

b

A benefit of telehealth is increased number of home visits by the nurse in order to link patients to specialists. a. True b. False

b

A core element of the master patient index is the patient's insurance. a. True b. False

b

About 75 percent of healthcare establishments are hospitals a. True b. False

b

According to the lecture, which entity frequently became the leader in HIE through RHIO development on a state level? a. Insurance companies b. Medicaid programs c. Physicians d. Federally funded research groups

b

An interdisciplinary team is a group of individuals with diverse training and backgrounds who work independently to improve patient care. a. True b. False

b

BlueCross BlueShield is: a. A managed care organization b. An association of private companies c. Funded by the federal government d. Funded by all 50 states

b

CPOE use is restricted to inpatient medications orders. a. True b. False

b

Classes and objects are exactly the same things. a. True b. False

b

Complete interoperability of centralized and federated EHRs is already in place. a. True b. False

b

Copying software from a friend is always okay. a. True b. False

b

Federally Qualified Health Centers include the following: a. County Health Clinics b. Migrant Health Centers c. Look Alikes d. Tribal Operated Health Clinics

b

Health consumerism can be seen as an inhibitor in the development of patient-centric health information systems. a. True b. False

b

In the Network Layer of the OSI model, what is the protocol data unit (PDU) called? a. Data b. Packets c. Segments d. Frames

b

Managed care plans: a. Are much less common today than they were 50 years ago b. Combine health insurance and healthcare services c. Pay doctors on a fee-for-service basis d. All of the above

b

Medication assistants in many states are restricted to administering medication in: a. Community hospitals b. Long-term care facilities c. Emergency departments d. Dialysis units

b

Most EHR systems today are based on what kind of computer model? a. Hardware-software b. Client-server c. Hosted

b

Most states allow a Licensed Practical Nurse (LPN) to administer an Intravenous push medication (rapidly infused using a syringe)? a. True b. False

b

Name three types of servers you may find in a typical EHR system? a. Hardware, RAM, Dell b. Configuration, terminal, VPN c. Application, Database, Citrix d. Internal, external, hosted

b

Programming languages have __________, just like natural languages. a. Code b. Syntax c. Meaning d. Greetings

b

T/F Ethernet uses CSMA/CA. a. T b. F

b

T/F IPv4 has 128 bits. a. T b. F

b

The CPU improves its performance through the implementation of one or more __________, which is made up of one or more __________. a. CPUs, fetches b. processes, threads c. cores, execute operations d. states, tasks

b

The EMTALA act requires hospitals receiving federal funds to evaluate individuals presenting to the emergency department a. only if they have insurance b. regardless of their ability to pay c. only if they pay in advance d. only if it is a true emergency

b

The SDLC covers creation of the product, but routine maintenance and ultimate decommissioning are addressed in different models. a. True b. False

b

The __________ allows ancillary systems in a hospital setting to connect with other systems. a. PIS b. Interface engine c. Registration system d. CDS

b

The five "rights" of medication administration are: a. Right department, right nurse, right patient, right drug, right time b. Right patient, right drug, right time, right dose, right route c. Right nurse, right chart, right drug, right time, right dose d. Right nurse, right patient, right time, right dose, right route

b

The functions of a RHIO include all EXCEPT a. initiating collaboration of stakeholders. b. matching the national model for RHIOs. c. formulating associational agreements d. constructing security and access procedures

b

The incentives for health IT are focused on getting a. as many physicians as possible to purchase electronic health records. b. physicians to use health IT to improve healthcare quality. c. vendors to develop systems with the newest features. d. patients to use health IT for medication management.

b

The largest Integrated Healthcare System in the US is: a. Kaiser Permanente b. Veterans Health Administration c. TRICARE d. Indian Health Services

b

The lecture talked about a "misalignment of incentives" as it pertains to health IT. Which of the following statements reflects this issue? a. Doctors pay for IT, hospitals benefit b. Doctors pay for IT, payers benefit c. Hospitals pay for IT, doctors benefit d. Payers pay for IT, hospitals benefit

b

The major difference between an academic and community hospital is the type of care they provide. a. True b. False

b

The technological and human engineering factors associated with digital displays are the same for the radiologist and the referring clinicians. a. True b. False

b

The type of Long Term Care organization that typically provides an apartment or room and includes personal care, meals and housekeeping is: a. Independent Living b. Assisted Living c. Skilled Nursing Facility d. Hospice

b

The typical sequence of education and training required to be a Nephrologists would be: a. College, Medical School, Graduate School, Fellowship, Residency b. College, Medical School, Residency, Fellowship c. College, Medical School, Fellowship, Licensure d. College, Graduate School, Medical School, Fellowship, Board Certification

b

True or False: Evidence-based decision-making means relying only on diagnostic and treatment methods that are scientifically proven. a. True b. False

b

True or False: When making a clinical judgment about a patient, a nurse should consider only the data in the patient's chart and what he or she finds by examining the patient. a. True b. False

b

What has been an impact of the increased interest in quality improvement over the last two decades? a. Hospitals have rushed out to purchase new health IT software. b. The Agency for Healthcare Research and Quality funded health IT research. c. Academic informaticians shifted their interests from administrative to clinical computing. d. Physicians protested that their quality was good enough and did not see any need for improvement.

b

When a hard disk drive is being accessed, the __________ spins and the __________ moves until the head is over the proper location on the disk. a. Spindle, arm b. Platter, arm c. Head, arm d. Arm, head

b

Which Presentation Layer protocol specifies how messages must be formatted so that they can be exchanged between different email systems? a. SMTP b. MIME c. SSL d. XDR

b

Which entity is the largest third party payer in the US healthcare system? a. Blue Cross and Blue Shield b. The federal government c. American Hospital Association d. Health Maintenance Organizations (HMOs)

b

Which method of reducing healthcare costs is demonstrated in the following scenario? After multiple visits to her primary care physician for concerns about the same problem, Aunt Sally could stay in the hospital for only 2 days for a preapproved procedure. a. Minimal care system b. Managed care system c. Fee -for -service system d. Reasonable reduction system

b

Which of the following is NOT a value of CPOE? a. Reduce variations in health care b. Reduce variations in provider workflow c. Improve patient safety d. Improve efficiency of health care delivery

b

Which of the following is likely to result in significant progress towards realizing the goals of HIE in the US? a. A technological breakthrough that allows for HIE to be feasible at a much lower cost b. The broad federal support for HIE outlined in HITECH c. The recent Supreme Court decision allowing for the exchange of patient information via the Internet d. A general consensus among stakeholders that HIE will save money

b

Which of the following is not a critical element needed in integrated billing, financial, and clinical systems? a. Information is available when and where it is needed b. Users must have separate views c. Data must have a consistent interpretation d. Adequate security must be in place

b

Which of the following is not a fundamental requirement of a clinical decision support system? a. Inference engine b. Clinical workflow tools c. Knowledge base d. Communication mechanism

b

Which of the following is not one of the general areas where telehealth supports clinical care with communication technologies? a. Long-distance clinical health care b. Payer and provider coordination of care c. Patient and professional health-related education d. Public health and health administration

b

Which of the following is one of the four key components of any EHR system? a. Provides mobility for healthcare workers b. Provides "longitudinal health data" on individuals c. Provides secure access by sacrificing efficiency

b

Which of the following is the MOST likely explanation for increased clinical computer use after 2000? a. Computers were very cheap and more doctors bought them for their offices. b. Doctors were more comfortable using computers. c. There were laws passed that mandated clinical computer use. d. Research evidence was very strong that doctors could increase their income if they used EHRs.

b

Which of the following is the MOST likely reason that Chief Information Officers began to report to the CEOs of hospitals in the 1990s? a. There were major hospital reorganizations and no other administrator wanted the responsibility for the information systems. b. The CIO's role became much broader than it had been previously. c. CIOs demanded that they get more recognition and wanted to report to the top administrator. d. CEOs began to take over many functions previously given to CFOs and this was one of them.

b

Which of the following standards for the exchange of administrative data includes insurance claims? a. DICOM b. ANSI ASCX12N c. HL 7 d. CHI

b

Which of the following typically pays providers the most for identical medical services? a. Medicare b. Private insurance companies c. Medicaid d. Managed care organizations

b

Which organization began with a focus on management engineering? a. AMIA b. HIMSS c. AHIMA d. NAHIT e. JHITA

b

__________ are programming constructs that store data. a. Assignments b. Variables c. Expressions d. Control structures

b

Fee-for-service payment type include (choose all that apply): a. episode-of-care b. traditional retrospective c. prospective payment d. global payment e. self-pay

b, e

A friend asks you how she can access and control her medical information electronically. Which of the electronic record systems listed below would you direct her to? a. Electronic Health Record b. Electronic Medical Record c. Personal Health Record d. Pharmacy Health Record

c

A friend of a patient asks the nurse if the patient is HIV positive. If the nurse provides this information, what is he or she guilty of? a. Violating information security b. Information by consent c. Breach of confidentiality d. Nothing; this is not illegal

c

A nurse practitioner typically requires what degree? a. Associate Degree b. Bachelor's of Science c. Master's Degree d. Doctoral Degree

c

A physician is reviewing digital images from a patient's CT scan at her home office. What systems need to be integrated for this to occur? a. Information Technology System and Picture Archiving and Communication System b. Radiology Information System and Electronic Documentation System c. Picture Archiving and Communication System and Radiology Information System d. Electronic Documentation System and Picture Archiving and Communication System

c

A wired network connection requires the use of: a. NIC, WAP, switch, router. b. Wireless NIC, WAP, router c. NIC, copper cabling, switch, router. d. NIC, WAP, switch.

c

A(n) __________ jack is used to connect a network cable to a network interface card. a. RJ-11 b. 802.11N c. RJ-45 d. Either A or C

c

According to the lecture which of the following best describes AHIMA's original constituency? a. An engineer developing telemedicine devices b. A physician desiring to apply technology to cancer research c. A health information manager seeking an administrative role d. A chief operating officer seeking to integrate healthcare organizations IT systems

c

According to the lecture, which entity would financially gain the most by the adoption and use of EHRs and engagement in HIE? a. Hospitals b. Physicians c. Payors d. Consumer-governed health care cooperatives

c

According to the lecture, which of the following explains the necessity for linking HITECH Act incentives to "meaningful use"? a. Healthcare organizations which are primarily paid through Medicaid have lower clinical outcomes. b. Healthcare organizations with mainly private insurance payors have quality HIT but generally do not value interoperablility with government agencies. c. Simply having an EHR system does not ensure maximum benefits for patients, physicians and payors. d. HIT is the tool to provide equality of healthcare services for all citizens.

c

According to the lecture, which of the following is the most common form of health information exchange today? a. Email b. Secure messaging c. Fax d. File transfer protocol (FTP)

c

According to the lecture, which of the following payor groups is considered most generous? a. Medicaid b. Medicare c. Traditional insurers d. HMOs

c

According to the lecture, which of the following was a driving force for coding standardization and standardized terminology in the 1980s? a. HIPAA regulations b. Increased integration of computer systems c. DRGs d. Palm pilots

c

Choose the best statement about Medicaid and Medicare coverage: a. Medicaid covers older adults; Medicare covers people with low incomes. b. Medicaid covers people with low incomes; Medicare covers children and pregnant women in families that earn too much for Medicaid. c. Medicare covers older adults; Medicaid covers people with low incomes. d. Medicare covers all uninsured children and pregnant women; Medicaid covers older adults.

c

Due to increased funding for health IT, healthcare organizations and administrators are currently more motivated to use technology to do which of the following? a. Manage information b. Survey patient satisfaction c. Improve quality and patient safety d. Decrease cost

c

How does data differ from information? a. Data has limited meaning, depending its storage location. b. Information is the same as data. c. Data has no meaning on its own merit. d. None of the above.

c

Identify the comprehensive controlled terminology that is published in numerous languages and used all over the world designed to capture information in the EHR. a. CDT b. HCPCS c. SNOMED CT d. NDC

c

If an organization purchased a system that allows for the capture of information during the perioperative period from preadmission to recovery at home, an entry stating "Permit Signed" would represent a. a nursing diagnosis b. a nursing intervention c. an operation outcome d. a potential problem

c

In Object Oriented Programming, __________ and __________ are stored together. a. integers, floating point numbers b. functions, procedures c. data, methods d. objects and classes

c

In Windows peer-to-peer networking, a workgroup is simply a __________. a. domain name b. server concept c. name for the network d. protocol

c

Inpatient Care is usually defined as admission for medical care longer than: a. 8 hours b. 12 hours c. 24 hours d. 48 hours

c

Managed care reimbursement may be paid using which of the following methods: a. fee-for-service b. episode-of-care c. either fee-for-service or episode-of-care d. none of the above

c

Medical implants use __________ technology to relay information from inside a patient's body to a receiver. a. WiMAX b. Ethernet c. Bluetooth d. CAT 5e

c

Negligence is one of the two main types of: a. Felonies b. Litigation c. Torts d. Violations of administrative law

c

Operating systems use __________ to provide the illusion of a large memory. a. Physical memory b. Permanent memory c. Virtual memory d. RAM

c

Patient assessed value and efficiency are parameters of a framework to assess: a. Health b. Healthcare c. Healthcare systems d. All of the above

c

Primary Care Organizations typically refer patients to what other types of organizations. a. Secondary Care b. Tertiary Care c. Secondary and Tertiary Care d. Neither Secondary or Tertiary Care

c

Published reports from which of the following organization emphasized the role of health IT in promoting patient safety? a. HIPAA b. CMS c. IOM d. NLM

c

Since 2007, new pharmacist are required to have what degree? a. Bachelor's Degree in Pharmacy b. Master's Degree in Pharmacy c. Pharm D d. PhD in Pharmacology

c

Social media is being used by health care organizations to a. Schedule patients for an appointment. b. Supply prices for services. c. Build a reputation in the marketplace. d. Order supplies.

c

Software can be defined as: a. The nuts and bolts that make things work. b. The physical components of servers. c. A collection of computer programs and related data that provide the instructions telling a computer what to do. d. A collection of computers and devices connected by communications channels that facilitates communications among users and allows users to share resources with other users.

c

Starting with the layer that is closest to the user what is the correct order of layers of the OSI model? a. Physical, Data Link, Network, Transport, Session, Presentation, Application b. Presentation, Data Link, Network, Transport, Session, Physical, Application c. Application, Presentation, Session, Transport, Network, Data Link, Physical d. Application, Physical, Session, Transport, Network, Data Link, Presentation

c

The __________ data type in Java is used for storing whole numbers. a. float b. char c. int d. Boolean

c

The following scenario demonstrates which factor that influenced the positive reception of Healthcare IT? After accessing information on the internet, Helen, age 54, suspected her symptoms were caused by a tumor on her pituitary gland. She researched surgical methods of removal and chose surgeons and a hospital according to her desired surgical procedure. a. Efficiency b. Personalized Healthcare c. Patient empowerment d. Research

c

The motherboard is made up of circuitry and thousands of copper wires known as __________. a. binary code b. RAM c. buses d. chips

c

The operating system is stored __________. a. in RAM when the computer is running b. on the hard disk c. Either A or B d. None of the above

c

The success of a RHIO is dependent on all of the following EXCEPT a. involvement of healthcare payers b. trust between stakeholders c. local government support d. perpetual maintenance of business agreements

c

The third party payer is a. the insured b. the provider c. the insurance company d. all of the above

c

What group determines whether someone is eligible for Medicare and processes their premium payments? a. The Centers for Medicare & Medicaid Services b. The Federal Insurance Contributions Agency c. The Social Security Administration d. The US Department of Health & Human Services

c

What is a CT scan? a. A nuclear medicine imaging device that produces a 3-D image. b. A device that creates an image based on sound waves. c. An x-ray, using specialized equipment, that takes cross-sectional pictures of the body. d. Magnetic imaging equipment that uses a radio frequency pulse to create an image.

c

What kind of job role is likely to be a part of a REC? a. Software engineer b. Research informatician c. Implementation manager d. Chief medical information officer e. Privacy and security officer

c

What organization developed the National Patient Safety Goals, the Sentinel Event Policy, and the Speak Up Initiative? a. The Agency for Healthcare Research and Quality b. The Health Resources and Services Administration c. The Joint Commission d. The Office of the Inspector General

c

What was the view of the Leapfrog Group about health information technology? The Leapfrog Group a. thought health IT was too expensive. b. wanted hospitals to use health IT to hold down healthcare costs. c. recommended health IT as a way to promote patient safety. d. was concerned about the dangers of health IT.

c

Which of the following HITECH programs supports health reform efforts that emphasize use of health information technology? a. Virtual Physician Programming b. Clinical TECH Modeling Centers c. Curriculum Development Centers d. HITECH Doctor television programming

c

Which of the following department would usually be a part of the Information division? a. Nursing Education b. Social Services c. Medical Records d. Security

c

Which of the following early clinical decision support systems used computer-based decision aids based on the Bayesian probability theory? a. MYCIN system b. HELP system c. Leeds Abdominal Pain System d. LDS system

c

Which of the following is NOT a feature of a control center? a. Accommodate 3 to 5 million persons b. Contain aggregated data for an Essential HER c. Be external to the region database d. Be Available 24/7 e. Contain linkages to other centers so patients crossing boundaries of regions can be aggregated

c

Which of the following is NOT a form of software that is free? a. Public Domain b. Open Source c. Packaged d. Freeware

c

Which of the following is a major part of the HITECH vision? a. Reduction of out-of-pocket costs to patients b. Assuring that primary care physicians earn as much as specialists c. Increased transparency and efficiency d. Patients taking more responsibility for their own health e. Insurers not discriminating against patients who have pre-existing conditions

c

Which of the following is an example of HITECH's concept of "meaningful use" of health IT? a. Having a nurse enter the doctor's orders into the EHR b. Printing prescriptions legibly so they can be entered accurately into the information system c. A primary care physician electronically exchanging a patient's laboratory data with a medical specialist d. Patients using the Internet to obtain information about a patient's disease e. A pharmacist using a drug interaction checker

c

Which of the following is currently the most widely available source for a cross-provider view of patient history in the U.S.? a. Personal electronic health records b. Smart Cards c. Payor claims data d. Cloud-based proprietary healthcare data

c

Which of the following is not a component of a knowledge-based patient monitoring system? a. Data acquisition b. Presentation c. Coding system d. Database

c

Which of the following programming languages was developed specifically for healthcare applications? a. Java b. C++ c. MUMPS d. Python

c

Which of the following was a NEW development in the 1990s? a. Computer applications just started to be developed to support scientific medical practice. b. The professionalism of informatics specialists that began in the 1980s decreased. c. The part of the Internet known as the World Wide Web was invented. d. Voice recognition software began to be used routinely in healthcare.

c

Which organization began in the 1920s? a. AMIA b. HIMSS c. AHIMA d. NAHIT e. JHITA

c

Wxyzab is a small country where the entire population has access to healthcare facilities owned and operated by the government, and funded by a tax on citizens. However, the current healthcare infrastructure does not have technologically advanced radiologic imaging facilities, and a commercial organization is allowed by the government to operate its own diagnostic imaging facilities, where patients have to pay for services out-of-pocket. This is an example of a transition of a healthcare system from: a. a public to a private healthcare system model b. a private to a mixed healthcare system model c. a public to a mixed healthcare system model

c

__________ is an example of an expert system used in healthcare. a. Registration b. Interface engine c. Clinical decision support d. Laboratory information system

c

__________ is an open source version of Unix. a. Windows XP b. Mac OS X c. Linux d. Linus

c

A _______________ is a unique address assigned to most network interface cards (NICs) by the manufacturer for identification. a. IP address b. Unicast c. Ethernet address d. MAC address

d

A clinical documentation improvement (CDI) program strives to: a. Improve the quality of documentation in the health record b. Reduce fraud and abuse c. Improve the coding and reimbursement process d. All of the above

d

A major concern that people have about including their data in federated EHRs relate to __________. a. Misinterpretation of data b. Inability for their provider to access the data c. Possibility for incorrect data to be present d. Privacy of their data

d

A reference used with standardized data that contains definitions, principles and guidelines, the values, format and synonyms for each data element is referred to as a: a. formulary b. vocabulary c. metadata d. data dictionary

d

A syndrome is best defined as: a. A combination of symptoms and physical findings attributed to a specific cause b. Impairment of a specific structure of the body producing symptoms c. Impairment of a specific function of the body producing physical findings d. A combination of symptoms and physical findings not easily attributable to a specific cause

d

A(n) __________ is a way of organizing files and their data. a. Operating system b. File manager c. BIOS d. File system

d

According to the lecture, a 2006 failure of a prominent RHIO caused a major uproar in the HIT community. Where was this RHIO located? a. Hartford, CT b. New York, NY c. San Francisco, CA d. Santa Barbara, CA

d

According to the lecture, which of the following 'benefits' is not a part of the goal of the Nationwide Health Information Network? a. Provide a common platform to communicate patient-level information between healthcare organizations b. Interconnect HIE systems between RHIOs and federal agencies c. Facilitate data retrieval for researchers d. Eliminate competition between healthcare organizations

d

All of the following are privately funded EXCEPT: a. BlueCross Blue Shield b. Commercial insurers c. Managed care organizations d. The Children's Health Insurance Program

d

As the HITECH Act progresses into implementation, monetary incentives through CMS will require the use of certified EHRs. Which option explains the benefit to the practitioner for using a certified EHR? a. Early financial gains and long-term financial benefits b. HITECH assistants for implementation c. Premium quality EHRs that fit practitioners' workflow designs d. Standardized and approved functions for health information exchange

d

In order to prove medical malpractice, an injured person must prove all of the following EXCEPT: a. The health provider had a duty of reasonable care. b. The health provider did not meet the minimum standard of care or failed to obtain informed consent. c. The health provider's failure to meet the standard of care was the primary cause of the injury. d. The injury resulted in physical harm.

d

In what year did AMIA as an organization begin and select a U.S. representative to the International Medical Informatics Association? a. 1975 b. 1978 c. 1980 d. 1988

d

Lack of informed consent can lead to accusation of: a. Battery b. Negligence c. Malpractice d. All of the above

d

Roughly how much storage does a chest x-ray require? a. 35 megabits b. 20 megabits c. 30 megabytes d. 20 megabytes

d

Samples of and electronic data interchange transaction include (choose all that apply): a. a fax copy of the claim b. CMS Form 1500 c. CMS Form 1450 d. 837 transaction for healthcare claims

d

Select the INCORRECT statement regarding HIPAA. a. HIPAA contains the standards related to privacy and security regulations b. HIPAA mandates the use of coding and classifications systems to be used by covered entities c. HIPAA supports standards for the electronic health records by mandating electronic transactions each covered entity has to use d. HIPAA mandates the use of SNOMED CT in electronic health records

d

The Affordable Care Act is slated to: a. Provide better access to insurance b. Improve public health c. Increase Medicaid and Medicare payments d. All of the above

d

The HIPAA Security Rule: a. Ensures compliance by the workforce b. Requires covered entities to use security measures to protect health information c. Anticipates threats to security and integrity of information, and protects against them d. All of the above

d

The __________ is used by switches for intranet communications and has no meaning outside of that local network. a. IP address b. subnet mask c. HTTP protocol d. MAC address

d

The age group associated with the highest medical expenses is: a. children <5 b. adults age 25-44 c. adults age 45-64 d. adults > 65

d

The following government agency enforces HIPAA: a. FDA b. AHRQ c. JC d. OCR

d

The health record is: a. A communication tool among care providers b. A tool to improve quality and safety for patients c. The legal business record of a healthcare organization d. all of the above

d

The type of Long Term Call organization that provides services to people living with and dying from an eventually fatal condition is: a. Independent Living b. Assisted Living c. Skilled Nursing Facility d. Hospice

d

What is an MRI? a. A nuclear medicine imaging device that produces a 3-D image. b. A device that creates an image based on sound waves. c. An x-ray, using specialized equipment, that takes cross-sectional pictures of the body. d. Magnetic imaging equipment that uses a radio frequency pulse to create an image.

d

What is the biggest difference between Counselors, MSWs, Psychologists, and Psychiatrists? a. Ability to perform individual counseling b. Ability to perform group counseling c. Ability to specialize in specific areas d. Ability to prescribe medication

d

What two divisions may be combined to form a single Diagnostic and Therapeutic division? a. Nursing and Clinical Support b. Nursing and Ancillary Services c. Clinical Support and Medical Staff d. Clinical Support and Ancillary Services

d

Which Application Layer protocol is used for converting host names and domain names into IP addresses? a. DHCP b. SMTP c. HTTP d. DNS

d

Which act of legislation represents the first realistic financial assistance for advancement in technology for clinical and economic health? a. The Human Genome Project b. Health Insurance Portability and Accountability Act c. CCHT d. HITECH

d

Which of the following HIPAA code sets would be used by dental practices to report dental procedures? a. CPT b. NDC c. ICD-9-CM d. CDT

d

Which of the following are components of the patient centered medical home? a. Coordination of care b. Emphasis on quality and safety c. Enhanced access to care d. All of the above

d

Which of the following barriers to health information exchange are NOT addressed by HITECH? a. There are few agreed-upon technical standards for health IT. b. The transfer of information between institutions is not secure. c. There are few statewide examples of health information exchange. d. Hospitals may lose competitive advantage if they exchange information with others.

d

Which of the following best describes what an ambulatory care nurse does? a. Reports on the safety of people who work in dangerous settings b. Travels to patients' homes to provide care c. Teaches athletes about exercise and fitness d. Treats non-urgent health problems over several visits

d

Which of the following describes a new area of emphasis for the American Health Information Management Association in the 1990s? a. Advocating policy for medical records b. Overseeing hospital information c. Ensuring the quality of medical record data d. Developing the HIT workforce

d

Which of the following does not contribute to identifying the functionality of the EHR for an organization? a. Type of setting (e.g. inpatient, ambulatory) and type of services b. Population served by the provider and type of services c. Type of services provided and population served d. Type of setting, population served and services provided assist in defining the functionality needed for the provider

d

Which of the following is NOT a common interest of AMIA, AHIMA and HIMSS? a. Electronic health IT workforce b. Electronic medical records c. Influencing health IT policies d. Making electronic hospital billing processes more efficient

d

Which of the following is NOT true about an operating system? a. It is a set of programs that coordinate all activities of hardware resources. b. It is the layer between the application software and the hardware. c. It is unique to each individual computer hardware system. d. There is only one operating system available for all computers.

d

Which of the following is NOT true about the paper medical record? a. Can be easily destroyed b. Can be used for one task at a time c. Allows for duplication of information d. Permits easy tracking of those who access it

d

Which of the following is a patient monitoring application? a. e-prescribing b. Computerized order entry c. Electronic charting d. Glucometers

d

Which of the following is an example of business software? a. Video games b. Electronic medical records c. Recipe manager d. Project management software

d

Which of the following is not a role of the PHR? a. Help consumers make informed health care decisions. b. Engage consumers in their care. c. Supply information to health care providers. d. Integrate the EHR and the PHR into a single record.

d

Which of the following is not considered a chronic disease? a. hypertension or high blood pressure b. diabetes c. asthma d. influenza

d

Which of the following occurred in 2004? a. The HIPAA legislation was passed. b. The HITECH legislation was passed. c. The Institute of Medicine was formed. d. The ONC was established.

d

__________ is the highest number of bits that can be sent across the media at any one time. a. Mbps b. Throughput c. Goodput d. Bandwidth

d

HITECH's Workflow Process and Redesign specialists address which of the following problems? a. Hospital workflow needs to be changed in order to increase safety when using health IT. b. Physician office workflow needs to be made more efficient. c. Doctors clinical processes need to be redesigned so computers can decrease costs. d. Office furniture has to be redesigned to accommodate computers. e. Electronic health records have to fit in with a practice's workflow.

e

Health Information Exchange enables the interoperable linkage of health care information across organizations within a ______________? a. A hospital b. An enterprise system c. A region d. Across a nation e. All of the above

e

Which of the following statements is/are TRUE? a. Medicaid has different names in different states. b. Medicaid is funded by federal income taxes; c. Medicare is partially funded by individuals and their employers through payroll taxes; d. Some people on Medicaid also qualify for Medicare. e. All of the above

e

___________ must exist to support an HIE? a. Standards - what we have discussed in this component, b. Infrastructure to support aggregation of data into a single patient record which requires c. Infrastructure to support a regional network d. Infrastructure and linkage of regional networks to provide a virtual national network e. a, b and c f. All of the above. Each of the following must exist to support a HIE.

f


Conjuntos de estudio relacionados

Computer Science ch. 5 Section 4: Database basics

View Set

MLT ASCP Practice Test Questions board practice

View Set

Ch 16: Reef Resilience, Loss of Biodiversity, and the Role of Conservation

View Set