Chapter 6

¡Supera tus tareas y exámenes ahora con Quizwiz!

ethernet

A communication system for connecting several computers so information can be shared.

practice management software

A computer application that allows the user to enter demographic information schedule appointments maintain lists of insurance payers perform billing tasks and generate reports

dumb terminal

A personal computer that doesn't contain a hard drive and allows the user only limited functions, including access to software, the network, and/or the Internet.

firewall

A program or hardware that acts as a barrier between the network and the Internet.

data server

Computer hardware and software that perform data analysis, storage, and archiving; also called a database server.

output device

Computer hardware that displays the processed data from the computere.g.,monitors and printers)

privacy filters

Devices attached to the monitor that allow visualization of the screen contents only if the user is directly in front of the screen; also called monitor filters or privacy screens.

modem

Peripheral computer hardware that connects to the router to provide Internet access to the network or computer.

point-of-care

Something designed to be used at or near where the patient is seen; point-of-care tools and apps are resources for the provider to use when working directly with the patient.

operating system

System software it acts as the computers software administrator by managing integrating and controlling application software and hardware

Ergonomics

The study of workplace equipment design or how to arrange and design devices, machines, or workspace so that people and things interact safely and most efficiently.

e-prescribing

The use of electronic software to communicate with pharmacies and send prescribing information,

1024 bytes

What is one kilobyte equivalent to? a. 1024 bytes b. 1024 MB c. 1024 GB d. 1024 TB

file

a collection of data or program records stored as a unit with a specific name

covered entity

a healthcare facility, healthcare provider, pharmacy, health (insurance) plan, or claims clearinghouse that transmits protected health information electronically

stylus

a pen-shaped device with a variety of tips that is used on touchscreens to write, draw, or enter commands

business associate

a person or business that provides a service to a covered entity that involves access to PHI

software

a set of electronic instructions to operate and perform different computer tasks

computer network

a system that links personal computers and peripheral devices to share information and resources

computer on wheels

a wireless mobile workstation

EMR

an electronic record of health related information about an individual that can be created gathered managed and accessed by authorized clinicians and staff members within a single healthcare organization

EHR

an electronic record that conforms to nationally recognized standards and contains health-related information about a specific patient; can be created, managed, and consulted by authorized clinicians and staff from more than one healthcare organization

interface

an interconnection between systems

claim

an itemized statement of services and costs from a healthcare facility submitted to the health (insurance) plan for payment

input device

any peripheral hardware that allows the user to provide data to the computer

local area network

computers and output devices that are all connected to the facility network and span one building or multiple buildings

wide area network

consists of two or more local area networks; used when healthcare agencies have clinics at a distance

authentication

each employee with network access must log in using a unique password

redundancy

files are copied onto many servers in various locations

security risk analysis

identification of potential threats of computer network breaches, for which action plans for corrective actions are instituted

personal health information (phi)

individually identifiable health information stored or transmitted by covered entities or business associates

malware

malicious software designed to damage or disrupt a system

secondary storage devices

media (e.g., jump drive, flash drive, hard drive) capable of permanently storing data until they are replaced or deleted by the user

revenue

money collected for providing a product or service

hardware

physical equipment of the computer system required for communication and data processing functions

telehealth

refers to remote clinical and nonclinical services, such as provider training, meetings, and continuing education

optical character recognition

scanners convert images to digital text through this process

decryption

the computer process of changing encrypted text to readable or plain text after a user enters a secret key or password

electronic transaction

the electronic exchange of information between two agencies to accomplish financial or administrative healthcare activities

down time

the interval of time during which something, such as hardware or software, is not functioning

media

types of communication (e.g., social media sites); with computers, the term refers to data storage devices

hacker

unauthorized user who attempts to break into computer networks

router

used to allow multiple devices to be on the same network to send and receive information

audit trails

what are records of computer activity used to monitor users' actions within software, including additions, deletions, and viewing of electronic records? a. automatic log-off b. authentication c. firewalls d. audit trails

firewalls

what is a program or hardware device that acts as a barrier or filter between the network and the internet? a. firewalls b. screen savers c. authentication d. privacy filters

electronic medical record

what is an electronic version of a patients paper record? a. electronic health record b. electronic medical record c. practice management d. A and B

use eight or more characters and use a random combination of upper-and lowercase letters, numbers, and symbols

what makes a strong password? a. use a persons name b. use eight or more characters c. use a random combination of upper-and lowercase letters, numbers, and symbols d. B and C

security risk analysis

what means potential threats to the computer system security are identified, the likelihood of such occurrence is determined, and additional safeguards are implemented? a. firewalls b. security risk analysis c. authentication d. privacy filters

practice management

which is a type of software that allows the user to enter demographic information, schedule appointments, maintain lists of insurance payers, perform billing tasks, and generate reports? a. electronic health record b. electronic medical records c. practice management d. Microsoft word and excel

RAM

which is the computer memory used for loading and running programs? a. ROM b. RAM c. Cache d. Hard drive

anti-malware software

which software protects computers against viruses? a. database software b. presentation software c. anti-malware software d. spreadsheet software


Conjuntos de estudio relacionados

Chapter 4 - Business Entities - Fiduciary Duty, Shareholder Litigation, and the Business Judgment Rule

View Set

Bio Introductory Physiology 2021

View Set

Series 7 Exam : Municipal Securities

View Set

Apush Amsco Chapter 23 and 24 Extra Credit

View Set

Module 8, Week 1 Big Idea Words and Critical Vocabulary

View Set

chapter 10 different types mutual funds

View Set

hot ch70 - emergency, trauma, environmental injuries

View Set

Parallel and Perpendicular Lines (Point-Slope and Slope-Intercept)

View Set

Lecture - Chapter 14 - Cash Forecasting

View Set

Arithmetic and Geometric Sequences (Explicit Rule only)

View Set