Healthcare Informatics Exam 1
Servers
-Provides up a particular service (e.g. file server, database server). -Can be either a mainframe or a personal computer
off
0
on
1
byte
8 bits = 1 byte, every letter, number, or special character on the keyboard is represented by 1 byte
byte
8 bits used to represent a character on a keyboard
CPU/Microprocesso
As known as the Central Processing Unit, it is the heart and brains of the computer
Which of the following is associated with informatics theory?-A. Organizational interactions-B. Impact of technology on productivity-C. Data with some structure
C. Data with some structure
Which of the following allows you to choose a search engine? A. URL B. HTTP C. Web browser D. Home page
C. web browser
general systems theory
Change in one part of a system will reflect in other parts of the system. whole>sum of parts
Freeware
Closed source, with some restricted usage rights
Thin clients
Computer with no hard drive and limited software, often just providing a Graphical User Interface (GUI)
Which of the following would a nurse identify as a benefit of informatics to nursing?-A. Less data to review for quality control-B. More time to complete documentation-C. Less communication needed among providers-D. Easier retrieval of healthcare information
D. Easier retrieval of healthcare information
what did most early PCs use?
DOS operating system
chaos theory
Differences in outcomes depend on conditions at the starting point. if chaos in the beginning the outcome is chaos
Extranet
Extension of intranet with added security features
Nickel-cadmium and Nickel-metal hydride batteries
Heavy-Must be occasionally fully discharged to avoid decreasing usage time-Lose 15% of charge within 24 hours, even if not used. This is referred to as self-discharge
is informatics data oriented or process oriented?
Initially process oriented; now data oriented
permanent memory includes
Internal Hard Drive, usually referred to as "C:" in Windows Operating System, External hard drives, flash drives, optical disks
Mainframes
Large computers, serving many users at the same time, using a concept known as time slicing
involves freezing, moving, and refreezing.
Lewin's change theory
Read Only Memory (ROM)
Only read by computer•Used to store program that boots (starts) the computer. Basic Input/Output System (BIOS) non-volatile
Supercomputers
Powerful, used for intensive math computations (e.g weather forecasting, nuclear energy research)
Commercial
Proprietary software with copyright protection for which you must purchase a license to use. Generally comes with a code or serial number.
theory that involves societal and individual change.
Rogers' diffusion of innovation theory
Secondary (also known as "Permanent") memory
Secondary (also known as "Permanent") memory -Provides permanent storage; user chooses whether to retain or delete information / files
Shareware
Share with friends to try out, but must pay fee after trial period
Public domain
Software to be used with no copyright restrictions
cognitive science
Study of mind and intelligence and how information can be applied
Disk and data encryption
To ensure file security. Pro is that thieves will not be able to read; Con is that if you forget the password, you will not be able to view the file contents
True or false: Nursing Informatics is considered a subspecialty of Healthcare Informatics.
True
Lithium-Ion batteries
Typical life span is 3 years-Do not require frequent full discharges-Must have a protection circuit to shut off power when fully charged, to avoid overheating.
informatics
Use of information technology in healthcare.
Random Access Memory (RAM)
Volatile•Primary memory of the computer•Very fast, used to store data temporarily before it is stored to hard drive
Pharming
Web scam involving an attacker infiltrating a Domain Name Server and changing the routing address
Phishing
Web scam involving e-mail message with hyperlink to confirm account or some task that will reveal personal information
Computer malware
all forms of software designed specifically to damage or disrupt a system
Every computer connected to the Internet has
an IP address and assigned name
Informatics Specialist
based on domain knowledge and experience, drives the development of HIT systems
Aggregated Data
biosurveillance and improving public health
Memory
can be either volatile (lost when the power is turned off) or permanent/non-volatile (retains info when power is down)
informatics theory
data, information, knowledge, wisdom
true or false: Lewin's change theory involves societal and individual change.
false
true or false: Mainframes are small computers with no hard drive and limited software, often providing a Graphical User Interface (GUI).
false
true or false: Managed Care slowed down the adoption of electronic healthcare information systems.
false
true or false: Most early PCs used a Windows operating system.
false
true or false: One Drive is Google's solution for Cloud Storage.
false
true or false: Phishing involves a scam that attacks the Domain Name Server to change the routing address.
false
true or false: The focus of Healthcare Informatics is the computer, not the information that resides in it and the people who use it.
false
true or false: The inability to share and edit documents is a disadvantage of cloud computing.
false
true or false? Health informatics is a subspecialty under nursing informatics.
false
true or false? Only public domain software is copyrighted.
false
ONCHIT
federal government driving healthcare information standards
Early Adopters
group in roger's diffusion of innovations theory
LeapFrog Group
healthcare costs are a driver for healthcare informatics
Central Processing Unit
hearts and brains of a computer
Sociotechnical Theory
impact of technology's implementation on an organization
informatics focuses on:
information management, not computers.
File extension
instructs the computer which program to use to open the file. As an example, if full filename is "resume.doc", then "doc" is the extension and tells the computer to open file with Microsoft Word
Motherboard
main circuit board, connecting all components
Botnets
networks of computers that have been hijacked by a malware virus or worm
Adware
not usually malicious
ANA
organization championing healthcare informatics for nurses
Intranet
private network using HTML-formatted documents and TCP/IP protocols; cost-effective way to share information within agencies
Open source
software code available, with the idea that programmers will make improvements to code that everyone will benefit from
flash drive
storage device that plugs into a USB port
informatics is based on what
theories
Spyware
tracks Web surfing; some adware is spyware
true or false: Cloud computing requires access to the Internet.
true
true or false: Cloud computing requires access to the internet.
true
true or false: Ensuring Patient Safety is one of the key drivers for Healthcare Informatics.
true
true or false: Healthcare Professionals need to demonstrate computer fluency in order to be successful in today's healthcare delivery environment.
true
true or false: Software piracy is a felony.
true
true or false: The results for sharing information on social media regarding your helathcare practice are ethically and legally serious .
true