Healthcare Informatics Exam 1

¡Supera tus tareas y exámenes ahora con Quizwiz!

Servers

-Provides up a particular service (e.g. file server, database server). -Can be either a mainframe or a personal computer

off

0

on

1

byte

8 bits = 1 byte, every letter, number, or special character on the keyboard is represented by 1 byte

byte

8 bits used to represent a character on a keyboard

CPU/Microprocesso

As known as the Central Processing Unit, it is the heart and brains of the computer

Which of the following is associated with informatics theory?-A. Organizational interactions-B. Impact of technology on productivity-C. Data with some structure

C. Data with some structure

Which of the following allows you to choose a search engine? A. URL B. HTTP C. Web browser D. Home page

C. web browser

general systems theory

Change in one part of a system will reflect in other parts of the system. whole>sum of parts

Freeware

Closed source, with some restricted usage rights

Thin clients

Computer with no hard drive and limited software, often just providing a Graphical User Interface (GUI)

Which of the following would a nurse identify as a benefit of informatics to nursing?-A. Less data to review for quality control-B. More time to complete documentation-C. Less communication needed among providers-D. Easier retrieval of healthcare information

D. Easier retrieval of healthcare information

what did most early PCs use?

DOS operating system

chaos theory

Differences in outcomes depend on conditions at the starting point. if chaos in the beginning the outcome is chaos

Extranet

Extension of intranet with added security features

Nickel-cadmium and Nickel-metal hydride batteries

Heavy-Must be occasionally fully discharged to avoid decreasing usage time-Lose 15% of charge within 24 hours, even if not used. This is referred to as self-discharge

is informatics data oriented or process oriented?

Initially process oriented; now data oriented

permanent memory includes

Internal Hard Drive, usually referred to as "C:" in Windows Operating System, External hard drives, flash drives, optical disks

Mainframes

Large computers, serving many users at the same time, using a concept known as time slicing

involves freezing, moving, and refreezing.

Lewin's change theory

Read Only Memory (ROM)

Only read by computer•Used to store program that boots (starts) the computer. Basic Input/Output System (BIOS) non-volatile

Supercomputers

Powerful, used for intensive math computations (e.g weather forecasting, nuclear energy research)

Commercial

Proprietary software with copyright protection for which you must purchase a license to use. Generally comes with a code or serial number.

theory that involves societal and individual change.

Rogers' diffusion of innovation theory

Secondary (also known as "Permanent") memory

Secondary (also known as "Permanent") memory -Provides permanent storage; user chooses whether to retain or delete information / files

Shareware

Share with friends to try out, but must pay fee after trial period

Public domain

Software to be used with no copyright restrictions

cognitive science

Study of mind and intelligence and how information can be applied

Disk and data encryption

To ensure file security. Pro is that thieves will not be able to read; Con is that if you forget the password, you will not be able to view the file contents

True or false: Nursing Informatics is considered a subspecialty of Healthcare Informatics.

True

Lithium-Ion batteries

Typical life span is 3 years-Do not require frequent full discharges-Must have a protection circuit to shut off power when fully charged, to avoid overheating.

informatics

Use of information technology in healthcare.

Random Access Memory (RAM)

Volatile•Primary memory of the computer•Very fast, used to store data temporarily before it is stored to hard drive

Pharming

Web scam involving an attacker infiltrating a Domain Name Server and changing the routing address

Phishing

Web scam involving e-mail message with hyperlink to confirm account or some task that will reveal personal information

Computer malware

all forms of software designed specifically to damage or disrupt a system

Every computer connected to the Internet has

an IP address and assigned name

Informatics Specialist

based on domain knowledge and experience, drives the development of HIT systems

Aggregated Data

biosurveillance and improving public health

Memory

can be either volatile (lost when the power is turned off) or permanent/non-volatile (retains info when power is down)

informatics theory

data, information, knowledge, wisdom

true or false: Lewin's change theory involves societal and individual change.

false

true or false: Mainframes are small computers with no hard drive and limited software, often providing a Graphical User Interface (GUI).

false

true or false: Managed Care slowed down the adoption of electronic healthcare information systems.

false

true or false: Most early PCs used a Windows operating system.

false

true or false: One Drive is Google's solution for Cloud Storage.

false

true or false: Phishing involves a scam that attacks the Domain Name Server to change the routing address.

false

true or false: The focus of Healthcare Informatics is the computer, not the information that resides in it and the people who use it.

false

true or false: The inability to share and edit documents is a disadvantage of cloud computing.

false

true or false? Health informatics is a subspecialty under nursing informatics.

false

true or false? Only public domain software is copyrighted.

false

ONCHIT

federal government driving healthcare information standards

Early Adopters

group in roger's diffusion of innovations theory

LeapFrog Group

healthcare costs are a driver for healthcare informatics

Central Processing Unit

hearts and brains of a computer

Sociotechnical Theory

impact of technology's implementation on an organization

informatics focuses on:

information management, not computers.

File extension

instructs the computer which program to use to open the file. As an example, if full filename is "resume.doc", then "doc" is the extension and tells the computer to open file with Microsoft Word

Motherboard

main circuit board, connecting all components

Botnets

networks of computers that have been hijacked by a malware virus or worm

Adware

not usually malicious

ANA

organization championing healthcare informatics for nurses

Intranet

private network using HTML-formatted documents and TCP/IP protocols; cost-effective way to share information within agencies

Open source

software code available, with the idea that programmers will make improvements to code that everyone will benefit from

flash drive

storage device that plugs into a USB port

informatics is based on what

theories

Spyware

tracks Web surfing; some adware is spyware

true or false: Cloud computing requires access to the Internet.

true

true or false: Cloud computing requires access to the internet.

true

true or false: Ensuring Patient Safety is one of the key drivers for Healthcare Informatics.

true

true or false: Healthcare Professionals need to demonstrate computer fluency in order to be successful in today's healthcare delivery environment.

true

true or false: Software piracy is a felony.

true

true or false: The results for sharing information on social media regarding your helathcare practice are ethically and legally serious .

true


Conjuntos de estudio relacionados

Med-Surg: Musculoskeletal disorders

View Set

59 YIELD-BASED BOND DURATION MEASURES AND PROPERTIES

View Set

history - final review: semester two

View Set

Abeka 7th Grade History Quiz 18 Sections 16.1-16.2

View Set

OCEA 101 [CH. 1: The Water Planet]

View Set

Wordly Wise - 7th Grade - Lesson 8

View Set

ULL Cultural Anthropology 201 Test 1

View Set

PD test 1 (chapters 1, 3, and 6)

View Set

unit 1-number system and rationals

View Set