HIT Implementation Support Specialist
Which statement is NOT true of an HIE? A) "HIE" stands for Health Improvement Enterprise. B) It maintains the meaning of healthcare information as it moves between disparate systems. C) It can be used for integration between EHRs. D) It can be set up privately or regionally.
A) "HIE" stands for Health Improvement Enterprise.
In 1995 it is estimated that ____ people were using the Internet. A) 16,000,000 B) 1,800,000,000 C) 18,000,000 D) 1,600,000,000
A) 16,000,000
The WWW was created in ____ by Dr. Tim Berners-Lee and others with the introduction of the Web browser and Web page coding. A) 1989 B) 1969 C) 1940 D) 1995
A) 1989
In the binary number "01011010", the rightmost value of "0" is a placeholder for ____. A) 2^0 B) 2^1 C) 2^2 D) 2^7
A) 2^0
The global standard governing wireless technologies is the ____ standard. A) 802.11 B) 568-A C) UTE D) 802.3
A) 802.11
Project Management can be defined as: A) A carefully planned and organized effort to accomplish a specific, usually one-time, objective. B) A way of handling introducing project status to upper management C) Software D) Hardware
A) A carefully planned and organized effort to accomplish a specific, usually one-time, objective.
Mac OS is an example of _______. A) A machine-based or independent Operating system B) Mobile-based or embedded operating system C) Server-based operating system D) Personal efficiency software
A) A machine-based or independent Operating system
From the choices below, select the best definition of a cloud computing. A) A model for enabling convenient, on-demand network access to a shared pool of configurable computing resources B) Access to systems remote from a user C) A model that allows a physical system that permits a single physical system to appear to contain multiple systems. D) A model that permits multiple physical systems to appear to be a single system.
A) A model for enabling convenient, on-demand network access to a shared pool of configurable computing resources.
What is a PET scan? A) A nuclear medicine imaging device that produces a 3-D image. B) An x-ray, using specialized equipment, that takes cross-sectional pictures of the body. C) A device that creates an image based on sound waves. D) Magnetic imaging equipment that uses a radio frequency pulse to create an image.
A) A nuclear medicine imaging device that produces a 3-D image.
Who is a stakeholder? A) A person with an interest in the information system. B) The person who pays for the information system. C) The person who develops the information system. D) The person who makes all the design decisions for the information system.
A) A person with an interest in the information system.
A candidate key is . . . A) A well-known attribute value that uniquely determines a row in a table. B) An automatically generated numeric value that uniquely determines a row of a table. C) A unique key from another table. D) A key that doesn't belong in the table where it appears.
A) A well-known attribute value that uniquely determines a row in a table.
A natural key is . . . A) A well-known attribute value that uniquely determines a row in a table. B) An automatically generated numeric value that uniquely determines a row of a table. C) A unique key from another tab D) A key that not the primary key.
A) A well-known attribute value that uniquely determines a row in a table.
A natural key is . . . A) A well-known attribute value that uniquely determines a row in a table. B) An automatically generated numeric value that uniquely determines a row of a table. C) A unique key from another table. D) A key that not the primary key.
A) A well-known attribute value that uniquely determines a row in a table.
Total cost of ownership includes A) Acquisition costs, ongoing support costs, and maintenance costs B) Opportunity costs C) Acquisition costs only D) Economic feasibility
A) Acquisition costs, ongoing support costs, and maintenance costs
What is required for a device to communicate over the Internet? A) An IP address and subnet mask. B) A Web browser. C) A Web server. D) An IP address only.
A) An IP address and subnet mask.
________ protect(s) a computer by locating and stopping programs attempting to harm computer operation. A) Antivirus software B) Firewalls C) Routers D) Spyware
A) Antivirus software
______ deliver a software application or access to an application over the Internet on a subscription basis. A) Application service providers B) Internet business services C) Offshore outsourcing D) Internet protocols
A) Application service providers
List the correct order of the OSI model layers, from top (7) to bottom (1). A) Application, Presentation, Session, Transport, Network, Data Link, Physical. B) Application, Presentation, Session, Network, Transport, Data Link, Physical. C) Application, Presentation, Session, Transport, Network, Physical, Data Link. D) Presentation, Application, Session, Transport, Data Link, Physical, Network.
A) Application, Presentation, Session, Transport, Network, Data Link, Physical.
List the correct order of the OSI model layers, from top (7) to bottom (1). A) Application, Presentation, Session, Transport, Network, Data Link, Physical. B) Application, Presentation, Session, Network, Transport, Data Link, Physical. C) Application, Presentation, Session, Transport, Network, Physical, Data Link. D) Presentation, Application, Session, Transport, Data Link, Physical, Network.
A) Application, Presentation, Session, Transport, Network, Data Link, Physical.
Which is NOT a reason why the SDLC is important for EHR systems? A) Because poorly designed software has not yet been linked to security risks. B) The Need for user satisfaction and high quality C) In-house development or integration of an EHR D) Because failure to plan adequately for software integration can limit efficiency and be costly in project over-runs and lost productivity
A) Because poorly designed software has not yet been linked to security risks.
Preventative maintenance involves work that is done ______ a potential problem affects the information system. A) Before B) After C) During D) When
A) Before
Identify the condition that results in the muscles on one side of the face being temporarily paralyzed causing the inability to close the eye and the drooping of one side of the mouth. A) Bell's Palsy B) peripheral neuropathy C) neurofibromatosis D) carpal tunnel syndrome
A) Bell's Palsy
Which of the following are important factors to consider when selecting a computer? Select all that apply. A) Budget B) Storage needs C) Application requirements D) Type of user E) Mobility needs
A) Budget B) Storage needs C) Application requirements D) Type of user E) Mobility needs
The ________________ programming language is an example of a compiled language. A) C B) PHP C) Perl D) Javascript
A) C
A ________ interface is one where the user types in all the commands. A) Command line B) Graphical User C) BIOS D) Windows
A) Command line
A statement that jumps to another module with a string attached that demands execution be returned to the branch-from module after execution of the branched-to module is completed illustrates what kind of branching? A) Conditional branching B) Unconditional branching C) Modular structure branching D) Blind branching
A) Conditional branching
Which form of branching is conducive to structured design? A) Conditional branching B) Unconditional branching C) Modular structure branching D) Blind branching
A) Conditional branching
A programming logic construct that executes code over and over again while or until a certain condition test is satisfied is known by all but which of the following? A) Continue B) Repetition C) Iteration D) Looping
A) Continue
_______ maintenance diagnoses and fixes errors in an operational system. A) Corrective B) Adaptive C) Perfective D) Preventive
A) Corrective
Which is NOT true of HL7? A) Creates communication standards for use only in American healthcare applications. B) Promotes open system architecture. C) Created a structured, message-oriented framework for communication between healthcare applications. D) Created a messaging standard that uses segment headers and delimiters to communicate information.
A) Creates communication standards for use only in American healthcare applications.
Which of the following are example(s) of personal computers? Select all that apply. A) Desktop B) Supercomputer C) Laptop D) Smartphone
A) Desktop C) Laptop D) Smartphone
A domain name is an identification label that defines a realm of administrative autonomy, authority, or control on the Internet, based on the _____. A) Domain Name System B) IEEE 802.3 standard C) Whitehouse D) ICANN
A) Domain Name System
A domain name is an identification label that defines a realm of administrative autonomy, authority, or control on the Internet, based on the _____. A) Domain Name System B) IEEE 802.3 standard C) Whitehouse D) ICANN
A) Domain Name System
Which of the following is involved in data modeling? A) ER-diagram B) SQL C) Implementing the database D) Maintaining the database
A) ER-diagram
Which of the following is involved in data modeling? A) ER-diagram B) SQL C) Implementing the database D) Maintaining the database
A) ER-diagram
___________________ provides information hiding in Object Oriented Programming. A) Encapsulation B) Inheritance C) Polymorphism D) Expressions
A) Encapsulation
The IEEE 802.3 standard governs ____ technologies. A) Ethernet B) Wi-Fi C) Bluetooth D) WiMAX
A) Ethernet
The IEEE 802.3 standard governs ____ technologies. A) Ethernet B) Wi-Fi C) Bluetooth D) WiMAX
A) Ethernet
Which is NOT a reason why integration is an important consideration when installing an EHR? A) Existing systems can usually share data with newer systems without additional programming or configuration. B) Many existing systems are too expensive to replace. C) Many different isolated systems currently exist within healthcare infrastructures. D) Many existing systems are tailored to meet specific departmental needs and not easily duplicated.
A) Existing systems can usually share data with newer systems without additional programming or configuration.
The file _______ identifies the file type. A) Extension B) Name C) Size D) Permissions
A) Extension
___________ is an example of a third generation programming language. A) FORTRAN B) SQL C) Machine code D) Assembly language
A) FORTRAN
Windows VSS is an example of: A) Fault tolerance B) Backup C) System decommissioning D) Antivirus protection
A) Fault tolerance
This type of backup allows a complete system restore with just one source: A) Full backup B) Incremental backup C) Differential backup D) Synthetic full backup
A) Full backup
Protocols such as _____ allow any browser to talk to any Web server. A) HTTP B) SMTP C) FTP D) POP3
A) HTTP
Protocols such as _____ allow any browser to talk to any Web server. A) HTTP B) SMTP C) FTP D) POP3
A) HTTP
An example of health promotion is: A) Hand washing B) Taking nutritional supplements C) Eating fast food D) Smoking cigarettes
A) Hand washing
What does HL7 stand for? A) Health Level 7 B) High Load 7 C) EHR Code of ethics guaranteeing safety
A) Health Level 7
An example of a one-to-many relationship is which of the following? A) Insured to dependents B) Patient to Hospital wrist band ID C) Patient to Insurance Co D) Hospital medical procedure to patient
A) Insured to dependents
An example of a one-to-many relationship is which of the following? A) Insured to dependents B) Patient to Hospital wrist band ID C) Patient to Insurance Co D) Hospital medical procedure to patient
A) Insured to dependents
What is one suggestion to consider when forming a EHR selection committee? A) Invite "movers and shakers" onboard in the decision-making process. B) Invite patients on your committee. C) Exclude as many top administrators as possible since their skill set with regards to EHR systems is often too limited. D) Be sure to limit physician input only to relevant topics such as workflow.
A) Invite "movers and shakers" onboard in the decision-making process.
Which of the following is true about a standardized healthcare language? A) It facilitates the measure of patient outcomes. B) It inhibits the linking of diagnoses. C) It hinders research. D) It interferes with education and practice.
A) It facilitates the measure of patient outcomes.
Which of the following is NOT an advantage that a database has over other forms of storage? A) It is able to store repetitive data. B) Only key data is repetitively stored. C) Security is enhanced. D) Conflicting data occurs less often
A) It is able to store repetitive data.
A _____ is a network with a small geographical area of coverage. A) LAN B) WAN C) MAN D) TAN
A) LAN
A _____ is a network with a small geographical area of coverage. A) LAN B) WAN C) MAN D) TAN
A) LAN
____________ are control structures that allow code to repeat. A) Loops B) If statements C) Assignments D) Objects
A) Loops
Which of the following operating systems support the NTFS file system? Select all that apply. A) Microsoft Windows Vista B) Microsoft Windows 7 C) Microsoft Windows XP D) Microsoft Windows 95
A) Microsoft Windows Vista B) Microsoft Windows 7 C) Microsoft Windows XP
A(n) ________ is an abstraction of a problem. A) Model B) Domain C) Object D) Attribute
A) Model
Examples of Boolean operators include the terms ____. A) NOT, AND, OR B) NOT, AND, * C) AND, OR, CATCH D) OR, TRY, NOT
A) NOT, AND, OR
_________ permissions are set so that users have the ability to view, make changes to, or delete files in a folder. A) NTFS B) Network C) LAN D) Sharing
A) NTFS
A surrogate key is most similar to which of the following? A) Natural key B) Foreign key C) Candidate key D) Door key
A) Natural key
A form of a programming logic construct that only evaluates a conditional test based on the results of a prior conditional test is called which of the following? A) Nested alternation B) Simple alternation C) Case structure alternation D) Compound alternation
A) Nested alternation
What is the most important software that runs on your computer? A) Operating System B) Word processor C) Spreadsheet D) Browser
A) Operating System
Which of the following, according to the IOM, is a software element of an EHR? A) Patient support B) Software C) Hardware
A) Patient support
Which of the following are examples of "programs" used before computers? Select all possible examples. A) Player piano scrolls B) Jacquard looms punched cards C) Blueprints D) Files
A) Player piano scrolls B) Jacquard looms punched cards
A form of a programming logic construct that potentially executes code multiple times, but also may not execute the code at all is called which of the following? A) Pre-test loop B) Post-test loop C) Endless loop D) Periodic
A) Pre-test loop
What is the preferred method to use when closing a suspicious Web site popup window? A) Press Alt + F4 B) Click to close the popup window C) Shut down the computer D) Close all browser windows
A) Press Alt + F4
Attributes must depend on the ____of the entity to which they belong. A) Primary key B) Foreign key C) Relationship D) Domain
A) Primary key
Relationships in the database are carried out with the use of which of the following? A) Primary key to foreign key matches. B) Surrogate key to natural key matches. C) Foreign key to foreign key matches. D) Primary key to primary key matches.
A) Primary key to foreign key matches.
Relationships in the database are carried out with the use of which of the following? A) Primary key to foreign key matches. B) Surrogate key to natural key matches. C) Foreign key to foreign key matches. D) Primary key to primary key matches.
A) Primary key to foreign key matches.
Which of the following can be considered modules in programming? Select all that apply. A) Procedures B) Functions C) Methods D) Objects
A) Procedures B) Functions C) Methods D) Objects
Where can you find up to date information about current computing systems? Select all that apply. A) Recent online reviews B) Current issues of computer magazines C) Year-old issues of computer magazines D) Books published more than a year ago
A) Recent online reviews B) Current issues of computer magazines
What are three things to consider when purchasing an EHR server? A) Reliability, performance, scalability B) Size of the unit, performance, power consumption C) Client-Server, Service Requester, client requests
A) Reliability, performance, scalability
Which is NOT commonly considered a phase of the SDLC? A) Requisition phase B) Requirements analysis phase C) Concept development phase D) Operations and maintenance phase E) Testing phase
A) Requisition phase
The user acceptance testing phase of a project usually occurs immediately before: A) Rollout. B) Project description. C) System backup. D) Project sign-off.
A) Rollout.
A tuple is a synonym in database terminology for which of the following? A) Row B) File C) Column D) Attribute
A) Row
A tuple is a synonym in database terminology for which of the following? A) Row B) File C) Column D) Attribute
A) Row
Which of the following are examples of file utilities? Select all that apply. A) Search B) File compression C) Backup D) Read
A) Search B) File compression C) Backup
A programming logic construct that executes code one statement after the other as they are written in the program is called _____________. A) Sequence B) Concurrency C) Alternation D) Iteration
A) Sequence
Primary keys are most efficient for data retrieval when they are which of the following? A) Short and numeric B) Shared primary keys C) Composite D) Multi-valued
A) Short and numeric
Primary keys are most efficient for data retrieval when they are which of the following? A) Short and numeric B) Shared primary keys C) Composite D) Multi-valued
A) Short and numeric
Which is NOT an important tool for data security? A) Solid-state drive B) Firewall C) Encryption D) Virtual Private Network (VPN) E) Strong passwords
A) Solid-state drive
Which of the following supports the development of electronic health records across the lifespan? A) Standardized healthcare languages B) One type of hardware C) One type of software D) One data repository
A) Standardized healthcare languages
What was the first use of electronic medical records? A) Storing dental records B) Automating antibiotic ordering C) Implementing Computerized Physician Order Entry D) None of the above
A) Storing dental records
_____ forward traffic to devices in their network only, based on MAC addressing. A) Switches B) Routers C) NICs D) Either A or B
A) Switches
_____ forward traffic to devices in their network only, based on MAC addressing. A) Switches B) Routers C) NICs D) Either A or B
A) Switches
There are two types of software: application and _________ software. A) System B) Multimedia C) Process D) Utility
A) System
Hardware can be defined as: A) The physical components that make things work. B) Data needed to tell the computer what to do and how to behave. C) Fast, low cost PC systems that permeate the workplace often less than $500 each. D) A computer designed to efficiently run server applications.
A) The physical components that make things work.
Which of the following best describes a subquery? A) The projection of one query is passed as input to another query. B) The values in one table are combined with the values in another table. C) All of the data from one table is projected. D) None of the data from any tables are projected.
A) The projection of one query is passed as input to another query.
A computer program that is compiled must be compiled separately for each different computer. A) True B) False
A) True
Algorithms are a sequence of steps that describe how a task is performed. A) True B) False
A) True
Assembly language is unique to a particular type of computer. A) True B) False
A) True
Business practices may have to be modified for, and workflow often has to be adapted to, the particular design of the COTS product. A) True B) False
A) True
Business practices may have to be modified for, and workflow often has to be adapted to, the particular design of the COTS product. A) True B) False
A) True
Encapsulation and modularity are important features of Object Oriented Programming. A) True B) False
A) True
End user testing is best suited for less-experienced staff and should represent a cross-section of the end-user environment. A) True B) False
A) True
Folders and directories are logically the same thing. A) True B) False
A) True
HIPAA requires protection not only of information that explicitly links to the patient (e.g., social security number), but also of information that could reasonably be used to identify the patient (e.g., ZIP code). A) True B) False
A) True
In expression evaluation, multiplication has higher precedence than subtraction. A) True B) False
A) True
In transaction processing changes to the database can be retracted before the end of the transaction is reached (true or false). A) true B) false
A) True
Java uses a hybrid approach of compiling and interpreting. A) True B) False
A) True
LISP is a programming language that follows the functional paradigm. A) True B) False
A) True
MIIS is a language that was developed for healthcare applications. A) True B) False
A) True
Maintenance requests are formalized processes to document and fix problems. A) True B) False
A) True
Python is an example of an Object Oriented Programming language. A) True B) False
A) True
SQL is used to create a database (True or False). A) True B) False
A) True
SQL is used to create relationships (True or False). A) True B) False
A) True
SQL is used to create tables (True or False). A) True B) False
A) True
SQL is used to create tables. A) true B) false
A) True
Server applications and client applications can exist on the same physical device. A) True B) False
A) True
Software testers perform actions that may cause software to malfunction. A) True B) False
A) True
System designers develop the database, software and interface designs. A) True B) False
A) True
The device driver for your printer will need to be updated when you do a major upgrade of your operating system. A) True B) False
A) True
The equal sign is the assignment operator in Java. A) True B) False
A) True
The execution of tests should be automated as much as possible. A) True B) False
A) True
The main objective of the systems analysis phase is to build a logical model of the information system. A) True B) False
A) True
The most important software on your computer is the operating system. A) True B) False
A) True
Typically, instance variables are declared to be private. A) True B) False
A) True
UML is an example of a design tool for Object Oriented Programs. A) True B) False
A) True
Today's computers connect the mouse and keyboard via a(n) ____ slot. A) USB B) IDE C) SATA D) PS/2
A) USB
The Veteran's Administration open source EHR is the ____ system. A) VistA B) VA Patient C) MUMPS D) HIPAA
A) VistA
HTML is a(n) ____. A) Web page programming language B) Web page C) IP addressing scheme D) Internet protocol used to communicate with Web servers
A) Web page programming language
The requirements analysis phase of the SDLC can involve all but the following. A) Writing programming code B) Talking to users C) Examining a report D) Analysis of a form
A) Writing programming code
When would you need a new device driver? Select all of the following that are reasons you'd need a new driver. A) You install a new printer. B) You do a major upgrade of your OS. C) You buy a new computer. D) Your driver was corrupted.
A) You install a new printer. B) You do a major upgrade of your OS. C) You buy a new computer. D) Your driver was corrupted.
A module with strong cohesive code with loose coupling is a candidate to become ____________? A) a method of an object B) an independent module C) a module within the application code D) A restricted use module
A) a method of an object
HIPAA requires that health care providers, insurance companies, and employers ____. A) abide by privacy and security standards B) provide employers with medical information required to make hiring decisions C) store medical records in electronic formats D) Both A and C
A) abide by privacy and security standards
Which is NOT a function of the skin? A) temperature regulation B) protection agains pathogens C) absorb nutrients D) housing sensory receptors
A) absorb nutrients
What is the condition that results when adults have too much growth hormone present? A) acromegaly B) diabetes insipidus C) dwarfism D) hyperthyroidism
A) acromegaly
"An electronic record of patient health information containing care received in all health facilities" is the definition of A) an Electronic Health Record. B) an Electronic Medical Record. C) a Computer Based Patient Record. D) a Healthcare Information Record.
A) an Electronic Health Record
Repetitive data can be stored in a(n) ________. A) array B) repository C) assemblage D) order
A) array
Clinical decision support systems are designed to A) assist the clinician in making decisions. B) provide guidelines that must be adhered to. C) remove the clinician from the decision making process. D) replace clinicians with robotic care providers.
A) assist the clinician in making decisions.
In the final design which element of the ER-diagram a name for a piece of data in the database? A) attribute B) relationship C) entity D) domain
A) attribute
Identify the condition that occurs when the prostate gland become enlarged with age and obstructs the flow of urine. A) benign prostatic hypertrophy B) prostatitis C) balanitis D) erectile dysfunction
A) benign prostatic hypertrophy
Machine code is a _______ language. A) binary B) legacy C) scripting D) object oriented
A) binary
A neighbor becomes aware of a medical condition you have been privately batlling for the past six months. The neighbor says that if you do not pay her $5,000, she will use a pay phone to disclose this information to your father. This is an example of _________. A) blackmail B) compromised data C) identify theft D) Impersonation
A) blackmail
The consequences of an error in a health care application _____________. A) can result in loss of life B) is comparable to other industries C) is negligible because it can always be done over D) may make it necessary to work overtime
A) can result in loss of life
Identify the largest part of the brain that is divided into two major hemispheres. A) cerebrum B) cerebellum C) ventricles D) hypothalamus
A) cerebrum
A name of a relationship is used for what purpose? A) clarify the relationship B) is used in programs that access the database. C) becomes code that implements the relationship in the database. D) indicate minimum and maximum cardinality of the relationship.
A) clarify the relationship
In object oriented programming the design of something that a user wants to keep track of is called a _________. A) class B) object C) module D) subtask
A) class
The number of minutes in a day (24 hour period) is a good candidate for being declared as a _______? A) constant B) literal C) variable D) secondary data
A) constant
Which of the following is an inherited disease of the mucus and sweat glands? A) cystic fibrosis B) chronic obstructive pulmonary disease C) primary pulmonary hypertension D) bronchitis
A) cystic fibrosis
Which is NOT a function of the digestive system? A) distribute nutrients B) digest food C) absorb nutrients D) eliminate solid waste
A) distribute nutrients
A _____ IP address can change when you reboot your ISP device. A) dynamic B) static C) DNS D) public
A) dynamic
A _____ IP address can change when you reboot your ISP device. A) dynamic B) static C) DNS D) public
A) dynamic
The main function of a computer is to ____. A) execute instructions B) answer human questions C) service the CPU D) create input signals
A) execute instructions
Virtual computing requires a A) hypervisor B) supervisor C) cloud computing environment D) distributed computing environment
A) hypervisor
Macro viruses usually infect Microsoft Office files and ________. A) install themselves when users click files B) delete all hard disk files on a specified date C) install themselves when the computer reboots D) none of the above
A) install themselves when users click files
Which of the following activities supports global healthcare networking? A) interoperable clinical information systems B) one type of hardware C) one type of software D) one type of Internet provider
A) interoperable clinical information systems
Identify the bean-shaped organs located near the middle of back whose functions include but are not limited to the removal of waste products and extra water from the body, regulation of the acid-base balance, and the regulation of pressure. A) kidneys B) ureters C) urethra D) urinary bladder
A) kidneys
An infinite loop is what type of error? A) logic B) missing keyword C) misspelled word D) syntax
A) logic
Which type of error may require a programmer to redo their pseudocode solution? A) logic B) missing keyword C) misspelled word D) syntax
A) logic
Second normal form of the Normalization process involves which of the following? A) making sure that data within a row when deleted will not eliminate data that will be needed later. B) Columns of data are uniquely named and contain only one piece of data. C) Eliminating transitive dependencies D) Making sure that every determinant is a candidate key
A) making sure that data within a row when deleted will not eliminate data that will be needed later.
The things that an object can do are referred to as ________. A) methods B) attributes C) variables D) modules
A) methods
Which type of tissue is designed to produce body movement? A) muscular B) connective C) epithelial D) nervous
A) muscular
Which of the following is a word root? A) nephr B) nephro C) nephros D) tomy
A) nephr
RAM is installed ____. A) on the motherboard B) in PCI slots C) within the CPU D) in SATA slots
A) on the motherboard
A ______ is a free protocol analyzer software tool that can display unencrypted network traffic on a monitor screen. A) packet sniffer B) malware analyzer C) spyware tracer D) server
A) packet sniffer
Privacy is to _______ as confidentiality is to _______. A) people; data B) security; blackmail C) blackmail; security D) data; people
A) people; data
Microsoft Word, running on a computer, is an example of a(n) ____. A) process B) service C) thread D) event
A) process
An infection of the prostate gland, usually caused by bacteria is: A) prostatitis B) benigh prostatic hypertrophy C) balanitis D) chlamydia
A) prostatitis
A _____ operates at Layer 3 of the OSI model. A) router B) switch C) Web protocol D) network cable
A) router
A syntax error is most like a ___________. A) run on sentence B) standing in two lines at once C) loop process that has no way to end D) improper sequence of events
A) run on sentence
Hard disk storage is known as ____ storage. A) secondary B) volatile C) nonvolatile D) primary
A) secondary
A complex password should include at least ____ characters. A) six B) nine C) five D) eleven
A) six
Unconditional branching is used in ____________. A) spaghetti code B) structured code C) top down design D) mandatory code
A) spaghetti code
A complex password contains at least 6 characters, made up of at least: 1-upper case, 1-lower case, 1-number, and 1-_______ character. A) special B) numeric C) typed D) authorized
A) special
Which directional term means more toward the head or above another structure? A) superior B) medial C) ventral D) caudal
A) superior
Sperm cells are produced in which of the following male reproductive organs? A) testes B) prostate gland C) seminal vesicles D) penis
A) testes
Functional Requirements can best be defined as: A) those processes that you want a system to perform. B) the attributes of the system as a whole or its environment. C) the requirements needed for the hardware to function.
A) those processes that you want a system to perform.
Identify the disorder of the ear that results in a ringing or roaring in your ears which may be caused by hearing loss or exposure to loud noise over a long period of time. A) tinnitus B) acoustic neuroma C) ear wax build up D) otitis media
A) tinnitus
Identify the thin partition located between the external auditory canal and the middle ear: A) tympanic membrane B) cochlea C) auricle D) malleus
A) tympanic membrane
Identify the major female organ that provides the nutritional and protective support for the fetus during development. A) uterus B) vagina C) ovary D) fallopian tubes
A) uterus
From the list provided below, select a valid URL. A) www.whitehouse.gov B) www.google/com C) ww.nih.gov D) [email protected]
A) www.whitehouse.gov
Select all of the following that are part of a test plan. A) Testing deliverables B) Testing goals C) What to do when a test fails D) Maintenance
A, B, C) Testing deliverables, Testing goals, What to do when a test fails
Select all of the following that are a type of software test. A) Usability B) Fire C) Smoke D) Load
A, C, D) Usability, Smoke, Load
In transaction processing changes to the database can be retracted before the end of the transaction is reached. A. True B. False
A. True
1024 bytes x 1024 x 1024 = ____. A) 1 KB B) 1 GB C) 1 TB D) 1,024 KB
B) 1 GB
HITECH requires healthcare institutions to switch to some sort of EHR system by this year to avoid financial penalties: A) 2013 B) 2015 C) 2020 D) 2025
B) 2015
HITECH requires healthcare institutions to switch to some sort of EHR system by this year to avoid financial penalties: A) 2013 B) 2015 C) 2020 D) 2025
B) 2015
Life expectancy at birth in 2007 was approximately A) 76 years. B) 78 years. C) 80 years. D) 82 years.
B) 78 years
What is a use case? A) Background information including organization size and specialty and current systems and hardware in place. B) A technique for documenting the potential requirements of a new system or any type of system change. C) The defined learning curve for users/ administrators. D) Both A and C
B) A technique for documenting the potential requirements of a new system or any type of system change.
The data model is best described as which of the following? A) The database design. B) A volatile diagram that through specification gathering and normalization processes eventually matures into the database design. C) A fixed model from which the database is implemented. D) A diagram that represents only one view of the database.
B) A volatile diagram that through specification gathering and normalization processes eventually matures into the database design.
A surrogate key is . . . A) A well-known attribute value that uniquely determines a row in a table. B) An automatically generated numeric value that uniquely determines a row of a table. C) A unique key from another table. D) A key that not the primary key.
B) An automatically generated numeric value that uniquely determines a row of a table.
Systems performance is measured with ________. A) Fault management B) Benchmark testing C) System faults D) Capacity planning
B) Benchmark testing
A programming logic construct that may either do something or not based on a conditional test is known by all but which of the following? A) Selection B) Choice C) If-Then-Else D) Alternation
B) Choice
Most EHR systems today are based on what kind of computer model? A) Hardware-software B) Client-server C) Hosted
B) Client-server
An attribute is a synonym in database terminology for which of the following? A) Table B) Column C) Record D) Row
B) Column
An attribute is a synonym in database terminology for which of the following? A) Table B) Column C) Record D) Row
B) Column
Which of the following is a translation process that translates an entire program and creates an executable module? A) Sequential B) Compiler C) Interpreter D) Structured execution
B) Compiler
Attributes that contain more than one piece of data such as Address are called . . A) Multi-valued B) Composite C) An unbound domain D) Unspecific
B) Composite
Attributes that contain more than one piece of data such as Address are called . . . A) Multi-valued B) Composite C) An unbound domain D) Unspecific
B) Composite
Which is NOT an important step in creating a testing strategy? A) Identify testing environment. B) Create test scenarios and scripts. C) Identify participants. D) Identify required equipment.
B) Create test scenarios and scripts.
The ____ monitor port replaces the VGA port in today's computer systems. A) HDMI B) DVI C) AGP D) PS/2
B) DVI
A ________ shows how data moves through an information system. A) Data dictionary B) Data flow diagram C) Data element D) Data field
B) Data flow diagram
From the choices below, select the best definition of a network. A) A collection of printers with no media. B) Devices interconnected by some common communication channel. C) A device that sends communication to the Internet. D) A shared folder stored on a server.
B) Devices interconnected by some common communication channel.
From the choices below, select the best definition of a network. A) A collection of printers with no media. B) Devices interconnected by some common communication channel. C) A device that sends communication to the Internet. D) A shared folder stored on a server.
B) Devices interconnected by some common communication channel.
It is best if primary keys . . . A) Are composite B) Do not change in value C) Can be used for all tables in the database D) Are shared
B) Do not change in value
_________ is when the projected benefits of a proposed system outweigh its projected costs. A) Total cost of ownership B) Economic feasibility C) Return on investment D) Ongoing support
B) Economic feasibility
Which part of the database ER-diagram becomes a table in the implemented database? A) Relationships B) Entities C) Attributes D) Primary keys
B) Entities
Which part of the database ER-diagram becomes a table in the implemented database? A) Relationships B) Entities C) Attributes D) Primary keys
B) Entities
A performance baseline is helpful in troubleshooting because it contains a backup of system critical data. A) True B) False
B) False
A variable's value cannot be changed. A) True B) False
B) False
Absolute system security is always possible. A) True B) False
B) False
Classes and objects are exactly the same things. A) True B) False
B) False
Copying software from a friend is always okay. A) True B) False
B) False
Implementation day for the pilot group is the perfect opportunity for IT to celebrate the completion of a successful project with a team-building retreat. A) True B) False
B) False
In Java, variable declarations do not have to include data types. A) True B) False
B) False
In a one-to-many mapping relationship, the relationship is created by just identifying the primary key of a table and placing it in another table as a non-unique attribute. A) True B) False
B) False
In-house software development is usually faster and less expensive than purchasing a commercial software application. A) True B) False
B) False
Local and state laws governing privacy of health information tend to supersede federal laws. A) True B) False
B) False
Machine code includes English words for basic computer commands. A) True B) False
B) False
Perl is a scripting language developed for web browsers. A) True B) False
B) False
Project teams do not require management. A) True B) False
B) False
SQL is an example of a third generation programming language. A) True B) False
B) False
System users are the only stakeholders for an information system. A) True B) False
B) False
The SDLC covers creation of the product, but routine maintenance and ultimate decommissioning are addressed in different models. A) True B) False
B) False
The code used in an application is the same as the database. A) True B) False
B) False
The procedure for sign-off for testing activities identifies the person who will manage defects in the project. A) True B) False
B) False
The scope of the project generally should remain flexible to accommodate future needs and changes. A) True B) False
B) False
Web-based applications have less complex security issues than traditional applications. A) True B) False
B) False
When the condition of an if statement is false, the body of the if statement executes. A) True B) False
B) False
____ permit(s) or deny a computer the ability to connect to another computer. A) Antivirus software B) Firewalls C) Operating systems D) Viruses
B) Firewalls
Files that are stored in non-contiguous clusters are called __________ files. A) Stored B) Fragmented C) Free D) Protected
B) Fragmented
A Web server sends ____ back to the browser, which translates it for display on a monitor. A) TCP/IP B) HTML C) HTTP D) header information
B) HTML
Which of the following best describes a firewall? A) Software that forms a barrier between systems or parts of systems B) Hardware that forms a barrier between systems or parts of systems C) A lead wall around a computer system
B) Hardware that forms a barrier between systems or parts of systems
The term used to describe the mobilization of healthcare information electronically across organizations within a region, community or hospital systems is: A) Regional Extension Center B) Health Information Exchange C) Personal Health Record D) Electronic Prescribing
B) Health Information Exchange
Triage is an important step in: A) Baseline testing. B) Help desk activity. C) Creating the production support team. D) Upgrading the EHR application.
B) Help desk activity.
An example of a many-to-many relationship is which of the following? A) Patient to hospital wrist band ID B) Hospital medical procedure to patient C) Insured to dependents D) Toxicology report to Patient
B) Hospital medical procedure to patient
An example of a many-to-many relationship is which of the following? A) Patient to hospital wrist band ID B) Hospital medical procedure to patient C) Insured to dependents D) Toxicology report to Patient
B) Hospital medical procedure to patient
SQL cannot do which of the following? A) Update the contents of a database B) Identify the user of the system C) Query a database for information D) Execute intrinsic functions
B) Identify the user of the system
Which prioritization level is appropriate for a non-functional device that is not impacting patient care? A). Routine (low) B) Important (medium) C) Urgent (high) D) Critical
B) Important (medium)
What is the process of creating an object of a class called? A) Conditional branching B) Instantiation C) Productizing D) Cookie cutter stamping
B) Instantiation
A(n) _____ connection requires the services of an ISP. A) network B) Internet C) Intranet D) home
B) Internet
A(n) _____ connection requires the services of an ISP. A) network B) Internet C) Intranet D) home
B) Internet
The ____ is a global system of computer networks that communicate using TCP/IP and is a large network made up of many smaller networks. A) Domain Naming System B) Internet C) World Wide Web D) ARPANET
B) Internet
_______ are hardware and/or software that monitor network traffic for malicious activity. A) Routers B) Intrusion Protection Systems C) Packet sniffers D) Antivirus installations
B) Intrusion Protection Systems
_______ is software designed to infiltrate a computer system without the owner's informed consent. A) Hackware B) Malware C) Phishing D) Spyware
B) Malware
Where are programs stored when they are running? A) DVD B) Memory C) Monitor D) Keyboard
B) Memory
iPhone OS is an example of _______. A) A machine-based or independent Operating system B) Mobile-based or embedded operating system C) Server-based operating system D) Personal efficiency software
B) Mobile-based or embedded operating system
______ describes the trend that the number of components on a circuit doubles every two years. A) Computer history B) Moore's Law C) Social netowkring D) Increasing memory size
B) Moore's Law
This is an example of hardware fault tolerance: A) Redundant hard drives in the server B) Multiple-version programs C) Both A and B D) Neither A nor B
B) Multiple-version programs
The hospital reports that a patient arrived at the hospital with a bullet injury. Can the hospital be forced to reveal this patient's medical records? A) Yes. B) No. C) It depends on where the patient was shot. D) Only with the presiding doctor's consent
B) No.
A deletion anomaly happens when . . . A) Data is deleted from one entity and placed in another entity. B) One kind of data is unintentionally deleted along with the data that was intended to be deleted. C) An entire table is deleted instead of a row of data. D) A new entity replaces an old entity.
B) One kind of data is unintentionally deleted along with the data that was intended to be deleted.
Which of the following is NOT an example of word processing software? A) Microsoft Word B) OpenOffice Impress C) OpenOffice Writer D) Corel WordPerfect
B) OpenOffice Impress
When a hard disk drive is being accessed, the _______ spins and the _____ moves until the head is over the proper location on the disk. A) Spindle, arm B) Platter, arm C) Head, arm D) Arm, head
B) Platter, arm
Which definition is incorrect? A) An interface is a point of interaction between components. B) Point-to-point interfacing involves connecting systems end to end, as if in a chain, so that each connects to no more than two others. C) Integration is the process of connecting various subsystems into the larger system, ensuring that subsystems function together as a whole. D) An interface engine routes data through a centralized location.
B) Point-to-point interfacing involves connecting systems end to end, as if in a chain, so that each connects to no more than two others.
A form of a programming logic construct that potentially executes code multiple times and must execute the code at least once is called which of the following? A) Pre-test loop B) Post-test loop C) Endless loop D) Periodic
B) Post-test loop
According to HIPAA rules, who can view your medical information without a signed release? A) Employer B) Primary care physician C) Spouse D) All of the above
B) Primary care physician
Which of the following is one of the four key components of any EHR system? A) Provides mobility for healthcare workers B) Provides "longitudinal health data" on individuals C) Provides secure access by sacrificing efficiency
B) Provides "longitudinal health data" on individuals
Which of the 8 project plan components is properly paired with one of its key aspects? A) Goals/objectives - critical dependencies B) Quality management - performance measuring activities C) Scope - defined, measurable achievement D) Constraints - features and functions
B) Quality management - performance measuring activities
The SQL statement used to retrieve data from a database is which of the following? A) UPDATE B) SELECT C) INSERT D) WHERE
B) SELECT
The SQL statement used to retrieve data from a database is which of the following? A) UPDATE B) SELECT C) INSERT D) WHERE
B) SELECT
A form of a programming logic construct that involves one conditional test or at most two exclusive options and that doesn't involve an AND or an OR operator is called which of the following? A) Nested alternation B) Simple alternation C) Case structure alternation D) Compound alternation
B) Simple alternation
This type of fault tolerance compensates for errors in data structures: A) Hardware fault tolerance B) Software fault tolerance C) System fault tolerance D) Dynamic fault tolerance
B) Software fault tolerance
Programming languages have _______, just like natural languages. A) Code B) Syntax C) Meaning D) Greetings
B) Syntax
What was the oldest tool used for counting and calculations? A) Abacus B) Tally stick C) Slide rule D) Electronic calculator
B) Tally stick
Email was initially limited to A) Voice B) Text C) Video D) Images
B) Text
Which normal form is commonly considered to be all that is necessary for most database situations? A) Second normal form B) Third normal form C) Boyce-Codd form D) Fourth normal form
B) Third normal form
Which normal form is commonly considered to be all that is necessary for most database situations? A) Second normal form B) Third normal form C) Boyce-Codd form D) Fourth normal form
B) Third normal form
_____ is the number of bits sent across the media at any one time that represent your computer's actual communication. A) Mbps B) Throughput C) Goodput D) Bandwidth
B) Throughput
_____ is the number of bits sent across the media at any one time that represent your computer's actual communication. A) Mbps B) Throughput C) Goodput D) Bandwidth
B) Throughput
The testing phase of the SDLC can involve all but the following. A) Formal walkthrough of design B) Translation into machine code C) System tests of program in context with other programs D) Program unit test
B) Translation into machine code
Which of the following is not a step in the SDLC? A) Implementation B) Translation into machine code C) Testing D) Requirements Analysis
B) Translation into machine code
A statement that jumps to another module without any strings attached as to what to do when the machine is finished executing the invoked module illustrates what kind of branching? A) Conditional branching B) Unconditional branching C) Modular structure branching D) Blind branching
B) Unconditional branching
____ permit you to determine who uses your computer A) Power users B) User accounts C) Firewalls D) Complex passwords
B) User accounts
_______________ are programming constructs that store data. A) Assignments B) Variables C) Expressions D) Control structures
B) Variables
Which is NOT a type of safeguard required by HIPAA? A) Organizational requirements B) Virtual safeguards C) Technical safeguards D) Physical safeguards E) Administrative safeguards
B) Virtual safeguards
The IEEE 802.11 standard governs ____ technologies. A) Ethernet B) Wi-Fi C) Bluetooth D) WiMAX
B) Wi-Fi
The IEEE 802.11 standard governs ____ technologies. A) Ethernet B) Wi-Fi C) Bluetooth D) WiMAX
B) Wi-Fi
What is the latest version of Microsoft Windows OS? A) Windows XP B) Windows 7 C) Windows Vista D) Windows NT
B) Windows 7
Some experts recommend ____ first party, ____ third party, and ____ session cookies. A) accepting, accepting, accepting B) accepting, rejecting, allowing C) accepting, allowing, rejecting D) rejecting, allowing, rejecting
B) accepting, rejecting, allowing
Significant healthcare security breaches A) have never occurred. B) are published on a government website C) are not a privacy issue D) are caused by virtual machine use
B) are published on a government website
Identify the condition that causes the inside walls of the airways to become sore, swollen, and narrow, and results in the lungs taking in less air. A) bronchitis B) asthma C) pharyngitis D) cystic fibrosis
B) asthma
Physical security of assets means that objects cannot access data without _______. A) use of a badge B) authentication C) written permission D) the proper security clearance
B) authentication
Network security revolves around the setup and use of _______ to contorl who and how objects are utilized. A) identification B) authentication, authorization, and permissions C) authentication and permissions D) packet sniffers
B) authentication, authorization, and permissions
An example of authorization is when a user ______. A) logs into a computer B) can print a document C) both A and B D) none of the above
B) can print a document
Following the five rights of information management ensures that A) patients will never suffer from medical error. B) clinicians always have the information they need to make a decision regarding patient care. C) all clinicians will make the correct decision regarding patient care. D) patients will be given the correct medication.
B) clinicians always have the information they need to make a decision regarding patient care.
A value that cannot be changed while a program is running is called a ________. A) variable B) constant C) array D) passed variable
B) constant
What medical term refers to the skull? A) carp/o B) crani/o C) oste/o D) vertebr/o
B) crani/o
SQL is a _______ language. A) binary B) data oriented language C) scripting D) object oriented
B) data oriented language
The kind of data stored in memory is described to the computer as a ________. A) memory location B) data type C) primary value D) data group
B) data type
Which term specifically means abnormal condition of the skin? A) dermatopathy B) dermatosis C) dermatoplasty D) dermatitis
B) dermatosis
The slowest type of Internet connection is the ____ connection type. A) satellite B) dialup C) DSL D) Cable
B) dialup
An IP address that that may change when you reboot your cable modem router is referred to as a(n) ____ A) APIPA B) dynamic C) Static D) ISP
B) dynamic
Patient medical records should be send electronically in a(n) ____ format. A) zipped B) encrypted C) HTTP D) IP
B) encrypted
Which is the most superficial layer of skin? A) subcutaneious layer B) epidermis C) dermis D) corium
B) epidermis
Which of the following brain disorders results in recurring seizures and is controlled primarily by medications? A) Parkinson's disease B) epilepsy C) Alzheimer's disease D) transient ischemic attacks
B) epilepsy
The breast condition that has the characteristics of lumpiness, thickening and swelling, and is often associated with the female's menstrual cycle is: A) fibroadenomas B) fibrocystic disease C) cysts D) intraductal papillomas
B) fibrocystic disease
"Count" is which of the following? A) type of statement B) function C) clause D) transaction processing statement
B) function
"Count" is which of the following? A) type of statement B) function C) clause D) transaction processing statement
B) function
The eye disorder that is the result of fluid pressure increases over time that damaging the optic nerve and results in blindness is: A) macular degeneration B) glaucoma C) cataract D) color blindness
B) glaucoma
Private IP addresses _____. A) have meaning on the Internet and in a home network B) have no meaning outside of the home network in which the address resides C) are the same thing as public IP addresses D) None of the above.
B) have no meaning outside of the home network in which the address resides
Private IP addresses _____. A) have meaning on the Internet and in a home network B) have no meaning outside of the home network in which the address resides C) are the same thing as public IP addresses D) None of the above.
B) have no meaning outside of the home network in which the address resides
You search the Web using the term health and informatics not education. What result below best matches your search? A) health network B) health informatics C) health informatics educational opportunities D) informatics and health
B) health informatics
Which type of anemia results from the insufficient iron? A) pernicious anemia B) iron-deficiency anemia C) hemolytic anemia D) thalassemia
B) iron-deficiency anemia
A variable in programming __________. A) is something that can cause a logic error in a program at random times B) is a name given to a place in the memory of the computer C) is a logic construct that changes an outcome depending on circumstances D) is a compile error caused by a logic error
B) is a name given to a place in the memory of the computer
COBOL is a _______ language. A) binary B) legacy C) scripting D) object oriented
B) legacy
One difference between PHRs and EHRs is that PHRs are ____. A) governed by HIPAA B) maintained by individuals C) not for online use D) organized and utilized by medical doctors
B) maintained by individuals
The Referential Integrity Constraint is which of the following? A) making sure that data is within the domain of the attribute B) making sure that a foreign key value is also a value in the primary key to which it belongs C) making sure that the user has permission to access data that they have requested D) making sure that the user is who they say they are
B) making sure that a foreign key value is also a value in the primary key to which it belongs
Which term means inflammation of the heart muscle? A) myositis B) myocarditis C) dermatomyositis D) myopathy
B) myocarditis
A solid piece of material that forms in the kidney results in which of the following conditions? A) interstitial cystitis B) nephrolithiasis C) acute cystitis D) urinary tract infection
B) nephrolithiasis
The Internet is owned by ____. A) Google B) nobody C) the U. S. government D) everybody
B) nobody
The character set of 0-9 is contained in what data type? A) numeric and alphabetic B) numeric and alphanumeric C) alphabetic D) alphabetic and alphanumeric
B) numeric and alphanumeric
A binary digit value of one (1) indicates that electricity is ____. A) stored in RAM B) on C) off D) in a Boolean circuit
B) on
A typical home network connecting to the Internet uses ____ IP addressing. A) only Public B) only private C) both public and private D) HTTP
B) only private
Which of the following endocrine glands has both an exocrine and an endocrine function? A) adrenal B) pancreas C) pineal D) thymus
B) pancreas
Antivirus software works by recognizing ____ and stopping those things from causing harm to your computer. A) files B) patterns of bad behavior C) hackers D) AV software
B) patterns of bad behavior
A _____ topology describes how a network is actually designed and laid out across a campus. A) logical B) physical C) mesh D) star
B) physical
A _____ topology describes how a network is actually designed and laid out across a campus. A) logical B) physical C) mesh D) star
B) physical
Another student informs you that you can purchase a completed research paper online and avoid doing the work yourself. This is an example of ____. A) freeware B) plagiarism C) theft D) pirating intellectual property
B) plagiarism
The watery part of blood is called: A) red cells B) plasma C) white cells D) platelets
B) plasma
The law of ________ regulates the type of information which may be collected and how this information may be used and stored. A) security B) privacy C) confidentiality D) torts
B) privacy
HIPAA requires that health care providers, insurance companies, and employers abide by ________ standards. A) accountability B) privacy and security C) state D) international
B) privacy and security
The American Recovery and Reinvestment Act is being implemented in order to A) provide organizations with funds to purchase information systems. B) provide incentives for organizations to use information systems in a meaningful way. C) force organizations to implement computer provider order entry. D) stimulate the economy by giving funds to information system companies
B) provide incentives for organizations to use information systems in a meaningful way.
Routers can be configured with _____ so they know where to route received traffic. A) switchports B) routing tables C) IP addresses D) WAPs
B) routing tables
Routers can be configured with _____ so they know where to route received traffic. A) switchports B) routing tables C) IP addresses D) WAPs
B) routing tables
A(n) ____ is also known as a query. A) index B) search phrase C) Boolean operator D) Web crawler
B) search phrase
Data that can be derived is called ________ data. A) variable B) secondary C) primary D) passed
B) secondary
Your company decides that it should back up computer files every four hours during the week and at the end of the day on weekends. This process needs to be recorded in the company's _________. A) permissions B) security policy C) WAN documentation D) email
B) security policy
Which of the following organs is NOT part of the cardiovascular system? A) artery B) spleen C) vein D) capillary
B) spleen
A _____ operates at Layer 2 of the OSI model. A) router B) switch C) Web protocol D) network cable
B) switch
A _____ operates at Layer 2 of the OSI model. A) router B) switch C) Web protocol D) network cable
B) switch
An attribute is said to be functionally dependent on another attribute if . . . A) both attributes can be determined by another attribute B) the attribute can be determined by the other attribute C) both attributes are candidate keys D) both attributes are non-unique keys
B) the attribute can be determined by the other attribute
When medical terminology word part provides the general meaning of the word? A) combining vowel B) word root C) suffix D) prefix
B) word root
Malware that works to create a lot of network traffic is referred to as a(n) ________. A) Macro virus B) worm C) adware D) phishing
B) worm
. Which of the following operators is the OR operator in Java? A) == B) || C) && D) !=
B) ||
Which suffix means narrowing? A) -sclerosis B) -rrhexis C) -stenosis D) -ptosis
C) -stenosis
Though the number or order of these steps is not set in stone, we suggested this number of steps for your selection process: A) 6 B) 10 C) 12 D) 24
C) 12
From the list below, select a valid IPv4 address and subnet mask for a laptop: A) 192.168.256.1, 255.255.0.0 B) 80:0cd0:24:dc09:e6f5:23b1:528f:7fe2, /23 C) 192.168.10.200, 255.255.255.0 D) 192.168.10.0, 255.255.265.0
C) 192.168.10.200, 255.255.255.0
From the list below, select a valid IPv4 address and subnet mask for a laptop: A) 192.168.256.1, 255.255.0.0 B) fe80:0cd0:2414:dc09:e6f5:23b1:528f:7fe2, /23 C) 192.168.10.200, 255.255.255.0 D) 192.168.10.0, 255.255.265.0
C) 192.168.10.200, 255.255.255.0
When was the World Wide Web first developed? A) 1969 B) 1979 C) 1989 D) 1999
C) 1989
What is the value assigned to the variable num after the following assignment statement? num = 5 + 5 * 3; A) 18 B) 30 C) 20 D) 15
C) 20
Software can be defined as: A) The nuts and bolts that make things work. B) The physical components of servers. C) A collection of computer programs and related data that provide the instructions telling a computer what to do. D) A collection of computers and devices connected by communications channels that facilitates communications among users and allows users to share resources with other users.
C) A collection of computer programs and related data that provide the instructions telling a computer what to do.
What is an information system? A) A computer program B) A database C) A collection of people, process and technology that generates and uses information in an organization D) None of the above
C) A collection of people, process and technology that generates and uses information in an organization
A foreign key is . . . A) A well-known attribute value that uniquely determines a row in a table. B) An automatically generated numeric value that uniquely determines a row of a table. C) A unique key from another table. D) A key that doesn't belong in the table where it appears.
C) A unique key from another table.
A foreign key is . . . A) A well-known attribute value that uniquely determines a row in a table. B) An automatically generated numeric value that uniquely determines a row of a table. C) A unique key from another table. D) A key that doesn't belong in the table where it appears.
C) A unique key from another table.
What was the first personal computer? A) Apple I B) IBM PC C) Altair D) iMac
C) Altair
A programming logic construct that provides for exclusive options of code to be executed is called __________. A) Sequence B) Concurrency C) Alternation D) Iteration
C) Alternation
Most (if not all) scientific, business, industry, health care and personal use computer problems can be solved with just the three following logic constructs. A) Continue, Choice and Steps B) Recursion, Concurrency and Execution C) Alternation, Sequence and Iteration D) Conditional branch, Unconditional branch and Perform
C) Alternation, Sequence and Iteration
Which of the following diseases of the nervous system results in dementia in older people that progressively worsens until the patient can no longer take care of themselves? A) brain aneurysm B) epilepsy C) Alzheimer's disease D) cerebrovascular stroke
C) Alzheimer's disease
What is a CT scan? A) A nuclear medicine imaging device that produces a 3-D image. B) A device that creates an image based on sound waves. C) An x-ray, using specialized equipment, that takes cross-sectional pictures of the body. D) Magnetic imaging equipment that uses a radio frequency pulse to create an image.
C) An x-ray, using specialized equipment, that takes cross-sectional pictures of the body.
Name three types of servers you may find in a typical EHR system? A) Hardware, RAM, Dell B) Configuration, terminal, VPN C) Application, Database, Citrix D) Internal, external, hosted
C) Application, Database, Citrix
Which is NOT a function of the lymphatic and immune systems? A) Transport fats absorbed by the small intestines B) Primary defense against the invasion of pathogens C) Assist in the blood clotting process D) Collect excess tissue fluid and return it to the circulatory system
C) Assist in the blood clotting process
Which of the following statements regarding the atria is NOT true? A) Atria are the upper chambers B) The two atria are separated by a septum C) Atria pump blood out of the heart D) Atria receive blood into the heart
C) Atria pump blood out of the heart
Access codes, passwords, and key cards are examples of: A) Audits B) Access routes C) Authentication D) Security
C) Authentication
Medical implants use _____ technology to relay information from inside a patient's body to a receiver. A) WiMAX B) Ethernet C) Bluetooth D) CAT 5e
C) Bluetooth
Medical implants use _____ technology to relay information from inside a patient's body to a receiver. A) WiMAX B) Ethernet C) Bluetooth D) CAT 5e
C) Bluetooth
A friend of a patient asks the nurse if the patient is HIV positive. If the nurse provides this information, what is he or she guilty of? A) Breaching information security B) Information by consent C) Breach of confidentiality D) Nothing; this is not illegal
C) Breach of confidentiality
Which part of the computer is its "brain"? A) Monitor B) Memory C) CPU D) Keyboard
C) CPU
Primary keys can be selected from a list of . . . A) Natural keys B) Surrogate keys C) Candidate keys D) Foreign keys
C) Candidate keys
A form of a programming logic construct that involves more than two exclusive options and that doesn't involve an AND or an OR operator is called which of the following? A) Nested alternation B) Simple alternation C) Case structure alternation D) Compound alternation
C) Case structure alternation
______ is commonly applied to conversations between doctors and patients. A) Security B) Privacy C) Confidentiality D) Tort law
C) Confidentiality
Testing of the database can be accomplished by which of the following? A) Create small databases for each view that was gathered during the specification gathering phase and make sure they all produce what the user or report needed. B) Have the users do every transaction by hand for a few days in parallel with the new database to see if the results are the same. C) Create a small test version of the database where queries can be executed and the results monitored. D) Testing is not important since users will have been involved throughout the entire process.
C) Create a small test version of the database where queries can be executed and the results monitored.
Which of the following is an advantage of databases over disk file storage? A) Databases can store data of a repetitive nature and disk file storage cannot. B) Disk file storage requires special expensive hardware and databases do not. C) Data from a database can be input selectively rather than all or nothing as with a disk file. D) Data in a database is not visible all the time as with a disk file.
C) Data from a database can be input selectively rather than all or nothing as with a disk file.
How does data differ from information? A) Data has limited meaning, depending its storage location. B) Information is the same as data. C) Data has no meaning on its own merit. D) None of the above
C) Data has no meaning on its own merit.
What is NOT a category of stage 1 meaningful use criteria? A) Improve care coordination B) Improve population and public health C) Define minimum EHR functionality D) Ensures adequate privacy and security protections for personal health information.
C) Define minimum EHR functionality
What is NOT a category of stage 1 meaningful use criteria? A) Improve care coordination B) Improve population and public health C) Define minimum EHR functionality D Ensure adequate privacy and security protections for personal health information.
C) Define minimum EHR functionality
What is the name of the problem that is solved by creating a new entity and moving some data from the existing entity to the new one so that when data is removed from the original entity, data is not unintentionally lost? A) Insertion anomaly. B) Update anomaly. C) Deletion anomaly. D) Addition anomaly.
C) Deletion anomaly
Which of the following is NOT usually included in a project plan? A) Scope and expectations B) Business and project goals and objectives C) Design specifications D) Roles and responsibilities E) Quality management approach
C) Design specifications
The support team for a production EHR system should do all of the following EXCEPT: A) Manage user requests for access to the system. B) Review daily interface error logs for problems with the system. C) Develop software and new environments to respond to customer needs. D) Provide rapid response to customer issue.
C) Develop software and new environments to respond to customer needs.
Though less commonly used than in the past, _________ are still used today. A) wireless hotspots B) punch cards C) dial-up connections D) touch screens
C) Dial-up connections
Which of the following is not a reason for the diversity of languages? A) Different languages for different purposes B) New languages to take advantage of new features C) Different world cultures have their own computer languages D) Legacy languages tend to stick around
C) Different world cultures have their own computer languages
This type of backup saves only the changes since the last full backup: A) Full backup B) Incremental backup C) Differential backup D) Synthetic full backup
C) Differential backup
The operating system is stored ____. A) in RAM when the computer is running B) on the hard disk C) Either A or B D) None of the above
C) Either A or B
Which of the following utilizes a computer technology that allows physicians to use handheld or personal computer devices to access drug and formularies and transmit prescriptions to a printer or local pharmacy? A) Computerized Provider Order Entry B) Decision Support System C) Electronic Prescribing D) Personal Health Record
C) Electronic Prescribing
A logic error that executes code repetitively and limitlessly? A) Pre-test loop B) Post-test loop C) Endless loop D) Continuous
C) Endless loop
Another name for unconditional branching is ____________. A) endless loop B) Spaghetti C) GoTo D) Blind branching
C) GoTo
Which is NOT a characteristic of the HITECH Act? A) HITECH Act initially rewards institutions for switching to EHRs. B) Starting in 2015, HITECH imposes penalties for noncompliance. C) HITECH helps narrow the initial field of vendors.
C) HITECH helps narrow the initial field of vendors.
Which is NOT a characteristic of the HITECH Act? A) HITECH Act initially rewards institutions for switching to EHRs. B) Starting in 2015, HITECH imposes penalties for noncompliance. C) HITECH helps narrow the initial field of vendors.
C) HITECH helps narrow the initial field of vendors.
A browser uses ____ to communicate with Web servers. A) TCP/IP B) HTML C) HTTP D) coding
C) HTTP
One way to improve data security is to require that all Web access of health records be done via ________. A) HTTP B) XML C) HTTPS D) FTP
C) HTTPS
The _______ is a centralized resource staffed by IT professionals who provide user support. A) Systems maintenance B) User trainers C) Help desk D) Database
C) Help desk
You receive an e-mail with the subject line "Win a prize by forwarding this email" and you decide not to forward this to your friends and family. You took this course of action because it was a(n) ____? A) Virus B) Phishing C) Hoax D) Trojan
C) Hoax
The Domain Naming System maps a(n) ____ to a domain name. A) Web site name B) TCP address C) IP address D) root server
C) IP address
Attributes that functionally determine other attributes are called . . . A) Non-unique identifiers B) Multi-valued identifiers C) Identifiers D) Unique identifiers
C) Identifiers
Which is NOT a goal of the American Recovery and Reinvestment Act? A) Improve communication between healthcare providers B) Improve reporting of immunizations to public health agencies C) Improve access to healthcare in rural areas D) Improve decisions made regarding patient care
C) Improve access to healthcare in rural areas
Which of the following is a translation process that translates and executes one statement at a time? A) Sequential B) Compiler C) Interpreter D) Structured execution
C) Interpreter
What is NOT a true statement regarding the CCHIT? A) CCHIT stands for Certification Commission for Health Information Technology. B) CCHIT has partnered with the US Department of Health and Human Resources. C) It is a government regulatory agency. D) It is becoming increasingly relevant in the EHR arena.
C) It is a government regulatory agency.
What is NOT a true statement regarding the CCHIT? A) CCHIT stands for Certification Commission for Health Information Technology. B) CCHIT has partnered with the US Department of Health and Human Resources. C) It is a government regulatory agency. D) It is becoming increasingly relevant in the EHR arena.
C) It is a government regulatory agency.
Which statement is true of the point-to-point interface method? A) It is a newer, less traditional method. B) Data is routed through a centralized location. C) Its direct linkages can provide secure transmission. D) Both B and C
C) Its direct linkages can provide secure transmission.
What does it mean when a Web site is at the top of a search results list? A) Web crawler HTTP results best match Boolean operators used. B) The top site paid Google the least amount of money for that ranking. C) Keywords on that site best matched the search terms used. D) Either A or C
C) Keywords on that site best matched the search terms used.
Which of the following programming languages was developed specifically for health care applications? A) Java B) C++ C) MUMPS D) Python
C) MUMPS
A wired network connection requires the use of: A) NIC, WAP, switch, router. B) Wireless NIC, WAP, router C) NIC, copper cabling, switch, router D) NIC, WAP, switch.
C) NIC, copper cabling, switch, router
A wired network connection requires the use of: A) NIC, WAP, switch, router. B) Wireless NIC, WAP, router C) NIC, copper cabling, switch, router. D) NIC, WAP, switch.
C) NIC, copper cabling, switch, router.
The half-life of software has the most effect on what phase of a program's life cycle. A) Design B) Implementation C) Obsolescence D) Maintenance
C) Obsolescence
Your own medical information may be stored using a A) USB B) WAN C) PHR D) KVM
C) PHR
Which of the following is NOT a form of software that is free? A) Public Domain B) Open Source C) Packaged D) Freeware
C) Packaged
_________ determines how long it will take for the project to pay for itself. A) Return on investment B) Present value analysis C) Payback analysis D) Benefit analysis
C) Payback analysis
A friend asks you how she can access and control her medical information electronically. Which of the electronic information systems listed below would you direct her to? A) Electronic Health Record B) Electronic Medical Record C) Personal Health Record D) Pharmacy Health Record
C) Personal Health Record
You receive an e-mail without an attachment. The e-mail subject line reads "Bank login required as soon as possible". What type of e-mail did you receive? A) Trojan B) Virus C) Phishing D) Adware
C) Phishing
A(n) ____ jack is used to connect a network cable to a network interface card. A) RJ-11 B) 802.11N C) RJ-45 D) Either A or C
C) RJ-45
In order to realize all the benefits of electronic health records, which of the following represents a common medical language that allows data to be shared? A) Classification B) Terminology C) Requires both classifications and terminologies D) Requires neither classification or terminology
C) Requires both classifications and terminologies
How does a search engine provide you with a result set? A) Web crawler searches Web pages to create a result set. B) Database query to search each Internet Web site. C) Searches its indexed data based on your search criteria. D) None of the above.
C) Searches its indexed data based on your search criteria.
Disks are formatted into _____, which make up tracks. A) Heads B) Arms C) Sectors D) Addresses
C) Sectors
Windows Server 2008 is an example of _______. A) A machine-based or independent Operating system B) Mobile-based or embedded operating system C) Server-based operating system D) Personal efficiency software
C) Server-based operating system
Natural keys have the advantage over surrogate keys of which of the following? A) They are short and almost always numeric. B) They introduce a transitive dependency. C) They are more likely to be known to the user or to the patient/customer. D) Their value is automatic and do not require data entry.
C) They are more likely to be known to the user or to the patient/customer.
What is a disadvantage to building your own in-house software solution? A) Fewer software "bugs" incurred B) Shorter development time C) Training must be developed in house D) A and B
C) Training must be developed in house
What is a disadvantage to building your own in-house software solution? A) Fewer software "bugs" incurred B) Shorter development time C) Training must be developed in house D) A and B
C) Training must be developed in house
What is an appropriate length of time for staff education and training before system implementation? A) Two hours B) Two days C) Two weeks D) Two months E) Two years
C) Two weeks
Which of the following is a design tool used to design objects? A) pseudocode B) Warnier/Orr C) UML D) Flowcharting
C) UML
You live in an area that experiences one minute power outages due to thunderstorms. What type of device should you install so that your computer does not lose power when this occurs? A) Surge protector B) Wireless protector C) UPS D) All of the above
C) UPS
You live in an area that experiences one minute power outages due to thunderstorms. What type of device should you install so that your computer does not lose power when this occurs? A) Surge protector B) Wireless protector C) UPS D) All of the above.
C) UPS
A structured programming language statement could possibly be used for all but which of the following ? A) Statements that define variables, constants, and files B) Statements that execute code repetitively C) Unconditionally branch to another statement D) Statements that assign values to variables
C) Unconditionally branch to another statement
_________ diagrams describe what a system does. A) Activity B) State machine C) Use case D) Component
C) Use case
The most important source of specifications for database development is obtained from which of the following? A) Forms and reports B) Existing files C) Users D) Customers
C) Users
_________ is a way that OS give the illusion of a large memory. A) Physical memory B) Permanent memory C) Virtual memory D) RAM
C) Virtual memory
Search engines search ____ using a proprietary algorithm. A) Web directories B) URLs C) Web pages D) root servers
C) Web pages
Which condition is a result of an infection in the urinary bladder by a bacteria, E. coli? A) interstitial cystitis B) chronic cystitis C) acute cystitis D) urinary incontinence
C) acute cystitis
Which data type is used more often in programming for A-Z? A) numeric B) literal C) alphanumeric D) alphabetic
C) alphanumeric
To create a business letter you would most likely use _______. A) an operating system B) application software for a Specific purpose C) application software for Personal efficiency
C) application software for Personal efficiency
Constraints ensure that____________. A) attributes are related. B) attributes can be considered candidate keys C) attribute values follow rules D) user access to the database is limited
C) attribute values follow rules
The tiny air sacs which allow oxygen to pass through them to eventually be transported to the body are: A) bronchi B) bronchioles C) aveoli D) nares
C) aveoli
The inflammation of the skin covering the head of the penis is: A) prostatitis B) benigh prostatic hypertrophy C) balanitis D) gonorrhea
C) balanitis
The hollow organ in the lower abdomen that stores urine is: A) urethra B) ureters C) bladder D) kidney
C) bladder
What organ is contained in the cranial cavity? A) spinal cord B) heart C) brain D) stomach
C) brain
The motherboard is made up of circuitry and thousands of copper wires known as ____. A) binary code B) RAM C) buses D) Chips
C) buses
"Order By" is which of the following? A) type of statement B) function C) clause D) transaction processing statement
C) clause
"Order By" is which of the following? A) type of statement B) function C) clause D) transaction processing statement
C) clause
Installing ____ updates is important to securing your operating system from attack. A) optional B) crucial C) critical D) recommended
C) critical
. In Object Oriented Programming, __________ and ___________ are stored together. A) integers, floating point numbers B) functions, procedures C) data, methods D) objects, classes
C) data, methods
In the final design which element of the ER-diagram becomes a table? A) attribute B) relationship C) entity D) domain
C) entity
Which term means high blood pressure? A) hypermanometer B) hypotension C) hypertension D) supratension
C) hypertension
Crohn's disease often affects the: A) stomach B) duodenum C) ileum D) common bile duct
C) ileum
A Trojan horse usually ________. A) installs itself on a computer and immediately begins making copies of itself B) destroys data and never installs software C) impersonates a known good file installed on the system by deleting the good file D) attacks Microsoft Office documents
C) impersonates a known good file installed on the system by deleting the good file
The sensory organs used in hearing are found in which part of the ear? A) outer ear B) middle ear C) inner ear D) outer and inner ear
C) inner ear
The _________ data type in Java is used for storing whole numbers. A) float B) char C) int D) boolean
C) int
Which term means pertaining to between the atria? A) intratrial B) interarterial C) interatrial D) transatrial
C) interatrial
Which term means pertaining to within the skin? A) epidermal B)hypodermal C) intradermal D) interdermal
C) intradermal
In a recursive relationship an entity has a relationship with which of the following? A) another entity B) a domain of an attribute C) itself D) multiple relationships with another entity
C) itself
Constraints are which of the following? A) ways of making sure that attributes are related. B) making sure that attributes can be considered candidate keys C) making sure that attribute values follow rules D) limiting user access to the database
C) making sure that attribute values follow rules
A thorough testing phase will catch ___________. A) all errors B) about half of possible errors C) most common, but not all possible errors D) all logic errors
C) most common, but not all possible errors
In Windows peer-to-peer networking, a workgroup is simply a _____. A) domain name B) server concept C) name for the network D) protocol
C) name for the network
In Windows peer-to-peer networking, a workgroup is simply a _____. A) domain name B) server concept C) name for the network D) protocol
C) name for the network
Privacy is to ____ as confidentiality is to ____. A) medical, online B) data, people C) people, data D) None of the above
C) people, data
You receive an email that appears to be from eBay asking you to login to verify a transaction. This is an example of a(n) _______attack. A) worm B) virus C) phishing D) buyware
C) phishing
Which of the following endocrine glands is known as the "master gland"? A) adrenal B) thyroid C) pituitary D) pancreas
C) pituitary
Macroglossia means large tongue. In this word, macro is a: A) suffix. B) word root. C) prefix. D) combining form.
C) prefix.
The inability of the eyes to focus close up as a result of the aging process is known as: A) myopia B) hyperopia C) presbyopia D) astigmatism
C) presbyopia
Data that cannot be derived is called ________ data. A) variable B) secondary C) primary D) passed
C) primary
Which medical term means inflammation of the rectum and anus? A) anitis B) sigmoiditis C) proctitis D) rectitis
C) proctitis
An authenticated object is an object that ________. A) is able to print a document B) in a directory C) proved its identity D) can delete a file in a folder
C) proved its identity
Health information is stored as a(n) ________ in an EHR. A) folder B) table C) record D) entity
C) record
SQL commonly produces or projects which of the following? A) one logical record B) users of the system C) record sets D) one attribute
C) record sets
SQL commonly produces or projects which of the following? A) one logical record B) users of the system C) record sets D) one attribute
C) record sets
Feces are stored in the ______ prior to defecation. A) sigmoid colon B) anus C) rectum D) cecum
C) rectum
An Applet is an example of a _______ language. A) binary B) legacy C) scripting D) object oriented
C) scripting
Health Language 7 (HL7) is an information model that is used to help systems A) speed processing time. B) print system screens. C) share information between information systems. D) translate English into other languages
C) share information between information systems
In three factor authentication, an oject must present _______ to be authenticated. A) something it knows and at least one other authentication factor item B) a username and password C) something it knows, something it has, and something it is D) either A or B
C) something it knows, something it has, and something it is
The term for above the kidney is: A) intrarenal B) pararenal C) suprarenal D) infrarenal
C) suprarenal
A(n) _____ protects a device from spikes in power usually originating with the power company. A) USPS B) switch C) surge protector D) Either A or B
C) surge protector
A(n) _____ protects a device from spikes in power usually originating with the power company. A) USPS B) switch C) surge protector D) Either A or B
C) surge protector
Pseudocode is an example of a(n) ____________ design tool. A) sequential B) object C) text-based D) graphical
C) text-based
The Internet began because ____. A) people realized the business potential of having a global communication system B) scientists needed to be able to share secrets securely C) the U. S. government wanted to be able to communicate, even in the event of a nuclear attack D) Stanford researchers sold the design to ICANN, who began selling IP addresses to ISPs.
C) the U. S. government wanted to be able to communicate, even in the event of a nuclear attack
In wireless networking, a WAP's SSID represents _________. A) the router's name B) the WPA preshared key C) the name of the wireless network D) none of the above
C) the name of the wireless network
Which type of burn damages the deepest layers of the skin and tissues underneath it? A) first degree B) second degree C) third degree D) fourth degree
C) third degree
Encryption is a process whereby communication is made unreadable to _________. A) everyone B) authorized viewers C) unauthorized viewers D) none of the above
C) unauthorized viewers
What database term involves connecting two or more tables together when a user needs data from more than one table in the database? A) Sweeping B) Conduit C) Concatenation D) Relationship
D)
Select a valid IP address and subnet mask from below: A) 192.168.0 and 255.255.255.0 B) 10.10.10.1 and 255.255.255.224 C) 10.10.10.1 and 255.255.256.0 D) 192.168.0.1 and 255.255.280.0
D) 192.168.0.1 and 255.255.280.0
Roughly how much storage does a chest x-ray require? A) 35 megabits B) 20 megabits C) 30 megabytes D) 20 megabytes
D) 20 megabytes
The U.S. Government would like to implement electronic health records for most Americans by the year ______. A) 2030 B) 2016 C) 2020 D) 2014
D) 2014
Which are advantages to using COTS software? A) Development costs are typically lower B) Integrates best with your present IT system components C) Easier learning curve for users and administrators D) A and C
D) A and C
Which are advantages to using COTS software? A) Development costs are typicaly lower B) Integrates best with your present IT system components C) Easier learning curve for users and administrators D) A and C
D) A and C
All of the following should be considered in selection of the pilot group EXCEPT: A) Advice of the steering committee. B) Representativeness of a cross-section of the user community. C) Readiness for the technology. D) Age.
D) Age.
Systems Implementation includes A) Application development B) Testing C) Training D) All of the above
D) All of the above
What is the goal of an information system? A) Improve business knowledge B) Improve business processes and services C) Improve business communications and people collaboration D) All of the above
D) All of the above
Which are stakeholders that could be external service providers? A) Systems analysts B) Systems designers C) Consultants D) All of the above
D) All of the above
You are asked to select the type of type of computer network that best suits your organizational needs. What factors should you take consideration when making this choice? A) Purpose of system, type of hardware, type of organization B) Budget, type of information sytem, purpose of system C) End user work flow, purpose of system, available infrastructure D) All of the above
D) All of the above
This support team member is expert in EHR applications and is able to troubleshoot difficult issues: A) Super user B) Help desk analyst C) Production support consultant D) Application support specialist
D) Application support specialist
_________________ are simple data structures that store multiple pieces of data together. A) Variables B) Loops C) Expressions D) Arrays
D) Arrays
A class can contain which of the following? A) Variables and modules B) A customer's name like "Sam Jones" C) Domains and literals D) Attributes and methods
D) Attributes and methods
Designing the test scenarios is best performed by: A) Less-experienced staff. B) Program experts. C) Workflow experts. D) B and C. E) All of the above.
D) B and C.
_____ is the highest number of bits that can be sent across the media at any one time. A) Mbps B) Throughput C) Goodput D) Bandwidth
D) Bandwidth
_____ is the highest number of bits that can be sent across the media at any one time. A) Mbps B) Throughput C) Goodput D) Bandwidth
D) Bandwidth
A router is a device that ____. A) sends traffic from a private network to the Internet B) sends traffic from the Internet a private network C) is utilized only by home networks D) Both A and B
D) Both A and B
Which are recommended steps for using HL7 as a baseline for your EHR requirements? A) Learn the language: Understand how key words are used within the model. B) Review and select relevant sections relevant to your healthcare setting. C) Understand that no organizational structure exists to the document as it is meant to be loosely interpreted. D) Both A and B.
D) Both A and B.
The project manager's role makes them which of the following? A) The focal point of the project, ensuring the successful completion of project B) The top of a typical hierarchical management role C) Direct responsibility for the activities of all project participants D) Both A and C
D) Both A and C
Which statement is true of an interface engine? A) More separate connectivity points than point-to-point B) More flexible and scalable than point-to-point C) Easier to install and maintain than point-to-point D) Both B and C
D) Both B and C
First normal form of the Normalization process involves which of the following? A) making sure that data within a row when deleted will not eliminate data that will be needed later. B) Making sure that attributes are dependent on the entire primary key and not just part of a composite primary key. C) when a row is inserted into a table, making sure that certain data doesn't disallow the addition because it is not present. D) Columns of data are uniquely named and contain only one piece of data.
D) Columns of data are uniquely named and contain only one piece of data.
A form of a programming logic construct that evaluates more than one conditional test and uses either an AND or an OR operator to connect the conditional tests is called which of the following? A) Nested alternation B) Simple alternation C) Case structure alternation D) Compound alternation
D) Compound alternation
All of the following are included in the Institute of Medicine's definition of public health EXCEPT: A) Prevention of disease B) Promotion of health C) Control of communicable disease D) Curative medical treatment
D) Curative medical treatment
A serial port, also known as a ____ port, can be used to connect to and manage a network device. A) DB-25 B) parallel C) USB to serial D) DB-9
D) DB-9
The purposes of a database include all of the following EXCEPT . . . A) Acquire data. B) Provide internal security. C) Retrieve data on command. D) Data is never repeated.
D) Data is never repeated
The purposes of a database include all of the following EXCEPT . . . A) Acquire data. B) Provide internal security. C) Retrieve data on command. D) Data is never repeated.
D) Data is never repeated.
Which of the following infections is NOT a sexually transmitted disease (STD)? A) Human papillomaviruses B) Gonorrhea C) Trichomoniasis D) Endometriosis
D) Endometriosis
A(n) ________ is a way of organizing files and their data. A) Operating system B) File manager C) BIOS D) File system
D) File system
HIPAA stands for: A) Health Investment Protection and Availability Act B) Health Information Protection and Access Act C) Health Information Portability and Accountability Act D) Health Insurance Portability and Accountability Act E) Health Insurance Prosperity and Access Act
D) Health Insurance Portability and Accountability Act
Home networks usually connect to the Internet through the use of the services provided by a(n) ____. A) ASP B) tier C) national provider D) ISP
D) ISP
Entities in the ER-diagram are object classes in that they are the _____ of something that the user needs to keep track of. A) The actual data values B) Instance C) Actual occurrence D) Idea
D) Idea
Which is NOT an advantage of integrating EHRs? A) Enables hospitals to share patient information. B) Enables providers to meet the HITECH "meaningful use" criteria. C) Enhances billing/payment and reform initiatives. D) Improves security and privacy of patient data. E) Streamlines workflows between hospitals and clinics.
D) Improves security and privacy of patient data.
What is NOT something typically found in a RFP? A) System Implementation plan B) Proposed costs C) Shorter development time D) Institution's financial statement
D) Institution's financial statement
HTTP is a(n) ____. A) Web page programming language B) Web page C) IP addressing scheme D) Internet protocol used to communicate with Web servers
D) Internet protocol used to communicate with Web servers
A programming logic construct that potentially executes code multiple times and contains a clear conditional test that terminates the execution is __________. A) Selection B) Concurrency C) Alternation D) Iteration
D) Iteration
The term used for the process of getting data out of more than one table is which of the following? A) Group By B) And or Or C) Distinct D) Join
D) Join
The term used for the process of getting data out of more than one table is which of the following? A) Group By B) And or Or C) Distinct D) Join
D) Join
_________ describes a common user interface. A) TCP B) USB C) PHR D) KVM
D) KVM
Assembler is a _______ language. A) binary B) legacy C) scripting D) Low-level
D) Low-level
The _____ is used by switches for intranet communications and has no meaning outside of that local network. A) IP address B) subnet mask C) HTTP protocol D) MAC address
D) MAC address
The _____ is used by switches for intranet communications and has no meaning outside of that local network. A) IP address B) subnet mask C) HTTP protocol D) MAC address
D) MAC address
What is an MRI? A) A nuclear medicine imaging device that produces a 3-D image. B) An x-ray, using specialized equipment, that takes cross-sectional pictures of the body. C) A device that creates an image based on sound waves. D) Magnetic imaging equipment that uses a radio frequency pulse to create an image.
D) Magnetic imaging equipment that uses a radio frequency pulse to create an image.
All of the following influence a person's health EXCEPT: A) Income status B) Violent crime exposure C) Healthcare access D) Marital status
D) Marital status
Macro viruses are usually associated with ____ files. A) Open Office B) PDF C) image D) Microsoft Office
D) Microsoft Office
Which of the following is an input device for a personal computer? A) Speaker B) CPU C) Memory D) Mouse
D) Mouse
Attributes that contain data that repeats are called which of the following? A) Composite B) A repeating domain C) Identifiers D) Multi-valued
D) Multi-valued
Which of the following agencies is responsible for oversight of the HITECH initiatives to promote meaningful use of electronic health records? A) NIH B) OCR C) NLM D) ONC
D) ONC or B) OCR--need to check on this one
The motherboard contains ____ slots, into which device expansion cards are inserted. A) RAM B) SATA C) AGP D) PCI
D) PCI
An example of a one-to-one relationship is which of the following? A) Patient to Doctor B) Nurse to work shift C) Drug to pharmaceutical company D) Patient to Hospital wrist band ID
D) Patient to Hospital wrist band ID
An example of a one-to-one relationship is which of the following? A) Patient to Doctor B) Nurse to work shift C) Drug to pharmaceutical company D) Patient to Hospital wrist band ID
D) Patient to Hospital wrist band ID
The C programming language uses the _____________ programming paradigm. A) Object Oriented B) Functional C) Domain specific D) Procedural
D) Procedural
The success of the implementation and roll-out is most evidenced by the: A) End users. B) Expert analysis. C) Technical staff. D) Professional evaluators
D) Professional evaluators
Which project plan component focuses on rules agreed to by team; e.g., reporting, communication, naming conventions, acceptance criteria? A) Scope B) Quality management C) Constraints D) Project Management
D) Project Management
Which of the following is an example of business software? A) Video games B) Electronic medical records C) Recipe manager D) Project management software
D) Project management software
Algorithms are written using _________________. A) A programming language B) Series of 1's and 0's C) Assembly language D) Pseudocode
D) Pseudocode
What database term involves connecting two or more tables together when a user needs data from more than one table in the database? A) Sweeping B) Conduit C) Concatenation D) Relationship
D) Relationship
What language is used to store and retrieve data from a database? A) UML B) DDLC C) DBMS D) SQL
D) SQL
What language is used to store and retrieve data from a database? A) UML B) DDLC C) DBMS D) SQL
D) SQL
__________ permissions are set so that users have the ability to access files and folders over a network. A) NTFS B) Network C) LAN D) Sharing
D) Sharing
SDLC stands for: A) System Development List Creation B) System Depreciation Lifetime Cost C) Software Depreciation Listed Costs D) Software Development Life Cycle
D) Software Development Life Cycle
When considering object oriented languages what is the best reason to break up code into modules? A) Manageable "chunks" of code B) Subtasks C) Structured design D) Strong cohesive code with loose coupling
D) Strong cohesive code with loose coupling
________ testing focuses on the system as a whole. A) Unit B) Integration C) Module testing D) System
D) System
Which stakeholder bridges the gap between the perspectives of different stakeholders? A) Systems designer B) Systems developer C) Systems owner D) Systems analyst
D) Systems analyst
________ permits virtual access to health care services. A) Social networking B) Twitter C) Location based services D) Telemedicine
D) Telemedicine
Which of the following is NOT true about an operating system? A) It is a set of programs that coordinate all activities of hardware resources. B) It is the layer between the application software and the hardware. C) It is unique to each individual computer hardware system. D) There is only one operating system available for all computers.
D) There is only one operating system available for all computers.
Which of the following is NOT true about the paper medical record? A) Can be easily destroyed B) Can be used for one task at a time C) Allows for duplication of information D) Those accessing can be easily tracked
D) Those accessing can be easily tracked
What technology was used in the first general purpose electronic computers? A) Transistors B) Integrated circuits C) Mechanical gears D) Vacuum tubes
D) Vacuum tubes
You were asked to configure wireless authentication. Which protocol should you select? A) WEP B) NTFS C) WLAN D) WPA2
D) WPA2
The ____ is a collection of interconnected documents and other resources, linked by hyperlinks and URLs. A) ARPANET B) Domain Name System C) Internet D) World Wide Web
D) World Wide Web
What type of immunity results from direct exposure to a pathogen? A) natural immunity B) innate immunity C) passive acquired immunity D) active acquired immunity
D) active acquired immunity
A(n) ____ is a set of instructions set out logically to solve a problem. A) Web crawler B) HTML coded page C) Web page D) algorithm
D) algorithm
Identify the condition that results when the body cannot rid itself of harmful wastes, the blood pressure rises, the body retain excess fluids and does not make enough red cells. A) renal failure B) kidney failure C) end stage renal disease D) all responses are used to describe the condition
D) all responses are used to describe the condition
The character set of A-Z is contained in what data type? A) numeric and alphabetic B) numeric and alphanumeric C) numeric D) alphabetic and alphanumeric
D) alphabetic and alphanumeric
Which procedure examines the inside of a joint? A) arthroplasty B) arthrotomy C) arthrocentesis D) arthroscopy
D) arthroscopy
A(n) ____ is a software program that lets a user use Web server resources over the Internet. A) Web page B) URL C) HTML page D) browser
D) browser
One of the leading causes of mortality is A) Alzheimer's disease. B) accidents. C) chronic lower respiratory diseases. D) cancer
D) cancer
Which term means enlarged heart? A) cardiorrhexis B) cardiostenosis C) cardiosclerosis D) cardiomegaly
D) cardiomegaly
Which term means that the fracture is protruding through an open skin wound? A) simple fracture B) compression fracture C) pathologic fracture D) compound fracture
D) compound fracture
A virus is a _________ that can harm a computer and make it inoperable. A) form of bacteria B) worm C) phishing attack D) computer program
D) computer program
Two processes that are executed at the same time are said to be executed _________. A) in unison B) together C) independently D) concurrently
D) concurrently
Viruses usually ______ on other computers. A) replicate themselves B) perform clean-up operations C) act on a specific date D) do not replicate themselves
D) do not replicate themselves
Software and/or hardware that blocks unauthorized communications on a computer is referred to as a(n) ___________. A) packet sniffer B) switch C) hub D) firewall
D) firewall
Computers in a _____ topology will usually be interconnected via a switch. A) logical B) physical C) router D) full mesh
D) full mesh
Computers in a _____ topology will usually be interconnected via a switch. A) logical B) physical C) router D) full mesh
D) full mesh
Which medical term means stomach pain? A) duodenalgia B) gingivalgia C) enteralgia D) gastralgia
D) gastralgia
Flowcharting is an example of a(n) ____________ design tool. A) sequential B) object C) text-based D) graphical
D) graphical
UML is an example of a(n) ____________ design tool. A) sequential B) object C) text-based D) graphical
D) graphical
Which of the following is a prefix? A) abdomen B) abdomino C) tomy D) hyper
D) hyper
A domain name is a(n) ____ that defines a realm of authority on the Internet, based on the DNS. A) IP address B) Web site C) URL D) identification label
D) identification label
In a super to subtype relationship attributes of the super type are which of the following? A) incompatible with the subtypes B) mirror images of the subtypes C) have identical attributes to the attributes of the subtypes D) inherited by the subtypes
D) inherited by the subtypes
An example of authentication is when a user ______. A) is able to delete a file B) can print a document C) shuts down a computer D) logs into a computer
D) logs into a computer
Variable names are associated with values in ________. A) database B) files C) windows D) memory
D) memory
A _____ operates at Layer 1 of the OSI model. A) router B) switch C) Web protocol D) network cable
D) network cable
A _____ operates at Layer 1 of the OSI model. A) router B) switch C) Web protocol D) network cable
D) network cable
Java is a(n) _______ language. A) binary B) legacy C) scripting D) object oriented
D) object oriented
You request the _______ to bring up your word processor. A) word processing package B) application software for a Specific purpose C) application software for Personal efficiency D) operating system
D) operating system
Select the endocrine gland that has other functions in the body in addition to producing hormones. A) adrenal B) thymus C) pituitary D) ovary
D) ovary
Identify the part of the respiratory system that is NOT included in the lower respiratory tract. A) trachea B) bronchi C) lungs D) pharynx
D) pharynx
The brain's meninges, or protective coverings, include: A) pia mater and dura mater B) arachnoid and pia mater C) dura mater only D) pia mater, arachnoid, and dura mater
D) pia mater, arachoid, and dura mater ("PAD")
Another student informs you that you can download software from an online source to avoid paying for it. This is an example of ____. A) copyright infringement B) plagiarism C) open source software D) pirating intellectual property
D) pirating intellectual property
Widespread aching, pain and inflammation in the muscles closest to the trunk is called: A) carpal tunnel syndrome B) fibromyalgia C) repetitive motion disorder D) polymyositis
D) polymyositis
Select the lung condition associated with a sudden blockage in an artery in the lung that is usually a result of a blood clot forming in the leg that breaks loose and travels through the bloodstream to the lung? A) cystic fibrosis B) pneumonia C) primary pulmonary hypertension D) pulmonary embolism
D) pulmonary embolism
The purpose of providing guidelines to health professionals and hospitals on how to adopt and use electronic health record technology is to improve the A) quality of healthcare delivered. B) safety of patients. C) efficiency of services provided. D) quality, safety, and efficiency of patient care.
D) quality, safety, and efficiency of patient care.
A simple step to secure data from those who do not have permission view it is to ________. A) store the data on a flash drive B) move the data on a corporate Web server C) perform a background check on all employees D) require employees to lock their computers when they leave their desk
D) require employees to lock their computers when they leave their desk
Which is NOT a method in which HIV/AIDS may be spread? A) unprotected sex B) shared needles C) childbirth D) shaking hands
D) shaking hands
The first phase in database development is which of the following? A) data modeling B) testing C) deployment D) specification gathering
D) specification gathering
In the word therm/o/meter, -meter is a(n): A) adjective B) prefix C) combining form D) suffix
D) suffix
SMS is used for A) email B) virtual machine management C) VoIP D) text messaging
D) text messaging
The endocrine gland located behind the sternum that secretes hormones which stimulate the production of cells involved in the immune system is the: A) adrenal B) pancreas C) thyroid D) thymus
D) thymus
One big difference between a virus and a worm is that the virus ____. A) can replicate itself B) is not a Trojan horse C) can ask you to login to your bank account D) usually cannot replicate itself
D) usually cannot replicate itself
When users enter data on Web forms, the data should be ________ before it is saved to the database. A) scrubbed B) committed C) balanced D) validated
D) validated
A computer is: A) A system with a processor, memory, storage, keyboard, mouse and monitor. B) A person who computes. C) An electronic programmable device that inputs, processes and outputs data. D) An electronic device that is embedded in objects and that controls the object based on certain inputs. E) All of the above
E) All of the above
Which statement accurately describes a SDLC model? A) The waterfall model emphasizes sequential development. B) The iterative model emphasizes that the product may need to pass through the same phase multiple times, in a cyclical fashion. C) The spiral model emphasizes prototyping as part of the cyclical process. D) Both B and C E) All of the above (A, B, and C)
E) All of the above (A, B, and C)
The most appropriate training strategy is: A) Classroom-style. B) Web-based. C) One-on-one. D) Train the trainer. E) All of the above.
E) All of the above.
Select all of the following that are examples of communications software. A) Email B) Web browsers C) Blog D) Wiki E) All of them
E) All of them
Which is NOT a common form of security breach? A) Password-based attack B) Identity spoofing C) Application layer attack D) Eavesdropping E) Parasite attack
E) Parasite attack
Select all of the following that are examples of healthcare software. A) EHRs and EMRs B) Health Information Systems C) Imaging D) Statistical software E) a,b,c
E) a,b,c
All computers have a keyboard, mouse, and monitor. True/False
False
Solid state drives are now being used on some laptops because solid state drives have moving parts and generate more heat than traditional hard disk drives. True/False
False
A dishwasher has an embedded computer. True/False
True
Personal computers were first developed in the 1970s. True/False
True
Speakers are an example of a computer output device. True/False
True