informatics exam III

¡Supera tus tareas y exámenes ahora con Quizwiz!

11) The informatics nurse reads an article about the international standards for health information exchanges. In which way will this standardization enhance patient care? A) Allows the reuse of information for multiple purposes B) Supports adherence to the diagnostic-related groupings C) Improves job satisfaction for nurses planning patient care D) Reduces the cost associated with duplicating diagnostic tests

Answer: A

12) A healthcare organization receives funding to study a new medical device to be used during surgery. Which database should the organization access to research similar studies? A) Patient Centered Outcomes Research network (PCORnet) B) The National Network of Libraries of Medicine (NN/LM) C) The Academic Center for Evidence-Based Practice (ACE) D) The Agency for Healthcare Research and Quality (AHRQ)

Answer: A

12) The cost of a new or upgraded system can be burdensome on an organization from a budgetary perspective. Which statement explains the return on investment? A) Employees express satisfaction with their jobs and turnover rate is low. B) Staff members with IT skills are more marketable and have greater job flexibility. C) The newly trained individual can be granted work release time to train new staff members. D) After the training, the objectives have not been met.

Answer: A

14) National standards for interoperability are constantly being developed. Which entity controls the future of health information exchanges (HIEs)? A) Nationwide health information network (NHIN) B) The Department of Homeland Security C) HIPAA D) HIMMS

Answer: A

15) A large healthcare organization is a member of a health information exchange (HIE). What should this organization expect as a stakeholder in the exchange? A) Paying a membership fee B) Reduction in reimbursement from Medicare C) Reduced rates for purchasing bulk medical supplies D) Group rates for nursing continuing education programs

Answer: A

16) A healthcare organization is experiencing a drop in revenue that is impacting patient care. In which way can nursing research impact this issue? A) Provide analytical data B) Change staffing patterns C) Begin a job-sharing program D) Withhold using time-off benefits

Answer: A

2) The Centers for Disease Control and Prevention (CDC) and the Centers for Medicare and Medicaid Services (CMS) transmit personal health information over the Internet. What did these organizations do to ensure privacy and security of this patient data? A) Sign DURSA. B) Install encryption software. C) Network all of the computers. D) Implement biometric authentication.

Answer: A

22) The informatics nurse is preparing material for new employee orientation about Internet technology. Which information should the nurse include that best depicts the impact that Internet technology has on the security of health-related information? A) Health information on the Internet requires the same types of safeguards provided for information found in private offices and information systems. B) Health information on the Internet does not require the same types of safeguards provided for information found in private offices and information systems. C) Health information on the Internet requires more types of safeguards than what are provided for information found in private offices and information systems. D) Health information on the Internet requires fewer safeguards than what are provided for information found in private offices and information systems.

Answer: A

25) The informatics nurse is preparing to discuss the Health Insurance Portability and Accountability Act (HIPAA) security rule with a group of new colleagues. What should the nurse explain about this rule and the use of technology? A) Does not specify the use of particular technology B) Refers to the Joint Commission standards for technology C) Specifies the utilization of HIPAA approved technology D) Provides a monthly web-based list of approved technology

Answer: A

27) A healthcare organization is implementing mobile technology for all staff providing direct patient care. Which should be considered when determining the best approach for the devices? A) Ensure adequate bandwidth for wifi signals. B) Make sure all devices are secure before assigning a device to a staff member. C) Replace all lost devices with those configured to the electronic health record. D) Configure personal smartphones to interface with the hospital's networking system.

Answer: A

28) A healthcare organization is awarding Fitbit devices to staff who exceed expectations on annual performance reviews. Which should the organization provide to the staff prior to supplying the devices? A) Explanation of how the data will be used B) Commitment to adhere to the advice provided once data are analyzed C) Expectation that health insurance premiums may be affected by the data D) Expectation that it is to be worn as a contingency for continued employment

Answer: A

3) The informatics nurse is preparing a training sheet to be used in orientation. Which should the nurse describe as the protection of information against threats to its integrity, inadvertent disclosure, or availability? A) Information security B) Survivability C) Confidentiality D) Privacy

Answer: A

3) The preparations for a health information exchange (HIE) include organizing a governing body and establishing financial sustainability. Which is considered a conceptual and sustainable public governance model? A) Public utility HIE with government oversight B) Public utility HIE with no government oversight C) Private sector-led HIE with local collaboration D) Private sector-led HIE with corporation collaboration

Answer: A

5) The informatics nurse is seeking information on patient outcomes. Which type of data network should the nurse access for this information? A) Clinical data network B) Health information network C) Integrated delivery network D) Health system in another state

Answer: A

7) The nurse needs to locate specific information to support a change in clinical practice. Which database should be accessed to locate this information? A) The National Network of Libraries of Medicine (NN/LM) B) The Academic Center for Evidence-Based Practice (ACE) C) The Agency for Healthcare Research and Quality (AHRQ) D) The American Association of Critical-Care Nurses (AACN)

Answer: A

8) The instructor is considering blended learning when training on the new clinical information system. Which should the instructor keep in mind about this teaching strategy? A) Blended learning maximizes learning and minimizes cost. B) The use of blended learning is not appropriate for super user training. C) Blended learning is too complicated for training sessions. D) Blended learning should only be used for point-of-care staff.

Answer: A

9) The informatics nurse is examining the relationship between the national health information network (NHIN) and the health information exchanges (HIE). Which explains this relationship in the United States? A) The success of the NHIN is dependent on the state-wide HIEs. B) The success of the NHIN is not dependent on the state-wide HIEs. C) The success of the state-wide HIEs is dependent on the NHIN. D) The success of the state-wide HIEs is not dependent on the NHIN.

Answer: A

9) The information technology system is concerned that spyware has infected a group of computers. Which is least likely to be found when searching for spyware on a computer? A) Ability to Skype B) Appearance of pop-ups C) Random error messages D) Poor system performance

Answer: A

9) The instructor is interested in learning the best approaches to use when training staff on a clinical information system. Which organization should the instructor contact? A) Association for Talent Development (ATD) B) Department of Health and Human Services (HHS) C) International Society for Performance Improvement (ISPI) D) Association for Nursing Professional Development (ANPD)

Answer: A

20) Healthcare providers who participate in the health information exchange must adopt the 2016 standards for EHRs to exchange common data. Which additional actions must occur at this time? Select all that apply. A) Adopt implementation specifications. B) Use new workflows. C) Educate end-users on the clinical terminologies. D) Consider the cost for using the system. E) Limit the of type exchange available.

Answer: A, B, C

7) The leadership team identifies a lead instructor to conduct all of the training on the new clinical information system. Which should the instructor consider when selecting an appropriate training method? Select all that apply. A) Time required to develop program B) Cost of development and training C) Information retention strategies D) Learning styles of instructor E) Scheduling for day shift sessions

Answer: A, B, C

14) The staff within the information technology department is reviewing a draft of a downtime policy. Which should be included in this policy? Select all that apply. A) Communication processes B) Methods for storing backup data C) Forms for alternate documentation D) Schedule for routine downtime drills E) Approval for staff to document overtime

Answer: A, B, C, D

18) A healthcare organization is reviewing the health information exchange being considered. Which is a prerequisite for the HIE organizing infrastructure? Select all that apply. A) Master person index B) Record locator service C) Methods of authentication D) Authorization for users E) Escalating fees for use

Answer: A, B, C, D

13) The research department within a multisystem healthcare organization requires funding to continue an ongoing study. Which sources should the department consider to obtain this funding? Select all that apply. A) Corporations B) Government grants C) Non-profit agencies D) Individual donations E) Academic institutions

Answer: A, B, C, E

2) The nurse is reviewing the results of a study using outcomes research. Which outcomes should the nurse analyze? Select all that apply. A) Survival B) Quality of life C) Functional status D) Medication usage E) Patient satisfaction

Answer: A, B, C, E

14) The nurse receives a notice about changes in funding for the Patient Centered Outcomes Research Network (PCORnet). Which agencies will be funding this public database in the future? Select all that apply. A) Private industry B) National Institutes of Health C) The World Health Organization D) The Food and Drug Administration E) The Department of Veterans Affairs

Answer: A, B, D

10) The information technology department is updating the procedures to handle threats to the computer system. For which type of invaders should a procedure be written to support? Select all that apply. A) Malware B) Scareware C) Telehealth D) Ransomware E) Social networking sites

Answer: A, B, D, E

19) The information technology department is reviewing the policy and procedure for disposing of confidential patient information. Which should be listed as appropriate actions to destroy this material? Select all that apply. A) Ensure shredders are installed on each care area. B) Mark all patient information with CONFIDENTIAL. C) Download patient data onto thumb drives for later use. D) Place locked receptacles in the laboratory and pharmacy. E) Erase all patient confidential information from hard drives.

Answer: A, B, D, E

3) The instructor is preparing information to include during training on the new computer information system. Which policies should be included in the content? Select all that apply. A) Patient privacy and security B) Password security C) Computer literacy D) System-error correction E) System idiosyncrasies

Answer: A, B, D, E

6) The leadership team is working with the information technology department in the planning of a new computerized information system. Which steps need to be done to ensure the system has the best possible amount of security? Select all that apply. A) Prepare a security policy. B) Draft a well-crafted security plan. C) Ensure a sufficient number of computer workstations are in place. D) Ensure adequate number of staff members for support. E) Thoroughly assess assets, risk, and necessary resources.

Answer: A, B, D, E

19) The informatics nurse is meeting with the leadership team of a multiple physician practice who do not want to participate in the health information exchange (HIE). Which should the nurse identify as a barrier to the implementation of the exchange? Select all that apply. A) Developing a sustainable HIE business model B) Funding C) Location D) Personnel E) Integration into daily workflow

Answer: A, B, E

6) A healthcare organization is planning to use the PARIHS framework to implement evidenced-based practice. Which elements should the organization plan to have for a successful implementation? Select all that apply. A) Context B) Evidence C) Validation D) Evaluation E) Facilitation

Answer: A, B, E

18) Passwords are a common means to authenticate access to automated records. Which recommendation should the informatics nurse suggest for password selection and use? Select all that apply. A) Using software to test and eliminate easily compromised passwords B) Using the browser "password save" feature C) Deleting and replacing all system user passwords when employment is terminated D) Storing passwords in a file on the computer E) Using the same password for access to all sites or systems

Answer: A, C

10) The nurse questions if an article was written by a healthcare professional because several pieces of data appear to be misinterpreted. Which action should be taken to identify a ghostwriter? Select all that apply. A) Use peer reviewers with expertise. B) Notify the publisher that the article is incorrect. C) Note if interpreted data is in sync with current practice. D) Monitor the internal and external validity of research data. E) Contact the listed author and ask questions about the content.

Answer: A, C, D

15) The leadership team at a multisystem healthcare organization is noting the contributions that the division of nursing has had through various research projects. Which program has nursing research impacted? Select all that apply. A) Meaningful use criteria B) Medicare reimbursement C) Clinical quality measures D) National Patient Safety Goals E) CMS conditions of participation

Answer: A, C, D

21) The informatics nurse is working with the information technology department to enhance information security. Which measure should be recommended? Select all that apply. A) Use file deletion software to overwrite hard disk files and leave meaningless information. B) Dispose of erased storage media in the dumpster. C) Individuals should routinely witness and record the destruction of records. D) Papers such as prescriptions, laboratory specimen labels, and identification bracelets should be disposed of in the dumpster. E) Assign each page of output assigned a serial number, and record the numbers when documents are destroyed.

Answer: A, C, E

8) A large healthcare organization is reviewing their information security plan. Which indicates that survivability has been addressed in the plan? Select all that apply. A) One hospital in each regional area has multiple sources of communication with central processing. B) Emergency power generators for all associated hospitals are tested and serviced each week C) The system at central processing is backed up each night, and the data are stored at a remote location. D) One hospital in each regional area has an emergency protocol in place for communicating directly with the Department of Homeland Security. E) One hospital in each regional area is especially prepared to maintain information system functionality for the emergency, operating room, lab, and pharmacy units.

Answer: A, D, E

1) The informatics nurse is working with the information technology department to decide if patient personal health information can be shared through a patient portal over the Internet. What are these technology professionals determining? A) Patient data app B) Information network C) Electronic medical record D) Health information system

Answer: B

13) The informatics nurse is asked why health information exchanges (HIE) are required since they can be costly to maintain. Which should the nurse explain as an advantage of these exchanges? A) They are data repositories accessible by patients and healthcare providers. B) They are tools that provide background information to support healthcare decisions. C) They are massive databases that store all health-related information for safekeeping. D) They maintain complete histories of services used to justify changes in cost and reimbursement.

Answer: B

13) The informatics nurse is reviewing the training plan on downtown procedures. Which information should be an integral part of this plan? A) Length of time to expect the system to be down B) When to enter data back into the computer system C) Location to store the patient information until the system is available D) Identify the person responsible for protecting the personal health information

Answer: B

14) The nurse is preparing to send patient health information to the main computer system from an off-site facility. What should the nurse do before sending this information? A) Spell check the information. B) Ensure it will be sent over an encrypted network. C) Telephone the recipient to inform him or her that the information is being sent. D) Validate the patient demographic information over a public network.

Answer: B

16) A health information exchange (HIE) charges physicians in private practice a fee to access the exchange to research medication uses and the latest in diagnostic testing for a specific patient population. In which way could this be viewed as a HIPAA violation? A) It is not a HIPAA violation. B) The information is being sold for profit. C) The physicians may not keep the information confidential. D) Accessing the system may be done by unapproved personnel.

Answer: B

17) To accomplish exchanges, an HIE infrastructure requires not only technology but an organizing structure for processes. Which does the organizing structure establish? A) Nontechnical standardization B) Secure application and rules of operation C) Trans-operational exchanges D) Standardized workflow to obtain nonessential information

Answer: B

2) The instructor is beginning an instructor-lead training (ILT) session on the upcoming clinical information system. What should the instructor say prior to having the participants access the practice clients? A) "All of the information in the database are from real patients." B) "Information used to create this database cannot be linked to any actual patients." C) "Let me know if you recognize any of the patients in the database, and I'll see if you are right." D) "Don't talk to anyone about the patients in the database. No one should have an unfair advantage."

Answer: B

4) A nurse receives a needlestick but is unaware that the client is positive for HIV. The nurse manager asks the client to sign a form granting permission to share the diagnosis with the nurse so treatment can begin. What is this situation considered? A) Informed consent B) Information consent C) HIPAA violation D) Breech of privacy

Answer: B

4) A state is using an information network, which is led by the private sector with government collaboration. What is an advantage of this type of network? A) Functions without an organization B) Easy to adapt to changing service needs C) Subject to government administrative rules and processes D) Provides oversight with or without regulatory control over the information network's infrastructure

Answer: B

4) The instructor addresses a policy that explains the paper forms to complete if the clinical information system is not available. Which policy is the instructor addressing? A) Email B) Downtime C) Screen security D) Information uploading

Answer: B

4) The nurse notes that a research study is graded as a C on the SORT scale. Which organization should the nurse realize created this type of research leveling? A) World Health Organization (WHO) B) Family Practice Inquiries Network (FPIN) C) Agency for Healthcare Research and Quality (AHRQ) D) American Association of Critical-Care Nurses (AACN)

Answer: B

6) A large healthcare organization is interested in learning how another major system in another state handles an ongoing resource utilization issue. Which type of data network should the organization access to learn this information? A) Clinical data network B) Health information network C) Integrated delivery network D) Health system in another state

Answer: B

6) The instructor is working with the informatics nurse to plan training for the new clinical information system. Which approach provides the most effective end-user learning experience? A) Real client data are utilized for realistic practice. B) The equipment used for training is the same used in the clinical setting. C) Two employees share each workstation for mutual encouragement. D) The live system is used with simulated client data.

Answer: B

7) A healthcare facility has discovered that data from one patient's chart was placed in another patient's chart, causing both charts to have invalid data. Which information security area does this breach affect? A) Survivability B) Integrity C) Availability D) Inadvertent disclosure

Answer: B

An organization is uploading client information into the database to use for training on the health information system. What must be done with this information before training begins? A) Categorize according to health problem. B) Delete all client-identifying information. C) Ensure for a wide selection of treatments. D) Subdivide according to healthcare provider.

Answer: B

1) The informatics nurse is using outcomes research to determine the effectiveness of changes made to the electronic health record. On which concepts should the nurse focus? Select all that apply. A) Accelerating the diffusion of research into practice B) Linking treatments and outcomes data through databases C) Minimizing variations in practice by developing quality guidelines D) Analyzing databases so results can be quickly and easily disseminated E) Providing ways to systematically measure the functioning and well-being of patients

Answer: B, C, D, E

12) The informatics nurse is working with the information technology department to update the procedure and policies for system security. Which information should be included to prevent the introduction of malicious software into the system? Select all that apply. A) Disable the Internet firewall. B) Only use licensed software on the computers. C) Never open any file attachment from an unfamiliar source. D) Download software patches to eliminate security problems. E) Retain backup copies of original software, work files, and directory structure for each computer.

Answer: B, C, D, E

20) A large healthcare organization experienced a breach of confidential information through an email attachment and is now reviewing the process for sending this type of information electronically. Which should be an expectation when using email for electronic transfer of information? Select all that apply. A) Disabling activated firewalls B) Destroying dormant email accounts C) Destroying unauthorized email accounts D) Ensuring the email program is encrypted E) Using software to monitor network traffic

Answer: B, C, D, E

26) The informatics nurse is reviewing the Health Insurance Portability and Accountability Act (HIPAA) security rule. Which personal health information does this act expect to be protected? Select all that apply. A) Age B) Name C) Address D) Telephone number E) Social Security number

Answer: B, C, D, E

5) The information technology department is reviewing the healthcare-information-security system in place. Which should be kept in mind when reviewing the purpose of this security system? Select all that apply. A) Enhanced overtime B) Saving time and money C) Guarding against cybercrime D) Preventing breaches in confidentiality E) Regarded as a form of insurance against downtime

Answer: B, C, D, E

16) A healthcare provider slides a smart card through a card reader and then place a finger on a scanner before being permitted access to a computer terminal in a healthcare organization. Which authentication measures were used to verify authorization to access client data? Select all that apply. A) Appearance of the user's name on a screen B) Biometric authentication C) Picture authentication package D) Proximity radio authentication E) Encrypted pass key authentication

Answer: B, E

10) The health information exchange (HIE) requires exchange of health-related information according to nationally recognized standards. What will the HIE link into to ensure users share reliable health-related information in a standardized, secure, and confidential way? A) Office of National Coordinator (ONC) B) Health information network (HIN) C) National health information network (NHIN) D) Health Information Security and Privacy Collaborative (HISPC)

Answer: C

10) The vendor providing the clinical information system being implemented in a healthcare organization invites the instructor and several other leadership colleagues to a training session so that these individuals can then train the end-users. Which type of training support is being provided by the vendor? A) Blended B) Just-in-time C) Train the trainer D) Instructor-led training

Answer: C

11) The Health Insurance Portability and Accountability Act (HIPAA) requires organizations to determine threats and appropriate protective measures for information, not only in electronic formats, but in all formats. Which measure is least likely to be incorporated by an organization to secure all data? A) Creation of authentication policies B) Specific software C) Spyware D) Firewall

Answer: C

11) The instructor is determining which type of evaluation to conduct after training on the use of the clinical information system. What should the instructor keep in mind as the end goal of the training? A) Training should be evaluated after the fifth session. B) Training evaluation is necessary after the class. C) Training assumes proficiency will occur over time with use. D) All super users have the opportunity to evaluate the training process.

Answer: C

11) The nurse needs to locate specific information to support a clinical project. For which reason should the nurse access the Patient Centered Outcomes Research network (PCORnet)? A) Funded by private sources B) Links all libraries on the Internet C) Contains clinical effective research D) Access limited to healthcare workers

Answer: C

17) A certified nursing assistant (CNA) at a local nursing home logs on to the facility's clinical information system and can only see information about assigned clients except for financial data. Which type of security is applied to this system? A) Password protection B) Computer forensics C) Access levels D) User authentication

Answer: C

23) The informatics nurse is updating the policy on the use of email to send information to include the HIPAA regulations. When should it be identified that personal health information can be sent through email? A) Client's consent was obtained to send information via email. B) Recipient is known to the sender. C) Email is sent encrypted. D) Organization's email system has appropriate firewalls.

Answer: C

24) A healthcare organization is concerned because several staff members have posted confidential patient information on their Facebook pages. Which should be communicated to all staff regarding the use of social media? A) Used to post results of diagnostic tests B) Seen as an avenue to report laboratory results C) Used for education and empowerment of consumers D) Encouraged as a way to promote relationships with patients

Answer: C

5) The nursing leadership team is brainstorming ways to change one aspect of care provided by the clinical staff. Which approach should be used that considers factors that determine the likelihood of adoption of practice? A) Iowa model B) Stetler model C) ACE star model D) PARIHS framework

Answer: C

8) The administrator of a large, physician practice is planning to assist with accessing data for the current patient population. What should the administrator expect if the interoperability of the network is classified as being a pilot? A) Has no or low adoption B) Has not been broadly tested C) Some entities are using the network in a testing or production environment D) Requires additional specification by the standards-development community

Answer: C

8) The nurse notes that a substantial amount of research data are available through search engines and databases. For which reason should the nurse contact the Office of Extramural Research, Education and Priority Populations (OEREP)? A) Locating an author of a research study B) Identifying where a study was conducted C) Learning what is being done to preserve the research data D) Obtaining the names of the people who were studied in a project

Answer: C

1) During the course of client care, a client reports having an abortion but no one else in the family knows. Which term best describes this situation? A) Information consent B) Privacy C) Information security D) Confidentiality

Answer: D

12) A conference being held in Europe has the topic of international standards as a lecture session. Which statements explain the importance of further developing these standards? A) Improves the use of drug databases B) Increases access to medical journals C) Provides a mechanism to link nursing databases D) Supports communicating information worldwide

Answer: D

13) The home care agency provides all nursing staff with laptop computers so they can document immediately after providing care in the patients' homes. Which action should be taken when assigning a laptop to a staff member? A) Disable all functions except for the online documentation system. B) Expect the laptop to be returned to the agency at the end of every work day. C) Install tracking software so every keystroke can be recorded for later evaluation. D) Have the employees sign a confidentiality-and-privacy agreement and complete HIPAA training.

Answer: D

15) The informatics nurse is reviewing tips to create effective passwords. Which password provides the most information and system security? A) StJohns3821 B) p#3J24q7 C) p#5N24p7#hN5 D) p#3J24q7?hN5

Answer: D

2) The informatics nurse is updating the policy about breaches. For which reason do must breaches of confidentiality occur? A) Malicious behavior B) System hacking C) Intent D) Carelessness

Answer: D

3) The nurse reviewing several pieces of literature notes the GRADE approach was used to rate the evidence. What should the nurse realize as being the purpose of this approach? A) Increasing the use of research by nurses B) Reducing the cost associated with grading research C) Focusing on the nursing outcomes when grading research D) Promoting the development of a transparent approach to grade research evidence

Answer: D

5) It has been determined from previous experience that eight hours is the minimum time necessary for staff nurses to obtain initial training on the new system. Which of the following is the best way to schedule this training? A) One eight-hour session is offered six weeks prior to the go-live date, where employees drop in when they are caught up with work assignments. B) Eight one-hour sessions are scheduled one month prior to going live, starting immediately after the employee's shift has ended. C) Four two-hour sessions are scheduled three months prior to going live during nonscheduled work time. D) Two four-hour sessions are offered one month before going live during nonscheduled work time.

Answer: D

7) The informatics nurse is assisting a large physician practice with obtaining health information on patients who reside in different states. Which would enhance the nurse's ability to obtain this information? A) Encryption B) Sustainability C) Authentication D) Interoperability

Answer: D

9) The nurse is planning to implement a study to measure the effectiveness of post-operative teaching. For which reason should the nurse obtain informed consent from the study participants? A) Ensuring that the patient's name remains confidential B) Communicating the patient's participation with the other staff members C) Making sure that the patient does not participate in another research study D) Receiving permission to use information collected while the patient received care

Answer: D


Conjuntos de estudio relacionados

Project Management Ch. 11 Quizzes

View Set

Unit 1: Financial Responsibility and Decision Making

View Set

Chapter 12 - Supply chain management in the service industry

View Set

Introduction to Sociology Ch 16 Questions

View Set

RN Adult Medical Surgical Online Practice 2023 B

View Set