Information Systems Multiple Choice Questions (Flash Card mode)

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is primary storage? A. RAM B. USB drive C. CD D. external hard drive

A. RAM

The most secure model of signatures used in information systems is A. digital signature. B. electronic signature. C. digitized signature. D. there is no difference in the level of security between these models.

A. digital signature

What types of software provide a front-end structure/interface that presents information in a familiar format leading to a natural style of interaction through the use of icons and a mouse? A. graphical user interface B. fiber optics C. assembly level language D. machine language

A. graphical user interface

The patient's blood pressure is automatically being recorded. This is an example of what type of clinical information system? A. patient monitoring system B. medical documentation C. nursing applications D. patient registration

A. patient monitoring system

What controls the traffic on the Internet? A. the World Wide Web B. Internet protocol C. the ISDN D. domain names

B. Internet protocol

Dr. Smith is entering a medication order in a CPOE. A window pops up with the following message: Patient is on beta-blocker, which is a contraindication for this medication. Do you want to order this medication? Yes or No. This is an example of a(n) A. reminder B. alert C. allergy D. structured entry

B. alert

Your release of information system has part of the computing on the workstation and part on the file server. What type of technology is being used? A. Internet B. client server C. LAN D. operating system

B. client server

Southside Community Hospital utilizes a wide area network to transport data across the Internet. This is done by using a private tunnel. This is a(n) A. WLAN B. LAN. C. VPN D. FDDI

C. VPN

You have been asked to identify and display the existing record processing workflow with the paper record. After you finish this, you will redesign the process and display the new process. What tool should you use? A. policy and procedure B. data dictionary C. data flow diagram D. data mapping

C. data flow diagram

The data on the hard drive were erased by a corrupted file that had been attached to an e-mail message. Which software would be used to prevent this? A. productivity B. utility C. virus checker D. encryption

C. virus checker

A common language used in data definition, and data manipulation is A. unified modeling language. B. metadata C. HTML. D. SQL

D. SQL


Conjuntos de estudio relacionados

Ch 2 Sociological Research Methods

View Set

WGU nutrition- nutrition for adults

View Set

Sesh 22 Adjusting Speed / Road Conditions, + 23 Winter Driving

View Set

NSG 115 Sexuality, Reproduction, & STI

View Set

Psyc 452 Booth-Ledoux Exam 1, Psyc. 452 Booth-Ledoux Exam 2, Psyc. 452 Booth-Ledoux Exam 3

View Set