RHIT - Information Technology Domain 4

¡Supera tus tareas y exámenes ahora con Quizwiz!

As the Compliance Officer for an acute care facility, you are interested in researching recent legislation designed to provide significant funding for health information technology for your next committee meeting. You begin by googling A. EMTALA. B. HIPAA. C.Health Care Quality Improvement Act. D. ARRA. REFERENCE: LaTour, Eichenwald-Maki, and Oachs, p 17 McWay, pp 34-35 Sayles, pp 25, 162

ARRA The American Recovery and Reinvestment Act was signed into law in 2009, and included significant funding for health information technology.

A facility wants to purchase a system that will use barcodes on all drug and biological products to help in ensuring patient safety. Which system should the facility purchase? A. EHR B. CPOE C. BC-MAR D. EMAR REFERENCE: Amatayakul, p 27

BC-MAR

Which one of the following would NOT be a strategy when purchasing an electronic health record system? A. Identify stakeholders from different organizational levels and engage them appropriately. B. Identify system requirements. C. Identify return on investment or cost-benefit analysis. D. Broaden the vendor field and select several vendors of choice. REFERENCE: AHIMA Practice Brief "Purchasing Strategies for EHR Systems" LaTour, Eichenwald-Maki, and Oachs, pp 145146 Sayles, p 862

Broaden the vendor field and select several vendors of choice.

Which one of the following is NOT an advantage of a computerized master patient index? A. It solves most space and retrieval problems. B. It allows access to data alphabetically, phonetically, or by date of birth, social security number, medical record, or billing number. C. It provides other departments with immediate access to the information maintained in the master patient index. D. Duplication of patient registration can never occur. REFERENCE: Green and Bowie, pp 237239 LaTour, Eichenwald-Maki, and Oachs, pp 226227 Sayles, pp 324326

Duplication of patient registration can never occur.

http://www.delmarlearning.com/iq/prg/2014/rhiarhit/content/img/StndRes/PRG/scprrhex01q.17.016.jpg The proposed National Healthcare Information Network (NHIN) dimensions are graphically depicted in the diagram above. Roman numerals are added to allow for the identification of specific areas. Where would information concerning a patient's health insurance be located on this chart? A. III B. I C. V D. II REFERENCE: Sayles, pp 984-986

II

Diverticulitis large bowel with abscess; right hemicolectomy with colostomy performed. K57.90 Diverticulosis of colon (without mention of hemorrhage) K57.92 Diverticulitis of colon (without mention of hemorrhage) K63.0 Abscess of intestine 0DTK0ZZ Open and other right hemicolectomy 0DTL0ZZ Open and other resection of transverse colon 0D1K0Z4 Exteriorization of large intestine (loop colostomy) A. K57.92, K63.0, 0DTK0ZZ B. K57.90, 0DTL0ZZ, 0D1K0Z4 C. K57.92, 0DTK0ZZ, 0D1K0Z4 D. K57.92, K63.0, 0DTL0ZZ REFERENCE: AHA, pp 243-244, 247-248

K57.92, K63.0, 0DTK0ZZ

Dr. Gray has applied for medical staff privileges at your hospital. What database would you research to determine if he has been denied medical staff privileges at another hospital? A.Healthcare Integrity and Protection Data Bank B. State Administrative Data Bank C. MEDPAR file D. National Practitioner Data Bank REFERENCE: Abdelhak, p 472 Green and Bowie, pp 251, 255 LaTour, Eichenwald-Maki, and Oachs, p 330 Sayles, p 657

National Practitioner Data Bank

As the Director of a Health Information Technology Program, your community college has been selected to participate in the workforce development of electronic health record specialists as outlined by ARRA and HITECH. In order to keep abreast of changes in this program, you will need to regularly access the Web site of which governmental agency? A. CDC B. OSHA C. CMS D. ONC REFERENCE: LaTour, Eichenwald-Maki, and Oachs, pp 17, 35, 83, 195 Sayles, p 25

ONC

As the Director of a Health Information Technology Program, your community college has been selected to participate in the workforce development of electronic health record specialists as outlined by ARRA and HITECH. In order to keep abreast of changes in this program, you will need to regularly access the Web site of this governmental agency. A. CMS B. OSHA C. ONC D. CDC REFERENCE: Sayles, pp 142, 162

ONC CMS, OSHA, and CDC are not correct - these are defined as follows: CMS - utilization review committees deal with the issues of the medical necessity of admissions and efficient utilization of facility resources; OSHA - risk management committees consider methods for reducing injury and financial loss; CDC - joint conference committees act as a liaison between the governing body and the medical staff. ONC is correct as this organization's task is to coordinate nationwide efforts to implement and use the most advanced health information technology and the electronic exchange of health information.

Gail Smith has presented to the ER in a coma with injuries sustained in a motor vehicle accident. According to her sister, Gail has had a recent medical history taken at the public health department. The physician on call is grateful that she can access this patient information using the area's A. expert system. B. EDMS system. C. CPOE. D. RHIO. REFERENCE: Green and Bowie, p 112 Sayles, p 326

RHIO.

A common language used in data definition, and data manipulation is A. unified modeling language. B. HTML. C. SQL. D. metadata. REFERENCE: Marreel and McLellan, p 207 McWay, p 171 Sayles and Trawick, p 177

SQL

http://www.delmarlearning.com/iq/prg/2014/rhiarhit/content/img/StndRes/PRG/scprrhex01q.10.050.jpg The EHR system selection committee evaluated three systems on a scale of 1-3 with a score of 3 being the best. The priority is ranked on a scale of 1-3 with 3 being the highest. Based on the evaluation above, which of the following systems should be purchased? A. System C B. System B C. System A D. none of these choices REFERENCE: Sayles and Trawick, pp 126-127

System B

The Assistant Director of Record Processing is evaluating software packages for a chart tracking system in the HIM Department. What is the BEST method to verify that the software will work as marketed? A. Perform a vendor reference check. B. Test the software prior to purchase. C. Visit corporate headquarters of the vendor. D. Read consumer reports before buying. REFERENCE: Abdelhak, pp 343345 LaTour, Eichenwald-Maki, and Oachs, pp 146148 Sayles, p 862

Test the software prior to purchase

A milestone is A. the distance between the users and the data center. B. a step in the path to the implementation of a system such as the EHR. C. a module of an information system such as the EHR. D. a project plan. REFERENCE: Amatayakul, p 120

a step in the path to the implementation of a system such as the EHR.

As supervisor of the cancer registry, you report the registry's annual caseload to administration. The most efficient way to retrieve this information would be to use A. patient index. B. patient abstracts. C. follow-up files. D. accession register. REFERENCE: Johns, p 487 LaTour, Eichenwald-Maki, and Oachs, p 371 Sayles, p 439

accession register

Maria has received a request to update a patient's insurance number. What system should she use? A. clinical decision support system B. laboratory information system C. executive information system D. admission-discharge-transfer system REFERENCE: Abdelhak, p 179 Green and Bowie, pp 237-240 Marreel and McLellan, pp 8, 187 Sayles, pp 912-913

admission-discharge-transfer system

As HIM director, you must ensure a means to regulate access and ensure preservation of data in the health care facility's computer system. Which of the following security measures can be implemented to prevent privacy violations in this computer system? A. all of these B. encryption C. authentication D. disaster recovery plan REFERENCE: LaTour, Eichenwald-Maki, and Oachs, p 133 McWay, p 209 Sayles, pp 883, 1038 Sayles and Trawick, p 319

all of these

You are developing a list of functions needed by users of a release of information system. You are also evaluating the current system to see what opportunities there are to improve the system. Which stage of the system developmental life cycle stages are you in? A. design B. analysis C. obsolescence D. implementation REFERENCE: Johns, pp 858-860 LaTour, Eichenwald-Maki, and Oachs, pp 105-106 Marreel and McLellan, pp 62-64, 317-319 McWay, pp 286-287

analysis

Which type of patient information system does the Joint Commission suggest that hospitals use? A. computer-based patient record B. any one of these C. unit record D. protocol for requesting information, whereby the request is provided to the practitioner in a timely manner REFERENCE: Joint Commission

any one of these

University Hospital, a 900 bed tertiary health care organization, is undergoing an information systems development. What system would best meet its needs? A. clinical workstation B. legacy system C. application service provider model D. IBM Medical Information Systems Program REFERENCE: Abdelhak, p 291 LaTour, Eichenwald-Maki, and Oachs, p 140 Sayles, pp 708, 1183 Sayles and Trawick, p 108

application service provider model

Which of the following is the term used to identify who made an entry in the health record? A. access control B. accessibility C. authentication D. authorship REFERENCE: McWay, p 304

authorship

The medical staff wants a speech recognition system where the staff dictates and then the editing of the dictation is done by editors. What type of speech recognition is this? A. front-end speech recognition B. hidden Markov model C. back-end speech recognition D. key-word spotting REFERENCE: Sayles and Trawick, p 284

back-end speech recognition

The function of a(an) ________ is limited to data retrieval. A. executive information system B. electronic health record C. clinical data repository D. database management system REFERENCE: Abdelhak, pp 186187 LaTour, Eichenwald-Maki, and Oachs, p 84 Odom-Wesley and Brown, p 225 Sayles, p 994 Sayles and Trawick, pp 72, 100

clinical data repository

Upon final review of the RFP that is to be sent out to prospective vendors, you notice that there is content that should not be included in the operational requirement section of the document. Which of the following information should be deleted from this section? A. data architecture B. data analysis tools C. data conversion D. response time REFERENCE: Amatayakul, p 386 Marreel and McLellan, pp 90-100 McWay, p 401

data conversion

As HIM Department Director, you are on the implementation team for the new MPI. You have been assigned the responsibility of looking at every data element stored in the system and establishing criteria for the use of each. An example of what you are doing is shown below. Name - Last name Description - This field is for the patient's last name Number of characters - 30 Alphanumeric - Alpha Acceptable characters - a-z Responsible person - HIM Director Used in reports - Admissions list, discharge list, transfer list, health record number list, UB-92, CMS-1500 You are responsible for the A. data flow diagram. B. decision tree. C. rules based algorithms. D. data dictionary. REFERENCE: Amatayakul, p 270 Eichenwald-Maki and Petterson, p 27 Green and Bowie, pp 250, 253 Marreel and McLellan, pp 79-81, 191 McWay, p 262 Sayles, pp 882-884

data dictionary

You are trying to ensure a patient's name, but the entire name will not fit in the field. Only the first eight characters will fit. This is a problem with which of the following? A. data mapping B. the data dictionary C. the data model D. policy and procedure REFERENCE: Sayles and Trawick, p 94

data mapping

You need to identify some patterns in our database. What technology should you use? A. reminders B. clinical guidelines C. data mining D. alerts REFERENCE: Amatayakul, p 30 Green and Bowie, p 258 LaTour, Eichenwald-Maki, and Oachs, p 86 McWay, p 268

data mining

In performing a "what if" query to determine if the facility should expand the emergency department, which of the following systems would be used? A. knowledge based system B. clinical decision support system C. financial information system D. decision support system REFERENCE: Abdelhak, p 40 Sayles, p 854

decision support system

An effective means of protecting the security of computerized health information would be to A. require all facility employees to change their passwords at least once a month. B. develop clear policies on data security that are supported by the top management of the facility. C. install a system that would require fingerprint scanning and recognition for data access. D. write detailed procedures for the entry of data into the computerized information system. REFERENCE: Abdelhak, pp 285-288 LaTour, Eichenwald-Maki, and Oachs, pp 129, 134, 160, 172, 204, 316, 318, 319, 328, 336, 343-344 McWay (2014), pp 291-293 Sayles, pp 12, 131, 415, 794, 829-830

develop clear policies on data security that are supported by the top management of the facility.

Disease management is an example of which of the following? A. e-health B. clinical information C. information brokering D. radio frequency device REFERENCE: McWay, p 311

e-health

Joint Commission does not approve of auto authentication of entries in a health record. The primary objection to this practice is that A. electronic signatures are not acceptable in every state. B. evidence cannot be provided that the physician actually reviewed and approved each report. C. it is too easy to delegate use of computer passwords. D. tampering too often occurs with this method of authentication. REFERENCE: Green and Bowie, p 78 LaTour, Eichenwald-Maki, and Oachs, pp 174, 897

evidence cannot be provided that the physician actually reviewed and approved each report. Auto authentication is a policy adopted by some facilities that allow physicians to state in advance that transcribed reports should automatically be considered approved and signed (or authenticated) when the physician fails to make corrections within a preestablished time frame (e.g., "Consider it signed if I do not make changes within 7 days."). Another version of this practice is when physicians authorize the HIM department to send weekly lists of unsigned documents. The physician then signs the list in lieu of signing each individual report. Neither practice ensures that the physician has reviewed and approved each report individually.

The hospital administrator is making a strategic decision by querying various institutional databases for information. What type of system is the hospital administrator using? A. electronic health record system B. financial information system C. results reporting system D. executive information system REFERENCE: LaTour, Eichenwald-Maki, and Oachs, p 95 Sayles, pp 885886, 924 Sayles and Trawick, p 213

executive information system

Electronic health record built-in tools that can make data capture easier include all but which one of the following? A. automated quality measures B. flow process charts C. clinical decision support systems D. data dictionaries REFERENCE: Abdelhak, pp 507508 LaTour, Eichenwald-Maki, and Oachs, p 172 Sayles, p 420

flow process charts

What types of software provide a front-end structure/interface that presents information in a familiar format leading to a natural style of interaction through the use of icons and a mouse? A. machine language B. fiber optics C. graphical user interface D. assembly level language REFERENCE: Abdelhak, p 126 Marreel and McLellan, p 196 Sayles, p 877

graphical user interface

One of the ways that an EHR is distinguished from a clinical data repository is that the EHR A. can have digital images. B. has clinical decision support capabilities. C. has data from multiple information systems. D. aggregates data. REFERENCE: Green and Bowie, pp 114-116 McWay, p 126

has clinical decision support capabilities.

The facility Hospital Information System team has been researching network topologies and has decided on one that combines the attributes of bus, ring, and star topologies. What topology has the team chosen? A. network protocol B. TCP/IP C. hybrid network D. physical topology REFERENCE: Sayles and Trawick, p 28

hybrid network

You have just inserted data contained in a spreadsheet into your word processed document. This is an example of a(n)________ system. A. integrated B. graphical user interface C. interfaced D. mapped REFERENCE: Glandon, Smaltz, and Slovensky, p 144 Marreel and McLellan, pp 74-75 McWay, p 110

integrated

Health Informatics, Inc. is a vendor with a large collection of clinical information systems and hospital information systems that are designed to share data without human or technical intervention. This is a(an) A. standard. B. interfaced system. C. integrated system. D. OLAP. REFERENCE: LaTour, Eichenwald-Maki, and Oachs, pp 132133 Sayles, pp 996997 Sayles and Trawick, pp 110111

interfaced system

What Medicare program requires the use of a certified electronic health record? A. prospective payment B. health information exchange C. data standards D. meaningful use REFERENCE: McWay, p 305

meaningful use

Which application design is used in a computer-assisted coding (CAC)? A. natural language processing B. intraoperability C. message standards D. electronic data interchange REFERENCE: Eichenwald-Maki and Petterson, p 160 LaTour, Eichenwald-Maki, and Oachs, p 86 McWay, p 158 Sayles, p 218

natural language processing

Setting up a drop down menu to make sure that the registration clerk collects "gender" as "male, female, or unknown" is an example of ensuring data A. validity. B. reliability. C. precision. D. timeliness. REFERENCE: Abdelhak, pp 133-134 Green and Bowie, p 258 LaTour, Eichenwald-Maki, and Oachs, p 382

precision Validity refers to the accuracy of data, while reliability refers to consistency of data. Timeliness refers to data being available within a time frame helpful to the user, and precision refers to data values that are just large enough to support the application of the process.

Medicare rules state that the use of verbal orders should be infrequent and used only when the orders cannot be written or given electronically. In addition, verbal orders must be A. written within 24 hours of the patient's admission. B. cosigned by the attending physician within 4 hours of giving the order. C. recorded by persons authorized by hospital regulations and procedures. D. accepted by charge nurses only. REFERENCES: Green and Bowie, p 154 LaTour, Eichenwald-Maki, and Oachs, pp 247-248 Davis and LaCour, pp 102-104 Odom-Wesley, pp 111, 113, 290-291, 339

recorded by persons authorized by hospital regulations and procedures. Only persons designated by hospital policies and procedures and state and federal law are to accept verbal orders.

Barbara is being seen at a physician's office that she has never been to before. This physician practice is independently owned and is not associated with a hospital or other physician practice. She did not have to request copies of her medical records, but the physician has everything that she needs. The physician must be part of a(n) A. regional health information organization. B. integrated health network. C. electronic health record. D. corporation. REFERENCE: McWay, pp 272-273 Sayles, pp 983-984

regional health information organization

A common goal of the Office of the National Coordinator for Health Information Technology, RHIOs, and a national infrastructure for information is A. promoting telemedicine. B. sharing information among providers. C. translating images into a digital format. D. transferring health information within a hospital system. REFERENCE: LaTour, Eichenwald-Maki, and Oachs, pp 17, 83, 117, 137, 204, 212 Sayles, pp 34, 162 Sayles and Trawick, pp 336-367

sharing information among providers Health information exchange is a term used to refer to a "plan in which health information is shared among providers."

http://www.delmarlearning.com/iq/prg/2014/rhiarhit/content/img/StndRes/PRG/scprrhia01q.10.001.jpg Review the simplistic screen above. This is an example of how ________ data can be entered. A. nomenclature B. unstructured C. structured D. template REFERENCE: Amatayakul, p 248 Eichenwald-Maki and Petterson, pp 35-37, 108

structured

Your facility is storing scanned records for long-term storage on optical disk. The Risk Management Committee's Disaster Task Force has recommended that copies of the disks be stored at a facility across town. The administrator is concerned that records may be altered on the disks stored off-site. You tell the administrator A. this is a legitimate concern; perhaps the committee should consider storing duplicates in two locations in this facility. B. this is a legitimate concern; it should be addressed in the contract written with the storage facility. C. this is not a concern because WORM technology makes it impossible to alter the documents. D. this is not a concern; there is really no need to make and store duplicate disks as they are difficult to damage. REFERENCE: Abdelhak, pp 190-191 LaTour, Eichenwald-Maki, and Oachs, pp 87, 278 Sayles, pp 346, 1032

this is not a concern because WORM technology makes it impossible to alter the documents.

Why would the database administrator add a foreign key to one of the tables? A. to indicate that it is a primary key in another table B. to ensure that each row is unique C. to separate two tables D. the data element refers to ethnicity REFERENCE: LaTour, Eichenwald-Maki, and Oachs, p 916 Sayles, p 881

to indicate that it is a primary key in another table

In the RFP, you have asked for information regarding the amount of time that a vendor has been in business and the number of installations of the product under consideration. If you want to review this information, you would go to the ________ section. A. licensing and contractual details B. organizational profile C. functional specifications D. vendor information REFERENCE: Abdelhak, p 340 Amatayakul, p 385 Marreel and McLellan, pp 109-110 McWay, p 401 Murphy, p 135

vendor information

The data on the hard drive were erased by a corrupted file that had been attached to an e-mail message. Which software would be used to prevent this? A. productivity B. encryption C. virus checker D. utility REFERENCE: Marreel and McLellan, pp 156-157 McWay, p 290

virus checker

As the Information Security Officer at your facility, you have been asked to provide examples of the physical safeguards used to manage data security measures throughout the organization. Which of the following would you provide? A. audit controls B. entity authentication C. chain-of-trust partner agreements D. workstation use and location REFERENCE: Green and Bowie, pp 270-271 LaTour, Eichenwald-Maki, and Oachs, pp 330, 947 Sayles, pp 1055-1056

workstation use and location


Conjuntos de estudio relacionados

MANA3335 MindTap Case Activity: Chapter 10: Managing Employee Motivation and Performance

View Set

Mental Health Disorders & Addictions

View Set

100 core Hindi Words - Hindi Pod 101

View Set

Sociology of Culture final review compilation

View Set

El Conditional Tense. Realidades 3 pag. 352 "You use the conditional in Spanish to express what a person would do or what a situation would be like"

View Set

CodePath Data Structure Patterns

View Set