Chapter 6
The ability to work with other systems. Intranet Ethernet Interoperability Interface Boot
Interoperability
The practice management software allows the user to enter patient demographic information, schedule appointments, perform billing procedures, and generate reports. EMR software contains the patient's medical treatment information for one healthcare facility. Both statements are true. Both statements are false. The first statement is true; the second is false. The first statement is false; the second is true.
Both statements are true.
Which of the following is used to ensure that all office computer programs and data are secure in case of a mishap, fire, or natural disaster? RAM Microprocessor Write-protection Data backup
Data backup
What is not recommended for infection control practices for technologic devices? Healthcare professionals should wash hands or use hand sanitizer before and after using the keyboard. Disinfection keyboards, touchscreens, and signature pads weekly. Gloves should not be worn during computer use. Use plastic covers to enclose keyboards and other devices.
Disinfection keyboards, touchscreens, and signature pads weekly.
An electronic record of health-related information about an individual that can be created, gathered, managed, and accessed by authorized clinicians and staff members within a single healthcare organization. This is an electronic version of a paper record. Operating system Electronic health record Electronic medical record Practice management software
Electronic medical record
A series of computers that are linked, allowing them to share information, is a(n): database. clearinghouse. network. internet.
network.
With practice management software, what tasks can be performed? Claim denial management and electronic claim submission Financial and management reporting Scheduler and insurance eligibility verification Medical coding or encoder All are correct
All are correct
This security measure records computer activity of a user within software. Virus protection software Audit trails Security risk analysis Access restrictions Monitoring log-in activity
Audit trails
__________ means that each employee with network access must log in using a unique password. Unique user identification Firewall Authentication Administrative safeguard
Authentication
___________ is a process in which the network files are copied either using an external hard drive, a server, or an online system. RAM Microprocessor Write-protection Backing up
Backing up
Which of the following screens responds to the electrical characteristics of a finger and is found in smartphones and other electronic devices? Touchpad Resistive touch screen Capacitive touch screen Surface acoustic wave
Capacitive touch screen
Malware are unauthorized users who attempt to break into computer networks. True False
False
What acts as a filter or barrier between the network and the internet? Network systems Virus detectors Scanners Firewalls
Firewalls
An ergonomic workstation designed for prolonged use will not include which of the following? Headsets Split-key keyboards Laptops and tablets Foam wrist rest
Laptops and tablets
Which statement is not correct? A personal computer is a single user electronic data processing device. A personal computer and peripheral devices are hardware. Output devices allow data to be entered into the computer. Secondary storage devices include jump drives, hard drives, and flash drives.
Output devices allow data to be entered into the computer.
A secure online website that gives patients 24-hour access to personal health information using a username and password. Intranet Ethernet Patient portal Interface Boot
Patient portal
Which of the following is an output device? Printer Scanner Touch pad Keyboard
Printer
Which of the following keyboards helps reduce repetitive strain injuries by minimizing muscle strain? QWERTY keyboard Wireless keyboard Split-key layout Waved or curved key layout Split-key layout and waved or curved key layout
Split-key layout and waved or curved key layout
What is incorrect when performing routine cleaning for computer hardware? Use a damp, lint-free cloth to wipe the hardware's casing. Spray a household glass cleaner on the monitor screen and wipe with a lint-free cloth. Spray a disinfectant on a lint-free cloth and clean the keyboard. Use a compressed air duster to blow the dirt out of the keyboard. Wipe clean all vents and air holds.
Spray a household glass cleaner on the monitor screen and wipe with a lint-free cloth.
What practice would not be considered ergonomically correct? The chair's backrest supports the upper body. The chair's armrest supports the forearms with the shoulders in a relaxed position. Using a document holder. The bottom of the monitor is at or just below eye level.
The bottom of the monitor is at or just below eye level.
A file is a collection of data or program records stored as a unit with a specific name. True False
True
HIPAA and HITECH require privacy, security, and confidentiality of patient records. True False
True
Privacy filters are also called privacy screens and are devices attached to monitors that allow visualization of the screen contents only if the user is directly in front of the screen. True False
True
Telehealth refers to remote clinical services and nonclinical services, such as provider training, meetings, and continuing education. True False
True
A mouse is a(n): output device. input device. storage device. processor.
input device.
An application program is a software that is designed to: perform a variety of tasks, such as word processing, database functions, and patient billing. provide the computer with a set of basic instructions for executing other programs. interpret the program instructions. All are correct
perform a variety of tasks, such as word processing, database functions, and patient billing.
When using cloud storage, the files are copied onto many servers in various locations. This is called: interoperability. security risk analysis. electronic transaction. redundancy. interface.
redundancy.
If you want to transfer paper files to a computerized system without inputting all the data using the keyboard, you could use a: modem. disk operating system. scanner. magnetic disk drive.
scanner.