Final Exam Study Questions

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

When describing the various biometric methods for authentication, which ofthe following would the nurse identify as most secure? A) Fingerprint B) Voiceprint C) Retinal scan D) Iris scan

D) Iris scan

A nurse is reading a journal article about syndromic surveillance. The nurse would expect the article to describe this concept as: A) Meeting the Joint Commission's client safety goals. B) Identifying unintended consequences of healthcare technology. C) A way to measure quality of care and client outcomes. D) Providing early detection of potential disease.

D) Providing early detection of potential disease.

A password consisting of the user's initials and one capital letter is strong.

False

A nursing informatics specialist is presenting a class to a local community group about computer security and protection against malware. The specialist determines that the teaching was successful when the group states which of the following? Select all that apply.

"Downloading the latest software updates is important.""We should scan downloaded files with antivirus software before installing."

A password consisting the dollar character ($) and the user's last name is strong.

False

A password that is the phrase from a song, such as "Let It Be," is strong.

False

All applications on a mobile device are regulated by the U.S. Food and Drug Administration.

False

A nurse is using SBAR and tells the primary health care provider that the abdomen is distended and firm with a pain rating of 8 on a scale of 0-10. Which component of SBAR did the nurse communicate?

A

The health IOT is characterized by ubiquitous sensing and knowledge understanding and is often referred to as which of the following, and this type of data ingesting and sourcing is essential to threat characterization? A Sense-making B. Sense-judging C. Sense-recognizing D. Sense-recording

A Sense-making

Which information by a nurse indicates more teaching is needed about the Joint Commission requirements for writing plans of care?

A care plan must be developed for patients in a clinic.

A nurse is explaining justice in health care to a nursing student. Which statement is correct? A) "Justice refers to fair, equitable, and appropriate treatment no matter what is owed to a person." B) "Justice refers to actions performed that contribute to the welfare of others." C) "Justice refers to the individual's freedom from controlling interferences by others and from personal limitations that prevent meaningful choices." D) "Justice is intentionally imposing risks that are unreasonable and unintentionally but carelessly imposing risks."

A) "Justice refers to fair, equitable, and appropriate treatment no matter what is owed to a person."

A nurse is teaching a nursing student about the use of social media and health care. Which statement is correct by the nurse? A) "Nurses must use social media cautiously to protect patients' rights." B) "Social media is safe for nurses to use because individuals can restrict access to posts." C) "Nurses can use social media at work as long as they don't post pictures of themselves with patients." D) "Posts on social media can be deleted, so caution in posting is overrated."

A) "Nurses must use social media cautiously to protect patients' rights."

A telenurse is teaching a nursing student on telehealth. Which statement by the nurse is correct? A) "Telehealth uses the same best practice standards as inpatient and acute care settings." B) "Telenursing requires less nursing care so we can take additional patients on our caseloads." C) "Telenursing has its own set of best practice guidelines that provide recommendations for home care." D) "Telehealth involves a great deal of non-care-oriented tasks."

A) "Telehealth uses the same best practice standards as inpatient and acute care settings."

A patient asks a telenurse about the efficiency of telenursing. Which of the following is the appropriate response by the nurse? A) "Telenursing reduces the need to have face-to-face interactions, which improves efficiency of care." B) "Telenursing reduces the amount of care required, which enables better use of nursing time." C) "Telenursing increases non-care-related tasks, so telenursing care must then be efficient." D) "Telenursing is not very efficient because telenurses have more documentation to complete."

A) "Telenursing reduces the need to have face-to-face interactions, which improves efficiency of care."

A nursing student asks an informatics nurse who certifies electronic health records against standards and test procedures. Which of the following is the correct response by the informatics nurse? A) "The National Institute of Standards and Technology performs this certification." B) "Certification is performed by the healthcare organizations locally." C) "The Centers for Medicare and Medicaid Services conducts this certification." D) "The medical associations of each state conduct these certifications."

A) "The National Institute of Standards and Technology performs this certification."

A patient asks a nurse about variation in patient care by different providers. What is the best response by the nurse? A) "Variation occurs when clinicians perform the same function in different ways and is minimized with standardization." B) "Variation occurs because healthcare providers have individual preferences. This does not affect patient care." C) "There is little variation in patient care since technology has been incorporated into health care." D) "Variation occurs only with very customized and complex care circumstances."

A) "Variation occurs when clinicians perform the same function in different ways and is minimized with standardization."

A patient does not want to be identified in the healthcare facility's directory and informs the nurse. Which of the following is an appropriate response by the nurse? A) "You can opt out of the facility's directory." B) "I will inform your physician of your request." C) "You must be identified as part of the privacy and security rules." D) "Your name will be listed but not your location."

A) "You can opt out of the facility's directory."

A nurse is considering a social convention about right and wrong human conduct that has formed a communal consensus, known as which of the following? A) A moral B) A right C) A value D) A bioethic

A) A moral

A nursing informatics specialist is conducting a seminar about electronic health records and the importance of interoperability. As part of the seminar, the nurse is describing the mission of the Nationwide Health Information Network. Which description would the nurse specialist include? A) A network of other interworking networks to support health information exchange B) An organization that recommends the use of ICD-10 for mortality and morbidity statistics C) An agency whose purpose is to expedite standardization for international commerce

A) A network of other interworking networks to support health information exchange

A nurse is discussing options in the treatment plan with a patient who speaks another language. To enhance interaction and exchange of data and information, the nurse will use which of the following? A) A technologically based translator B) Another nurse to translate the information C) A family member as a translator D) An Internet website on the medical condition

A) A technologically based translator

A nurse replaces a new patient's wristband after the first was misplaced. This action by the nurse is which of the following? A) A value-added action B) A non-value-added action C) Waste D) Overproduction

A) A value-added action

A nursing informatics specialist has been asked to prepare a presentation for a group of staff nurses about an electronic documentation system that is being implemented in the facility. Which features would the nurse specialist include as promoting continuity of care? Select all that apply. A) Ability to have real-time documentation B) Inclusion of an audit trail about detailed record access C) Use of decision support systems and alerts D) Ability to obtain trends about practice E) Ability for instant communication among providers

A) Ability to have real-time documentation C) Use of decision support systems and alerts E) Ability for instant communication among providers

The healthcare system has lost electrical power. To which policy should the nurse refer? A) Accessibility policy B) Availability policy C) Outage policy D) Privacy policy

A) Accessibility policy

A nursing informatics specialist is describing meaningful use of electronic health records to a group of newly hired nurses at the facility. Which requirement would the nurse specialist include? A) An interoperable healthcare information system B) Computer literacy C) Incentives to foster adoption

A) An interoperable healthcare information system

A nurse logs in to the electronic health record. The login with a password represents which of the following? A) Authentication B) Biometrics C) Security D) Identification

A) Authentication

A nurse is documenting nursing care in the electronic health record. Why is this considered meaningful use? A) Because the nurse is communicating patient information to help coordinate care B) Because the nurse is following the healthcare facility's policy C) Because the nurse is contributing to public health information D) Because the nurse is advancing information technology

A) Because the nurse is communicating patient information to help coordinate care

A telenurse reviews patient data that are transmitted via a remote server. The nurse recognizes a mild elevation in the blood pressure. Which of the following is the telenurse's priority action? A) Call and ask the patient about signs or symptoms of hypertension B) Immediately call the physician for notification of the change in blood pressure C) Travel to the patient's home for an in-person blood pressure assessment D) Call the patient's family members to inquire about recent interactions with the patient

A) Call and ask the patient about signs or symptoms of hypertension

A nurse is documenting in a new complex electronic health record system and duplicates patient data. This duplication often occurs due to which of the following? A) Clinical technology solutions are implemented poorly. B) Stakeholders are uninterested in clinical technology solutions. C) Healthcare providers are not educated on clinical technology solutions. D) There is not any management support from clinical technology solutions.

A) Clinical technology solutions are implemented poorly.

When describing the electronic medication record (eMar) to a group of students, the instructor would include which of the following as a required necessity for implementation? A) Computerized provider order entry B) Positive patient identifier C) Picture archiving and communication system D) Ancillary systems

A) Computerized provider order entry

A nurse is documenting in a patient record and is unsure what information is considered confidential. To which policy should the nurse refer? A) Confidentiality policy B) Privacy policy C) Documentation policy D) Information technology policy

A) Confidentiality policy

The American Telemedicine Association released a clinical care guideline for TeleICU. In this guideline, they identified three practice models. Which practice model refers to monitoring the patient without interruption for a designated period of time? A) Continuous care model B) Scheduled care model C) Responsive (reactive) care model D) Reimbursement for care episode model

A) Continuous care model

John, a 78-year-old male patient in a hospital, is referred to a pulmonary specialist for a consult on his breathing problems. The specialist orders a CT scan of the lungs and is alerted by the electronic health record that a CT scan was performed 1 week ago. This alert is designed to prevent duplicate testing and is part of which essential electronic health record component? A) Decision support system B) Cost savings function C) Physician assist system D) Testing management system

A) Decision support system

A nurse is reviewing email while at work and notes an attachment on an email from an unknown sender. Which of the following is the nurse's next action? A) Do not open the attachment and notify information technology B) Open the attachment for more information C) Close the email program and restart the computer D) Log out of email and call the nurse supervisor

A) Do not open the attachment and notify information technology

A new clinical technology has been implemented to improve care so that little waste is incurred. This is known as which of the following? A) Efficient delivery of care B) Effective delivery of care C) Transformative delivery of care D) Innovative delivery of care

A) Efficient delivery of care

Security breaches can occur with which of the following? A) Electronic data B) Personal knowledge C) Oral reports D) All of these are correct.

A) Electronic data

A new security tool is integrated into a healthcare system. Which of the following should be included in its integration? A) Employee awareness training B) Mandated utilization of biometrics C) Password changes for logins D) Use of malware on all computers

A) Employee awareness training

An informatics nurse is integrating a new clinical technology and understands that to optimize success in integration, which of the following must be considered? A) End-user involvement B) Collaboration with leadership C) Coordination with computer programmers D) Input from administration

A) End-user involvement

A nurse is reviewing telehealth policies and protocols to see if a patient qualifies for telenursing. Which of the following will the nurse consider? A) Equipment that will be required for home use B) Patient's income level C) Patient's proximity to a healthcare facility D) Patient's family agreement

A) Equipment that will be required for home use

A group of healthcare providers are meeting to discuss two different viewpoints on end-of-life care. Which of the following would the group consider? A) Ethical standards B) Personal values C) The healthcare organization's mission/values D) Qualitative studies

A) Ethical standards

A telenurse is teaching a nursing student on the skills and attributes every new telenurse must have, which include which of the following? A) Excellent listening skills B) Advanced computer skills C) Experience with telehealth applications D) Interest in data collection

A) Excellent listening skills

The HITECH Act had which of the following goals? A) Facilitate clinical research B) Increase information exchange C) Increase health disparities D) All of these are correct.

A) Facilitate clinical research

An informatics nurse is consulting with a healthcare organization for expansion of the electronic health record (EHR). Which of the following is a barrier to expansion of EHRs in healthcare organizations? A) Financial barriers B) Need to decrease interoperability C) Lack of meaningful use incentives D) Lack of interprofessional collaboration

A) Financial barriers

A healthcare facility has adopted an electronic health record system. The nurse understands that since the facility has adopted this record for meaningful use, which incentive may the facility receive? A) Financial incentives B) Patient referrals C) Technology support D) Government tax breaks

A) Financial incentives

A nursing informatics specialist is working as part of a group that is working with an agency that is transitioning from the paper record to the electronic record. The nurse identifies that the agency is currently at stage 3 of the adoption model because: A) Flow sheets for clinical documentation are in place. B) Closed loop medication administration is integrated. C) Computerized provider order entry is in used. D) Data warehousing is available.

A) Flow sheets for clinical documentation are in place.

What is the name of the federal legislation in the United States to control how financial institutions handle the private information they collect from individuals? A) Gramm-Leach-Bliley Act (GLBA) B) Sarbanes-Oxley (SOX) Act C) HL7 D) All of these are correct.

A) Gramm-Leach-Bliley Act (GLBA)

How much is spent on health care in the United States per year? A) Greater than $2 trillion B) Less than $1 trillion C) Less than $2 billion D) Greater than $1 billion

A) Greater than $2 trillion

A nurse is learning about the protection of patient privacy in a new electronic health record that is adopted by a healthcare system. The nurse understands that protection of patient privacy in an electronic health record is addressed by which law? A) Health Information Technology for Economic and Clinical Health Act B) Health Insurance Portability and Accountability Act C) U.S. Department of Health and Human Services Act D) American Recovery and Reaffirmation Act

A) Health Information Technology for Economic and Clinical Health Act

A nurse is educating a patient on privacy of health information. The nurse explains that privacy is part of which federal law? A) Health Insurance Portability and Accountability Act B) Health Information Technology for Economic and Clinical Health Act C) U.S. Department of Health and Human Services Act D) American Recovery and Reaffirmation Act

A) Health Insurance Portability and Accountability Act

An elderly patient with dementia lives in a home with six family members. What question should the nurse consider prior to initiating telenursing? A) How will telenursing affect home life and family dynamics? B) To what extent will the in-home technology usage change the patient's normal behaviors? C) Is the technology provider-centric or patient-centric? D) Will this telenursing experience contribute data to nursing research?

A) How will telenursing affect home life and family dynamics?

A nurse is involved with developing standards. As part of the process, the standard is open for public comment. Results indicate a problem. Which step would be performed next? A) Refine the standard B) Subject the standard to testing C) Identify the need

A) Refine the standard

A nurse is unaware of threats to information security in the health system and does not follow policies and procedures related to security. A subsequent breach in security would be caused by which of the following? A) Human error B) Insufficient employee resources C) Inadequate staff education on security D) Improper disposal

A) Human error

nurse working in a primary care setting is involved with the billing of healthcare services. With which would the nurse most likely be involved? Select all that apply. A) ICD codes with clinical modifications (ICD-CM) B) Digital Imaging and Communications in Medicine C) Outcome and Assessment Information Set (OASIS) D) Health Level Seven E) Diagnosis-related groups (DRGs)

A) ICD codes with clinical modifications (ICD-CM) B) Digital Imaging and Communications in Medicine C) Outcome and Assessment Information Set (OASIS) E) Diagnosis-related groups (DRGs)

An informatics nurse is tracking and assessing decision making through a clinical course of care, which will do what? A) Improve patient care B) Reduce medical errors C) Enhance collaboration between providers D) Contribute to research databases

A) Improve patient care

When describing interoperability, which organization would being responsible for setting interoperability standards in health? A) International Organization for Standardization (ISO) B) International Electrotechnical Commission (IEC) C) American National Standards Institute (ANSI)

A) International Organization for Standardization (ISO)

A nurse using a clinical information system is required to document the same data in more than one area because the data do not "flow over" to the other areas and the data fields are not universally designed. Which component is lacking? A) Interoperability B) Intangibles C) Return on investment D) Biometrics

A) Interoperability

A telenurse reviews a patient's blood sugar level and phones the patient to instruct the patient on a change in the dose of insulin. This process is known as which of the following? A) Knowledge dissemination B) Knowledge generation C) Knowledge processing D) Knowledge gathering

A) Knowledge dissemination

A group of students are reviewing information about how to view a file list. The students demonstrate understanding of the information when they identify which of the following as important for viewing file names. Select all that apply. A) List B) Details C) Tiles D) Icons E) Thumbnails F) None of the above

A) List B) Details

Which of the following would an instructor use to describe best-of-breed system? Select all that apply. A) Need for an integrated interface B) Integrated interface in place C) Different vendors for different systems D) Collection of varying levels of systems E) Systems meeting the organization's needs at large

A) Need for an integrated interface C) Different vendors for different systems

A patient reviews inaccurate information about a medical condition on the Internet that results in a delay in care. This is a violation of which of the following? A) Nonmaleficence B) Confidentiality C) Privacy D) Ethical decision making

A) Nonmaleficence

Which use reflects implementation of the basic electronic health records in a healthcare facility? A) Nurses document patient care in the electronic health record. B) Nurses use the medication administration tools in an electronic health record. C) The inpatient care data in the electronic health record is interfaced with emergency and outpatient facilities. D) Physicians document patient care in progress notes in the electronic health record.

A) Nurses document patient care in the electronic health record.

When reviewing the core standards for telemedicine operations, which of the following would the nurse identify as an example of a clinical standard? A) Nursing practice standards of care B) Health Insurance Portability and Accountability guidelines C) Network connectivity standards D) Fiscal management guidelines

A) Nursing practice standards of care

A patient with congestive heart failure is homebound. Why would the nurse recommend telenursing for this patient? A) Ongoing monitoring reduces the occurrence of acute exacerbations of disease. B) Telehealth reduces inpatient length of stays. C) Telehealth uses healthcare resources more appropriately than inpatient centers do. D) The use of standards and guidelines in telehealth occurs more often than in inpatient centers.

A) Ongoing monitoring reduces the occurrence of acute exacerbations of disease.

A nurse researcher is reviewing the results of a telehealth study. Which of the following is considered a clinical outcome of the study? A) Patient and family satisfaction B) Demographics of the patient sample C) Raw data results D) Enrollment criteria

A) Patient and family satisfaction

An informatics nurse has been asked to consult on the selection of an electronic health record for a healthcare organization. Which of the following should the nurse identify when choosing an electronic health record? A) Possible barriers to implementation of the electronic health record B) Key metrics to measure success of the electronic health record C) When to host end-user usability testing sessions D) Staff training needs for the electronic health record

A) Possible barriers to implementation of the electronic health record

A problem has been identified and data on the performance of a process are collected at the beginning of the process. These data are known as which of the following? A) Process metrics B) Current state metrics C) System metrics D) Employee metrics

A) Process metrics

Which of the following would a nurse use when describing telenursing? SATA A) Promotes autonomous practice B) Is practiced primarily in rural areas C) Requires certification D) Increases healthcare costs E) Usually involves on-the-job training F) Is a new specialty

A) Promotes autonomous practice E) Usually involves on-the-job training

Which of the following terms is defined as any physical or mental health information created, received, or stored by a "covered entity" that can be used to identify an individual patient, regardless of the form of the health information. A) Protected health information B) Patient health information C) Provider health information D) All of these are correct.

A) Protected health information

An informatics nurse is educating staff on a medication administration tool in an electronic health record (EHR). This tool supports which benefit of EHRs? A) Reduction in medication errors B) Decreased use of care C) Increased ability to monitor for disease D) Increased delivery of standardized care

A) Reduction in medication errors

A nurse researcher is reviewing relevant cases from a database. To uphold bioethics, which of the following should the nurse researcher consider next? A) Situational context, including the patient's individual situation B) Context of the setting, including the characteristics of the healthcare organization C) Professional context, including the provider's characteristics D) The social context and society's expectations

A) Situational context, including the patient's individual situation

A nurse is interested in serving on one of the national HITECH Act committees. Which committee could the nurse serve on? A) Standards Committee B) Grievance Committee C) Health Services Committee D) Policy Committee

A) Standards Committee

Which of the following would be most appropriate for an instructor to use when creating a slide presentation to achieve learning at the analysis level? A) Statements written as bullet points B) Fill-in-the-blank question C) Narrative with illustrations D) Numbered list of statements

A) Statements written as bullet points

An electronic health record (EHR) developer needs to validate the EHR workflow design and content build. Whom should the developer consult? A) Subject-matter experts B) Nursing executives C) Hospital administrators D) Computer technologists

A) Subject-matter experts

Which of the following is the most basic type of telehealth? A) Telephony B) mHealth C) Video transmission D) All of these are correct.

A) Telephony

A health system is taking on a transformation initiative, which will be initiated by whom? A) The health system's leadership B) The healthcare professionals C) The information technology department D) The informatics nurses

A) The health system's leadership

When developing a plan for workflow redesign and the use of computerized documentation, which item would be the first thing to consider? A) The number of computers needed B) Location of the computers C) Wheeled or bedside type of computer D) Theft prevention

A) The number of computers needed

A patient's electronic health record in a health system has been breached by an outside source. Which of the following is the priority action by the health system? A) The patient must be notified of the breach. B) The patient's family members must be notified of the breach. C) The patient's primary care provider should be notified first. D) The patient's insurance company should be notified immediately.

A) The patient must be notified of the breach.

A team of healthcare providers is developing a treatment plan for a patient and should include which attributes of the patient? A) The patient's quality of life B) The setting of care C) The health organization's mission and values D) The social context of care

A) The patient's quality of life

The informatics nurse is reviewing an electronic health record and understands that the eight essential components emphasize which of the following? A) The promotion of patient safety B) The ease of data collection C) The promotion of interoperability D) The ease in data mining

A) The promotion of patient safety

A patient is concerned that the medical insurance company will receive personal health information about the patient. The nurse reassures the patient that insurance companies receive information that is related to which of the following? A) Treatment and payment for treatment B) The patient's preexisting medical conditions C) The patient's family history D) The patient's current medical conditions

A) Treatment and payment for treatment

When describing meaningful use, which statement would be most appropriate to include? A) Use of information from EHRs to improve healthcare delivery B) A way to provide a picture of a client's health information C) A means for providing a common structure for clinical documents

A) Use of information from EHRs to improve healthcare delivery

When explaining teletrauma to a group of students, which of the following would the instructor include? A) Use of trauma care experts for second opinions B) Trauma specialist guiding trauma care via video C) Emergency care provided via robotics D) Education of rural providers by trauma specialists

A) Use of trauma care experts for second opinions

A patient is diagnosed with a new health condition and needs education. Which of the following telehealth tools will the telenurse suggest for provision of this information? A) Video conferencing patient education B) Transmitting still images and paper handouts C) Watching embedded videos on social media D) Calling the patient on the phone to review the condition

A) Video conferencing patient education

A nurse is working on a committee addressing problems associated with patient flow in the agency and looking at tracking system solutions. When reviewing the various products, which of the following would the committee most likely identify as a common feature? Select all that apply. A) Visual display of beds B) Bed availability C) Transport notification D) Equipment locators E) Passive RFID

A) Visual display of beds B) Bed availability C) Transport notification D) Equipment locators

A nurse is working with the billing department of the office. The office uses the healthcare common procedure coding system. Based on the nurses understanding of this system, which service would be coded as Level II? Select all that apply. A) Walker B) Lower leg prosthesis C) Surgery D) Orthotics E) Oxygen therapy

A) Walker B) Lower leg prosthesis D) Orthotics E) Oxygen therapy

A nurse is creating a new password for logging in to the electronic health record. Which of the following is an example of a strong password? A) X2#4!mK60 B) 12345678 C) KRI12KRI D) 12281976

A) X2#4!mK60

Practice-based ethics as described by Husted and Husted (1995), focuses on: A) bringing about human benefit. B) normative approaches to ethics. C) examining moral life. D) understanding right or good action.

A) bringing about human benefit.

A change management plan developed for implementing an electronic health record will include all of the following except: A) disciplinary measures for addressing resistance by professionals. B) involving subject-matter experts to validate workflow. C) hosting end-user usability testing sessions. D) formal training activities.

A) disciplinary measures for addressing resistance by professionals.

A nurse is documenting in the electronic health record and uses standardized terminology, which is important because: A) it captures and codifies the work of nursing. B) it ensures the right diagnosis code will be used. C) it classifies clinical data in storage. D) it reduces interoperability.

A) it captures and codifies the work of nursing.

Professional obligations of nonmaleficence include: A) not inflicting harm and not imposing risks of harm. B) clear communications. C) respect for cultural differences. D) None of these is correct.

A) not inflicting harm and not imposing risks of harm.

A nursing student has created several patient teaching handouts in Microsoft Word for use in a class presentation and is saving the handouts for the first time. Which of the following names would be appropriate to use to save the file? A) patientteach.doc B) patient-teach.doc C) patient/teach.doc D) patient teach.doc

A) patientteach.doc

Variation occurs when workers: A) perform the same function in different ways. B) initiate flaws in the way a process was originally designed. C) lack knowledge about the process. D) All of these are correct.

A) perform the same function in different ways.

A hardware security tool that helps protect an organization against security breaches by issuing masks to protect the identity of a corporation's employees who are accessing the Internet is a(n): A) proxy server. B) firewall. C) antivirus program. D) masking program.

A) proxy server.

A nurse is using an electronic health record in which the pharmacy is able to exchange data with the laboratory and several healthcare providers. The nurse identifies this as: A) semantic interoperability. B) standard. C) algorithm.

A) semantic interoperability.

Telehealth used in the medical field is known as: A) telemedicine. B) teleradiology. C) telepathology. D) telenursing.

A) telemedicine.

An ethics approach that was applied to relatively homogenous societies where beliefs were similar and the majority of societal members shared common values is known as: A) the Hippocratic tradition. B) a casuist approach. C) principlism. D) antiprinciplism.

A) the Hippocratic tradition.

Two ethics approaches that emphasize considerations for human needs and responsibility to meet needs are: A) virtue and care ethics. B) bioethics and casuistry. C) beneficence and care ethics. D) principlism and antiprinciplism.

A) virtue and care ethics.

An instructor is describing the Physician Quality Report Initiative to a group of students.Which of the following would the instructor include? A)Provision of financial incentives to fee-for-service providers forcost-effective, high-quality care B )Payment for the quantity of patients served along with the number of resources that were consumed C) A focus on decreasing patient care costs by decreasing the length of stay in an agency D) A mandatory program for all agencies billing third parties to obtain incentives for improved outcomes

A)Provision of financial incentives to fee-for-service providers forcost-effective, high-quality care

A nurse is using an electronic clinical documentation system and enters the patient'spulse rate. Which of the following would the nurse expect to see if the value isconsidered abnormal? A)The value as a different color B)An asterisk placed before the value C)The block for the value shaded D)A pop-up box next to the value

A)The value as a different color

The importance of which of the following with respect to the safe and effective use of the EHR is unquestionable one of the most significant evaluation questions organizations should consider when evaluating an HER? A. Accuracy B. Efficacy C. Sensitivity D. Specificity

A. Accuracy

Which of the following refers to how well the staff and users actually use and embrace the system as part of their routine daily activities? A. Adoption B. Implementation C. Interoperability D. Innovation

A. Adoption

Which of the following are a set of software applications that typically help inform one's business as to profitability, quality, risk, and other that indicate how well one is doing within any given industry and allow multidimensional analysis that is aimed at hitting "the sweet spot" in one's data? A. BI tools B. Statistical packages C. Spreadsheet applications D. Data visualization

A. BI tools

Security of health data remains one of the challenges for HIEs and, in general, interoperability of health data and information. Which of the following, best known for its use in bitcoins and is extremely secure when coupled with encryption, is a standard increasing put forth as a solution? A. Blockchain B. Health Level 7 (HL7) C. The Global Language of Business (GSI) D. International Organization for Standardization (ISO)

A. Blockchain

When integrated with an existing electronic health record (EHR) which of the following enables new options to share the data securely and maintain compliance with HIPAA regulations? A. Blockchain B. Cognitive security C. Layered security D. Unified data protection

A. Blockchain

Historically, which type of network was used mainly on a copper wire and was limited by the distance or size of the network, or the length of the cable between computers, which impacts timing and efficiency? A. Bus network B. Ring network C. Star network D. Tree network

A. Bus network

Given the importance of return on investment (ROI) approaches, which agency has provided a publicly available toolkit for setting up, implementing, and calculating ROI for technology-focused improvement studies? A. Center for Technology and Aging B. Center for Medicare and Medicaid Services C. Centers for Disease Control and Prevention D. CareCycle Management

A. Center for Technology and Aging

Reverting to the new paradigm of subsequent limitation of access will enable the open environment of which of the following and access to social media and open source information in personalized medicine and patient education? A. Cloud computing B. Cluster computing C. Cognitive computing D. Ubiquitous computing

A. Cloud computing

Ambulatory care procedures are coded using which classification system by the American Medical Association, which has the primary purpose for reimbursement or claims processing? A. Current Procedural Terminology (CPT) B. International Classification of Diseases (ICD-10) C. Logical Observation Identifiers Names and Codes (LOINC) D. Systematized Nomenclature of Medicine-Clinical Terms (SNOMED-CT)

A. Current Procedural Terminology (CPT)

During which type of analysis demonstrates that not everyone follows the same workflow for the same process? A. Current state analysis B. Gap analysis C. Future state analysis D. SWOT analysis

A. Current state analysis

Once the executive oversight committee and the team responsible for the intervention have aligned on the CDS program strategies, which phase should be validated with all stakeholders who will be impacted by the process? A. Design phase B. Analysis phase C. Evaluation phase D. Implementation phase

A. Design phase

The Clinical Information System Implementation Evaluation Scale (CISIES) is one of the surveys that has been validated for which of the following? A. End-user satisfaction B. Return on investment (ROI) C. Patient engagement D. Attainment toward meaningful use (MU)

A. End-user satisfaction

Which of the following represents a disadvantage associated with tree network? A. Expensive to configure and maintain B. Not as stable as other configurations C. If one computer goes down, the entire network is down D. Bottlenecks can occur because data pass through the hub

A. Expensive to configure and maintain

Due to the 2013 modifications to the Health Information Technology for Economic an Clinical Health Act (HITECH), most health plans are prohibited from using which type of information for underwriting purposes? A. Genetic information B. Demographic information C. Substance abuse information D. Pre-existing medical information

A. Genetic information

Which of the following is the most common healthcare messaging standard for text information? A. HL7 B. IEEE C. X12N D. DICOM

A. HL7

Which of the following has become the standard in 55 countries for the exchange, integration, sharing, and retrieval of health information? A. Health Level Seven International (HL7) B. Fast Healthcare Interoperability Resources (FHIR) C. Composite Healthcare System (CHCS) D. De-centralized Hospital Computer Program

A. Health Level Seven International (HL7)

The care standards that regulate and oversee the remote monitoring industry have been borrowed from which of the following? A. Home healthcare industry B. Acute care industry C. Ambulatory care industry D. Managed care industry

A. Home healthcare industry

Which form of statistics involves deriving information from a sample data set about a given population of care and setting up a model to validly describe the population? A. Inferential statistics B. Descriptive statistics C. Predictive statistics D. Prescriptive statistics

A. Inferential statistics

During which phase of the project to implement EHR, there are often "roadshows" to provide demonstrations of the system and get staff feedback and buy-in of the impending project? A. Initiation phase B. Analysis phase C. Design phase D. Implementation phase

A. Initiation phase

Which term has received a good deal of attention over the past few years and is now a widely acknowledged potential that can covertly operate within any organization and one where immediate steps must be taken by the risk and security departments to mitigate? A. Insider threat B. Third-party threat C. Employee threat D. In-house threat

A. Insider threat

The Watson project presented a unique opportunity to utilize which concepts in conjunction with a project charter that focused on workflow redesign? A. Lean techniques B. Six sigma techniques C. Lean six sigma techniques D. Data mining techniques

A. Lean techniques

In addition to the project charter, another approach that is frequently used for program evaluation is to establish which of the following early in the planning phase that includes data input and output that you can expect to achieve with the proposed project? A. Logic model B. Feasibility assessment C. Product scope document D. Product concept document

A. Logic model

The goal of which of the following is to accurately evaluate a phenomenon of interest and reduce concepts to operational definitions with numeric values? A. Measurement B. Validation C. Manipulation D. Transformation

A. Measurement

Effective January 1, 2017, a reduction in reporting requirements for modified stage 2 and stage 3 meaningful use (MU) resulted in the elimination of the CDS requirements for which type of hospitals? A. Medicare hospitals B. Medicaid hospitals C. Veterans hospitals D. Academic hospitals

A. Medicare hospitals

When approaching and operationalizing a measure, a relatively new technique is to convene the interprofessional team and examine the thought processes related to how the measure will be constructed using which of the following? A. Mind map B. Control chart C. Gantt chart D. Scatterplot

A. Mind map

Which of the following is an aspect of human factors design and whether or not the human-technology interface is designed in a manner intended to best engage the end user and for the information within the system to be cognitively interpreted, processed, and utilized? A. Place utility B. Time utility C. Actualization utility D. Goal utility

A. Place utility

Which category of utility indicated that information has no value if people who use the system have no power to improve it or lack the ability to use the system productively? A. Possession utility B. Form utility C. Time utility D. Actualization utility

A. Possession utility

The KNIME tool is a modern data analytics platform that allows an analyst to perform sophisticated statistics and data mining on data sets to analyze trends and predict potential results that is based on which statistical package? A. R statistical package B. SPSS statistical package C. SAS statistical package D Stata statistical package

A. R statistical package

A large part of defining which of the Five Rights is a passionate debate among stakeholders on which standard to adopt, and this process frequently takes longer than the build and implementation process? A. Right information B. Right person C. Right CDS intervention format D. Right channel

A. Right information

Which of the following is the overarching metric that encompasses the entire person and his or her environment? A. Risk B. Symptoms C. Vital signs D. Medical history

A. Risk

A goal of the industry is to obtain which of the following, which requires that the meaning of the information is understood as the data are exchanged? A. Semantic interoperability B. Foundational interoperability C. Structural interoperability D. Syntactic interoperability

A. Semantic interoperability

Which of the following represents the first commandment in the "10 commandments" for success of CDS? A. Speed is everything B. Fit into the user's workflow C. Simple interventions work best D. Little things can make a big difference

A. Speed is everything

All covered entities must conduct a risk assessment in accordance with the requirements under 45 CFR 164.308(a)(1). If any deficits are noted in the risk assessment, the covered entity must address the deficiencies and put a plan in place to address all area that may be in violation of HIPAA. This is core objective of meeting the requirement for which of the following? A. Stage 1 meaningful use B. Stage 2 meaningful use C. The Patient Protection and Affordable Care Act D. The Health Information Technology for Economic and Clinical Health Act

A. Stage 1 meaningful use

Which model is excellent for framing improvements and healthcare outcomes studies and for thinking through relationships and processes that may influence some outcome of interest? A. The Donabedian model B. The Plan-Do-Study Act (PDSA) Model C. The Interactive sociotechnical analysis (ISTA) Model D. Sittig and Singh's Eight-Dimensional Model

A. The Donabedian model

In late 2016, which organization publicly announce its development efforts for ICD-11, which will be designed to be compatible with electronic health application and information systems? A. The World Health Organization B. The American Medical Association C. The Centers for Medicare and Medicaid Services D. The Centers for Disease Control and Prevention

A. The World Health Organization

Which of the following represents the function of a hard disc drive (HDD)? A. The main, and usually largest, data storage hardware device in a computer where the operating system, software, and most files are stored B. Retrieve and/or store data on of media like CDs, DVDs, and Blu-ray discs C. Allows the computer to work with more information at the same time in active memory processing. D. Responsible for interpreting an executing most of the commands from the computer's hardware and softwar

A. The main, and usually largest, data storage hardware device in a computer where the operating system, software, and most files are stored

Which type of security vulnerability appears to be legitimate when presented to the user but performs illicit activity when it runs and stays on the computer until properly removed, allowing unauthorized users to take control of the computer? A. Trojans B. Worms C. Viruses D. Payloads

A. Trojans

Which type of testing performed by end users is the gold standard for making sure DCS tools are in the right spots to be most effective at supporting the desired clinical outcomes? A. Usability testing B. Functionality testing C. Efficiency testing D. Feasibility testing

A. Usability testing

Which of the following establish a foundation for evaluating information design in an EHR that categorizes and describes discrete functional scenarios and determines how computer interactions are carried out? A. Use cases B. Test cases C. Key cases D. Control cases

A. Use cases

Honeywell Life Care see which field as an ideal entry point for providers who want to maintain a connection to patients beyond the reimbursable 30- to 90-day time period? A. mPERS services B. mHealth services C. Remote monitoring D. Asynchronous telemedicine

A. mPERS services

An electronic health record may help to lower healthcare costs by integrating patient information from multiple sources.

False

What is the name of the legislation put in place to protect shareholders and the public from deceptive accounting practices in organizations? A) Gramm-Leach-Bliley Act (GLBA) B) Sarbanes-Oxley (SOX) Act C) HL-7 D) All of these are correct.

B) Sarbanes-Oxley (SOX) Act

Which process involves "matching" between a source and a target such as between two databases that contain the same data elements but call them by different names? A. Data modeling B. Data mapping C. Data mining D. Data cleansing

B. Data mapping

Which method of standards development have evolved over time to become universally used without governmental or other mandates? A. Ad hoc standards B. De facto standards C. Consensus standards D. Common data standards

B. De facto standards

At the time that Strategic Health IT Advanced Research Projects on Security (SHARPS) began, some members of the SHARPS team had shown security vulnerabilities of wireless communications with which of the following? A. Fitness trackers B. Defibrillators C. Pulse oximeters D. Glucometers

B. Defibrillators

The American Telemedicine Association released a clinical care guideline for TeleICU. In this guideline, they identified three practice models. Which practice model refers to periodic consultation within a predetermined time frame? A) Continuous care model B) Scheduled care model C) Responsive (reactive) care model D) Reimbursement for care episode model

B) Scheduled care model

HIPAA was signed into law by President Bill Clinton in 1996 to monitor physicians and hospitals and enhance information exchange without consequences.

False

Healthcare organizations typically do not encourage use of personal devices for professional matters, and in many instances they actually have policies in place forbidding employees from using personal devices in the workplace. What is an issue or are issues with "bring your own device" (BYOD)? A) Validity B) Security C) Portability D) All of these are correct.

B) Security

A nurse is using critical pathways to care for a patient. Which area will the nurse address according to the pathway?

Activity

When writing a report, a student changes the usual typeface from Arial 10 pt to Times New Roman 12 pt. The student saves the report and then begins creating two new documents, using a typeface of TimesNew Roman 10 pt for one of the documents and Courier 10 pt for the other. Which typeface would be considered the default?

Arial 10 pt

A nurse is creating a password for use in accessing the healthcare information system in the agency. Which action would be most appropriate for the nurse to do in creating this password? A) Select mostly lowercase letters B) Select a combination of letters and numbers C) Use numbers sparingly D) Use a word familiar to the nurse

B) Select a combination of letters and numbers

After an in-service program conducted by an informatics nurse specialist about electronic health records, interoperability, and standards, a participant asks, "Why is all this important to us as nurses?" Which response by the nurse specialist would be most appropriate? A) "You need an understanding of the history behind what is happening now." B) "Nursing is affected by the decisions made for recording healthcare data." C) "You will most likely be involved with one of the agencies at some time in your career."

B) "Nursing is affected by the decisions made for recording healthcare data."

A nurse is reviewing the information used with International Classification of Functioning, Disability, and Health. The nurse would identify codes being organized by which of the following? Select all that apply. A) Diagnosis B) Body structure C) Activities of daily living D) Injuries E) Participation in life situations

B) Body structure C) Activities of daily living E) Participation in life situations

Which of the following factors are drivers of the growing trend toward telehealth and technology use and will influence nursing practice significantly in the next decades? A) Overabundance of nursing and healthcare workers B) Chronic diseases and conditions C) Uneducated consumers D) All of these are correct.

B) Chronic diseases and conditions

A nurse is working at a facility as part of a group involved with billing. Which would the group most likely use to categorize patients for a system A) ICD codes with clinical modifications (ICD-CM) B) Diagnosis-related groups C) Healthcare Common Procedure Coding System D) Alternative Billing Codes

B) Diagnosis-related groups

A client had a magnetic resonance imaging test completed while vacationing in Europe. The client's physician in Chicago is able to view the test results through standards developed by which organization? A) Comité Européen de Normalisation B) Digital Imaging and Communications in Medicine C) International Health Terminology Standards Development Organization D) Outcome and Assessment Information Set

B) Digital Imaging and Communications in Medicine

A nursing instructor is describing devices that can be used for real-time telehealth. Which of the following would the instructor be least likely to include. A) Telephone B) Digital camera C) Videoconferencing D) Satellite system

B) Digital camera

Which of the following would a clinical decision support system provide an alert for when a provider uses computerized provider order entry (CPOE) for a medication? Select all that apply. A) Dose within normal range B) Drug incompatibilities C) Allergies D) Appropriate route E) Drug-drug interaction

B) Drug incompatibilities C) Allergies E) Drug-drug interaction

A nurse is reading a journal article about the use of healthcare information systems. The article is discussing financial systems and mentions that these systems are mission critical. The nurse interprets this to mean which of the following? A) Most important to implement B) Essential to the organization's existence C) Necessary for use of other information systems D) Required to prevent potential fraud

B) Essential to the organization's existence

The use of which method would be most effective in providing data protection from entry by outsiders? A) Audit trail B) Firewall C) Spear phishing D) Data backup

B) Firewall

A nurse reviewing statistics on global morbidity and mortality rates understands that this information is based on: A) ICD-9 codes. B) ICD-10 codes. C) ICD-11 codes. D) ICD-12 codes

B) ICD-10 codes. C) ICD-11 codes.

When standards are developed by organizations and agencies, which step would they perform first? A) Operationally state what the standard will achieve B) Identify the need for a standard C) Define the specifications to be tested

B) Identify the need for a standard

After teaching a group of students about the benefits of telehealth, the instructor determines that the teaching was successful when the students identify which of the following as a benefit? A) Increased travel time B) Increased productivity C) Increased face-to-face patient contact D) Increased healthcare costs

B) Increased productivity

An agency is selecting a healthcare information system that includes a collection of systems already interfaced. Which of the following did the agency use? A) Best-of-breed approach B) Integrated approach C) Integrated enterprise D) Clinical information system

B) Integrated approach

As part of the facility orientation, a nursing informatics specialist is describing the different types of client records to a group of newly hired nurses. Which facts would the nurse specialist include when describing electronic medical records (EMRs)? Select all that apply. A) The client owns the data. B) It is an electronic version of the traditional record C) The EMR is transportable. D) It provides a connection between the EHR and ePHR. E) A client can have many EMRs.

B) It is an electronic version of the traditional record E) A client can have many EMRs.

A nurse working in a physician's office is participating in the Health IT Adoption Survey. The nurse understands which information about this survey? Select all that apply. A) The survey is conducted quarterly. B) It is designed to monitor EHR use. C) It helps evaluate outcomes of HIE efforts.

B) It is designed to monitor EHR use. C) It helps evaluate outcomes of HIE efforts.

When describing the use of portable monitoring devices used in telehealth to a group of students, which of the following would the instructor most likely include? A) Most require access to a wireless connection B) Many devices involve a touch screen for assessment C) E-mail is used to address patient education needs D) There is a central device located in the patient's home

B) Many devices involve a touch screen for assessment

After teaching a group of students about innovative reimbursement incentives being used to reward quality care, the instructor determines that the teaching was successful when the students identify which of the following as an example? A) Certification Commission for Healthcare Information Technology B) Physician Quality Report Initiative C) HIMSS Analytics D) KLAS

B) Physician Quality Report Initiative

_________________ is the ability to manage results of all types electronically including laboratory and radiology procedure reports, both current and historical. A) Data warehousing B) Results management C) Digital manipulation D) Electronic searching

B) Results management

What is a non-value-added activity? A) One that ultimately brings the process closer to completion or changes the product or service for the better B) Steps in a process that are necessary for regulatory or compliance reasons but do not bring the process closer to completion or do not change the product or service for the better C) An activity that enhances the process and moves it closer to completion or changes the product or service for the better D) None of these is correct.

B) Steps in a process that are necessary for regulatory or compliance reasons but do not bring the process closer to completion or do not change the product or service for the better

While working as a member of a group tasked with addressing meaningful use with electronic data, the group has met the criteria for stage 1 and is now moving onto stage 2. Which action would now become a focus for the group? A) Recording smoking status for those 13 years of age and older B) Submitting electronic data to immunization registries C) Transmitting prescriptions electronically

B) Submitting electronic data to immunization registries

A nurse is reading an article about a surgeon who uses a combination of robotics and virtual reality along with special gloves and audio and video technology to perform surgery by manipulating surgical instruments at a remote site. The nurse is reading about which of the following? A) Store-and-forward technology B) Telepresence C) Real-time technology D) Telemedicine

B) Telepresence

A nurse is preparing a presentation about various telehealth practices for a group of nurses in the community. Which of the following would the nurse include about e-intensive care (e-ICU)? A) They require minimal planning for execution B) Workflow typically requires redesign C) Enhanced communication results D) Involvement of other departments is limited

B) Workflow typically requires redesign

It is termed __________if a nurse knows that a colleague has accessed or attempted to access the record of a patient for whom the colleague is not providing care. A) negligent behavior B) a breach C) a violation D) an infringement

B) a breach

Computers linked together to facilitate communication and operations within and outside of an organization are known as: A) digital operations. B) a network. C) a local web. D) All of these are correct.

B) a network.

Workflow is a term used to describe: A) the action or execution of a singular task. B) a progression of steps (tasks, events, interactions) that comprise a work process, involve two or more persons, and create or add value to the organization's activities. C) the delegation of work to staff members. D) All of these are correct.

B) a progression of steps (tasks, events, interactions) that comprise a work process, involve two or more persons, and create or add value to the organization's activities.

Devices that recognize thumb prints, retina patterns, or facial patterns are known as: A) biologic devices. B) biometric devices. C) radiofrequency identifiers. D) All of these are correct.

B) biometric devices.

Acceptable use policies in an organization typically restrict downloads of files by employees because: A) employees may waste work time. B) downloads increase vulnerabilities to viruses. C) downloads interfere with backup and storage of data. D) All of these are correct.

B) downloads increase vulnerabilities to viruses.

Email scanning software helps to detect: A) worms. B) known viruses. C) social engineering attempts. D) All of these are correct

B) known viruses.

Although first proposed in 2004, electronic health record implementation blossomed after passage of the HITECH Act in 2009 because: A) the president discussed electronic health records in the State of the Union address. B) monetary incentives and potential penalties were administered by the Centers for Medicare and Medicaid Services. C) implementation support was provided by information technology professionals. D) All of these are correct.

B) monetary incentives and potential penalties were administered by the Centers for Medicare and Medicaid Services.

The universal denominator in the development of electronic health records is: A) user-friendliness. B) patient safety. C) affordability. D) All of these are correct.

B) patient safety.

New technologies used in health care, such as smartphones and Google Glass, create potential ethical issues associated with: A) interoperability. B) privacy and confidentiality. C) the human technology interface. D) cognitive load.

B) privacy and confidentiality.

An ID badge is an example of authentication by: A) something the user knows. B) something the user has. C) something the user is. D) All of these are correct.

B) something the user has.

The term for transmitted radiologic images to specialists is: A) telemedicine. B) teleradiology. C) telepathology. D) telenursing.

B) teleradiology.

Behaviors leading to unintentional data breaches include: A) safeguarding an input device. B) walking away from a workstation without logging off. C) using numeral characters in passwords. D) All of these are correct.

B) walking away from a workstation without logging off.

After teaching a group of students about clinical information systems, the instructor determines that the students need additional teaching when they identify which of the following as the foundation for other clinical systems? A)Lab system B)Electronic medication administration record C)Pharmacy system D)Radiology system

B)Electronic medication administration record

An important aspect of meaningful use (MU) that has proven to be the most difficult to reach for hospitals and providers is the requirement for which of the following? A. Advance directives B. Care coordination C. Medication reconciliation D. Patient engagement

B. Care coordination

Which clinical document standard provides markup standardization that indicates the structure and semantics of the clinical document specifically for the purpose of standardizing clinical information to be exchanged both between and across care settings? A. Blockchain B. Clinical Document Architecture (CDA) C. Continuity of Care Record (CCR) D. Continuity of Care Document (CCD)

B. Clinical Document Architecture (CDA)

Complex systems may be described with many metaphors; however, the most fitting for health information systems and vulnerabilities is a living community of coexisting entities such as a biome. Which type of security is the most conservative approach to the management of threats in complex systems? A. Blockchain B. Cognitive security C. Layered security D. Unified data protection

B. Cognitive security

Which of the following is a machine learning system trained primarily by data instead of rules or structured code? A. Blockchain B. Cognitive security C. Layered security D. Unified data protection

B. Cognitive security

Reports, graphs, dashboards, drill-down reports, and alerts are all present within which component of business intelligence (BI)? A. Inferential analytics B. Descriptive analytics C. Predictive analytics D. Prescriptive analytics

B. Descriptive analytics

Which of the following is defined as an electronic record of health-related information on an individual that can be created, gathered, managed, and consulted by authorized clinicians and staff within one healthcare organization? A. EHR B. EMR C. PHR D. PMR

B. EMR

Which type of EHR adopter looks for bugs in the system and seeks to find solutions? A. Innovators B. Early adopters C. Early and Late majority D. Laggards

B. Early adopters

Which of the following are a means of communicating using an architecture that relies on a detection and avoidance protocol for routing data that permits larger networks and faster data transmission? A. Internet connections B. Ethernet connections C. Local area networks D. Wide area networks

B. Ethernet connections

Which type of utility takes into account human factors and the need to make sure we do not overload the end user with too much information on the EHR screens? A. Possession utility B. Form utility C. Time utility D. Actualization utility

B. Form utility

During the design phase of EHR implementation, which of the following is done to evaluate the old workflows and define the new ones? A. Current state analysis B. Gap analysis C. Future state analysis D. SWOT analysis

B. Gap analysis

Which of the following applies to electronic health information created, received, used, and maintained by covered entities and contains scalable and flexible measures that covered entities must address as part of their electronic PHI-related activities? A. HIPAA Privacy Rule B. HIPAA Security Rule C. HIPAA Omnibus Rule D. HIPAA Final Rule

B. HIPAA Security Rule

Patients with which medical condition are of particular interest for management by remote monitoring, not only because of the high rate of readmission to acute care hospitals, but also because of the adjustment made by the Centers for Medicare and Medicaid Services for reimbursement for hospitalization that results within 30 days of a previous hospitalization? A. Cancer B. Heart failure C. Chronic obstructive pulmonary disease D. Coronary artery disease

B. Heart failure

One of the biggest challenges with device integration is the expense associated with which of the following because of the requirements of devices to translate the monitoring data into EHR data through interface engines? A. Adoption B. Implementation C. Interoperability D. Innovation

B. Implementation

The Davies Award is a more advanced user designation for organizations that have achieved higher levels of which of the following? A. Meaningful use B. Innovative use C. Patient engagement D. Clinician engagement

B. Innovative use

Electronic data from EHRs are placed into categories. Which of the following would be classified as structured data? A. Text data B. Laboratory values C. Records of medication administration D. X-ray images

B. Laboratory values C. Records of medication administration

The data-mining process that the data scientist experiences on an everyday basis revolves around the linchpin of which of the following through practical applications of translational research? A. Interoperability B. Meaningful use C. Data governance D. Collective Impact

B. Meaningful use

Which of the following, also referred to as "software glue," is software that allows developers to control input/output devices? A. Firm ware B. Middle ware C. Utility software D. Open source software

B. Middle ware

After the clarification in 1984, the use of "bit" to accurately describe computational architecture cemented the definition of the "bit" as which of the following? A. Unit of time B. Unit of measure C. Unit of information D. Unit of function 3.

B. Unit of measure

Allowing protected health information (PHI) to reside only on which of the following is a better practice in all instances to reduce risk? A. Laptop computers B. Network servers C. Back-up tapes D. Universal serials busses (USB)

B. Network servers

Data destruction or spurious emails or texts sent to a large number of people represent which type of security threat? A. Malware B. Payloads C. Rootkits D. Keyloggers

B. Payloads

Which of the following is a method used to determine whether an intended HIT solution has met the needs of the organization and end user or the intended purpose? A. Process mapping B. Program evaluation C. Patient engagement D. Clinician engagement

B. Program evaluation

With approximately 80% of all healthcare data categorized as which of the following, the Watson application will offer healthcare a tool that would assimilate valuable patient information housed in the EHR with more comprehensive analytics utilizing these additional data? A. Structured data B. Unstructured data C. Transactional data D. Continuous data

B. Unstructured data

Which of the following refers to data being held hostage through encryption and only freed through providing the encryption code for payment in bitcoins, has become a household discussion among health information technology security experts? A. Malware B. Ransomware C. Spyware D. Firmware

B. Ransomware

Which data mining technique is most often used for predictive analytics such as predicting factors that are associated with mortality or 30-day readmissions? A. Cluster analysis B. Regression model C. Anomaly detection D. Association rule learning

B. Regression model

Which of the following, as pointed out in The Future of Nursing, a report by the Institute of Medicine/Robert Wood Johnson Foundation, predicted that shifts in time and place of care have significant implications for nursing? A. Acute care B. Remote care C. Primary care D. Managed care

B. Remote care

A data warehouse refers typically to which type of data, and it maintains both aggregate and detail-level data? A. Prospective data B. Retrospective data C. Categorical data D. Continuous data

B. Retrospective data

Due to the presence of infinite technological options existing within the clinical environment, which of the five rights may not be within the EHR itself? A. Right information B. Right channel C. Right CDS intervention format D. Right point in the workflow

B. Right channel

Which type of network offers high bandwidth and span distances, relatively easy to install, and easy to locate points of failure? A. Bus network B. Ring network C. Star network D. Tree network

B. Ring network

Which type of software allows data to be analyzed in a tabular format with data organized in row and columns that can be manipulated by formulas? A. Workflow software B. Spreadsheet software C. Simulation software D. Presentation software

B. Spreadsheet software

For hospitals, which of the following required that hospitals provide patients with online access to downloadable information from their electronic record and that the hospital track the percentage of patients who actually access that information? A. Stage 1 meaningful use B. Stage 2 meaningful use C. The Patient Protection and Affordable Care Act D. The Health Information Technology for Economic and Clinical Health Act

B. Stage 2 meaningful use

Which requirements come with the expectation that encryption/security data stored in the certified EHR technology be addressed in accordance with requirement under the HIPAA Security Role? A. Stage 1 meaningful use B. Stage 2 meaningful use C. The Patient Protection and Affordable Care Act D. The Health Information Technology for Economic and Clinical Health Act

B. Stage 2 meaningful use

Which data mining technique is often used in business intelligence (BI) tools to aggregate data in cubic views of data by category and by some outcome measure? A. Cluster analysis B. Summarization C. Anomaly detection D. Association rule learning

B. Summarization

When using an admission, discharge, and transfer (ADT) system, which of the following would a nurse be least likely to find? A) Patient demographics B) Insurance information C) Supplies used D) Next of kin

C) Supplies used

The first fundamental step in any CDS project is to understand which of the following? A. The Million Hearts campaign B. The Five Rights of CDS C. The regulations of the HITECH Act D. The regulations of stage 3 MU

B. The Five Rights of CDS

Which of the following is an international standards group largely responsible for bar code standardization worldwide? A. Health Level 7 (HL7) B. The Global Language of Business (GSI) C. International Organization for Standardization (ISO) D. Clinical Data Interchange Standards Consortium (CDISC)

B. The Global Language of Business (GSI)

Most EHRs today, under certifications for EHRs have the ability to reveal a patient's journey across the continuum, from various encounters, from a physician office visit, to a hospital encounter, even to the patient's home, under which piece of legislation? A. The Patient Protection and Affordable Care Act B. The Health Information Technology for Economic and Clinical Health Act C. The Health Information Portability and Privacy Act D. The Medicare Access and CHIP Reauthorization Act

B. The Health Information Technology for Economic and Clinical Health Act

With the new emphasis on enforcement penalties, which piece of legislation is often described as having "put teeth in HIPAA"? A. The Patient Protection and Affordable Care Act B. The Health Information Technology for Economic and Clinical Health Act C. The General Data Protecting Regulation D. The Medicare Access and CHIP Reauthorization Act

B. The Health Information Technology for Economic and Clinical Health Act

CDS is a key strategy within which piece of legislation, which is used for attaining a meaningful use (MU) of electronic health records (EHRs)? A. The Patient Protection and Affordable Care Act (PPACA) B. The Health Information Technology for Economic and Clinical Health Act (HITECH) C. The Health Information Portability and Privacy Act (HIPAA) D. The 21st Century Cures Act

B. The Health Information Technology for Economic and Clinical Health Act (HITECH)

Which agency oversees the safety of medical devices, which includes addressing the management of cybersecurity risks and hospital network security? A. The Federal Trade Commission (FTC) B. The U.S. Food and Drug Administration (FDA) C. The Centers for Medicare and Medicaid Services (CMS) D. The Centers for Disease Control and Prevention (CDC)

B. The U.S. Food and Drug Administration (FDA)

Which Title of HIPAA required the Department of Health and Human Services (DHHS) to establish national standards for electronic healthcare transactions and national identifiers for providers, health plans, and employers? A. Title I B. Title II C. Title III D. Title IV

B. Title II

A process is in statistical control only if which of the following is present? A. Confounders B. Normal distribution C. Common-cause variation D. Special-cause variation

C. Common-cause variation

Which of the following is a destructive program that replicates itself on a computer or network that is either wired or wireless, doing damage by reproduction and consuming memory and internal disk space? A. Trojans B. Worms C. Viruses D. Payloads

B. Worms

Which of the following would a nurse identify as a core information system in a clinical information system? A) Electronic medication administration record B) Computerized provider order entry C) Ancillary system D) Positive patient identification

C) Ancillary system

A nurse is preparing to access a client's electronic record. The system verifies that the nurse is the person logging into the system and grants access to the information. This process is known as: A) Phishing B) Biometrics C) Authentication D) Voice recognition

C) Authentication

A nursing informatics specialist is conducting a seminar for agency staff about the benefits of a fully integrated electronic health record. The nurse specialist determines the need for additional teaching when the group identifies which aspect as a benefit to the client? A) Individualized treatment B) Ability to check the record's accuracy C) Capability of decision support D) Knowledge of persons with access to the data

C) Capability of decision support

A group of nurses is putting together a proposal for the use of active RFID for medication administration. Which of the following would the nurses most likely cite as the key benefit? A) Decrease in medication errors B) Improved patient safety C) Decrease in disturbing patients D) Better use of nurse time

C) Decrease in disturbing patients

Healthcare agencies do not require data encryption when patient health information is being transmitted over a mobile device.

False

An instructor is preparing a teaching plan for a group of students about clinical documentation systems. The instructor plans to discuss aggregated data, which are used for which of the following? A) Identifying trends for an individual patient B) Confirming decision making as correct C) Determining best practices D) Evaluating clinical workflow

C) Determining best practices

The HITECH Act has had a significant impact on HIPAA's Privacy and Security Rules in which of the following ways? A) Weakened the enforcement of HIPAA B) Removed the annual guidance from the Department of Health and Human Services regarding how to secure health information C) Enhanced notification requirements in the event of a breach in the security of health information D) All of these are correct.

C) Enhanced notification requirements in the event of a breach in the security of health information

An administrative group at an agency involved in adopting healthcare information technology is developing a strategic plan. Which component would they include? A) Plan that covers 2 to 3 years B) Structured guide that does not change C) Expenditures offset by client outcome benefits D) Demonstration of a slight return on investment

C) Expenditures offset by client outcome benefits

When developing a teaching plan on the various organizations involved in setting standards, which of the following would an instructor include as being most involved with setting standards for the electronic health record? A) Digital Imaging and Communications in Medicine B) Comite European de Normalisation C) Health Level Seven D) International Health Terminology Standards Development Organisation

C) Health Level Seven

A nurse is reviewing research on the efficacy of telehealth over the past several years. The nurse would identify which of the following conditions as having outcomes most significantly affected by the use of telehealth? SATA A) Chronic lung disease B) Kidney failure C) Heart disease D) Newborn health E) Psychiatric conditions

C) Heart disease E) Psychiatric conditions

When writing a paper, a student realizes that a previous paragraph is unclear and wants to delete it. Which of the following would be the quickest way to do this? A) Press the delete key several times to erase the text B) Press the backspace key until all the text is removed C) Hit the delete key after selecting the text to be cut D) Type over the text after moving the insertion point to the left

C) Hit the delete key after selecting the text to be cut

In home telehealth care, which of the following would not be considered a home location? A) Nursing home B) Assisted living facility C) Hotel room D) Hospice facility

C) Hotel room

A nurse is reading an article about the use of robotics and telehealth. Which of the following would the nurse expect research on this technology to reveal? A) Increased response time B) Increased length of stay C) Improved patient outcomes D) Increased costs

C) Improved patient outcomes

A nurse is describing telehomecare to a group of patients, incorporating the knowledge that this method of care is cost-effective because of which of the following? A) It provides care in the comfort of the patient's home. B) It promotes self-management for patients with chronic illnesses. C) It allows early detection, reducing the need for unnecessary emergency visits. D) It minimizes the time spent with office appointments.

C) It allows early detection, reducing the need for unnecessary emergency visits.

In which of the following locations would a nurse least expect to find telemental health? A) Prison facilities B) Rural areas C) Large cities D) War-torn areas

C) Large cities

A nurse is involved with the billing process for the primary care setting where he works. The nurse identifies which dataset as the one commonly referred to as the daily rate guide? A) Healthcare Common Procedure Coding Systems B) International Classification of Disease—Clinical Modification C) Medicare Severity Diagnosis-Related Groups

C) Medicare Severity Diagnosis-Related Groups

A nursing informatics specialist is conducting a seminar on the need for uniformity in user design for data entry screens based on the understanding that: A) Most healthcare providers involved in the design process have background knowledge. B) Database design skills are common in those serving on EHR committees. C) Most providers approach user design using a paper chart thinking process. D) Screen design issues are limited, rarely affecting the time for documentation.

C) Most providers approach user design using a paper chart thinking process.

After teaching a group of students about efforts in the United States toward an electronic health record, the instructor determines that the students have understood the teaching when they identify which of the following as responsible for coordinating health policies and programs for the U.S. Department of Health and Human Services for health information technology? A) Nationwide Health Information Network B) State Health Policy Consortium C) Office of the National Coordinator for Health Information Technology D) American Society for Testing and Materials

C) Office of the National Coordinator for Health Information Technology

A portion of text is cut from one document and will be inserted into another document that is being prepared. Until the text is placed in the new document, the information is placed at which location? A) On the ROM memory B) On the desktop screen C) On the RAM clipboard D) On the master document

C) On the RAM clipboard

A student using Microsoft Vista operating sy is looking for a file that he created last week after transferring some digital photos onto the computer. He has not created any personal folders as student would most likely find the file in which folder? A) Documents B) Music C) Pictures D) Desktop

C) Pictures

A nursing informatics specialist is describing the similarities and differences between the two types of radio frequency identification (RFID) to a group of agency administrators. Which type would a nursing informatics specialist include as being associated with the passive type? A) Increased cost B) Read-write capability C) Readable from a distance of 1 to 10 feet D) Implantable under the skin

C) Readable from a distance of 1 to 10 feet

The American Telemedicine Association released a clinical care guideline for TeleICU. In this guideline, they identified three practice models. Which practice model refers to virtual visits prompted by an alert that are unscheduled? A) Continuous care model B) Scheduled care model C) Responsive (reactive) care model D) Reimbursement for care episode model

C) Responsive (reactive) care model

A group of students is reviewing material about the types of standards for telehealth and telemedicine. Which of the following, if stated by the students as an example of technical standards, indicates successful review? A) HIPAA B) Research protocols C) Systems for network connectivity D) Human resource management

C) Systems for network connectivity

An informatics nurse specialist is describing the different types of interoperability to a group of staff nurses whose agency has just adopted health information technology. Which term would the nurse specialist use to explain structural interoperability? A) Automatic interpretation B) Information transmission C) Workflow management D) Algorithm interaction

C) Workflow management

1. Ethics is best described as: A) a revolution in health care brought on by technologic change. B) ever-changing principles that guide decision making. C) a goal-oriented approach to answering questions that potentially have multiple acceptable answers. D) paradigmatic changes that involve rhythmic processes central to the healthcare system.

C) a goal-oriented approach to answering questions that potentially have multiple acceptable answers.

A nurse is reading an online article about the unified medical language system (UMLS). After reading the article, the nurse would identify this system as: A) a method for standardizing data entry. B) data standards on disease classifications. C) a method designed to match concepts from different terminologies. D) support for integrated surveillance systems for information transfer.

C) a method designed to match concepts from different terminologies.

Case-based ethical reasoning that considers the facts of a case in a sound, logical, and ordered or structured manner is known as: A) principlism. B) case-based ethics. C) casuistry. D) bioethical decision making.

C) casuistry

The prevalence of healthcare-associated infections (1.7 million cases per year) demonstrates how the _______ can address quality issues. A) local database B) paper-based chart C) electronic health record D) All of these are correct.

C) electronic health record

In ethics theory, autonomy means: A) personal responsibility. B) acting alone. C) freedom from controlling interferences. D) All of these are correct.

C) freedom from controlling interferences.

Organizations are able to monitor who is using the organizational network and what files that user has accessed, because any use of an electronic network: A) constitutes fair use. B) protects against spam. C) leaves a digital footprint. D) All of these are correct.

C) leaves a digital footprint.

The main goal of any ethical decision is to: A) promote professionalism. B) generate knowledge. C) reach a rational justifiable decision. D) promote trust.

C) reach a rational justifiable decision.

The term for transmitted pathologic images to specialists is: A) telemedicine. B) teleradiology. C) telepathology. D) telenursing.

C) telepathology.

Some organizations provide offsite employees such as homecare nurses with a network interface device that does not have private information stored on it. These devices are also known as: A) secure devices. B) networking facilitators. C) thin clients. D) All of these are correct.

C) thin clients

Confidential information in a secure network is most typically breached by: A) people "hacking" in from outside the network. B) viruses or cookies that enter from email. C) unauthorized use by authorized users. D) None of these is correct.

C) unauthorized use by authorized users.

Binary has its own special quanta names bases on the fundamental radix (base) of how many bytes of data information? A. 256 B. 512 C. 1024 D. 2048

C. 1024

Building on the concept of a more engaged patient, the view, download, and transmit capabilities required by MU provide patients with the ability to view online information and download and transmit their health information within what time frame of the information being available? A. 24 hours B. 72 hours C. 4 business days D. 10 business days

C. 4 business days

The International Classification of Diseases, 9th revision, clinical modification (ICD-9- CM) codes are an example of a code set that requires the hospital to use which electronic format? A. 837P B. 837D C. 837i D. 837r

C. 837i

Which data mining technique is used in public health to detect patterns and trends in disease outbreak? A. Cluster analysis B. Regression model C. Anomaly detection D. Association rule learning

C. Anomaly detection

Which data mining technique is used in some of the software used by the Centers for Disease Control and Prevention (CDC) for syndromic surveillance systems using emergency department data to detect disease outbreak from aberrations in the data? A. Cluster analysis B. Regression model C. Anomaly detection D. Association rule learning

C. Anomaly detection

Although which of the following are the most familiar clinical decision support (CDS) tool should ideally only be employed only for life-threatening clinical decision points where it is the only safe choice? A. Passive alerts B. Smart order sets C. Best practice alerts D. Single select paneled choices

C. Best practice alerts

Nominal and ordinal data can also be considered to be which type of data? A. Primary data B. Secondary data C. Categorical data D. Continuous data

C. Categorical data

The results from the Watson project demonstrate the feasibility and positive impact that which type of tools can have on a clinical setting? A. Data mining tools B. Data governance tools C. Cognitive computing tools D. Measurement tools

C. Cognitive computing tools

Which basic method of development for which standards occurs through a formal process of comment and feedback by interested stakeholders? A. Ad hoc standards B. De facto standards C. Consensus standards D. Government-mandated standards

C. Consensus standards

Visualization and manipulation of ordination in higher dimensions of data is a hallmark of which of the following and a core skill of the data scientist? A. Data modeling B. Data mapping C. Data mining D. Data cleansin

C. Data mining

Dating back to Florence Nightingale, which process in healthcare is recognized as a powerful manner in which data can inform improvement strategies? A. Data modeling B. Data mapping C. Data visualization D. Data governance

C. Data visualization

Most currently, patients can wear a monitor on their wrists that continually tracks their vital signs—blood pressure, respiratory rate, pulse rate, pulse oximetry, and body temperature—and sends the information to a which of the following? A. Patient portal B. Personal health record C. Electronic health record D. Health information exchange

C. Electronic health record

To meet the decision support requirement for stage 2 of MU, there must be how many CDS interventions related to four or more clinical quality measures at a relevant point in the patient care for the entire reporting period? A. Three B. Four C. Five D. Six

C. Five

Along with the HITECH Act came additional provisions for HIPAA that went above and beyond the original protections established in 1996. Also known as which of the following, these changes significant expand individual rights and provide increased protection and control over health information? A. HIPAA Privacy Rule B. HIPAA Security Rule C. HIPAA Omnibus Rule D. HIPAA Final Rule

C. HIPAA Omnibus Rule

The goals of which of the following mandate federal protections for personally identifiable health information, establishing rights to access and control health information, and preserving important uses of protected health information (PHI), such as through research, to improve quality of care? A. HIPAA Omnibus Rule B. HIPAA Final Rule C. HIPAA Privacy Rule D. HIPAA Security Rule

C. HIPAA Privacy Rule

A successful EHR is dependent on its ability to integrate which of the following into a cohesive clinician experience and reflect an accurate patient record? A. Adoption B. Implementation C. Interoperability D. Innovation

C. Interoperability

Which of the following is becoming more prominent and more robust in it use, due to advancement in standards, such as FHIR, and application program interface (API), which easily link data between multiple sources? A. Adoption B. Implementation C. Interoperability D. Innovation

C. Interoperability

In which level of measurement do the numbers assigned represent an object's membership in one of a set of mutually exclusive and exhaustive categories that can be ordered and are equally spaced regarding he magnitude of the attribute under consideration? A. Nominal B. Ordinal C. Interval D. Ratio

C. Interval

Many organizations still have disparate systems in use, often with some systems being more outdated and some systems using newer technology. These systems are often referred to as which of the following? A. Adjunct systems B. Outside systems C. Legacy systems D. Affiliate systems

C. Legacy systems

Which vocabulary standard provides identifiers, names, and codes for representing clinical observations and laboratory test results in a way that allows them to be exchanged effectively and efficiently? A. Current Procedural Terminology (CPT) B. International Classification of Diseases (ICD-10) C. Logical Observation Identifiers Names and Codes (LOINC) D. Systematized Nomenclature of Medicine-Clinical Terms (SNOMED-CT)

C. Logical Observation Identifiers Names and Codes (LOINC)

An electronic health record can be used by nurses for: A) decision support and documentation of care. B) patient education and information exchange. C) discharge planning. D) All of these are correct.

D) All of these are correct.

Which of the following is an important focus of stage 2 meaningful use of the EHR? A. Process mapping B. Program evaluation C. Patient engagement D. Clinician engagement

C. Patient engagement

A fall risk tool is a simple form of which type tool that is available to CDS teams? A. Inferential analytics B. Descriptive analytics C. Predictive analytics D. Prescriptive analytics

C. Predictive analytics

The system looking at hundreds of data points to give a weighted sepsis risk score is an example of which type of tool? A. Inferential analytics B. Descriptive analytics C. Predictive analytics D. Prescriptive analytics

C. Predictive analytics

Which of the following can be considered the formal mathematical definition for hypothesis tests, with numerical thresholds of acceptance or rejection that would yield a simple "yes" (or "no") decision? A. Regression B. Variance C. Probability D. Coincidence

C. Probability

Which of the following is the most recognizable component of the five rights as it is what the end user sees? A. Right information B. Right person C. Right CDS intervention format D. Right channel

C. Right CDS intervention format

In healthcare during 2016, the most frequently used attack techniques where which of the following, which collectively accounted for 48% of all attacks? A. Image File Attacks and SQL Injection B. Image File Attacks and OS Command Injection C. SQL Injection and OS Command Injection D. Malicious code and SQL Injection

C. SQL Injection and OS Command Injection

Which type of software allows the end user to model real phenomena with a set of mathematical formulas used in healthcare training re-create events rather than have students practice on patient? A. Workflow software B. Spreadsheet software C. Simulation software D. Communications software

C. Simulation software

Which type of networks are typically connected via a switch or hub, with a limited number of computers on the network? A. Bus network B. Ring network C. Star network D. Tree network

C. Star network

Which of the following requires the involved individuals to be simultaneously present for immediate exchange of information, as in the case of videoconferencing? A. mHealth technology B. Remote monitoring C. Synchronous telemedicine D. Asynchronous telemedicine

C. Synchronous telemedicine

Enacted in 1996, which regulation is considered a seminal event in health privacy regulation and sets a floor for privacy and security practices for defined "covered entities"? A. The Patient Protection and Affordable Care Act B. The Health Information Technology for Economic and Clinical Health Act C. The Health Insurance Portability and Accountability Act D. The General Protecting Regulation

C. The Health Insurance Portability and Accountability Act

The use of a contract is required to ensure the relationship between covered entities and business associates. For which piece of legislation, this contract is also known as a business associate agreement (BAA)? A. The Patient Protection and Affordable Care Act B. The Health Information Technology for Economic and Clinical Health Act C. The Health Insurance Portability and Accountability Act D. The General Protecting Regulation

C. The Health Insurance Portability and Accountability Act

mHealth is not held to regulations from which piece of legislation because some of these apps have been generally available and may be used by consumers to collect their own health data? A. The Patient Protection and Affordable Care Act B. The Health Information Technology for Economic and Clinical Health Act C. The Health Insurance Portability and Accountability Act D. The 21st Century Cures Act

C. The Health Insurance Portability and Accountability Act

Healthcare facilities do not have a reduction in expenses in medical records with use of an electronic health record.

False

Which of the following has been designated as the national Value Set Authority (VSAC) which maintains and provides access to all official versions of vocabulary value sets contained in the electronic clinical quality measures (e-CQMs) required by the Centers for Medicare and Medicaid Services (CMS)? A. The Institute of Medicine B. The World Health Organization C. The National Library of Medicine D. The American Medical Association

C. The National Library of Medicine

Which initiative supported by the Institute for Healthcare Improvement (IHI) calls for transformation of the healthcare industry and creates a need to embrace the use of big data, analytics, and innovative tools such as cognitive computing systems? A. The Beacon Initiative B. The Healthy People Initiative C. The Triple Aim Framework D. The National Quality Strategy

C. The Triple Aim Framework

Electronic data from EHRs are placed into categories. Records of medication administration would be placed into which category? A. Structured data B. Unstructured data C. Transactional data D. Continuous data

C. Transactional data

Many types of point-of-care systems require approval from which agency because the barcode reader interacts with the patient and this agency regulates all medical devices that interact with patients? A. Centers for Medicare and Medicaid Services B. Centers for Disease Control and Prevention C. U.S. Food and Drug Administration D. Agency for Healthcare Research and Quality

C. U.S. Food and Drug Administration

Which of the following can be measured in terms of utility and provides a very effective way to evaluate the sues of information technology projects? A. Efficiency B. Feasibility C. Usefulness D. Patient engagemen

C. Usefulness

Many decision support tools do not include the steps to ensure the patient's understanding or to evaluate the follow-up/effectiveness of advice or intervention given. Which of the following is an important part of the nursing process and should be part of the telehealth encounter? A. Delegation B. Comprehension C. Validation D. Anticipation

C. Validation

If an employee wants to work on patient information at home, typically he or she can download information to a flash drive from the network

False

A decision support system in the electronic health record consists of: A) reminders and alerts to improve the diagnosis of a patient. B) screening for drug selection, dosing, and interactions. C) preventive health reminders. D) All of these are correct.

D) All of these are correct.

Which of the following is one of the most important technological developments of this generation and a natural step in the evolution of mobile-connected solutions? A. Patient portal B. Remote monitoring C. mHealth technology D The Internet of things (IoT)

D The Internet of things (IoT)

A nursing informatics specialist is describing the use of health information technology to meet national safety goals to a group of nurse managers. The nurse specialist determines that the group needs additional teaching by which statement? A) "Barcodes aid in meeting the required two client identifiers for improved client safety." B) "Agencies are using barcode identification for one-person identification and blood transfusion." C) "Clinical decision support systems could alert providers of critical lab values." D) "Alarms should be used on all devices to ensure prompt response to safety issues."

D) "Alarms should be used on all devices to ensure prompt response to safety issues."

An organization's confidentiality policy should clearly define: A) which data are confidential. B) procedures for releasing confidential information. C) procedures to follow if confidential information is accidentally released without authorization. D) All of these are correct.

D) All of these are correct.

HIPAA was enacted by the federal government for several purposes, including: A) better portability of health insurance as a worker moved from one job to another. B) deterrence of fraud, abuse, and waste within the healthcare delivery system. C) simplification of the administrative functions associated with the delivery of health care, such as reimbursement claims sent to Medicare and Medicaid. D) All of these are correct.

D) All of these are correct.

Health information and data in the electronic health record consist of: A) demographics. B) medical diagnoses. C) medication lists and allergies. D) All of these are correct.

D) All of these are correct.

Organizations can ensure information integrity in a network by developing policies to: A) specify how data are actually input. B) indicate who has the authorization to change such data. C) track how and when data are changed and by whom. D) All of these are correct.

D) All of these are correct.

Patient data in an electronic health record includes demographics, medical and nursing diagnoses, and: A) medication lists. B) allergies. C) test results. D) All of these are correct.

D) All of these are correct.

Patients who have which of the following characteristics can use telenursing services? A) Are immobilized B) Have a chronic disease C) Live in remote places D) All of these are correct.

D) All of these are correct.

Positive impacts noted with using an informatics system to manage patients with chronic illness include: A) guidelines adherence. B) a decrease in emergency department visits. C) improved provider documentation. D) All of these are correct.

D) All of these are correct.

The HITECH Act had the purpose of: A) promoting prevention. B) enabling early detection. C) assisting in the management of chronic diseases. D) All of these are correct.

D) All of these are correct.

The HITECH Act had which of the following goals? A) Improve healthcare quality B) Reduce healthcare costs C) Improve and protect public health D) All of these are correct.

D) All of these are correct.

The National Healthcare Disparities Report of 2012 confirms that some Americans continue to receive inferior care because of such factors as race, ethnicity, and socioeconomic status (AHRQ, 2013). This report found disparities in which of the following areas? A) Healthcare quality B) Access to care C) Levels and types of care D) All of these are correct.

D) All of these are correct.

The development and implementation of a nationwide electronic health records system holds great promise for nursing practice and nursing informatics. The profession of nursing will benefit from the many enhancements such an infrastructure has to offer, including the ability to: A) improve the delivery of nursing care and the quality of that care. B) make more efficient and timely nursing care decisions for patients. C) avoid errors that may harm patients and promote health and wellness for the patients whom nurses serve. D) All of these are correct.

D) All of these are correct.

The use of teletechnology allows the telenurse to: A) evaluate the patient's status. B) use data to make decisions to better manage patient's health conditions. C) monitor the patient's vital signs. D) All of these are correct.

D) All of these are correct.

Which of the following is an advantage of electronic health record use? A) Support for home telemonitoring B) Improved communications C) Improved medication administration safety D) All of these are correct.

D) All of these are correct.

Which of the following is an example of real-time clinical telehealth applications? A) Telemental health B) Telerehabilitation C) Telehome care D) All of these are correct.

D) All of these are correct.

Which of the following is an example of telemonitoring? A) Monitoring patient parameters during home-based nocturnal dialysis B) Cardiac and multiparameter monitoring of remote intensive care units C) Daily home telemonitoring of vital signs by patients D) All of these are correct.

D) All of these are correct.

After teaching a group of students about the International Classification of Functioning, Disability, and Health, the instructor determines that the teaching was successful when the students identify the primary emphasis as which of the following? A) Disease B) Body structure C) Activities D) Function

D) Function

After teaching a group of students about standardizing terminology for billing of healthcare services, the instructor determines that additional teaching is needed when the students identify which of the following as being involved? A) ICD codes with clinical modifications (ICD-CM) B) Diagnosis-related groups (DRGs) C) Outcome and Assessment Information Set (OASIS) D) Health Level Seven

D) Health Level Seven

______ is another purpose of the HITECH Act. This term is defined as differences or gaps in the care experienced by one population compared with another population. A) Socioeconomic status B) Minority health care C) Inferior care D) Health disparities

D) Health disparities

A group of nurses are attending an in-service program on computerized documentation. Which of the following would the group expect to hear as the major impact of using a computerized provider order entry (CPOE) system? A) Time saving B) Cost-effectiveness C) Enhanced understanding D) Improved patient safety

D) Improved patient safety

After reviewing information about the benefits of electronic health records, a nurse demonstrates understanding of the information by identifying which as one of the most important benefits? A) Continuity of care B) Privacy C) Analyzable information D) Improved quality

D) Improved quality

When describing foundational interoperability to a group of nurses, what information would the nursing informatics specialist include? A) Automatic interpretation of messages exchanged B) Action by computer without human intervention C) Coordination of workflow management D) Information transmission and reception for use

D) Information transmission and reception for use

An instructor is teaching a group of students about telehealth and reimbursement. The instructor determines that the teaching was successful when the students state which of the following? A) Most telehealth services are paid for by clients as out-of-pocket expenses B) Reimbursement is fairly consistent across the different policies C) Little progress has been made in reimbursement policies D) Reimbursement is a large barrier to widespread adoption of telehealth

D) Reimbursement is a large barrier to widespread adoption of telehealth

An instructor is describing the technology classifications associated with telehealth and determines that students have understood the teaching when they state which of the following as being associated with real-time telehealth? A) Stored images sent for interpretation at a later time B) Asynchronous transmission of clinical data C) Affordable method for practice in rural communities D) Same-time interaction of the patient and provider via video

D) Same-time interaction of the patient and provider via video

The bioethical standard of fidelity emphasizes: A) confidentiality. B) privacy. C) truthfulness. D) adhering to promises.

D) adhering to promises.

New technologies in digital communications, electronic health records, and telehealth raise issues related to: A) comprehensiveness of care. B) the digital divide. C) justice and fidelity. D) privacy and confidentiality.

D) privacy and confidentiality

Telehealth used in the nursing practice is known as: A) telemedicine. B) teleradiology. C) telepathology. D) telenursing.

D) telenursing.

The Centers for Medicare and Medicaid Services (CMS) touts that the trend to use which of the following as the financial care delivery approach has actually slowed the growth in Medicare spending? A. Health maintenance organizations (HMOs) B. Preferred provider organizations (PPOs) C. Exclusive provider organizations (EPOs) D. Accountable care organizations (ACOs)

D. Accountable care organizations (ACOs)

Which factor is realized when long-term value is determined by the end user and amplifies the importance of determining end-user satisfaction and acceptance of the EHR? A. Possession utility B. Form utility C. Time utility D. Actualization utility

D. Actualization utility

Which type of data mining may be a preliminary step to building predictive models to examine variables that are predictive of some outcome of interest? A. Cluster analysis B. Summarization C. Anomaly detection D. Association rule learning

D. Association rule learning

The patient or referring health professional sending an email description of a medical case to an expert who later sends back an opinion regarding diagnosis and optimal management is an example of which of the following? A. mHealth technology B. Remote monitoring C. Synchronous telemedicine D. Asynchronous telemedicine

D. Asynchronous telemedicine

Which of the following is a common range estimate used in healthcare, which is a range of values that are likely to contain the point estimate with some probability? A. Mean B. Variance C. Standard deviation D. Confidence interval

D. Confidence interval

Which of the following is a joint effort of HL7 international and the American Society for Testing Materials (ASTM) to further promote exchange and interoperability through use of XML-based standards with the goal of sending clinical information from one provider to another without losing clinical meaning? A. Blockchain B. Clinical Document Architecture (CDA) C. Continuity of Care Record (CCR) D. Continuity of Care Document (CCD)

D. Continuity of Care Document (CCD)

Which of the following is a messaging standard that is used to communicate diagnostic and therapeutic information on digital images and associated data? A. HL7 B. IEEE C. X12N D. DICOM

D. DICOM

Which of the following is the primary language for the computer and consists of binary 0s and 1s, and is considered "first-generation" language? A. PROLOG B. GUI C. BASIC D. Machine code

D. Machine code

Which of the following is an important consideration for the protection of healthcare information, or other information such as your banking or credit card information? A. FTP B. HTML C. HTTP D. HTTPS

D. HTTPS

Which type of evaluation provides an easy-to-use, easy-to-learn, and cost-effective technique that allows for the identification of major usability issues in a short time frame? A. User evaluation B. System evaluation C. Program evaluation D. Heuristic evaluation

D. Heuristic evaluation

When which principles are not addressed in either development or implementation of health IT, patient safety issues and unintended consequences can occur? A. Usability principles B. Interoperability principles C. Feasibility principles D. Human factors principles

D. Human factors principles

In which phase of EHR implementation, data dictionaries are established, nomenclature is standardized within the HER, and expectations for use and compliance are established? A. Initiation phase B. Analysis phase C. Design phase D. Implementation phase

D. Implementation phase

Which of the following is a rapidly expanding, and virtually boundless, universe of devices that includes hardware, software, and infrastructure that does not abide by Moore's law which indicates that processing powers and speed doubles every 2 years? A. Blockchain B. Electronic health records (EHR) C. Health information exchanges (HIEs) D. Internet of Things (IOT)

D. Internet of Things (IOT)

A basic knowledge of electronic health records and nursing informatics is now considered to be an advanced informatics competency.

False

Which of the following represents a character trait of early majority staff members? A. Are willing to support the system with their peers and other staff, and to promote the use of the system B. Often use workarounds and may even continue to use old workflows, trying to use as little of the new system as they can C. Are often fearful of change or feel they do not have the technological knowledge to change D. Often use a portion of the system well but may have forgotten or not adopted certain workflows well and need to be supported and reminded of key features

D. Often use a portion of the system well but may have forgotten or not adopted certain workflows well and need to be supported and reminded of key features

According to Adams and Garets, which type of analysis is not widely used in healthcare to date, but it will likely demonstrate the most impact in areas such as cognitive support for physicians and other practitioners? A. Inferential analysis B. Descriptive analysis C. Predictive analysis D. Prescriptive analysis

D. Prescriptive analysis

Which of the following are intended to lead the clinician on a defined pathway to address the identified issue? A. Inferential analytics B. Descriptive analytics C. Predictive analytics D. Prescriptive analytics

D. Prescriptive analytics

Which of the following, one example of the need for public health standards and HIE, is a mechanism that is used to identify disease clusters early, before diagnoses, to confirm and report findings to public health agencies? A. National Active Surveillance B. National Passive Surveillance C. Sentinel Surveillance D. Syndromic Surveillance

D. Syndromic Surveillance

Which principle of human factors design is likely to reduce false alarms, be more satisfying to the end user and reduce error? A. Linked information B. Format of alerts C. Mental models of the end user D. Tailored interfaces to the end user

D. Tailored interfaces to the end user

Which regulation addresses the export of personal data outside the European Union (EU), which has implications for U.S. businesses and patients overseas? A. The Patient Protection and Affordable Care Act B. The Health Information Technology for Economic and Clinical Health Act C. The Health Insurance Portability and Accountability Act D. The General Protecting Regulation

D. The General Protecting Regulation

Which of the following is a technique used for the analysis of data that requires adjusting the original data to answer the question of interest? A. Measurement B. Validation C. Manipulation D. Transformation

D. Transformation

Which of the following refers to everywhere and anywhere/anytime computing that is enabled by a significant underlying infrastructure? A. Cloud computing B. Cluster computing C. Cognitive computing D. Ubiquitous computing

D. Ubiquitous computing

Which approach to security in the cloud treats all data the same and all data in the cloud may be accessed and manipulated by multiple applications and users simultaneously? A. Blockchain B. Cognitive security C. Layered security D. Unified data protection

D. Unified data protection

Which security approach enables access anywhere and supports the evolving paradigm of personalized medicine in a ubiquitous computing environment? A. Blockchain B. Cognitive security C. Layered security D. Unified data protection

D. Unified data protection

TURF is an EHR framework developed by the Strategic Health IT Advanced Research Projects program (SHARPC) that is focused on which aspect of EHR? A. Efficiency B. Feasibility C. Functionality D. Usability

D. Usability

Reports say that data from U.S. healthcare system alone reached 150 exabytes in 2011. At this rate of growth, big data for U.S. healthcare will soon reach which scale? A. Gigabyte B. Petabyte C. Yottabyte D. Zettabyte

D. Zettabyte

In addition to being the most common way to communicate health data, which of the following is also the most promising way to engage patients in their healthcare? A. Patient portal B. Telemedicine C. Remote monitoring D. mHealth technology

D. mHealth technology

A password consisting of the ampersand character (&) and the user's birthdate is strong.

False

A nurse works at a health care organization that is accredited by the Join Commission. What is the best method for this health care organization to demonstrate that it is providing quality patient care?

Documentation audits

While working on a document, a student wants to access the help feature. Which of the following keys would be most appropriate for the student to press?

F1

In a store-and-forward telehealth transmission, digital images, video, audio, and clinical data are immediately transmitted securely to a specialist or clinician at another location, where they are studied by the relevant specialist or clinician and then are captured and stored on the client's computer or device.

False

It is safe to open an email attachment from a known sender.

False

Most electronic health record benefits studies are hypothesis-testing studies.

False

Most healthcare personnel are using electronic health records. Medicare Access and Summary CHIP Reauthorization Act of 2015 (MACRA) measures will push healthcare organizations to limit the use of clinical technologies within their organization and implement intervention analyses in a new way.

False

Most workflow redesign efforts are focused on large changes resulting in widespread change that accompanies transformational activities.

False

Order entry management functions in the electronic health record are limited to physicians.

False

Principles of nonmaleficence are related to direct contacts with patients and do not apply to information published on health websites.

False

Protected health information relates to handwritten or verbal information only.

False

Stage 1 meaningful use criteria focused on health information exchange and patient control over health data.

False

The HITECH Act does not provide significant monetary incentives for providers who engaged in meaningful use of health information technology.

False

The implementation of an electronic health record impacts only healthcare providers of a healthcare organization.

False

Threats to data security in healthcare organizations are not common.

False

Virtue ethics focuses on the needs of others and the individual's responsibility to meet those needs.

False

Workflow analysis must be conducted as a stand-alone effort.

False

A nurse is involved with knowledge generation as part of the process of integrating evidence-based practice. Which of the following would the nurse be involved with from the research perspective? Select all that apply.

Identifying information in nursing literatureSynthesizing nursing information to solve nursing problemsApplying the steps of information literacy

A group of nurses are working on a committee to develop a program that promotes the adoption of evidence-based nursing at the facility. Which of the following would the committee need to address? Select all that apply.

Improved access to resources for the staff Emphasis on the value of information seekingEnhanced familiarity of staff to evidence-based practice

Which benchmarks will indicate to the nurse that the agency has computerized information systems that demonstrate meaningful use?

Improves quality & safetyImproves care coordinationImproved public health

If you are authoring a blog, which of the following would violate ethical and legal guidelines?

Including names of staff members in the blog

A group of students are debating the pros and cons of implantable identification devices. Which of the following would the proponents most likely address?

It allows quicker and safer emergency care.

A nurse is working in an agency with standards that require a nurses documentation to be within the context of the nursing process. The nurse is working for which agency?

Joint commission

The nurse manager of a large medical unit in a busy urban teaching hospital reviews the unit trends for staffing, which are determined by an acuity system. The nurse manager notices that the acuity level is high. What should the nurse manager do?

More staff may be needed

Which guidelines must the nurse follow to appropriately manage electronic patient information?

Never share passwordsAvoid leaving patient information displayed on a computer where others can see it

A nurse is preparing to do research. Which of the following would be an appropriate use for the nurse's handheld device? Select all that apply.

Participate in Web-based research surveys Record comments from a focus group Take photos of changes in status with a treatment Search for evidence-based resources

A registered nurse recently went to work for a health care organization that uses the SOAP format for documentation. The nurse charts the following: Discuss alternatives for pain control. Which component of SOAP did the nurse chart?

P

Which of the below statements are true as concerns ethics and the law?

Penalties can be imposed if laws are violated

A nurse is told during orientation that the organization is very patient focused and that is uses a documentation system with the acronym PIE. What will the nurse be charting?

Problem, intervention, evaluation

A nursing administrator at an acute care facility is meeting with a telehealth nursing administrator on the expansion of telehealth for mutual patients. Which of the following is a collaborative opportunity for both organizations to reduce cost and expenditures? [1] Provide initiatives for reducing hospital readmissions in patients with chronic disease [2] Improve beneficiary access under fee-for-service payments [3] Promote telehealth networks to improve care quality and accessibility [4] Mandate telehealth for every patient with two or more chronic diseases

Provide initiatives for reducing hospital readmissions in patients with chronic disease

A nurse is preparing a discharge summary. Which item should the nurse include?

Provision for follow-up care

A brute force attack is software used to guess network passwords.

True

A clinical information system may be used effectively as a staff development tool.

True

A clinical use for telehealth technologies includes providing disease prevention and promotion of good health. One example is telephonic or smartphone app case management and patient education provided through asthma and weight management programs conducted in public schools.

True

A common thread in all ethics approaches is that they all are goal-oriented approaches to answering questions that have the potential for multiple acceptable answers.

True

All nurses need to be engaged in the development and integration of a nationwide electronic health record.

True

As a clinical field, telenursing is part of telehealth and has many points of contact with other medical and nonmedical applications, such as telediagnosis, teleconsultation, and telemonitoring.

True

Browser privacy settings can control how cookies are used.

True

Chronic diseases are of major concern to the United States, not only because of the impact they have on individuals, but also because of the tremendous cost associated with providing treatment for patients with these conditions. Adult-onset diabetes, for example, has reached epidemic proportions. A national health information technology infrastructure will help providers better identify those patients who are at risk for developing this disease and provide treatment strategies to avoid it.

True

Electronic health record technology will make it easier for all providers involved in a patient's care to readily access that patient's complete and current healthcare record, thereby allowing providers to make well-informed, efficient, and effective decisions about a patient's care at the time those decisions need to be made.

True

Electronic health records hold the promise of transforming health care by improving all aspects of patient safety and promoting patient-centered care.

True

Ethical dilemmas arise when issues raise questions that cannot be answered with a simple, clearly defined rule, fact, or authoritative view.

True

Examining the workflow surrounding the use of technology enables better use of the technology and more efficient work.

True

Existing accounting rules are enhanced under the HITECH Act, giving patients the right to access their EHR and receive an accounting of all disclosures. Before the HITECH Act, HIPAA regulations provided an exception to the accounting requirements.

True

Informatics nurses and nursing executives should partner with electronic health record developers to capture nursing content using standardized terminologies.

True

Informatics nurses are significant resources in a project team, influencing adoption and change management.

True

Many healthcare organizations experience the effects of poorly implemented clinical technology solutions. These effects may be manifested in the form of redundant documentation, non-value-added steps, and additional time spent at the computer rather than in direct care delivery.

True

Many of the quality reporting measures rely on the nurse's documentation.

True

Meaningful use measures have pushed healthcare organizations to reexamine the use of clinical technologies within their organization and approach implementations in a new way.

True

New technologies can violate patients' privacy and confidentiality.

True

Nurses must be involved in "meaningful" data collection and reporting.

True

Nurses must become familiar with the many and varied clinical and nonclinical transmission formats and applications of telehealth technologies so that they can make informed choices about the tools that are available for their use, as needed.

True

Nurses using telehealth have much greater access to their patients' conditions and needs and are able to respond in a more timely way than is possible using only faceto- face visits.

True

Observation and documentation of workflow to better understand what is happening in the current environment and how it can be altered is referred to as process or workflow analysis.

True

One of the key advantages of home telemonitoring is the creation of a digital health record that allows information to be recorded over time. If a patient takes his or her weight and blood pressure daily, most software will graphically display these data over time so that subtle trends can be observed. This type of trend data is much more useful in identifying emerging or developing conditions than snapshot data that are collected every 6 to 8 weeks at a physician's office.

True

Over the last decade, the efficiencies of telenursing have been well documented, as have the resulting improved patient care outcomes that can be expected by frequent telecontact.

True

Patient notification of drug recalls is a benefit of an electronic health record.

True

Patients who have a predisposition to disease are at increased risk of medical problems associated with employment, lifestyle, or location, and those patients who have displayed early signs of potentially serious health problems could be placed on preventive monitoring. In such cases, telehealth could benefit these patients since monitoring is used to ensure that interventions are timely and acute incidents avoided.

True

Principlism has decreased as societies became more heterogeneous, and societies began experiencing diversity of beliefs and values.

True

Some analysis and redesign efforts may occur weeks, months, or even years following the implementation of technology.

True

Some home-based telecardiology programs involve the patient, the family, the physician, and a specialized cardiac monitoring center. A multidisciplinary approach is used along with best practice-defined protocols to manage the patient, improve the patient's quality of life, and reduce healthcare costs, especially hospitalization costs. Nurses play a key role in this network of care.

True

Spear phishing uses contact information provided in an organization's directory and tailors the scam email to a specific person.

True

Systematic and flexible ethical decision-making abilities are essential for all nurses.

True

Technology should not be implemented for the sake of automation unless it promises to deliver gains in patient outcomes and proper workflow.

True

TeleICU nurses provide remote monitoring, oversight, and expert consultation for patients in rural intensive care units by examining real-time data collected at the bedside.

True

Teleconsultations use a variety of technologies to enable collaborative exchanges or consultations between individuals or among groups that are involved with a case. These teleconsults may be transmitted live using videoconferencing technology.

True

Telehealth can positively impact the healthcare outcomes for patients with chronic diseases, particularly those with higher acuity levels who are at significant risk of having a medical crisis that might necessitate emergency or unplanned acute interventions. Many other patients with chronic diseases are less susceptible to a health crisis but would greatly benefit from home telemonitoring to improve care and reduce costs.

True

Telehealth can refer to clinical and nonclinical uses of health-related contacts.

True

Telehealth is affected by certain legal, ethical, and regulatory issues of which nurses should be aware. In the United States, interstate practice of telenursing, for example, requires attending nurses to be licensed to practice in all of the states in which they provide telehealth services by directly interacting with patients.

True

Telehospice or telepalliative care can use real-time or remote monitoring to provide psychological support to patients and caregivers. Telehealth devices can also play a role in symptom management, in effect helping end-of-life patients achieve an optimal quality of life.

True

Telephony-based call centers may be operated by managed care organizations, hospitals, and other health organizations. Some call centers also include telemonitoring services, which allow the patient to stay at home and use different telehealthcare devices to transmit biometric and other medical information back to the call center. Monitoring can be intermittent or continuous.

True

The "Level Seven" in HL7's name refers to the highest level of the International Standards Organization's (ISO) communications model for Open Systems Interconnection (OSI) application level.

True

The HIPAA privacy requirements, which went into effect on April 14, 2003, limited the release of protected health information without the patient's knowledge and consent.

True

The HITECH Act has enhanced the security and privacy protections each patient has a right to expect under HIPAA.

True

The HITECH Act has improved the privacy and security of patient health information by applying the requirements of HIPAA directly to the business associates of covered entities. In the past, it was up to the covered entity to enter into contracts with its business associates to ensure compliance with HIPAA. Now business associates are responsible for their own compliance. Ans: True

True

The HITECH Act made provisions to include meaningful public input in the development of a national HIT infrastructure. Both the Policy Committee and the Standards Committee established by the HITECH Act hold public meetings, and anyone interested in this process can participate.

True

The Policy Committee established by the HITECH Act is responsible for making recommendations to the coordinator about how to implement the requirements of the HITECH Act, such as the technologies to use in the infrastructure.

True

The Standards Committee established by the HITECH Act is responsible for recommending standards by which health information is to be electronically exchanged.

True

The ability to provide better healthcare access is the number one benefit of using telehealth.

True

The electronic health record may be used to identify patients who qualify for research studies.

True

The federal Health Information Technology for Economic and Clinical Health Act of 2009 (HITECH Act; Leyva & Leyva, 2011), enacted February 17, 2009, is part of the American Recovery and Reinvestment Act (ARRA). The ARRA was enacted to stimulate various sectors of the United States. The health information technology (HIT) industry was one area where lawmakers saw an opportunity to stimulate the economy and improve the delivery of health care at the same time.

True

The goal of workflow analysis is to maximize the use of technology and reduce non-value-added activities.

True

The password !E1E2E30 is strong.

True

The password *tomatoSoup 7 is strong.

True

The popularity of social and mobile networking applications is one indication of how new Web-based technologies are changing communication preferences.

True

The term workflow is sometimes used interchangeably with process or process flows, particularly in the context of implementations.

True

The use of electronic health records has demonstrated a reduction in adverse drug reactions through the use of computerized physician order entry.

True

The use of mobile phones, tablets and personal digital assistants for managing health is a rapidly advancing form of telehealth. There are numerous apps that target specific health behaviors and illnesses and provide a platform for management at a distance.

True

Two key pieces of legislation have shaped the nursing informatics landscape—the Health Insurance Portability and Accountability Act (HIPAA) of 1996 and the Health Information Technology for Economic and Clinical Health Act (HITECH) of 2009.

True

Under the Medicare Access and CHIP Reauthorization Act of 2015 (MACRA), there is now an explicit requirement for providers and hospitals to use a certified electronic health record that meets a set of standard functional definitions to be eligible for reimbursement incentives.

True

We must minimize preventable errors, and one of the most important tools for this purpose is the use of electronic records and information systems to provide point-ofcare decision support and automation.

True

When workflow changes begin to fail and workarounds develop, the new processes need to be evaluated further.

True

With the new goal of paying for value and better care, the Medicare Access and Summary CHIP Reauthorization Act of 2015 (MACRA) reformed Medicare payment by making changes that created a quality payment program to replace the hodgepodge system of Medicare reporting programs.

True

Workflow is a term to describe the execution of a series of tasks in a prescribed sequence.

True

A nurse is explaining clinical transformation to a group of nurses. Which statement is correct? [1] "Clinical transformation is a radical change approach that produces a more responsive organization." [2] "Clinical transformations must include an adoption of a clinical technology." [3] "Clinical transformations are led by nursing staff members." [4] "Clinical transformations involve small, impactful changes."

[1] "Clinical transformation is a radical change approach that produces a more responsive organization."

An informatics nurse is consulting with healthcare administrators on receiving incentives for the implementation of electronic health records (EHRs). Which statement by the informatics nurse is correct? [1] "EHRs with data sharing capabilities are important to provide quality, coordinated care that is incentivized." [2] "EHRs with complex nomenclature systems are key to incentive programs." [3] "EHRs should not include a care management system for incentive programs." [4] "EHRs should maintain patient privacy and not share any data across the technology."

[1] "EHRs with data sharing capabilities are important to provide quality, coordinated care that is incentivized."

A nurse is participating on a multidisciplinary committee that is reviewing different viewpoints on a patient care dilemma. The committee's review relates to which of the following? [1] Bioethics [2] Standards [3] Morals [4] Values

[1] Bioethics

An informatics nurse is explaining barriers to the adoption of electronic health records to a group of administrators. Which statement by the informatics nurse is correct? [1] "Electronic health records are expensive, and the cost has prohibited widespread adoption of this technology." [2] "Healthcare providers are resistant to adopt the use of electronic health records because there are no financial incentives for their use." [3] "Healthcare systems do not want to adopt electronic health records because doing so requires extensive staff training." [4] "Electronic health records do not impact patient care or workflow."

[1] "Electronic health records are expensive, and the cost has prohibited widespread adoption of this technology."

An informatics nurse is explaining that certification criteria are used for electronic health records to a group of staff nurses. Which statement is correct by the informatics nurse? [1] "The certification criteria are updated often to make the electronic health record more robust and functional for the needs of users and patients." [2] "There are 10 criteria each electronic health record must meet in order to be implemented." [3] "The certification criteria involve documentation functions only." [4] "The certification criteria do not address interoperability."

[1] "The certification criteria are updated often to make the electronic health record more robust and functional for the needs of users and patients."

A nurse is explaining the impact of a nationwide electronic health record on nursing to a nursing student. Which statement by the nurse is correct? [1] "The electronic health record will likely provide the ability to make more efficient and timely nursing care decisions for patients." [2] "The electronic health record will increase errors but will increase the access to patient data." [3] "The electronic health record will not impact the quality of care but will make patient care more efficient." [4] "The electronic health record will not impact nursing or nursing care delivery in any meaningful way."

[1] "The electronic health record will likely provide the ability to make more efficient and timely nursing care decisions for patients."

A nurse is describing benefits and problems associated with the electronic health record (EHR) to a nursing student. Which statement by the nurse is correct? [1] "There is faster turnaround time for laboratory results in the EHR." [2] "Doctors' orders are harder to interpret in the EHR." [3] "Medication recalls are not effectively communicated to patients in the EHR." [4] "The EHR helps reduce the amount of nursing documentation for every patient."

[1] "There is faster turnaround time for laboratory results in the EHR."

A nurse is teaching a nursing student about information security and the use of passwords. Which statement by the nurse is correct? [1] "Use a combination of letters, numbers, and special characters." [2] "Avoid changing from upper- to lowercase in your password." [3] "Do not make your password long, and keep it to four characters or less." [4] "Change your password only when you must."

[1] "Use a combination of letters, numbers, and special characters."

A patient has a concern that the security and privacy of health information has been compromised. Which statement by the nurse is correct? [1] "You should contact the Office of Civil Rights to file a complaint about privacy and security rights." [2] "You should contact your insurance provider if you have a complaint." [3] "You can contact the local office of the Department of Health and Human Services." [4] "You can contact the information technology department at the hospital."

[1] "You should contact the Office of Civil Rights to file a complaint about privacy and security rights."

A nurse is using standardized terminology in nursing documentation in a healthcare organization that has multiple campuses. Which of the following demonstrates interoperability? [1] A healthcare provider at another campus is able to review the nursing documentation and understand its meaning and significance. [2] Multiple nurses are able to enter information into the nursing documentation at the same time. [3] A physician is able to enter physician orders into the patient's chart while the nurse is completing documentation. [4] A laboratory technician is able to enter lab results into the patient's chart simultaneously.

[1] A healthcare provider at another campus is able to review the nursing documentation and understand its meaning and significance.

A nurse unintentionally does not log out from a computer workstation prior to responding to a patient's call light. This is considered which of the following? [1] A negligent breach [2] A vulnerable breach [3] A computer breach [4] A patient breach

[1] A negligent breach

A nurse has requested a schedule change in work schedule. To preserve integrity, which individual would likely have access to change such data? [1] A nursing supervisor [2] A peer nurse [3] A nursing assistant [4] A physician colleague

[1] A nursing supervisor

A patient is admitted to a healthcare facility and has questions about the facility's privacy practices. To which of the following does the patient have a right? [1] A paper copy of the notice of privacy practices of the facility [2] An electronic copy of privacy disclosures for the facility [3] An individual safeguard policy for the patient's protected health information [4] A copy of staff training records on patient privacy

[1] A paper copy of the notice of privacy practices of the facility

An elderly patient who lives alone is homebound and receives telehealth services. The telenurse has discovered that the patient often forgets to turn off appliances after use. Which of the following telehealth tools would the nurse recommend? [1] A sensor and activity-monitoring system [2] A personal emergency response system [3] A medication management device [4] A central station

[1] A sensor and activity-monitoring system

A patient with obesity needs nutrition education. Which of the following is an example of the facilitation of patient education through telenursing? [1] A video conference on menu planning [2] Use of a phone application to track exercise [3] An interdisciplinary face-to-face conference on diabetes [4] Use of email to request medication refills

[1] A video conference on menu planning

A nurse receives a request for information about a patient from an outside agency. Which of the following should be the nurse's next action? [1] Access the healthcare system's confidentiality policy. [2] Ask the patient's family for permission. [3] Review the patient's chart for an informed consent. [4] Refer the outside agency to the medical records department.

[1] Access the healthcare system's confidentiality policy

A nurse manager is using an ethical foundation to guide the nursing activities, which includes providing care, preventing harm, and maintaining relationships. Which of the following is the ethical foundation being used? [1] Care ethics [2] Casuist ethics [3] Virtue ethics [4] Justice ethics

[1] Care ethics

An informatics nurse is developing an integration plan of a new electronic health record and anticipates a workflow redesign. Which of the following will the informatics develop first? [1] Change management plan [2] Workflow analysis [3] Clinical transformation [4] Workflow evaluation

[1] Change management plan

An informatics nurse uses which theory when integrating a new technology? [1] Change theory [2] Adaptation theory [3] Goal attainment theory [4] Collaboration theory

[1] Change theory

A healthcare system is making widespread change in the clinical environment due to unstable financial circumstances. This change is known as which of the following? [1] Clinical transformation [2] Facility overhaul [3] System transformation [4] Work analysis

[1] Clinical transformation

A patient is wearing an electrocardiographic device that connects with a mobile technology device. This system is designed to assist with which of the following? [1] Communicating data to a physician for proper diagnosis and treatment [2] Updating the patient's status when the patient is in a home environment [3] Communicating the patient's behaviors outside the health facility [4] Ensuring patient confidentiality and privacy in data transmission

[1] Communicating data to a physician for proper diagnosis and treatment

A nurse is considering the ethics of a patient care dilemma and develops a list of alternative options. This effort requires the nurse to use which of the following? [1] Critical thinking skills [2] Knowledge of rules and laws [3] Worst-case options [4] The role of key players

[1] Critical thinking skills

A telenurse is concerned about the status of a patient who is at home. To make a complete and accurate decision about next steps for the patient, which question(s) should the nurse consider? [1] Do I need to call the patient? [2] Do I need additional information? [3] Do I need to call the patient's family member? [4] Do I need to go to the patient's home?

[1] Do I need to call the patient?

Expansion of telehealth can impact the impending shortage of nurses in which of the following ways? [1] Improving job retention and job satisfaction [2] Improving patient satisfaction [3] Improving access to healthcare services for patients [4] Increasing interdisciplinary collaboration

[1] Improving job retention and job satisfaction

A healthcare organization is using an electronic health record to improve the quality of care and patient safety. Which of the following will the organization receive from the Centers for Medicare and Medicaid Services? [1] Increased reimbursement rates [2] Increased research funding [3] Matching patient care dollars [4] National recognition of technology use

[1] Increased reimbursement rates

A nurse administrator is collaborating with leadership of a healthcare organization to make sure fair, equitable, and appropriate treatment is provided to all individuals in the facility. This type of treatment is an example of which of the following? [1] Justice [2] Autonomy [3] Beneficence [4] Nonmaleficence

[1] Justice

An informatics nurse stores secured information in an office. Which step should the nurse take next to secure the physical location of the information? [1] Lock the office door. [2] Close the door. [3] Ask security to guard the door. [4] Request the staff to not go in the office.

[1] Lock the office door.

A nurse is documenting laboratory results in an electronic health record (EHR), which meets which Institute of Medicine component of EHRs? [1] Results management [2] Security management [3] Privacy management [4] Interoperability standards

[1] Results management

An informatics nurse is performing a workflow analysis, which is a necessity for which of the following? [1] Safe patient care [2] Nursing satisfaction [3] Patient satisfaction [4] Financial well-being

[1] Safe patient care

Which of the following requires a release of information in accordance with the Health Insurance Portability and Accountability Act (HIPAA)? [1] Sharing patient records from an evaluation at a mental health treatment center [2] De-identifying patient records for research activities [3] Using patient lab results for public health data [4] Releasing patient records for legal proceedings after a police emergency

[1] Sharing patient records from an evaluation at a mental health treatment center

A nurse is collaborating with consumers and other healthcare providers on a recommendation for the exchange of health information as part of the HITECH Act. Which committee is the nurse serving on? [1] Standards committee [2] Policy committee [3] Privacy committee [4] Documentation committee

[1] Standards committee

A telenurse will be providing care to patients in two bordering states. Which of the following does the nurse need to review before caring for these patients? [1] State licensure requirements [2] State tax exemptions [3] National recommendations for nursing practice [4] National nursing certification guidelines

[1] State licensure requirements

Nursing staff has adopted the use of an electronic health record (EHR) in day-today practice. This is considered which of the following? [1] Successful ownership of the EHR [2] Expected results of EHR staff training [3] Acceptance of commercial offerings [4] Readiness for change in technology

[1] Successful ownership of the EHR

An advanced practice nurse is providing telehealth care for patients who are incarcerated. The nurse understands which of the following? [1] Telehealth provides cost-effective care and supports public safety when this method of care is provided. [2] Telehealth is used for this patient population because public safety outweighs quality of patient care. [3] Patients have increased options of appointment times when telehealth is delivered in this manner. [4] Patients prefer telehealth when they are incarcerated because they do not have to leave the facility.

[1] Telehealth provides cost-effective care and supports public safety when this method of care is provided.

A patient has undergone a knee replacement and lives in a rural location. Which of the following will the nurse recommend for a home exercise program? [1] Teletherapy with motion-tracking webcam technology [2] Inpatient physical therapy [3] Outpatient physical therapy at the closest healthcare facility [4] Use of written patient handouts on exercise after a joint replacement

[1] Teletherapy with motion-tracking webcam technology

To uphold ethics in a patient's care, which of the following must the nurse ensure? [1] That a rational, justifiable decision is reached [2] That nonmaleficence is avoided [3] That justice is maintained [4] That beneficence is provided

[1] That a rational, justifiable decision is reached

A nursing executive would like to improve a nursing process and needs to collect metrics on which of the following? [1] The current performance of the process [2] The past performance of the process [3] Nursing research on nursing processes [4] Quality indicators on nursing care

[1] The current performance of the process

A nurse is using the Internet, and the website is blocked. This website is blocked by which of the following? [1] The proxy server [2] The computer's hardware [3] The intrusion detection software [4] The firewall.

[1] The proxy server

Nurses who protect the privacy and security of patient information are also protecting which of the following? [1] Their own violation of privacy laws [2] Their facility from patient complaints [3] Their patients' ethics and morals [4] The future of nursing's role in informatics

[1] Their own violation of privacy laws

A nurse logs in to a medication dispensing system with a password and a biometric authentication. Which of the following is an example of biometric authentication? [1] Thumbprint [2] ID with radiofrequency identification chip [3] Signature [4] Passphrase

[1] Thumbprint

An informatics nurse is examining workflow of nursing staff for what purpose? [1] To improve work efficiency [2] To stabilize financial budgets [3] To increase patient-nurse interactions [4] To reduce nurse-to-patient ratios

[1] To improve work efficiency

A patient is considering inconclusive evidence on both sides of medical choice and is questioning which choice to make. The nurse understands which of the following? [1] Uncertainty is stressful, and there is need for an ethical decision-making model to help one choose the best action. [2] The patient is experiencing uncertainty and needs help from family members to make a decision. [3] Uncertainty indicates that the patient does not have enough information, and the nurse should call the physician for more information. [4] The patient is uncertain about the decision, and no action should be taken until the physician decides for the patient.

[1] Uncertainty is stressful, and there is need for an ethical decision-making model to help one choose the best action.

A nurse posts a photo of a patient and the nursing staff in an inpatient nursing facility on a social media site. The patient's name is not included in the post. The nurse is subsequently disciplined by administration for which of the following? [1] Violation of the patient's privacy and confidentiality [2] Violation of the other nursing staff's privacy and confidentiality [3] Violation of the healthcare organizations rights [4] Violation of personal ethics

[1] Violation of the patient's privacy and confidentiality

A healthcare provider is working on a patient electronic health record at home. Which security tool ensures that all data transmitted on unsecured networks are encrypted? [1] Virtual private network [2] Intrusion detection system [3] Proxy server [4] Mask

[1] Virtual private network

An informatics nurse develops a visual depiction of a workflow process, which is called a: [1] process map. [2] work process. [3] workflow analysis. [4] clinical transformation.

[1] process map.

A physician is reviewing chest radiograph images of a patient who is located 30 miles away at another healthcare facility. This type of care delivery is known as: [1] teleradiology. [2] telepathology. [3] telereview. [4] telemanagement.

[1] teleradiology.

A patient with the comorbidities of diabetes, hypertension, and fibromyalgia lives in a home in a rural area. The telenurse remotely monitors the patient's objective data, which would include: [1] vital signs and blood glucose results. [2] complaints of shortness of breath, lightheadedness, shakiness. [3] a 24-hour nutritional log. [4] pain scores.

[1] vital signs and blood glucose results.

A nurse is working with a new patient monitor that interfaces with the electronic health record (EHR). This demonstrates which capability of the EHR? [1] Biomedical device integration [2] Increased clinical reporting [3] Expansion of health information exchange [4] Vendor expansion of products

[3] Expansion of health information exchange

The role of an information security officer at a healthcare facility involves which of the following? [1] Handling patient complaints about privacy and confidentiality [2] Providing staff education about privacy [3] Conducting regular audits on privacy and compliance with national laws [4] All of these are correct.

[4] All of these are correct.

How is best research evidence produced? a By the conduct and synthesis of numerous high-quality studies in a health- related area b By the imaginations of creative health care workers, who design qualitative research that illuminates our understanding c By dissemination of important results at conferences d By publications that detail the newest advances in health care

a By the conduct and synthesis of numerous high-quality studies in a health- related area

Which information by the staff indicates teaching by the nurse was successful for the purposes of documentation? (Select all that apply.) a To aid in clinical research b To maintain a legal and financial record of care c To include a step-by-step description of how to perform procedures d To evaluate quality process and performance improvement e To communicate patient needs and progress toward meeting outcomes

a To aid in clinical research b To maintain a legal and financial record of care d To evaluate quality process and performance improvement e To communicate patient needs and progress toward meeting outcomes

A nurse is frustrated about the lack of staffing for the shift. When one of the patients fell and broke a hip, the nurse documented the incident in the patients chart. Which entry is the best way that the nurse should document what happened? a Patient stated that fell while going to the bathroom. Physician notified. b Nobody available to answer call bell; patient got up on own and fell. c Patient fell because of unsafe staffing levels on unit.

a Patient stated that fell while going to the bathroom. Physician notified.

A nurse is using a computer to locate and review laboratory test results, and chart and order sterile supplies. What type of system is the nurse using? a. Clinical information system b. Computerized provider order entry system c. Administrative information system d. Clinical decision support system

a. Clinical information system

A registered nurse recently changed jobs and is now working in home health. What must the nurse chart to obtain reimbursement from Medicare, Medicaid, and private insurance companies? a. Patients response to care b. Whether patient had a good or bad day c. Whether family liked nurse or not ro d. Patients number of marriages

a. Patients response to care

A nurse began working at a local hospital and learned that the hospital had just instituted a hand-off protocol. What will the nurse be doing? a. Performing transfer reports b. Completing IV fluid flow sheets c. Using standardized care plans d. Reviewing laboratory reports

a. Performing transfer reports

A nurse is teaching the staff about informatics and describing the key concepts. Which information should the nurse include during the teaching session? a. Wisdom b. Charting c. Assessment d. Evaluation

a. Wisdom

Which action should the nurse take when handling and disposing of patient information? a. Keep patient information to take home for disposal. b. Use programmed speed-dial keys when faxing. c. Throw hand-written notes about the patient in the trash. d. Place fax machines in a public place.

b. Use programmed speed-dial keys when faxing.

Which documentation by the nurse best describes patient data? a. Moderate amount of clear yellow urine voided. b. Voided 220 mL clear yellow urine. c. A small amount of urine voided into absorbent pad. d. Patient incontinent of urine.

b. Voided 220 mL clear yellow urine.

A registered nurse is caring for an older adult patient with lung cancer. The daughter, who is also a nurse, asks to see the chart. What is the nurses best response? a. Come with me and we will look at it together. b. Im sorry; this information is confidential. c. Let me ask my supervisor if it is okay. d. You should know better than to ask me that

b. Im sorry; this information is confidential.

The probability that a product will operate properly within an expected timeframe is the dimension of quality known as a. durability. b. reliability. c. performance. d. serviceability.

b. reliability.

How are evidence-based practice and best research evidence related? a With best research evidence publications, there is no evidence-based practice. b Both evidence-based practice and best research evidence are generated by . research. c Best research evidence is the evidence on which practice is based. d Best research evidence includes five basic items, one of which is evidence. based practice.

c Best research evidence is the evidence on which practice is based.

After a nurse receives a medication telephone order for a patient, what is the proper action? a Withholding the medication until the physician or health care provider signs the . order b Verifying the physicians or health care providers order with the pharmacy c Reading it back to the person who gave the order d Clarifying the new medication order with another registered nurse

c Reading it back to the person who gave the order

A new registered nurse is working on a pediatric unit in a large teaching hospital that uses focus charting with the acronym DAR. What will the nurse be charting? a. Data, assessment, reaction b. Data, assessment, recommendation c. Data, actions, response d. Data, actions, recovery

c. Data, actions, response

A nurse records the following at 1800: patient states that the abdominal pain is worse now than last nightBetty Smith, RN. The nurse is using which type of charting? a. PIE documentation b. SOAP documentation c. Narrative charting d. Charting by exception

c. Narrative charting

Which information indicates the nurse has a correct understanding of the purpose of a patients medical record? a To invoice the nurse for reimbursement b To protect the patient in case of a malpractice suit c To ensure everyone is working toward a common goal of providing safe care d To contribute to a worldwide databank for trends in health care

d To contribute to a worldwide databank for trends in health care

A registered nurse is documenting patient assessments. Which documentation written by the nurse is most clear?

d States pain is a 2 on a 0 to 10 scale.

A nurse works at a health care organization that is accredited by The Joint Commission. What is the best method for this health care organization to demonstrate that it is providing quality patient care? a. Cost of care per patient day b. Number of registered nurses c. Absence of sentinel events d. Documentation audits

d. Documentation audits

nurse is giving a change-of-shift report. Which action should the nurse take? a. Exchange judgments made about the patients attitudes. b. Include a description of how to perform procedures. c. Provide a concise and organized description of the patients normal findings. d. Make walking rounds with the nurse coming on duty to review the patients . status and needs.

d. Make walking rounds with the nurse coming on duty to review the patients . status and needs.

A nurse completes an incident/occurrence report on a patient who fell while walking in the a. To exchange information among health care members b. To provide information about patients on one unit to another c. To prevent a legal lawsuit from the patient d. To aid in the hospitals quality improvement program

d. To aid in the hospitals quality improvement program

A nursing student is working on a clinical assignment. Which information is acceptable for the student to write on the clinical care plan that will be given to the instructor? a. Patient room number b. Patient date of birth c. Patient medical record number d. patient diagnosis

d. patient nursing diagnosis

The American Association for Justice (2013), suggests that to improve care delivery and to minimize error, the most important tools to employ are: A) electronic records and information systems to provide point-of-care decision support and automation. B) medication administration methodologies that provide care decision support and automation at the point of care. C) bar coding for patient care activities to provide access to information and automation at the point of care. D) computer systems that track activities at the point-of-care automation.

electronic records and information systems to provide point-of-care decision support and automation.


Ensembles d'études connexes

Life Insurance and Health Life Policy Riders

View Set

One-Sided vs. Two-Sided Messages

View Set

Ch.13 Meiosis and Sexual Life Cycles

View Set

Exam Missed Questions Readiness Exam

View Set

Allusion-Understatement Literary Terms

View Set

Art History Section 5 Test (HS, Romanesque,

View Set

Incorrect Exam FX Life Insurance Questions

View Set

HED510-FINAL EXAM QUIZ 2 QUESTIONS

View Set