Information Systems Multiple Choice Questions (Flash Card mode)
Which of the following is primary storage? A. RAM B. USB drive C. CD D. external hard drive
A. RAM
The most secure model of signatures used in information systems is A. digital signature. B. electronic signature. C. digitized signature. D. there is no difference in the level of security between these models.
A. digital signature
What types of software provide a front-end structure/interface that presents information in a familiar format leading to a natural style of interaction through the use of icons and a mouse? A. graphical user interface B. fiber optics C. assembly level language D. machine language
A. graphical user interface
The patient's blood pressure is automatically being recorded. This is an example of what type of clinical information system? A. patient monitoring system B. medical documentation C. nursing applications D. patient registration
A. patient monitoring system
What controls the traffic on the Internet? A. the World Wide Web B. Internet protocol C. the ISDN D. domain names
B. Internet protocol
Dr. Smith is entering a medication order in a CPOE. A window pops up with the following message: Patient is on beta-blocker, which is a contraindication for this medication. Do you want to order this medication? Yes or No. This is an example of a(n) A. reminder B. alert C. allergy D. structured entry
B. alert
Your release of information system has part of the computing on the workstation and part on the file server. What type of technology is being used? A. Internet B. client server C. LAN D. operating system
B. client server
Southside Community Hospital utilizes a wide area network to transport data across the Internet. This is done by using a private tunnel. This is a(n) A. WLAN B. LAN. C. VPN D. FDDI
C. VPN
You have been asked to identify and display the existing record processing workflow with the paper record. After you finish this, you will redesign the process and display the new process. What tool should you use? A. policy and procedure B. data dictionary C. data flow diagram D. data mapping
C. data flow diagram
The data on the hard drive were erased by a corrupted file that had been attached to an e-mail message. Which software would be used to prevent this? A. productivity B. utility C. virus checker D. encryption
C. virus checker
A common language used in data definition, and data manipulation is A. unified modeling language. B. metadata C. HTML. D. SQL
D. SQL