Introduction to Computer Systems in Healthcare Information Technology
Periodically the files containing the documentation of security awareness training are cleared out. How many years back must the records be kept for?
6
Which of the following organizations accredits SDOs?
ANSI
Which of the following would make patient information PHI?
Account number
What type of safeguard is more people focused in nature?
Admnistrative
What do expanders do in a transcription system?
Allow transcriptionists to type an acronym
What does ANSI stand for?
American National Standards Institute
The ability of a healthcare facility to provide EHR software to physicians is allowed through
An exception to the Stark Law
Typically, a chargemaster is updated from software on a ______ basis.
Annual
Which of the following is the type of encoder that mimics a codebook?
Automated codebook encoder
Money is an exmaple of a ____________ to the EHR
Barrier
What system would one use to enter data required by the NCHS?
Birth Certificate software
An RIS system may perform all of the following radiological tests except
CBC
Life expectancy is information that would come from the
Cancer Registry Software
Which system collects the TNM stage?
Cancer Registry Software
What does CCHIT stand for?
Certification Commission on Health Information Technology
Which part of of an administrative information system automates the coding process for routine procedures such as lab tests and radiology examinations?
Chargemaster
Which system would tell a physician that they need to sign an operation report?
Chart deficiency
Which system tracks the location o the paper medical record?
Chart locator
Which of the following encodes data?
Code set
Which of the following is a business associate?
Company that bills for a physicians office
What type of organization contracts with hospitals to assist them with special projects?
Consulting
If the EHR crashes, what plan should be implemented?
Contingency
Which of the following is a database that is updated in real time?
Data repository
Which HIM role works with patients to help them understand health data?
Data translator
A physician speaks into a phone and gives a summary of the patients care, which is later transcribed. What type of system is the physician using?
Dictation
The most secure type of signature used in the EHR is the
Digital signature
Which of the following is a health information exchange model?
Directed exchange
Which of the following statements is true about telehealth?
Documentation requirements are the same as the typical face to face patient care
What is the term used for healthcare providers who are a part of the meaningful use program?
Eligible professional
A computerized system designed to help assign the proper code is a:
Encoder
Which system assists the coder in selecting the appropriate code?
Encoder
The type of system designed to be used for top level administration is an
Executive information system (EIS)
Which system would on one be using if one typed out the abbreviation EGD and the term esophagogastroduodenoscopy was spelled out?
Expander
The area most likely aligned with meeting the Joint Commission's focus on patient safety would be..
Facilities Management
Which of the following systems would use a physical plant department of a hospital primarily use?
Facilities Management
Our hardware repair service needs access to the data center. He signs in and is escorted. This is an example of what?
Facility access control
True or False: e-HIM is an information system used as a component of the EHR
False
A security breach has been reported. What concept describes the process used to gather evidence
Forensics
The mapping system used to convert ICD-9-CM to ICD-10-CM is
GEMs
Which of the following healthcare setting is involved in data collection, data analysis, monitoring compliance with regulations and research?
Governmental agencies
Which of the following system systems should one use to assign the diagnosis and procedure codes ?
Grouper
Which of the following is an example of the designated standard maintenance organization
HL7
Which of the following standards is the messaging standard used in most clinical information systems?
HL7
Which of the following is an organization that supports, oversees, or governs the exchange of health-related information among organizations according to nationally recognized standards
Health information exchange organization
To enter the number of units of blood that a patient received during a recent hospitalization, one would use the
Healthcare quality indicator
An automated timekeeping system might be found within which one of the following systems?
Human Resources Information System
Which of the following is a reason why healthcare providers benefit from social networking?
Identify what service patients want
Which of the following is a benefit of the EHR?
Improved efficiency
What is expected to happen with the roles of the medical language specialists as more speech recognition technology is used in the future?
Increase in productivity and decrease in staffing
What are the roles of a report design specialist?
Information dissemination and liason
Which of the following is an example of a clinical information system
Laboratory information system
Algorithms are used to match duplicate patients in which of the following systems?
MPI
The facilities management system controls
Major construction
Which of the following is used to identify drugs?
NDC
What does NCHS stand for?
National Center for Health Statistics
Which of the following is an example of cost avoidance?
Not repeating tests
Where should the audit trail be stored?
On a different computer from the database
The component of the EHR that allows patients to manage their own data is
PHR
The system that includes patient information from both the patient and the healthcare provider is called the
PHR
Which of the following is an example of a person or entity authenitcation
Password
Which of the following is an example of a reminder?
Patient is due for MMR immunization
Which component of the EHR allows patients to retrieve their test results
Patient-provider portal
Which of the following clinical information systems easily operates with the CPOE?
Pharmacy information system
The physician wants to dictate a question. What lets the SRT know that it is a question?
Physician changes his inflection
Which of the following is a benefit of scanning after the chart is complete?
Physicians do not need to be trained in online chart completion
What function is typically found in the ambulatory EHR but not the inpatient EHR?
Practice Management
Which of the following is a way that technology can assist in patient safety?
Preventing adverse effets
Which of the following would not be done with an MPI system?
Printing out patient general consents
How can mobile devices transform healthcare?
Reducing medical fraud
The purpose of which organization is to provide training and other support to help physicians and other professionals implement and adopt EHRs
Regional extension center
Routine reports such as number of admissions and discharges per month or per year are generated by which system?
Registration
Which system typically assigns the patients medical record number to the patients folder?
Registration
Which type of software tracks patients who meet criteria for inclusion such as a specific disease or treatment?
Registry
The system used to notify requests of invalid authorizations is called an
Release of Information
Which system would you use to print out a report of people who have not paid for the copies of records sent to them?
Release of Information
Which of the following must be addressed when monitoring the quality of CAC?
Reliability
Which of the following is an example of two factor authentication
Retinal scan and password
A labor and delivery nurse has the same access to the information system as the perinatal nurse even though the job varies. This is what type of access?
Role-based
The term used to describe routing documents to someone for quality control review is
Routing
The algorithm also referred to as "fuzzy logic" is
Rules Based
Which type of malware can capture keystrokes?
Spyware
The term used to describe where you enter the locations that a record can be checked out to is called a
Table
Pages that tell the scanner information about the pages that follow are called
Target sheets
Which of the following is a true statement about the document management system
The DMS captures clinical data only through scanning documents
Which statement is true about the EHR?
The EHR is different based on the setting in which it operates
What is the trend of adoption of the EHR in the United States
The United States is rapidly increasing the rate of adoption of EHRs
As seen within the dictation - transcription process, turnaround time is a measure of what?
The time frame of completion of the dictated reports
Critique this statement: The DMS is used only by the HIM department
This is a false statement as it is used by many departments across the hospital
Critique this statement: Risk management eliminates risk
This is a false statement as risk management reduces risk
A scheduling system would be used in which of the following situations?
To track the patients in the operating room by time and operating room number.
What does TNM stand for?
Tumor, node, metastasis
Which of the following is used as part of the design process
Use case
Data lost due to malware being downloaded onto a computer may be caused by which of the following?
Virus
Which of the following is an example of security incident
Virus attack
Security awareness training should be provided to
all members of the workforce
The scheduling system knows which of the following?
amount of time needed to perform colonoscopy
Demographic data
are generally obtained from the hospital information system
To receive the full benefits of the EHR, one should document
at the point of care
An example of a technical safeguard is
audit control
Business intelligence assists with
both clinical and administrative analysis
Unstructured data, also called narrative data
can be entered in a free text format by the user, usually by typing
CCHITs role in the EHR is
certification
Structured data are generally found in
checkboxes, drop-down boxes and other data entry whereby the user chooses from the options already built in the system
The minimum content for a continuity care record (CCR) is called the
core data set
To be subject to HIPAA, an organization must meet the definition a
covered entity
The HIM role that protects data from unauthorized use is
data security, data privacy, and confidentiality manager
A PACS system allows the x-ray department to be totally digital, so there is no need for the use of physical
film
A reason to implement an EHR is to
improve patient care
Security controls should be monitored periodically for inappropriate disclosure or use. This review is called:
information system activity review
Ensuring that data are not altered either during transmission across a network or during storage is
integrity
Which of the following is used to indicate that data sent is the same as data received
integrity
The users have requested an outline for a document. What is this outline called
macro
The term used to describe viruses and spyware is called
malicious software
Addressable standards are:
mandatory as written
The program that provides incentive payments to healthcare providers who meet certain criteria for using the EHR is:
meaningful use
DICOM is an example of a
messaging standard
The term used to describe computer working similarly to a persons brain is
neural network
SNOMED is an example of a
nomenclature
Data such as graphic information and activities of daily living would be typically found within which of these clinical information systems
nursing information system
The MPI is a key data storehouse of patient information and must be kept
permanently
We have spent alot of money purchasing duplicate hardware, cables, and such. This duplication is known as
redundancy
A healthcare organization can consider size and complexity of the organization when developing the security plan. This flexibility is called:
scalability
Poor security practices that do not lead to disclosure of ePHI are called
security events
The individual assigned the responsibility of managing the security process is called
security official
A portable method of storage of health data is known as
smart-card
The SRT has been trained to use a specific physicians voice. The system is
speaker dependent
The inadvertant deletion of data needed for a court case is known as
spoilation
Checkboxes are a method of data entry used in
structured data entry
The term used to describe viewing images from a remote location is
teleradiology
Which of the following can be used when dictating
template
The advantage of front-end speech recognition is
the turnaround time is shortend
One of the purposes of the administrative simplification title is
to improve efficiency and effectiveness of healthcare business processes
Many believe the greatest advantage of tele-health is the elimination of
travel
Our computer system just notified us that Mary Burchfield has just looked up another patient with the same last name. This notification is called a
trigger
If a provider wants to ensure the correct spelling of a word while dictating using SRT, he or she should
use the military alphabet and spell the word out
We found a weakness in our security through which a hacker can access the system. This weakness is known as a
vulnerability
I need to understand how data moves throughout the organization. I must be a
work and data flow analyst
The standard that determines whether or not an employees access to ePHI is appropriate is called
workforce security