Introduction to Computer Systems in Healthcare Information Technology

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Periodically the files containing the documentation of security awareness training are cleared out. How many years back must the records be kept for?

6

Which of the following organizations accredits SDOs?

ANSI

Which of the following would make patient information PHI?

Account number

What type of safeguard is more people focused in nature?

Admnistrative

What do expanders do in a transcription system?

Allow transcriptionists to type an acronym

What does ANSI stand for?

American National Standards Institute

The ability of a healthcare facility to provide EHR software to physicians is allowed through

An exception to the Stark Law

Typically, a chargemaster is updated from software on a ______ basis.

Annual

Which of the following is the type of encoder that mimics a codebook?

Automated codebook encoder

Money is an exmaple of a ____________ to the EHR

Barrier

What system would one use to enter data required by the NCHS?

Birth Certificate software

An RIS system may perform all of the following radiological tests except

CBC

Life expectancy is information that would come from the

Cancer Registry Software

Which system collects the TNM stage?

Cancer Registry Software

What does CCHIT stand for?

Certification Commission on Health Information Technology

Which part of of an administrative information system automates the coding process for routine procedures such as lab tests and radiology examinations?

Chargemaster

Which system would tell a physician that they need to sign an operation report?

Chart deficiency

Which system tracks the location o the paper medical record?

Chart locator

Which of the following encodes data?

Code set

Which of the following is a business associate?

Company that bills for a physicians office

What type of organization contracts with hospitals to assist them with special projects?

Consulting

If the EHR crashes, what plan should be implemented?

Contingency

Which of the following is a database that is updated in real time?

Data repository

Which HIM role works with patients to help them understand health data?

Data translator

A physician speaks into a phone and gives a summary of the patients care, which is later transcribed. What type of system is the physician using?

Dictation

The most secure type of signature used in the EHR is the

Digital signature

Which of the following is a health information exchange model?

Directed exchange

Which of the following statements is true about telehealth?

Documentation requirements are the same as the typical face to face patient care

What is the term used for healthcare providers who are a part of the meaningful use program?

Eligible professional

A computerized system designed to help assign the proper code is a:

Encoder

Which system assists the coder in selecting the appropriate code?

Encoder

The type of system designed to be used for top level administration is an

Executive information system (EIS)

Which system would on one be using if one typed out the abbreviation EGD and the term esophagogastroduodenoscopy was spelled out?

Expander

The area most likely aligned with meeting the Joint Commission's focus on patient safety would be..

Facilities Management

Which of the following systems would use a physical plant department of a hospital primarily use?

Facilities Management

Our hardware repair service needs access to the data center. He signs in and is escorted. This is an example of what?

Facility access control

True or False: e-HIM is an information system used as a component of the EHR

False

A security breach has been reported. What concept describes the process used to gather evidence

Forensics

The mapping system used to convert ICD-9-CM to ICD-10-CM is

GEMs

Which of the following healthcare setting is involved in data collection, data analysis, monitoring compliance with regulations and research?

Governmental agencies

Which of the following system systems should one use to assign the diagnosis and procedure codes ?

Grouper

Which of the following is an example of the designated standard maintenance organization

HL7

Which of the following standards is the messaging standard used in most clinical information systems?

HL7

Which of the following is an organization that supports, oversees, or governs the exchange of health-related information among organizations according to nationally recognized standards

Health information exchange organization

To enter the number of units of blood that a patient received during a recent hospitalization, one would use the

Healthcare quality indicator

An automated timekeeping system might be found within which one of the following systems?

Human Resources Information System

Which of the following is a reason why healthcare providers benefit from social networking?

Identify what service patients want

Which of the following is a benefit of the EHR?

Improved efficiency

What is expected to happen with the roles of the medical language specialists as more speech recognition technology is used in the future?

Increase in productivity and decrease in staffing

What are the roles of a report design specialist?

Information dissemination and liason

Which of the following is an example of a clinical information system

Laboratory information system

Algorithms are used to match duplicate patients in which of the following systems?

MPI

The facilities management system controls

Major construction

Which of the following is used to identify drugs?

NDC

What does NCHS stand for?

National Center for Health Statistics

Which of the following is an example of cost avoidance?

Not repeating tests

Where should the audit trail be stored?

On a different computer from the database

The component of the EHR that allows patients to manage their own data is

PHR

The system that includes patient information from both the patient and the healthcare provider is called the

PHR

Which of the following is an example of a person or entity authenitcation

Password

Which of the following is an example of a reminder?

Patient is due for MMR immunization

Which component of the EHR allows patients to retrieve their test results

Patient-provider portal

Which of the following clinical information systems easily operates with the CPOE?

Pharmacy information system

The physician wants to dictate a question. What lets the SRT know that it is a question?

Physician changes his inflection

Which of the following is a benefit of scanning after the chart is complete?

Physicians do not need to be trained in online chart completion

What function is typically found in the ambulatory EHR but not the inpatient EHR?

Practice Management

Which of the following is a way that technology can assist in patient safety?

Preventing adverse effets

Which of the following would not be done with an MPI system?

Printing out patient general consents

How can mobile devices transform healthcare?

Reducing medical fraud

The purpose of which organization is to provide training and other support to help physicians and other professionals implement and adopt EHRs

Regional extension center

Routine reports such as number of admissions and discharges per month or per year are generated by which system?

Registration

Which system typically assigns the patients medical record number to the patients folder?

Registration

Which type of software tracks patients who meet criteria for inclusion such as a specific disease or treatment?

Registry

The system used to notify requests of invalid authorizations is called an

Release of Information

Which system would you use to print out a report of people who have not paid for the copies of records sent to them?

Release of Information

Which of the following must be addressed when monitoring the quality of CAC?

Reliability

Which of the following is an example of two factor authentication

Retinal scan and password

A labor and delivery nurse has the same access to the information system as the perinatal nurse even though the job varies. This is what type of access?

Role-based

The term used to describe routing documents to someone for quality control review is

Routing

The algorithm also referred to as "fuzzy logic" is

Rules Based

Which type of malware can capture keystrokes?

Spyware

The term used to describe where you enter the locations that a record can be checked out to is called a

Table

Pages that tell the scanner information about the pages that follow are called

Target sheets

Which of the following is a true statement about the document management system

The DMS captures clinical data only through scanning documents

Which statement is true about the EHR?

The EHR is different based on the setting in which it operates

What is the trend of adoption of the EHR in the United States

The United States is rapidly increasing the rate of adoption of EHRs

As seen within the dictation - transcription process, turnaround time is a measure of what?

The time frame of completion of the dictated reports

Critique this statement: The DMS is used only by the HIM department

This is a false statement as it is used by many departments across the hospital

Critique this statement: Risk management eliminates risk

This is a false statement as risk management reduces risk

A scheduling system would be used in which of the following situations?

To track the patients in the operating room by time and operating room number.

What does TNM stand for?

Tumor, node, metastasis

Which of the following is used as part of the design process

Use case

Data lost due to malware being downloaded onto a computer may be caused by which of the following?

Virus

Which of the following is an example of security incident

Virus attack

Security awareness training should be provided to

all members of the workforce

The scheduling system knows which of the following?

amount of time needed to perform colonoscopy

Demographic data

are generally obtained from the hospital information system

To receive the full benefits of the EHR, one should document

at the point of care

An example of a technical safeguard is

audit control

Business intelligence assists with

both clinical and administrative analysis

Unstructured data, also called narrative data

can be entered in a free text format by the user, usually by typing

CCHITs role in the EHR is

certification

Structured data are generally found in

checkboxes, drop-down boxes and other data entry whereby the user chooses from the options already built in the system

The minimum content for a continuity care record (CCR) is called the

core data set

To be subject to HIPAA, an organization must meet the definition a

covered entity

The HIM role that protects data from unauthorized use is

data security, data privacy, and confidentiality manager

A PACS system allows the x-ray department to be totally digital, so there is no need for the use of physical

film

A reason to implement an EHR is to

improve patient care

Security controls should be monitored periodically for inappropriate disclosure or use. This review is called:

information system activity review

Ensuring that data are not altered either during transmission across a network or during storage is

integrity

Which of the following is used to indicate that data sent is the same as data received

integrity

The users have requested an outline for a document. What is this outline called

macro

The term used to describe viruses and spyware is called

malicious software

Addressable standards are:

mandatory as written

The program that provides incentive payments to healthcare providers who meet certain criteria for using the EHR is:

meaningful use

DICOM is an example of a

messaging standard

The term used to describe computer working similarly to a persons brain is

neural network

SNOMED is an example of a

nomenclature

Data such as graphic information and activities of daily living would be typically found within which of these clinical information systems

nursing information system

The MPI is a key data storehouse of patient information and must be kept

permanently

We have spent alot of money purchasing duplicate hardware, cables, and such. This duplication is known as

redundancy

A healthcare organization can consider size and complexity of the organization when developing the security plan. This flexibility is called:

scalability

Poor security practices that do not lead to disclosure of ePHI are called

security events

The individual assigned the responsibility of managing the security process is called

security official

A portable method of storage of health data is known as

smart-card

The SRT has been trained to use a specific physicians voice. The system is

speaker dependent

The inadvertant deletion of data needed for a court case is known as

spoilation

Checkboxes are a method of data entry used in

structured data entry

The term used to describe viewing images from a remote location is

teleradiology

Which of the following can be used when dictating

template

The advantage of front-end speech recognition is

the turnaround time is shortend

One of the purposes of the administrative simplification title is

to improve efficiency and effectiveness of healthcare business processes

Many believe the greatest advantage of tele-health is the elimination of

travel

Our computer system just notified us that Mary Burchfield has just looked up another patient with the same last name. This notification is called a

trigger

If a provider wants to ensure the correct spelling of a word while dictating using SRT, he or she should

use the military alphabet and spell the word out

We found a weakness in our security through which a hacker can access the system. This weakness is known as a

vulnerability

I need to understand how data moves throughout the organization. I must be a

work and data flow analyst

The standard that determines whether or not an employees access to ePHI is appropriate is called

workforce security


Ensembles d'études connexes

Applied Biostatistics I QuizStar

View Set

Modules 11-12 group exam cyberops

View Set