Chapter 6

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The ability to work with other systems. Intranet Ethernet Interoperability Interface Boot

Interoperability

The practice management software allows the user to enter patient demographic information, schedule appointments, perform billing procedures, and generate reports. EMR software contains the patient's medical treatment information for one healthcare facility. Both statements are true. Both statements are false. The first statement is true; the second is false. The first statement is false; the second is true.

Both statements are true.

Which of the following is used to ensure that all office computer programs and data are secure in case of a mishap, fire, or natural disaster? RAM Microprocessor Write-protection Data backup

Data backup

What is not recommended for infection control practices for technologic devices? Healthcare professionals should wash hands or use hand sanitizer before and after using the keyboard. Disinfection keyboards, touchscreens, and signature pads weekly. Gloves should not be worn during computer use. Use plastic covers to enclose keyboards and other devices.

Disinfection keyboards, touchscreens, and signature pads weekly.

An electronic record of health-related information about an individual that can be created, gathered, managed, and accessed by authorized clinicians and staff members within a single healthcare organization. This is an electronic version of a paper record. Operating system Electronic health record Electronic medical record Practice management software

Electronic medical record

A series of computers that are linked, allowing them to share information, is a(n): database. clearinghouse. network. internet.

network.

With practice management software, what tasks can be performed? Claim denial management and electronic claim submission Financial and management reporting Scheduler and insurance eligibility verification Medical coding or encoder All are correct

All are correct

This security measure records computer activity of a user within software. Virus protection software Audit trails Security risk analysis Access restrictions Monitoring log-in activity

Audit trails

__________ means that each employee with network access must log in using a unique password. Unique user identification Firewall Authentication Administrative safeguard

Authentication

___________ is a process in which the network files are copied either using an external hard drive, a server, or an online system. RAM Microprocessor Write-protection Backing up

Backing up

Which of the following screens responds to the electrical characteristics of a finger and is found in smartphones and other electronic devices? Touchpad Resistive touch screen Capacitive touch screen Surface acoustic wave

Capacitive touch screen

Malware are unauthorized users who attempt to break into computer networks. True False

False

What acts as a filter or barrier between the network and the internet? Network systems Virus detectors Scanners Firewalls

Firewalls

An ergonomic workstation designed for prolonged use will not include which of the following? Headsets Split-key keyboards Laptops and tablets Foam wrist rest

Laptops and tablets

Which statement is not correct? A personal computer is a single user electronic data processing device. A personal computer and peripheral devices are hardware. Output devices allow data to be entered into the computer. Secondary storage devices include jump drives, hard drives, and flash drives.

Output devices allow data to be entered into the computer.

A secure online website that gives patients 24-hour access to personal health information using a username and password. Intranet Ethernet Patient portal Interface Boot

Patient portal

Which of the following is an output device? Printer Scanner Touch pad Keyboard

Printer

Which of the following keyboards helps reduce repetitive strain injuries by minimizing muscle strain? QWERTY keyboard Wireless keyboard Split-key layout Waved or curved key layout Split-key layout and waved or curved key layout

Split-key layout and waved or curved key layout

What is incorrect when performing routine cleaning for computer hardware? Use a damp, lint-free cloth to wipe the hardware's casing. Spray a household glass cleaner on the monitor screen and wipe with a lint-free cloth. Spray a disinfectant on a lint-free cloth and clean the keyboard. Use a compressed air duster to blow the dirt out of the keyboard. Wipe clean all vents and air holds.

Spray a household glass cleaner on the monitor screen and wipe with a lint-free cloth.

What practice would not be considered ergonomically correct? The chair's backrest supports the upper body. The chair's armrest supports the forearms with the shoulders in a relaxed position. Using a document holder. The bottom of the monitor is at or just below eye level.

The bottom of the monitor is at or just below eye level.

A file is a collection of data or program records stored as a unit with a specific name. True False

True

HIPAA and HITECH require privacy, security, and confidentiality of patient records. True False

True

Privacy filters are also called privacy screens and are devices attached to monitors that allow visualization of the screen contents only if the user is directly in front of the screen. True False

True

Telehealth refers to remote clinical services and nonclinical services, such as provider training, meetings, and continuing education. True False

True

A mouse is a(n): output device. input device. storage device. processor.

input device.

An application program is a software that is designed to: perform a variety of tasks, such as word processing, database functions, and patient billing. provide the computer with a set of basic instructions for executing other programs. interpret the program instructions. All are correct

perform a variety of tasks, such as word processing, database functions, and patient billing.

When using cloud storage, the files are copied onto many servers in various locations. This is called: interoperability. security risk analysis. electronic transaction. redundancy. interface.

redundancy.

If you want to transfer paper files to a computerized system without inputting all the data using the keyboard, you could use a: modem. disk operating system. scanner. magnetic disk drive.

scanner.


संबंधित स्टडी सेट्स

Client with musculoskeletal Medications

View Set

Nutrition 2114 Ch. 3 (Digestion, Absorption and Transport)

View Set

Pers Fin Ch 10 Financial Planning

View Set

AP English Language + Composition - MCQ

View Set

Chapter 6 The Human Population and Its Impact | APES

View Set

Assignment 3: Chap 49 (Opioids) & Chap 58 (SUD)

View Set

Chapter 2. FINANCIAL STATEMENTS, TAXES, AND CASH FLOW

View Set