Computers in Healthcare
The number of frames that are displayed per second is measured in _______.
fps
The iOS operating system is found on which device?
iPhone
Which of the following operating systems is found on Macintosh desktop and laptop computers?
macOS
A communication ______ is a virtual end point for data entering and leaving a digital device.
port
Which of the following file extensions is NOT a vector graphic?
.tif
Telegraphy remained the major technology for intercontinental communication well into the ________.
1950s
When were the original HTML specifications developed by Tim Berners-Lee?
1990s
In 1971, Intel introduced the world's first microprocessor called the _________.
4004 (Intel)
Wireless connections use unlicensed frequencies that are available for public use, including 2.4 GHz and _____ GHz, which is subject to less interference from other devices, but it has a more limited range.
5
The maximum speed of a dial-up connection is _____ Kbps.
56
A key feature of the Apple Lisa was its use of _______________.
A graphical user interface
What is HEDIS?
A healthcare dataset that is widely used to measure performance
Which of the following would be considered spyware?
A keylogger
EHRs provide a two-way means of communication. Which choice is an example of this?
A physician orders a drug and receives an allergy alert
3D graphics are based on vectors stored as a set of instructions describing the coordinates for lines and shapes in a three-dimensional space. What do these vectors form?
A wireframe
As with other popular mobile operating systems, Android is designed for _______ processors.
ARM
A calculation is based on a(n) ___________—the step-by-step process by which numbers are manipulated.
Algorithm
Which of the following can be used to block unauthorized access while allowing authorized communications on a device or network?
All of the above -Network router -Personal firewall -Hardware that uses NAT (network address translation)
Which of the following would be classified as productivity software?
All of the above (Microsoft Office, Google Docs, and iWorks)
A password manager can store passwords in an encrypted file located at which of the following storage locations?
All of the above (local storage, cloud storage, and USB storage)
The advantages of liquid crystal display (LCD) screens include _________________.
All of the above (portability, display clarity, low radiation emission)
Digital audio is stored in a variety of file formats, including ___________.
All the above -WMA (Windows Media Audio) -WAV -MP3
A transaction processing system is characterized by its ability to:
All the above (collect, display, and modify transactions, store transactions, and list transactions)
What is the term used to describe altering the pixel colors where the edges of the object and the background meet, so that the object appears to merge with the background?
Alpha blending
What federal law enacted in 2009 provides financial incentives to healthcare organizations to encourage the adoption of EHRs?
American Recovery and Reinvestment Act (ARRA)
A(n) _____________________ is a graphic that uses red and blue overlays to create a stereoscopic effect.
Anaglyph
Which of the following is a function of the browser cache?
Any elements that it stores do not have to be downloaded again
To install software on a Mac, download the application, open the DMG file from the Downloads folder and then drag the .APP file to your ____________ folder.
Applications
Software applications are sometimes referred to as _______, especially in the context of handheld devices.
Apps
Rather than deleting old data, it can be moved to a data __________.
Archive
The ____________ is the part of the microprocessor that performs arithmetic operations, such as addition and subtraction.
Arithmetic Logic Unit (ALU)
Thomas de Colmar's _________ became the first mass-produced mechanical calculator.
Arithmometer
In the context of database security, database ______ identifies sensitive data and database vulnerabilities in order to secure them.
Assessment
What type of Internet connection do you have when upload speed differs from download speed?
Asymmetric
When communication is __________, messages are held until the recipient is ready to view them.
Asynchronous
A(n) _______ is software that works in conjunction with your computer's browser to manage and play audio that you are accessing from a Web page.
Audio Plugin
A(n) ___________ is a copy of one or more files that is made in case the originals become damaged.
Backup
Which file-sharing protocol distributes the role of a file server across a collection of dispersed computers?
BitTorrent
Which term is used to describe an online, personal journal in the form of a Web page that contains posts on one or more topics that are usually displayed in reverse chronological order?
Blog
A common wireless technology for connecting peripherals is ___________.
Bluetooth
Which of the following file extensions indicates the file is an HTML document?
Both A and B (.html and .htm)
In a browser, __________ link to pages that you use frequently.
Both A and B (Bookmarks and Favorites)
What would you use to set up a feed that monitors your favorite blogs, collects the latest posts, and displays them?
Both A and B (RSS reader and Blog aggregator)
A Web _________ is client software that displays Web page elements and handles links between Web pages.
Browser
Which of the following would be considered essential software for both laptop computers and tablet computers?
Browser
Which of the following attacks uses password-cracking software to generate every possible combination of letters, numerals, and symbols?
Brute force
A stock market _________ refers to a sharp rise in stock values that is later followed by a sudden decline.
Bubble
RAM is the computer memory used to run programs and store data. How is RAM rated?
By access speed
_______ applications provide optimal information when they encompass customer support, marketing, and sales.
CRM
Your browser _________ serves as temporary storage for Web documents.
Cache
Information that identifies the source of a quotation or excerpted work is called a ________.
Citation
__________ device has a keyboard as the base and a screen on the hinged cover.
Clamshell, laptop, notebook
A _____________ defines the characteristics of a set of objects.
Class attribute
The person in this position studies EHR workflow to improve efficiency, designs EHR forms, and screens content sets.
Clinical analyst
The person in this position coordinates the integration of different applications in hospital systems and provides training for new software
Clinical application coordinator
This is not a defense against computer threats.
Cloud computing
A _________ is a set of guidelines designed to help professionals thread their way through a sometimes tangled web of ethical on-the-job decisions.
Code of Ethics
Which computer system would a hospital HIM department most likely own?
Coding
A(n) __________ center is where several corporations lease space and equipment to hold and protect their data.
Colocation
___________ is the obligation not to disclose willingly any information that should be kept private.
Confidentiality
_________ workers are not official employees of a company.
Contract
Customers shopping online are often greeted by name and shown photos of the items they looked at last time along with suggestions for new items to purchase. What technology allows this to happen?
Cookies
____________ is designed to make a work freely available for distribution and modification under the condition that all derivative works use the same license.
Copyleft
__________ is a form of legal protection that grants the author of an original work exclusive rights that include distributing and performing that work.
Copyright
Which type of security measure reduces the effect of an attack by using data backups, disaster recovery plans, and the availability of redundant hardware devices?
Corrective Procedures
_____________ is the use of ICT technology to carry out politically motivated attacks designed to infiltrate, sabotage, or damage an opponent's information systems and defensive capabilities.
Cyberwarfare
Which of the following projections captures a 360-degree image on a horizontal plane?
Cylindrical
The SQL command word _________ removes a record from a table.
DELETE
IP addresses can be assigned by a network administrator, but more commonly they are automatically assigned by _________. (Hint: Use the acronym.)
DHCP
Windows evolved from a Microsoft operating system called _____.
DOS
Computers process __________ by performing calculations, modifying documents and pictures, drawing graphs, and sorting lists of words or numbers.
Data
_________ refers to the symbols that represent people, events, things, and ideas.
Data
What is the term for a single fact with a single meaning?
Data element
_________ is the amount of data a storage device can move per second from the storage medium to RAM.
Data transfer rate
The Harvard Mark I was digital but used _________ rather than binary representation.
Decimal
In the context of Prolog programming, a ________________ is a tabular method for visualizing and specifying rules based on multiple factors.
Decision table
The software application associated with a specific file type is called a(n) __________ application.
Default
___________ programming is an approach to software development in which programmers anticipate what might go wrong as their programs run, and take steps to smoothly handle those situations.
Defensive
A(n) __________ work modifies a copyrighted work but does not substantially change its content or purpose.
Derivative
Network _________ enables a computer to see other devices on a network and determines whether that computer can be seen by others.
Discovery
Which of the following has become a major concern with the adoption of EHRs?
Documentation integrity
In a display device, __________ is the distance in millimeters between like-colored light-emitting diodes (LEDs).
Dot Patch
A(n) _________ is designed to deliver malicious code into a device.
Dropper
A(n) _________ Web page displays customized content in response to keyboard or mouse actions or based on information supplied directly or indirectly by the person viewing the page.
Dynamic
A(n) _____ system can provide such benefits as improved overall performance by standardizing business processes based on best practices or improved access to information from a single database to an enterprise.
ERP
____________ refers to business transactions that are conducted electronically over a computer network.
Ecommerce
Which of the following is not a characteristic of a weak password?
Eight characters in length and include one or more uppercase letter, numbers and symbols
The Security Rule established standards for protection of ePHI in three broad areas. Which choice is not one of those areas?
Electronic safeguards
Password managers store passwords in a(n) _________ file.
Encrypted
This type of security transforms a message or data file in such a way that its contents are hidden from unauthorized readers.
Encryption
Wireless _______ scrambles the data transmitted between wireless devices.
Encryption
When the HIM analysis clerk leaves her computer for more than three minutes, the computer will automatically log her off of the EHR. What EHR feature is this?
Enhanced security
Password _________ is a measure in bits of a password's unpredictability.
Entropy
Which of the following is not a type of spam filter?
Entropy
When network protocols clean a corrupted signal, the process is called ______________.
Error correction
________ is a wired network technology that is defined by IEEE 802.3 standards.
Ethernet
The term professional _______ refers to on-the-job choices and actions that reflect a person's values.
Ethics
A(n) _____________ is a hacker's LAN server that is designed to look like a legitimate Wi-Fi hotspot.
Evil Twin
Ports that expand the options for input, output, and storage, are commonly called ____________ ports.
Expansion
The action carried out by malware code is referred to as a(n) _______.
Exploit
A file with a .css file extension indicates that it is a(n) ________ CSS.
External
Which type of protocol provides a way to transfer files from one computer to another over any TCP/IP network, such as a LAN or the Internet?
FTP
A desktop is a portable computing device featuring a touch-sensitive screen that can be used for input as well as for output.
False
A dual in-line package (DIP) is a square chip package, typically used for microprocessors, with pins arranged in concentric squares.
False
A manual calculator implements algorithms autonomously.
False
A wiki and a tweet are similar because they are collaborative, enabling contributors to post, read, and modify content.
False
ASCII text files contain formatting.
False
All remote storage is considered to be cloud storage.
False
Although there are online sources for software, most consumers obtain software offline.
False
Athlon and A-series processors manufactured by AMD are NOT x86 compatible.
False
Blacklist and header filtering are usually performed by email clients and Webmail services.
False
Both scanners and digital cameras produce vector graphics.
False
Common threats to corporate information systems are limited to software failures and security breaches.
False
Data cannot flow over multiple networks that have different topologies.
False
Data for SCM does not necessarily take into account customer demand for products.
False
Editing the source content of wikis is discouraged at media content communities.
False
Facebook does not provide ways to discover if you've been tagged.
False
File sharing poses no real security risks.
False
Hacking accounts for about 90% of data breaches.
False
If you are traveling and expect to access files on a computer that you've left at home, make sure the remote access utility is turned off.
False
If you want to change your default browser, you need to delete the browsers that you no longer want to use.
False
In DFD terminology, a data store is a process that changes data by performing a calculation, updating information, or sorting a list.
False
In a case-sensitive database, uppercase letters are equivalent to their lowercase counterparts.
False
In addition to replicating itself, a virus is self-distributing.
False
In the context of database security, intermediary servers allow users to directly access the database.
False
It is not possible to encrypt a Windows hard drive volume.
False
It is not possible to extract analytical data from operational databases.
False
MIDI files are less compact than digital audio files.
False
Most handheld devices can use either Web apps or mobile apps but not both.
False
Privacy is only important if you have something to hide.
False
Programmers insert documentation called facts into the program code.
False
Programmers specify the actual solution in the problem statement.
False
Purchasing software is the same as buying tangible goods, meaning software can be used, altered, loaned to friends, resold, or given away.
False
SQL statements contain command words but do not contain data.
False
Session cookies are stored on a disk or other permanent storage medium.
False
Spreadsheet software offers database capabilities for establishing relationships between different record types.
False
System documentation contains step-by-step instructions for performing specific tasks.
False
System software is a set of computer programs that helps a person carry out a task.
False
The order or sequence of rules in a Prolog program is usually critical.
False
Webmail is configured so that incoming messages are stored in an Inbox on your local storage device.
False
When you create a work, you must apply for protection of that work by copyright and only then do you have exclusive rights to its distribution, modification, and sale.
False
Wireless connections use licensed frequencies that are available for public use.
False
Your online reputation is how you see yourself, but your online identity is how others see you.
False
Your search history is the same as your browser history.
False
_______ involves the use of high-capacity fiber-optic cables to connect homes to broader municipal networks.
Fiber to the home
A _____________ is a specification that the database designer sets up to filter data entered into a particular field.
Field Validation Rule
Database software stores data as a series of records, which are composed of _________ that hold data.
Fields
Operating systems provide file organization tools called ___________.
File Management Utilities
An operating system uses a(n) ___________ to keep track of the names and locations of files that reside on a storage medium, such as a hard disk.
File system
A(n) ________-party cookie is set by the domain that hosts a Web page.
First
A(n) __________ file consists of a single, two-dimensional table of data elements.
Flat
In digital video, each bitmap image is referred to as a(n) __________.
Frame
A(n) _________ informs potential lenders that they must verify the identity of anyone attempting to open an account in your name.
Fraud alert
Payment processing is based on an online payment __________ that authorizes credit and debit cards, PayPal, and Apple Pay transactions.
Gateway
A graphics card contains a(n) __________ and special video memory, which store screen images as they are processed but before they are displayed.
Graphics Processing Unit (GPU)
A(n) ________ network allows visitors to access the Internet through a LAN but doesn't allow them to access other resources and data on the network.
Guest
What federal act of legislation allowed CMS to offer eligible hospitals and professionals financial incentives to promote and adopt the meaningful use of EHR technology?
HITECH
What programming language is most commonly used for web pages?
HTML
______ is called a markup language because authors mark up documents by inserting special instructions.
HTML
_____ is the current HTML specification.
HTML5
Antivirus software can use techniques called__________ to detect malware by analyzing the characteristics and behavior of suspicious files.
Heuristic analysis
A virus __________ usually arrives as an email message that contains warnings about a fake virus.
Hoax
Besides a URL, and a set of Web pages, you also need a Web ______________ service that stores and distributes your Web pages.
Hosting
What is the name for a health record that is part electronic and part paper?
Hybrid
Web pages are connected by __________ links.
Hypertext
What is the term that is used to describe a computer system that could store literary documents, link them according to logical relationships, and allow readers to comment and annotate what they read?
Hypertext
Which of the following would be considered a third-generation computer?
IBM 360
The organization that supervises Internet addressing is ___________.
ICANN
What organization is the top-level authority for supervising domain name requests?
ICANN
The __________ is made up of businesses that focus on digital equipment, software, communications technologies, and related services.
ICT industry
The protocols POP3 (Post Office Protocol version 3) and __________ can be used to manage your incoming mail.
IMAP
Networks that form the Internet are maintained by ____________.
ISPs
Which of the following is the least important characteristic of content communities?
Identity
During the ____________ phase of the SDLC, the project team supervises the tasks necessary to construct the new information system.
Implementation
EHRs allow different providers to access the patient record in real time and across organizations. Which meaningful use domain does this describe?
Improve care coordination
What does the Privacy Rule protect?
Individually identifiable PHI
Microprocessors are hard-wired to perform a limited, preprogrammed set of activities called a(n) ___________.
Instruction Set
EHRs are an improvement over paper records in all areas but one. Which one?
Integrity of documentation
1996 was the year that cable _______ service made its debut.
Internet
_______ compression can be applied to each frame of a video.
Intraframe
Which of the following job descriptions best matches that of a systems analyst?
Investigates the requirements of a business or an organization, its employees, and its customers in order to plan and implement new for improved computer services
Which statement is not true of cloud computing?
It allows for increased security of information
What is the function of encoder software?
It helps coders identify the codes with the highest specificity
Which of these statements about EHRs is not true?
It is simply a duplication of a paper record
Which of these is not an advantage of the EHR?
It required extensive training to use
A(n) _________ SDLC can be used to create and implement a small subset of a system and then enhance it through a series of upgrades.
Iterative
On an iOS device, making unauthorized changes to the device's software is called a(n) ____________.
Jailbreak
Once loaded into RAM, the __________ provides essential operating system services, such as memory management and file access.
Kernel
A cryptographic ________ is a word, number, or phrase that must be known to encrypt or decrypt data.
Key
In a programming language, a(n) ______, or command, is a word with a predefined meaning.
Keyword
When working with Windows, storage devices can also be identified by a device __________.
Letter
The most popular battery type used in today's electronic devices is __________.
Lithium ion
DHCP assigns an IP address to a device and links it to the device's _______ address.
MAC
What is the name of the database that contains the names and record numbers of all patients admitted to the hospital?
MPI
A(n) ____________ measures magnetic fields and can be used as a compass to determine orientation relative to magnetic north.
Magnetometer
Common classifications of _________ include viruses, worms, and trojans.
Malware
An abacus is an example of a(n) _________ calculator.
Manual
This computer system tracks inventory and supplies.
Materiel management
Which of the following is NOT a factor in the quality of digital video?
Memory technology in your camera
_________ tags make it possible to search for photos or videos using keywords.
Metadata
A class is defined by attributes and ________.
Methods
Encapsulation refers to the process of hiding the internal details of objects and their ___________.
Methods
A(n) ____________ is an integrated circuit designed to process instructions.
Microprocessor
Which of these is software?
Microsoft Office
Data _________ refers to computer algorithms that analyze information to discover previously unknown and useful information, including relationships and patterns.
Mining
Every organization has a goal or plan that's referred to as its ___________.
Mission
The underlying structure of a database is referred to as a database _________.
Model
Which early browser was the first to run on multiple computer platforms including Windows?
Mosaic
A key element of __________ databases is their ability to support OLAP queries that make it possible to combine data, drill down to specifics, or slice and dice the data to view it from different perspectives.
Multidimensional
A network utility called ______________ produces a detailed list of open ports on a device.
Netstat
In a(n) __________ database, processing logic for the query is performed on the device that holds each database shard and if necessary, results are consolidated by the DBMS.
NoSQL
Any device in a network is called a(n) __________.
Node
A process called ____________ helps database designers create a database structure that minimizes storage space and increases processing efficiency.
Normalization
The goal of ______________ is to minimize data redundancy.
Normalization
What organization has grouped the objectives for "meaningful use" into five domains?
ONC
The ________________ paradigm is based on the idea that the solution for a problem can be visualized in terms of objects that interact with each other.
Object-oriented
The implementation phase of an SDLC includes all of the following except _________.
Obtain approval
Many touchscreens have a(n) _______________ coating designed to repel the oils deposited by fingers that tap and swipe the screen.
Oleophobic
A(n) ___________________ stream sends media to a local device where it is stored temporarily, or "buffered," until there is enough data to begin playback.
On-demand
Approximately how big is a megabyte (MB)?
One million characters
Which type of software must include the source code, which allows programmers to modify and improve the software?
Open source
In IT positions and functions, which of these would not be considered part of user support?
Operating the help desk
_______ storage represents data as microscopic light and dark spots on a disc surface.
Optical
What is the term used to describe unwanted software that installs along with the application software that you originally downloaded and installed?
PUP
Parcels of data that are sent over a network are called ________.
Packets
Keywords can be combined with specific ____________, which provide more detailed instructions for the computer to carry out.
Parameters
A disk __________ is a section of a hard disk drive that is treated as a separate storage unit.
Partition
This is one of the problems associated with cloning and "auto fill" features.
Patient information is copied without updating
Cookies that are stored on a device after a session ends are referred to as ________ cookies.
Persistent
What are the two categories of data elements in the core health data elements?
Personal and encounter
Originally called microcomputers, _________ are designed to meet the computing needs of individuals.
Personal computers
Employees at a manufacturing company received an email that appeared to come from their insurance carrier stating that they were in danger of losing their coverage unless they updated their employee ID and password. The email was fake. What is this type of data threat called?
Phishing
________ is a mass-mailing scam that masquerades as a message from a legitimate source.
Phishing
CMS has raised concerns about the accuracy and validity of the EHR, which could lead to a number of problems for healthcare providers and facilities. Which choice is not a CMS concern?
Physicians could be suspended
Bitmap graphics are coded as a series of bits. Each bit represents the color of one ________.
Pixel
An undesirable jagged appearance of a graphics image is referred to as _______.
Pixelated
Bitmap images are formed by a grid of _____.
Pixels
Which type of network topology connects a peripheral device to a host device?
Point-to-Point
The ability to redefine a method in a subclass is referred to as ___________.
Polymorphism
___________ provides OO programs with easy extensibility and can help simplify program control structures.
Polymorphism
Which AHIMA healthcare technology specialist certification describes a person who uses health IT to help providers improve healthcare delivery?
Practice workflow and information management redesign specialist
When vector animations are used for special effects in movies, the animation sequences are _____________.
Pre-rendered into digital video clips
In Prolog, the __________ describes the relationship between the _________.
Predicate, arguments
In a programming project, a(n) _____________ methodology requires extensive planning and documentation up front.
Predictive
Which of the following is not a programming paradigm?
Predictive
__________ refers to a branch of data mining that analyzes current and historical data to predict future trends.
Predictive analytics
In a hospital setting, which position is commonly filled by an HIM professional?
Privacy officer
____________ paradigms are used to conceptualize the solution to a problem as a sequence of steps.
Procedural
From the perspective of a business that creates and sells a technology product, the ____________ maps the expected profitability of a product from its inception to its demise.
Product Life Cycle
Most social media sites provide a generic ________ image for users who do not upload a personal photo.
Profile
Instructions that tell a computer how to carry out processing tasks are referred to as a computer _______.
Program
The person in this position coordinates the various elements of an undertaking, such as objectives, budget, schedule, and team.
Project manager
Which programming language is used for artificial intelligence applications and expert systems?
Prolog
____________ is a notational system for algorithms that is less formal than a programming language but more formal than simply jotting down notes.
Pseudocode
When a router connects to and communicates over the Internet, it has a(n) ________ IP address that is routable over the Internet.
Public
On a communication matrix, where would blogs be found?
Public asynchronous
_________ refers to the status of works with expired copyrights or whose creators have forfeited their copyright.
Public domain
Computer programming languages designed for databases are called _________ languages because one of their main capabilities is to request data from a database.
Query
Which of the following is NOT an example of an expansion port?
RAM
After discharge from a hospital, a patient may ask the hospital's privacy officer to provide an accounting of all disclosures of the patient's PHI made after discharge. In what database would this information be stored?
ROI
Many of the graphic sequences in video games require __________________ to produce a series of bitmap images while the game takes place.
Real-time rendering
In a database, a(n) _________ holds data for a single entity.
Record
A(n) _____________ contains parts of the operating system necessary to boot your computer and diagnose system problems after a hard drive failure or software malfunction.
Recovery Drive
Although many content communities allow open access to media, most require _________ before files can be uploaded.
Registration
In the context of database security, user ______ management allows access to data on an as-needed basis.
Rights
The main directory on a storage device is referred to as the ________ directory.
Root
Any code that is designed to hide the existence of processes and privileges is referred to as a(n) _______.
Rootkit
__________ is the acronym that describes devices that automate many industrial tasks by receiving digital commands and converting them into real-world actions such as shutting down a power grid or opening a valve in a fuel pipeline.
SCADA
The protocol used in a local email system that handles outgoing mail is __________.
SMTP
Which of the following elements would NOT be found on a blog page?
SMTP (Simple Mail Transfer Protocol) services
One method of heuristic analysis allows the suspicious file to run in a guarded environment called a(n) ___________.
Sandbox
A(n) __________ solution for data storage adds resources to a single device, while a(n) __________ solution adds more devices to a system.
Scale up, Scale out
Relational databases are organized according to a(n) _________, which is simply the blueprint for its structure.
Schema
Search engines usually work with keyword queries where the user enters one or more words, called __________ terms.
Search
In an information system, problems can be classified into three types: structured, ________, and unstructured.
Semi-structured
During ___________ execution, the first statement in the program is executed first, then the second statement, and so on, to the last statement in the program.
Sequential
A Web _________ is an Internet-based computer that stores Web site content and accepts requests from browsers.
Server
________-side scripts run on Web servers rather than on your local device.
Server
Software for PCs contains a(n) _________ program that guides you through the installation process.
Setup
The process of dividing a database into distributed subsets is called ________.
Sharding
______________ is copyrighted software marketed under a try-before-you-buy policy.
Shareware
An expert system __________ is a software tool containing an inference engine and a user interface that developers use to enter facts and rules for a knowledge base.
Shell
What is the process called when an app from a source other than an official app store is installed on a device?
Side-loading
A(n) ____________ is generally priced at a flat rate and allows software to be used on all computers at a specific location.
Site license
Unicode uses________ bits and provides codes for 65,000 characters.
Sixteen
_____________ is/are mobile devices that have features similar to tablet computers but also provide telecommunications capabilities over cell phone networks.
Smartphones
A mobile app called __________ allows consumers to send and receive photo and video messages referred to as "snaps."
Snapchat
______________ is a deceptive practice that exploits human psychology by inducing victims to interact with a digital device in a way that is not in their best interest.
Social engineering
What provides a visual model for classifying and comparing various social media services?
Social media honeycomb
Which of the following is NOT a type of location service?
Sociogram
Sociologists use social network diagrams called _________ to depict connections between people.
Sociograms
An HTML document is sometimes referred to as a(n) _______ document.
Source
Participants in open _________ community projects get experience and make connections with other professionals that can be valuable resources during a job hunt.
Source
The human-readable version of a program created in a high-level language by a programmer is called __________.
Source code
_____________ exploits send deceptive messages to targeted individuals in an attempt to get those individuals to click links to infected Websites.
Spear phishing
__________ is the process by which machines produce sound that resembles spoken words.
Speech Synthesis
Which of the following statements is not true about medical transcription?
Speech recognition systems have made HIT professionals obsolete
Which database tool is best for simple flat files that involve calculations?
Spreadsheet software
Networks use more than one protocol, and the collection of protocols for a network is referred to as a protocol ________.
Stack
Because HTTP is a(n) _________ protocol, each time you connect to a different Web page at the site, the server regards it as a new visit.
Stateless
HTTP is considered to be a(n) ___________ protocol.
Stateless
Suppose you wanted to run a Web server or FTP server from your home. What type of IP address would you want?
Static
Image _______________ creates a panoramic image by combining two or more photographs that have overlapping edges.
Stitching
A(n) ___________ file uses a uniform format to store data for each person or thing in the file.
Structured
A(n) __________ is any class from which attributes can be inherited.
Superclass
At its time of construction, one of the fastest computers in the world is referred to as a(n) _________________.
Supercomputer
When communication is ______________, interchanges happen in real time while all parties are online.
Synchronous
Which of the following terms is NOT part of an email system?
Synchronous
Instant messaging is a(n) ______________, real-time technology for two or more people to type messages back and forth while online.
Synchronous Private
The ________ houses all essential chips and provides connecting circuitry between them.
System board
____________ programmers specialize in developing system software such as operating systems, device drivers, security modules, and communications software.
Systems
A person who writes and edits software programs is an expert in this.
Systems and data architecture
On a network, which protocol is responsible for dividing files into chunks, adding headers containing information for reassembling packets in their original order, and error checking?
TCP
Which business practice is a technique initiated by top management that involves all employees and all departments and focuses on quality assurance in every product and service offered to customers?
TQM
What type of computer should you consider purchasing if you want a portable system that is great for consuming content such as books, music, and videos but not so great for creating content or multitasking?
Tablet
Formal __________ standards make it possible to create generalized media search engines that can locate media from multiple locations.
Tagging
An information _________ degree focuses on computer equipment and software used by businesses.
Technology
A(n) _______________ uses available technology to work from home or an off-site location.
Telecommuter
An emerging computing platform that is likely to drive innovation and disruption through the next decade called __________ has massive scale, not only in cloud-based hardware technology, but also in the vast amount of data that will be generated, consumed, and analyzed.
The 3rd platform
Which of the following is not an example of an Information Technology Law?
The Espionage Act of 1917
Which of the following transitions will most likely not occur as more HIM functions become computerized?
The HIM department will become more centralized
When you empty the trash on your computer what happens?
The index marks the sectors as available for storing new data
A PHR is a record of health information that is created by the patient. Which of these statements is not true about PHRs?
The information in a PHR is protected by HIPAA privacy laws
What is CPU speed?
The speed at which a computer can process data
A(n) __________ cookie is set by a site other than the one you connected to.
Third-party
How are users connected to the Internet?
Through a web browser
What is the function of a macro?
To produce a full text from abbreviations
Why should hospitals back up their computer systems at least once a day?
To protect stored data
Magnetic and optical media are divided into circular ______ and then further divided into pie-shaped ________.
Tracks, sectors
In a wireless network, RF signals are sent and received by a ______________.
Transceiver
A(n) ____________ work repackages a copyrighted work to add new meaning or produce a work that is used for a purpose different from the original work.
Transformative
__________ are standalone programs that masquerade as useful utilities or applications.
Trojans
3D graphics can be animated.
True
A DSS derives its name from the fact that it provides the tools a decision maker needs to analyze data.
True
A copyright holder has total control over how a work may be used.
True
A document called a system requirements report describes the objectives for an information system.
True
A dropper installs a malicious program on a device, and it works with an entire program. Code injection inserts a segment of malicious code into another program. It carries only a short segment of code rather than an entire program.
True
A hard disk drive is an example of magnetic storage.
True
A multicore processor that executes more than one instruction at a time is referred to as a parallel processor.
True
A vector graphic consists of a set of instructions for creating a picture.
True
After a vector graphic is converted to a bitmap, the resulting graphic no longer has the qualities of a vector graphic.
True
An efficiently designed database uses computed fields whenever possible because they do not require manual data entry.
True
An important characteristic of third-generation programming languages is that the source code can be written with simple tools, such as a word processor, and this code can be easily understood by programmers.
True
Antivirus software cannot be expected to block threats that do not arrive in the form of malware.
True
Application software for an information system is usually a series of preprogrammed software modules supplied by a software publisher.
True
At an ecommerce site, the merchant's ecommerce application carries out only the first and last stages of the payment process.
True
Brute force attacks methodically try every possible password until the correct one is found.
True
By some estimates, nearly 40% of all online identities are fake.
True
Colossus used binary arithmetic.
True
Domain name servers maintain lists of all domain names and their corresponding IP addresses.
True
Every peripheral device connected to a computer is regarded as an input or output resource.
True
Every storage device has a directory containing a list of its files.
True
Hackers can use ports to communicate with devices in botnets.
True
Human errors are mistakes made by computer operators.
True
IM technology offers a degree of anonymity because typed messages have no associated voice or video.
True
In digital video, as long as the proportion of horizontal and vertical pixels remains the same, the aspect ratio is consistent.
True
In the United States, copyrights do not expire until 70 years after the author's death.
True
LANs use many of the same network technologies as the Internet.
True
Lossy compression throws away some of the original data during the compression process.
True
Microwaves have more carrying capacity than radio waves.
True
Mobile broadband can be used to access the Internet from a laptop or desktop computer.
True
Most blogs are open to the public, so blogging has become a form of personal journalism.
True
Most commercial software is distributed under a single-user license that limits use to one person at a time.
True
Networks can be classified according to their size and geographic scope.
True
Packet loss of less than 2% is required for acceptable streaming, gaming, Skype, and voice calls.
True
Plain, unformatted text is sometimes called ASCII text.
True
Procedural languages encourage programmers to approach problems by breaking down the solution into a series of steps.
True
Prolog programming is all about facts and rules.
True
Public key encryption requires one key to encrypt data but a different key to decrypt it.
True
Social media sites, such as Wikipedia, YouTube, and Flickr, are examples of content communities.
True
Social networking services tend to emphasize identity and relationships.
True
Some database software provides tools to work with more than one collection of records, as long as the records are somehow related to each other.
True
Spam sent by scammers often uses spoofed email addresses.
True
The Apple II computer included color graphics.
True
The Internet is the world's largest WAN.
True
The Stuxnet virus that disabled Iranian nuclear centrifuges is an example of cyberwarfare.
True
The facts in a Prolog program are useful even without any rules.
True
The goal of normalization is to minimize data redundancy.
True
The growth of the ICT industry has a generally upward trend.
True
The technical term for ripping music tracks is digital audio extraction.
True
The term stored program means that a series of instructions for a computing task can be loaded into a computer's memory.
True
Web apps are examples of cloud computing.
True
When taking the object-oriented approach to a problem, one of the first steps is to identify the objects that pertain to a solution.
True
Wikipedia articles can be edited by anyone at any time, which has led some critics to question the accuracy and reliability of Wikipedia information.
True
You can create HTML documents with simple text editors such as Notepad or TextEdit.
True
You can use multiple browsers on a device.
True
You won't find a desktop with application windows on an iOS device.
True
x86 processors use a different instruction set than ARM processors.
True
A(n) ____________ system consists of hardware and application software designed to offer a complete information system solution.
Turnkey
______________________ increases security by verifying identity based on more than just a password or PIN.
Two-factor authentication
A link contains the ________ that links to another Web page.
URL
Every page on the Internet has a unique web address. What is this called?
URL
Which type of problem requires human intuition as the basis for finding a solution?
Unstructured
It is a good idea to ________ your browser when a new version becomes available, mainly to increase security.
Upgrade
Computers can help patients monitor their own health care in many ways. Which choice is not one of those ways?
Using electronic prescriptions
A(n) _________ provides programmers with tools to build substantial sections of a program by pointing and clicking rather than by typing lines of code.
VDE
When you change the size of a(n) _______ graphic, the objects change proportionally and maintain their smooth edges.
Vector
A(n) _______________ allows one computer to simulate the hardware and software of another.
Virtual machine
Early computers that held both programs and data in memory became known as ________ architecture.
Von Neumann
Which type of network covers a large geographical area and usually consists of several smaller networks, which might use different computer platforms and network technologies?
WAN
Smartwatches, smartglasses, and fitness trackers can be classified as _______ computers.
Wearable
Instead of running program files that are stored locally, the code for _______ applications is downloaded along with HTML pages and is executed client-side by the browser.
Web
A(n) ____________ is a company that provides space on a server to house Web pages.
Web hosting service
Which statement is true about the HIM and IT departments in a hospital?
With the arrival of the EHR, they are working more closely together
__________ are the people who directly carry out the organization's mission.
Workers
______ is a markup language designed to describe data.
XML
Transmission speeds are expressed in _______, whereas storage space is expressed in _______.
bits, bytes
A group of eight bits is called a _______.
byte
What interface was created to document the time, dosage, and administration of every medication the patient receives while in the hospital?
eMAR