HI 630 - Week 4

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What are 4 examples of point-of-care (POC) systems?

(1) EHRs (2) picture archiving systems (3) laboratory information systems (4) patient monitoring systems

What are 2 internal issues that must be addressed with mobile computing?

(1) type of device(s) (2) ownership of the device(s)

(Network Topology | Advantages | Disadvantages) Ring

- Advantages: can support better performance than a start topology, provides for orderly data transmission - Disadvantages: high performance under low loads, expensive to implement, any fault can cause network failure

(Network Topology | Advantages | Disadvantages) Bus

- Advantages: easy device connection, uses less cable than other topologies - Disadvantages: one break disables network, terminators required at both ends of the backbone, problems are hard to identify

(Network Topology | Advantages | Disadvantages) Star

- Advantages: easy installation/device connection, can connect/remove devices w/o disruption, problems are easily identified - Disadvantages: requires more cable than bus topology, failure of a hub/switch/concentrator disables nodes, more expensive than bus topology

(Network Topology | Advantages | Disadvantages) Mesh

- Advantages: extensive redundancy w/multiple connections, "self-configuring" when new nodes are added, "self-healing" to continue operations even when some nodes fail, more nodes increase speed - Disadvantages: still in development w/no standards, wireless is inherently unreliable, they are not completely seamless, moving nodes may result in failure

(Network Topology | Advantages | Disadvantages) Tree

- Advantages: point-to-point wiring for certain segments, vendor neutral - Disadvantages: length of a segment is limited by type of cable used, if backbone breaks an entire segment fails, more difficult to configure and wire

(Network Topology | Advantages | Disadvantages) Point-to-point

- Advantages: speed - Disadvantages: limited to 2 devices

Extended or Enhanced Entity Relationship (EER)

- a "languages" associated with information modeling, began as entity relationship diagramming - it is useful for those who process data better visually

future-proofing

- a benefit of cloud computing - computer hardware, software, and networking solutions begin their move toward obsolescence almost as soon as they are implemented, which can be costly - cloud computing moves the cost of updating certain parts of the technology form the customer to the cloud provider, a substantial benefit given the rapid pace of the growth of the Internet and other technologies

mobility

- a benefit of cloud computing - data streaming from the clouds allows for greater mobility because the Internet is accessible from multiple mobile devices, such as smart phones and tablets, PDAs, virtual desktops, or traditional laptops or PCs

dependability

- a benefit of cloud computing - the cloud is up and running 24 hours a day, 7 days a week, every day of the year, which ensures access to much-needed items such as business applications, financial data, and help desk personnel

security

- a benefit of cloud computing - the security of the cloud application is paramount for healthcare providers to be able to ensure the privacy of individually identifiable healthcare data - cloud computing service companies working with providers and others would be subject to all aspects of the HIPAA Privacy and Security Rules

cost of ownership

- a benefit of cloud computing - using cloud computing can be more cost effective than maintaining a server on-site - additional savings may be realized by reducing the number of employees and contractors needed for server maintenance, legacy system conversions, and upgrades

Service-Oriented Architecture (SOA)

- a distributed computing system framework that is used to integrate existing software components - a logical way of designing software in modular and flexible components, called services, that are often provided over the Internet or intranet

two-tiered model

- a model composed of several client computers that are used to capture and process the data - the servers in this configuration are powerful machines that have application software installed on them and in turn store the data captured by client machines

software

- a program that directs the hardware in the computer - two types: operating systems and application software

Database Management System (DBMS)

- a system installed locally on each machine that is designed to keep track of data locations and coordinate data modifications - creates and maintains a database - provides a method for adding or deleting data and also supports methods to extract data for reporting

private cloud

- accessible to only one customer and can be operated by the organization, a third party, or a combination of the two, at the customer's location or off-site - healthcare organizations, especially larger ones, may choose this option due to the need for patient information security or if sensitive research is being conducted

Platform as a Service (PaaS)

- at this intermediate level of capability consumers create or acquire applications using programming languages and tools supported by the cloud computing service provider - although the consumer does not control the underlying infrastructure they do exercise more control over the applications

physical models

- capture the hardware composition of a system in terms of computer and other devices - the model is a pictorial representation of the arrangement of the different pieces and connection points

audit log

- chronological record of electronic system(s) activities that enables the reconstruction, review, and examination of the sequence of events surrounding or leading to each event or transaction from its beginning to its end - includes who performed what event and when it occurred

unstructured data

- data typed into a text box - harder to index for database searches and cannot be separated into individual components like the structured data

three-tiered architecture

- expands on the 2-tier system with the addition of an application server that contains the software applications and the business rules - clients in this architecture are called "thin clients" because most of the processing is done on the server, and the client has very little software installed on it

Virtual Private Networks (VPNs)

- extend the firewall protection boundary beyond the local intranet by the use of cryptographically protected secure channels at the IP level - a VPN is a private network that uses a public network (usually the internet) to connect remoted sites or users together privately

healthcare-associated infections (HAIs)

- infections acquired in a healthcare setting that are associated with the use of indwelling medical devices, surgical procedures, and environmental contamination - 1 million HAIs reported in the US healthcare system each year

firewall

- monitors and controls all communication into and out of an intranet - it is implemented by a set of processes that act as a gateway to a network applying the organizational security policy

mobile computing

- providing healthcare with mobile devices, which include smart phones, tablets, PDAs, and other portable wireless devices - quickly emerging as a technology infrastructure challenge for healthcare organizations

What is the prevalent Internet protocol set utilized for implementing the OSI model? By whom was it developed?

- the Transmission Control/Internet Protocol (TCP/IP) - developed by the Department of Defense

terminal-to-host

- the application and any data stay on a host computer with the user connecting either via a dumb terminal or using terminal emulation software on a personal computer to connect as if the user is on a dumb terminal - sometimes this arrangement is also termed a thin client, with most of the actual processing taking place on a central computer

Software as a Service (SaaS)

- the highest level of cloud computing service models - enables access to the cloud computing provider's applications via a variety of devices, usually through an interface such as a web browser

topology

- the network's physical layout - types of cabled network topologies include point-to-point, star, bus, tree, or ring

public cloud

- this cloud is open to the general public and owned by an academic institution, the government, or some other organization for the benefit of the public - the owner or a third party or some combination thereof can operate it, at any location

Infrastructure as a Service (IaaS)

- this is the most minimal level of cloud computing where the infrastructure is provided, but the consumer controls the customer controls the operating systems, storage, and applications - the consumer may also have control over networking components such as the firewall

Open System Interconnection Model (OSI)

7-layer model presenting the protocol layers that a typical data packet traverses beginning with the electronic signal that starts the source data transmission, and ending with the application layer in the destination application on a PC or server that receives the transmitted data packet and translates i into meaningful data for display

What are the 4 layers to the TCP/IP model?

Application Layer Transport Layer Internet Layer Network Interface Layer

Where can ROM be found?

In the computer chip

What are the 7 layers of the open system interconnection system?

Layer 7: application layer (receives data) Layer 6: presentation layer Layer 5: session layer Layer 4: transport layer Layer 3: network layer Layer 2: data link layer Layer 1: physical layer (sends electronic data)

T/F Audit files may be subpoenaed and examined to determined if fraudulent activities occurred.

True

T/F Distributed information systems are difficult to develop due to their complex and decentralized nature, basic safety (and security) requirements, as well as the need to achieve consistently high performance across a wide range of deployment settings.

True

middleware

a bridge between two applications or the software equivalent of an interface

Clinical Data Repository (CDR)

a central database that focuses on clinical information

distributed system

a collection of independent computers connected through a network and managed by system software that enables the computers to coordinate their activities and to share system resources such that the users perceive the system as a single, integrated system

Unified Modeling Language (UML)

a common data-modeling notation used in conjunction with object-oriented database design

Wide Area Network (WAN)

a computer network that connects devices across a large geographic area

ergonomics

a discipline of functional design associated with the employee in relationship to his or her work environment, including equipment, workstation, and office furniture adaptation to accommodate the employee's unique physical requirements so as to facilitate efficacy of work functions

file server

a distribution method where the system runs entirely on the end user's workstation and transfers entire files

architectural models

a framework or structure for the flow of data and information within information

cloud computing

a model for enabling ubiquitous convenient, on-demand network access to a shared pool of configurable computing resources (such as networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction

client-server

a network distribution method that involves multiple servers dedicated to different functions with workstations running the application and retrieving data from a server as needed

Local Area Network (LAN)

a network that connects various devices together via communications wtihin a small geographic area such as a single organization

Hypertext Markup Language (HTML)

a standardized computer language that allows the electronic transfer of information and communications among many different information systems

decentralized

a system in which the processing functions are split or distributed, among one or more machines in the network system

centralized

a system in which the systems processing functions occur on a single computer

Check Your Understanding 4.3 2. Which network design connects various computers across one state so that they can communicate? a. WAN b. VPN c. LAN d. firewall

a. WAN

Check Your Understanding 4.1 1. What is the term for the physical part of a computer system that includes the monitor, keyboard, and mouse? a. hardware b. software c. operating system d. computer language

a. hardware

Check Your Understanding 4.1 4. Architectural models are used for information systems to: a. provide a framework or structure for the flow of data and information within systems b. determine the hardware necessary for the system c. help technicians isolate problems in the system d. assess quantitative results of evaluation data

a. provide a framework or structure for the flow of data and information within systems

Check Your Understanding 4.2 2. This network design is more expensive than a hub; however, it is easier to install. It is what type of network? a. star b. mesh c. tree d. bus

a. star

Check Your Understanding 4.2 1. What is a non-cabled method for computer communications using microwaves or radio waves called? a. wireless b. fiber optic c. twisted pair d. coaxial

a. wireless

broad network access

any capabilities available over the network can be accessed by a wide variety of interface devices (laptops, smart phones, and so on) using standard mechanisms

on-demand self-service

anyone with the appropriate permissions can make use of the resources without additional intervention

Check Your Understanding 4.2 9. What is the term for the natural laws that govern work? a. ethics b. ergonomics c. economics d. procedures e. processes

b. ergonomics

Check Your Understanding 4.1 3. What is permanent memory that stores the applications installed by a user, such as Microsoft Word? a. ROM b. hard disk c. RAM d. CPU

b. hard disk

resource sharing

being able to ue the hardware, software, or data anywhere in the system

Check Your Understanding 4.3 1. Which network design connects various devices in one hospital building so that they can communicate? a. WAN b. VPN c. LAN d. firewall

c. LAN

Check Your Understanding 4.1 2. What is temporary memory used by a laptop to perform application software tasks? a. ROM b. hard disk c. RAM d. CPU

c. RAM

Check Your Understanding 4.2 3. What is a private network that uses a public network (usually the internet) to connect to remote sites or users together privately? a. extranet b. FTP c. VPN d. SFTP

c. VPN

Check Your Understanding 4.2 7. According to HIPAA, what are facilities required to have for mobile devices? a. adequate power supply b. correct network architecture c. a separate risk management plan d. a policy forbidding Bring Your Own Device

c. a separate risk management plan

Check Your Understanding 4.1 5. Which of the following is not a goal of Service-Oriented Architecture? a. build information systems that enable businesses to reuse existing assets effectively b. support changes that will occur in the business and its needs c. create new assets d. ensure services are delivered effectively

d. ensure services are delivered effectively

Check Your Understanding 4.2 8. Which of the following would decrease the usability of a new Clinical Data Repository? a. develop workflow reports as they relate to the CDR b. review reports of other users of the same system c. survey users from systems testing activities d. exclude users from systems testing activities

d. exclude users from systems testing activities

Check Your Understanding 4.3 3. Which device monitors and controls all data transmission in and out of Valley General Hospital? a. WAN b. VPN c. LAN d. firewall

d. firewall

Check Your Understanding 4.2 5. Decisions regarding mobile computing should be made a. after new technology emerges b. after IT personnel tests the product c. when users demand it d. following a thorough risk anaylsis

d. following a thorough risk anaylsis

Check Your Understanding 4.2 10. Which is the main goal of creating ergonomic office environments? a. provide an up-to-date work place b. color coordinate the office furniture c. spend money leftover in the annual budget d. increase users' comfort as they perform their daily activities e. ergonomics

d. increase users' comfort as they perform their daily activities

Check Your Understanding 4.2 6. According to the DHHS, the majority of all healthcare data breaches affecting over 500 users involved which devices? a. servers b. desktops c. printers d. mobile devices

d. mobile devices

Check Your Understanding 4.2 4. What is the information distribution system that is the most widely employed in information systems? a. internet b. client-server c. peer-to-peer d. network

d. network

ergonomic work environment

designed to increase the workers' comfort as they go about the daily activities

Business Process Simulation (BPS)

designing a model of a real system and conducting experiments with this model for the purpose of either understanding the behavior of the system or of evaluating various strategies for the operation of the system

openness

flexibility to extend and improve the existing system with minimal impact

Enterprise Knowledge Development (EKD)

focused on managing technology, information, and knowledge across and organization

structured data

generated when the use selects data from a predefined selection of data on a webpage dropdown, radio button, or check box

central processing unit (CPU)

hardware that mimics the human brain as it directs the electrical circuits in teh computer to perform math, make logical comparisons, and store calculation results in long-term RAM

computers on wheels (CoWs)

mobile notebook computers on rolling carts that are used by clinical personnel

examples of input peripherals

mouse, keyboard, touch screen, microphone, bar code reader, web camera

Read Only Memory (ROM)

permanent memory that can be read from but not changed by any applications' or users' actions

examples of output peripherals

printers, speakers, digital cameras, network cards

concurrent processes

processes that run simultaneously and access shared resources such as databases

information infrastructure

processing, tools, and technologies to support the creation, use, transport, and storage of information

rapid elasticity

service is provided on demand, meaning that more can quickly be provided when needed and reduced just as fast, so the consumer only pays for what they need and use

fault tolerant

systems that are highgly available and remain in operation even when hardware, software, or network failures occur

Random Access Memory (RAM)

temporary memory used when a software application is in use or when the ocmputer starts up

scalability

the ability to support growth while maintaining hte same level of service

resource pooling

the cloud computing provider resources serve multiple consumers, usually independent of location, though these can be specified by the customer

transparency

the end user sees the distributed system as a single machine

hard disk

the permanent memory of a computer that stores installed application software, files created by the user, and the operating system

computer hardware

the physical pieces like the monitor, keyboard, mouse, printer, and scanner

hybrid cloud

this consists of two totally separate cloud infrastructures (private, community, or public) that are unique, but share standardized or proprietary technology facilitating data and application portability

measured service

use of resources in the cloud can be monitored, controlled, and reported, allowing for better management

terminal emulation software

used on a personal computer to allow a user to connect to a host as if the user is on a dumb terminal

Electronic Document Management System (EDMS)

utilized to manage the plethora of electronically stored images and documents

wireless network

when a network is created using non-cabled communication methods to connect the computers and other resources


संबंधित स्टडी सेट्स

Honan-Chapter 25: Patients With Hepatic and Biliary Disorders

View Set

ATI HIV AIDS Targeted MEd Surg practice test

View Set

SB 17 Integrated Marketing Communications

View Set

R/E Finance: Unit 11 - Deeds of Trust & Mortgages

View Set

Honors Chemistry 1 Semester Exam (Part 2)

View Set

Algebra 2B Probability and Statistics

View Set