Computers in Healthcare

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The number of frames that are displayed per second is measured in _______.

fps

The iOS operating system is found on which device?

iPhone

Which of the following operating systems is found on Macintosh desktop and laptop computers?

macOS

A communication ______ is a virtual end point for data entering and leaving a digital device.

port

Which of the following file extensions is NOT a vector graphic?

.tif

Telegraphy remained the major technology for intercontinental communication well into the ________.

1950s

When were the original HTML specifications developed by Tim Berners-Lee?

1990s

In 1971, Intel introduced the world's first microprocessor called the _________.

4004 (Intel)

Wireless connections use unlicensed frequencies that are available for public use, including 2.4 GHz and _____ GHz, which is subject to less interference from other devices, but it has a more limited range.

5

The maximum speed of a dial-up connection is _____ Kbps.

56

A key feature of the Apple Lisa was its use of _______________.

A graphical user interface

What is HEDIS?

A healthcare dataset that is widely used to measure performance

Which of the following would be considered spyware?

A keylogger

EHRs provide a two-way means of communication. Which choice is an example of this?

A physician orders a drug and receives an allergy alert

3D graphics are based on vectors stored as a set of instructions describing the coordinates for lines and shapes in a three-dimensional space. What do these vectors form?

A wireframe

As with other popular mobile operating systems, Android is designed for _______ processors.

ARM

A calculation is based on a(n) ___________—the step-by-step process by which numbers are manipulated.

Algorithm

Which of the following can be used to block unauthorized access while allowing authorized communications on a device or network?

All of the above -Network router -Personal firewall -Hardware that uses NAT (network address translation)

Which of the following would be classified as productivity software?

All of the above (Microsoft Office, Google Docs, and iWorks)

A password manager can store passwords in an encrypted file located at which of the following storage locations?

All of the above (local storage, cloud storage, and USB storage)

The advantages of liquid crystal display (LCD) screens include _________________.

All of the above (portability, display clarity, low radiation emission)

Digital audio is stored in a variety of file formats, including ___________.

All the above -WMA (Windows Media Audio) -WAV -MP3

A transaction processing system is characterized by its ability to:

All the above (collect, display, and modify transactions, store transactions, and list transactions)

What is the term used to describe altering the pixel colors where the edges of the object and the background meet, so that the object appears to merge with the background?

Alpha blending

What federal law enacted in 2009 provides financial incentives to healthcare organizations to encourage the adoption of EHRs?

American Recovery and Reinvestment Act (ARRA)

A(n) _____________________ is a graphic that uses red and blue overlays to create a stereoscopic effect.

Anaglyph

Which of the following is a function of the browser cache?

Any elements that it stores do not have to be downloaded again

To install software on a Mac, download the application, open the DMG file from the Downloads folder and then drag the .APP file to your ____________ folder.

Applications

Software applications are sometimes referred to as _______, especially in the context of handheld devices.

Apps

Rather than deleting old data, it can be moved to a data __________.

Archive

The ____________ is the part of the microprocessor that performs arithmetic operations, such as addition and subtraction.

Arithmetic Logic Unit (ALU)

Thomas de Colmar's _________ became the first mass-produced mechanical calculator.

Arithmometer

In the context of database security, database ______ identifies sensitive data and database vulnerabilities in order to secure them.

Assessment

What type of Internet connection do you have when upload speed differs from download speed?

Asymmetric

When communication is __________, messages are held until the recipient is ready to view them.

Asynchronous

A(n) _______ is software that works in conjunction with your computer's browser to manage and play audio that you are accessing from a Web page.

Audio Plugin

A(n) ___________ is a copy of one or more files that is made in case the originals become damaged.

Backup

Which file-sharing protocol distributes the role of a file server across a collection of dispersed computers?

BitTorrent

Which term is used to describe an online, personal journal in the form of a Web page that contains posts on one or more topics that are usually displayed in reverse chronological order?

Blog

A common wireless technology for connecting peripherals is ___________.

Bluetooth

Which of the following file extensions indicates the file is an HTML document?

Both A and B (.html and .htm)

In a browser, __________ link to pages that you use frequently.

Both A and B (Bookmarks and Favorites)

What would you use to set up a feed that monitors your favorite blogs, collects the latest posts, and displays them?

Both A and B (RSS reader and Blog aggregator)

A Web _________ is client software that displays Web page elements and handles links between Web pages.

Browser

Which of the following would be considered essential software for both laptop computers and tablet computers?

Browser

Which of the following attacks uses password-cracking software to generate every possible combination of letters, numerals, and symbols?

Brute force

A stock market _________ refers to a sharp rise in stock values that is later followed by a sudden decline.

Bubble

RAM is the computer memory used to run programs and store data. How is RAM rated?

By access speed

_______ applications provide optimal information when they encompass customer support, marketing, and sales.

CRM

Your browser _________ serves as temporary storage for Web documents.

Cache

Information that identifies the source of a quotation or excerpted work is called a ________.

Citation

__________ device has a keyboard as the base and a screen on the hinged cover.

Clamshell, laptop, notebook

A _____________ defines the characteristics of a set of objects.

Class attribute

The person in this position studies EHR workflow to improve efficiency, designs EHR forms, and screens content sets.

Clinical analyst

The person in this position coordinates the integration of different applications in hospital systems and provides training for new software

Clinical application coordinator

This is not a defense against computer threats.

Cloud computing

A _________ is a set of guidelines designed to help professionals thread their way through a sometimes tangled web of ethical on-the-job decisions.

Code of Ethics

Which computer system would a hospital HIM department most likely own?

Coding

A(n) __________ center is where several corporations lease space and equipment to hold and protect their data.

Colocation

___________ is the obligation not to disclose willingly any information that should be kept private.

Confidentiality

_________ workers are not official employees of a company.

Contract

Customers shopping online are often greeted by name and shown photos of the items they looked at last time along with suggestions for new items to purchase. What technology allows this to happen?

Cookies

____________ is designed to make a work freely available for distribution and modification under the condition that all derivative works use the same license.

Copyleft

__________ is a form of legal protection that grants the author of an original work exclusive rights that include distributing and performing that work.

Copyright

Which type of security measure reduces the effect of an attack by using data backups, disaster recovery plans, and the availability of redundant hardware devices?

Corrective Procedures

_____________ is the use of ICT technology to carry out politically motivated attacks designed to infiltrate, sabotage, or damage an opponent's information systems and defensive capabilities.

Cyberwarfare

Which of the following projections captures a 360-degree image on a horizontal plane?

Cylindrical

The SQL command word _________ removes a record from a table.​

DELETE

IP addresses can be assigned by a network administrator, but more commonly they are automatically assigned by _________. (Hint: Use the acronym.)

DHCP

Windows evolved from a Microsoft operating system called _____.

DOS

Computers process __________ by performing calculations, modifying documents and pictures, drawing graphs, and sorting lists of words or numbers.

Data

_________ refers to the symbols that represent people, events, things, and ideas.

Data

What is the term for a single fact with a single meaning?

Data element

_________ is the amount of data a storage device can move per second from the storage medium to RAM.

Data transfer rate

The Harvard Mark I was digital but used _________ rather than binary representation.

Decimal

In the context of Prolog programming, a ________________ is a tabular method for visualizing and specifying rules based on multiple factors.

Decision table

The software application associated with a specific file type is called a(n) __________ application.

Default

___________ programming is an approach to software development in which programmers anticipate what might go wrong as their programs run, and take steps to smoothly handle those situations.

Defensive

A(n) __________ work modifies a copyrighted work but does not substantially change its content or purpose.

Derivative

Network _________ enables a computer to see other devices on a network and determines whether that computer can be seen by others.

Discovery

Which of the following has become a major concern with the adoption of EHRs?

Documentation integrity

In a display device, __________ is the distance in millimeters between like-colored light-emitting diodes (LEDs).

Dot Patch

A(n) _________ is designed to deliver malicious code into a device.

Dropper

A(n) _________ Web page displays customized content in response to keyboard or mouse actions or based on information supplied directly or indirectly by the person viewing the page.

Dynamic

A(n) _____ system can provide such benefits as improved overall performance by standardizing business processes based on best practices or improved access to information from a single database to an enterprise.

ERP

____________ refers to business transactions that are conducted electronically over a computer network.

Ecommerce

Which of the following is not a characteristic of a weak password?

Eight characters in length and include one or more uppercase letter, numbers and symbols

The Security Rule established standards for protection of ePHI in three broad areas. Which choice is not one of those areas?

Electronic safeguards

Password managers store passwords in a(n) _________ file.

Encrypted

This type of security transforms a message or data file in such a way that its contents are hidden from unauthorized readers.

Encryption

Wireless _______ scrambles the data transmitted between wireless devices.

Encryption

When the HIM analysis clerk leaves her computer for more than three minutes, the computer will automatically log her off of the EHR. What EHR feature is this?

Enhanced security

Password _________ is a measure in bits of a password's unpredictability.

Entropy

Which of the following is not a type of spam filter?

Entropy

When network protocols clean a corrupted signal, the process is called ______________.

Error correction

________ is a wired network technology that is defined by IEEE 802.3 standards.

Ethernet

The term professional _______ refers to on-the-job choices and actions that reflect a person's values.

Ethics

A(n) _____________ is a hacker's LAN server that is designed to look like a legitimate Wi-Fi hotspot.

Evil Twin

Ports that expand the options for input, output, and storage, are commonly called ____________ ports.

Expansion

The action carried out by malware code is referred to as a(n) _______.

Exploit

A file with a .css file extension indicates that it is a(n) ________ CSS.

External

Which type of protocol provides a way to transfer files from one computer to another over any TCP/IP network, such as a LAN or the Internet?

FTP

A desktop is a portable computing device featuring a touch-sensitive screen that can be used for input as well as for output.

False

A dual in-line package (DIP) is a square chip package, typically used for microprocessors, with pins arranged in concentric squares.

False

A manual calculator implements algorithms autonomously.

False

A wiki and a tweet are similar because they are collaborative, enabling contributors to post, read, and modify content.

False

ASCII text files contain formatting.

False

All remote storage is considered to be cloud storage.

False

Although there are online sources for software, most consumers obtain software offline.

False

Athlon and A-series processors manufactured by AMD are NOT x86 compatible.

False

Blacklist and header filtering are usually performed by email clients and Webmail services.

False

Both scanners and digital cameras produce vector graphics.

False

Common threats to corporate information systems are limited to software failures and security breaches.

False

Data cannot flow over multiple networks that have different topologies.

False

Data for SCM does not necessarily take into account customer demand for products.

False

Editing the source content of wikis is discouraged at media content communities.

False

Facebook does not provide ways to discover if you've been tagged.

False

File sharing poses no real security risks.

False

Hacking accounts for about 90% of data breaches.

False

If you are traveling and expect to access files on a computer that you've left at home, make sure the remote access utility is turned off.

False

If you want to change your default browser, you need to delete the browsers that you no longer want to use.

False

In DFD terminology, a data store is a process that changes data by performing a calculation, updating information, or sorting a list.

False

In a case-sensitive database, uppercase letters are equivalent to their lowercase counterparts.

False

In addition to replicating itself, a virus is self-distributing.

False

In the context of database security, intermediary servers allow users to directly access the database.

False

It is not possible to encrypt a Windows hard drive volume.

False

It is not possible to extract analytical data from operational databases.

False

MIDI files are less compact than digital audio files.

False

Most handheld devices can use either Web apps or mobile apps but not both.

False

Privacy is only important if you have something to hide.

False

Programmers insert documentation called facts into the program code.​

False

Programmers specify the actual solution in the problem statement.

False

Purchasing software is the same as buying tangible goods, meaning software can be used, altered, loaned to friends, resold, or given away.

False

SQL statements contain command words but do not contain data.​

False

Session cookies are stored on a disk or other permanent storage medium.

False

Spreadsheet software offers database capabilities for establishing relationships between different record types.

False

System documentation contains step-by-step instructions for performing specific tasks.

False

System software is a set of computer programs that helps a person carry out a task.

False

The order or sequence of rules in a Prolog program is usually critical.​

False

Webmail is configured so that incoming messages are stored in an Inbox on your local storage device.

False

When you create a work, you must apply for protection of that work by copyright and only then do you have exclusive rights to its distribution, modification, and sale.

False

Wireless connections use licensed frequencies that are available for public use.

False

Your online reputation is how you see yourself, but your online identity is how others see you.

False

Your search history is the same as your browser history.

False

_______ involves the use of high-capacity fiber-optic cables to connect homes to broader municipal networks.

Fiber to the home

A _____________ is a specification that the database designer sets up to filter data entered into a particular field.

Field Validation Rule

Database software stores data as a series of records, which are composed of _________ that hold data.

Fields

Operating systems provide file organization tools called ___________.

File Management Utilities

An operating system uses a(n) ___________ to keep track of the names and locations of files that reside on a storage medium, such as a hard disk.

File system

A(n) ________-party cookie is set by the domain that hosts a Web page.

First

A(n) __________ file consists of a single, two-dimensional table of data elements.

Flat

In digital video, each bitmap image is referred to as a(n) __________.

Frame

A(n) _________ informs potential lenders that they must verify the identity of anyone attempting to open an account in your name.

Fraud alert

Payment processing is based on an online payment __________ that authorizes credit and debit cards, PayPal, and Apple Pay transactions.

Gateway

A graphics card contains a(n) __________ and special video memory, which store screen images as they are processed but before they are displayed.

Graphics Processing Unit (GPU)

A(n) ________ network allows visitors to access the Internet through a LAN but doesn't allow them to access other resources and data on the network.

Guest

What federal act of legislation allowed CMS to offer eligible hospitals and professionals financial incentives to promote and adopt the meaningful use of EHR technology?

HITECH

What programming language is most commonly used for web pages?

HTML

______ is called a markup language because authors mark up documents by inserting special instructions.

HTML

_____ is the current HTML specification.

HTML5

Antivirus software can use techniques called__________ to detect malware by analyzing the characteristics and behavior of suspicious files.

Heuristic analysis

A virus __________ usually arrives as an email message that contains warnings about a fake virus.

Hoax

Besides a URL, and a set of Web pages, you also need a Web ______________ service that stores and distributes your Web pages.

Hosting

What is the name for a health record that is part electronic and part paper?

Hybrid

Web pages are connected by __________ links.

Hypertext

What is the term that is used to describe a computer system that could store literary documents, link them according to logical relationships, and allow readers to comment and annotate what they read?

Hypertext

Which of the following would be considered a third-generation computer?

IBM 360

The organization that supervises Internet addressing is ___________.

ICANN

What organization is the top-level authority for supervising domain name requests?

ICANN

The __________ is made up of businesses that focus on digital equipment, software, communications technologies, and related services.

ICT industry

The protocols POP3 (Post Office Protocol version 3) and __________ can be used to manage your incoming mail.

IMAP

Networks that form the Internet are maintained by ____________.

ISPs

Which of the following is the least important characteristic of content communities?

Identity

During the ____________ phase of the SDLC, the project team supervises the tasks necessary to construct the new information system.

Implementation

EHRs allow different providers to access the patient record in real time and across organizations. Which meaningful use domain does this describe?

Improve care coordination

What does the Privacy Rule protect?

Individually identifiable PHI

Microprocessors are hard-wired to perform a limited, preprogrammed set of activities called a(n) ___________.

Instruction Set

EHRs are an improvement over paper records in all areas but one. Which one?

Integrity of documentation

1996 was the year that cable _______ service made its debut.

Internet

_______ compression can be applied to each frame of a video.

Intraframe

Which of the following job descriptions best matches that of a systems analyst?

Investigates the requirements of a business or an organization, its employees, and its customers in order to plan and implement new for improved computer services

Which statement is not true of cloud computing?

It allows for increased security of information

What is the function of encoder software?

It helps coders identify the codes with the highest specificity

Which of these statements about EHRs is not true?

It is simply a duplication of a paper record

Which of these is not an advantage of the EHR?

It required extensive training to use

A(n) _________ SDLC can be used to create and implement a small subset of a system and then enhance it through a series of upgrades.

Iterative

On an iOS device, making unauthorized changes to the device's software is called a(n) ____________.

Jailbreak

Once loaded into RAM, the __________ provides essential operating system services, such as memory management and file access.

Kernel

A cryptographic ________ is a word, number, or phrase that must be known to encrypt or decrypt data.

Key

In a programming language, a(n) ______, or command, is a word with a predefined meaning.

Keyword

When working with Windows, storage devices can also be identified by a device __________.

Letter

The most popular battery type used in today's electronic devices is __________.

Lithium ion

DHCP assigns an IP address to a device and links it to the device's _______ address.

MAC

What is the name of the database that contains the names and record numbers of all patients admitted to the hospital?

MPI

A(n) ____________ measures magnetic fields and can be used as a compass to determine orientation relative to magnetic north.

Magnetometer

Common classifications of _________ include viruses, worms, and trojans.

Malware

An abacus is an example of a(n) _________ calculator.

Manual

This computer system tracks inventory and supplies.

Materiel management

Which of the following is NOT a factor in the quality of digital video?

Memory technology in your camera

_________ tags make it possible to search for photos or videos using keywords.

Metadata

A class is defined by attributes and ________.​

Methods

Encapsulation refers to the process of hiding the internal details of objects and their ___________.​

Methods

A(n) ____________ is an integrated circuit designed to process instructions.

Microprocessor

Which of these is software?

Microsoft Office

Data _________ refers to computer algorithms that analyze information to discover previously unknown and useful information, including relationships and patterns.

Mining

Every organization has a goal or plan that's referred to as its ___________.

Mission

The underlying structure of a database is referred to as a database _________.

Model

Which early browser was the first to run on multiple computer platforms including Windows?

Mosaic

A key element of __________ databases is their ability to support OLAP queries that make it possible to combine data, drill down to specifics, or slice and dice the data to view it from different perspectives.

Multidimensional

A network utility called ______________ produces a detailed list of open ports on a device.

Netstat

In a(n) __________ database, processing logic for the query is performed on the device that holds each database shard and if necessary, results are consolidated by the DBMS.

NoSQL

Any device in a network is called a(n) __________.

Node

A process called ____________ helps database designers create a database structure that minimizes storage space and increases processing efficiency.

Normalization

The goal of ______________ is to minimize data redundancy.

Normalization

What organization has grouped the objectives for "meaningful use" into five domains?

ONC

The ________________ paradigm is based on the idea that the solution for a problem can be visualized in terms of objects that interact with each other.​

Object-oriented

The implementation phase of an SDLC includes all of the following except _________.

Obtain approval

Many touchscreens have a(n) _______________ coating designed to repel the oils deposited by fingers that tap and swipe the screen.

Oleophobic

A(n) ___________________ stream sends media to a local device where it is stored temporarily, or "buffered," until there is enough data to begin playback.

On-demand

Approximately how big is a megabyte (MB)?

One million characters

Which type of software must include the source code, which allows programmers to modify and improve the software?

Open source

In IT positions and functions, which of these would not be considered part of user support?

Operating the help desk

_______ storage represents data as microscopic light and dark spots on a disc surface.

Optical

What is the term used to describe unwanted software that installs along with the application software that you originally downloaded and installed?

PUP

Parcels of data that are sent over a network are called ________.

Packets

Keywords can be combined with specific ____________, which provide more detailed instructions for the computer to carry out.​

Parameters

A disk __________ is a section of a hard disk drive that is treated as a separate storage unit.

Partition

This is one of the problems associated with cloning and "auto fill" features.

Patient information is copied without updating

Cookies that are stored on a device after a session ends are referred to as ________ cookies.

Persistent

What are the two categories of data elements in the core health data elements?

Personal and encounter

Originally called microcomputers, _________ are designed to meet the computing needs of individuals.

Personal computers

Employees at a manufacturing company received an email that appeared to come from their insurance carrier stating that they were in danger of losing their coverage unless they updated their employee ID and password. The email was fake. What is this type of data threat called?

Phishing

________ is a mass-mailing scam that masquerades as a message from a legitimate source.

Phishing

CMS has raised concerns about the accuracy and validity of the EHR, which could lead to a number of problems for healthcare providers and facilities. Which choice is not a CMS concern?

Physicians could be suspended

Bitmap graphics are coded as a series of bits. Each bit represents the color of one ________.

Pixel

An undesirable jagged appearance of a graphics image is referred to as _______.

Pixelated

Bitmap images are formed by a grid of _____.

Pixels

Which type of network topology connects a peripheral device to a host device?

Point-to-Point

The ability to redefine a method in a subclass is referred to as ___________.​

Polymorphism

___________ provides OO programs with easy extensibility and can help simplify program control structures.​

Polymorphism

Which AHIMA healthcare technology specialist certification describes a person who uses health IT to help providers improve healthcare delivery?

Practice workflow and information management redesign specialist

When vector animations are used for special effects in movies, the animation sequences are _____________.

Pre-rendered into digital video clips

In Prolog, the __________ describes the relationship between the _________.

Predicate, arguments

In a programming project, a(n) _____________ methodology requires extensive planning and documentation up front.

Predictive

Which of the following is not a programming paradigm?

Predictive

__________ refers to a branch of data mining that analyzes current and historical data to predict future trends.

Predictive analytics

In a hospital setting, which position is commonly filled by an HIM professional?

Privacy officer

____________ paradigms are used to conceptualize the solution to a problem as a sequence of steps.​

Procedural

From the perspective of a business that creates and sells a technology product, the ____________ maps the expected profitability of a product from its inception to its demise.

Product Life Cycle

Most social media sites provide a generic ________ image for users who do not upload a personal photo.

Profile

Instructions that tell a computer how to carry out processing tasks are referred to as a computer _______.

Program

The person in this position coordinates the various elements of an undertaking, such as objectives, budget, schedule, and team.

Project manager

Which programming language is used for artificial intelligence applications and expert systems?​

Prolog

____________ is a notational system for algorithms that is less formal than a programming language but more formal than simply jotting down notes.

Pseudocode

When a router connects to and communicates over the Internet, it has a(n) ________ IP address that is routable over the Internet.

Public

On a communication matrix, where would blogs be found?

Public asynchronous

_________ refers to the status of works with expired copyrights or whose creators have forfeited their copyright.

Public domain

Computer programming languages designed for databases are called _________ languages because one of their main capabilities is to request data from a database.

Query

Which of the following is NOT an example of an expansion port?

RAM

After discharge from a hospital, a patient may ask the hospital's privacy officer to provide an accounting of all disclosures of the patient's PHI made after discharge. In what database would this information be stored?

ROI

Many of the graphic sequences in video games require __________________ to produce a series of bitmap images while the game takes place.

Real-time rendering

In a database, a(n) _________ holds data for a single entity.

Record

A(n) _____________ contains parts of the operating system necessary to boot your computer and diagnose system problems after a hard drive failure or software malfunction.

Recovery Drive

Although many content communities allow open access to media, most require _________ before files can be uploaded.

Registration

In the context of database security, user ______ management allows access to data on an as-needed basis.

Rights

The main directory on a storage device is referred to as the ________ directory.

Root

Any code that is designed to hide the existence of processes and privileges is referred to as a(n) _______.

Rootkit

__________ is the acronym that describes devices that automate many industrial tasks by receiving digital commands and converting them into real-world actions such as shutting down a power grid or opening a valve in a fuel pipeline.

SCADA

The protocol used in a local email system that handles outgoing mail is __________.

SMTP

Which of the following elements would NOT be found on a blog page?

SMTP (Simple Mail Transfer Protocol) services

One method of heuristic analysis allows the suspicious file to run in a guarded environment called a(n) ___________.

Sandbox

A(n) __________ solution for data storage adds resources to a single device, while a(n) __________ solution adds more devices to a system.

Scale up, Scale out

Relational databases are organized according to a(n) _________, which is simply the blueprint for its structure.​

Schema

Search engines usually work with keyword queries where the user enters one or more words, called __________ terms.

Search

In an information system, problems can be classified into three types: structured, ________, and unstructured.

Semi-structured

During ___________ execution, the first statement in the program is executed first, then the second statement, and so on, to the last statement in the program.

Sequential

A Web _________ is an Internet-based computer that stores Web site content and accepts requests from browsers.

Server

________-side scripts run on Web servers rather than on your local device.

Server

Software for PCs contains a(n) _________ program that guides you through the installation process.

Setup

The process of dividing a database into distributed subsets is called ________.​

Sharding

______________ is copyrighted software marketed under a try-before-you-buy policy.

Shareware

An expert system __________ is a software tool containing an inference engine and a user interface that developers use to enter facts and rules for a knowledge base.

Shell

What is the process called when an app from a source other than an official app store is installed on a device?

Side-loading

A(n) ____________ is generally priced at a flat rate and allows software to be used on all computers at a specific location.

Site license

Unicode uses________ bits and provides codes for 65,000 characters.

Sixteen

_____________ is/are mobile devices that have features similar to tablet computers but also provide telecommunications capabilities over cell phone networks.

Smartphones

A mobile app called __________ allows consumers to send and receive photo and video messages referred to as "snaps."

Snapchat

______________ is a deceptive practice that exploits human psychology by inducing victims to interact with a digital device in a way that is not in their best interest.

Social engineering

What provides a visual model for classifying and comparing various social media services?

Social media honeycomb

Which of the following is NOT a type of location service?

Sociogram

Sociologists use social network diagrams called _________ to depict connections between people.

Sociograms

An HTML document is sometimes referred to as a(n) _______ document.

Source

Participants in open _________ community projects get experience and make connections with other professionals that can be valuable resources during a job hunt.

Source

The human-readable version of a program created in a high-level language by a programmer is called __________.​

Source code

_____________ exploits send deceptive messages to targeted individuals in an attempt to get those individuals to click links to infected Websites.

Spear phishing

__________ is the process by which machines produce sound that resembles spoken words.

Speech Synthesis

Which of the following statements is not true about medical transcription?

Speech recognition systems have made HIT professionals obsolete

Which database tool is best for simple flat files that involve calculations?

Spreadsheet software

Networks use more than one protocol, and the collection of protocols for a network is referred to as a protocol ________.

Stack

Because HTTP is a(n) _________ protocol, each time you connect to a different Web page at the site, the server regards it as a new visit.

Stateless

HTTP is considered to be a(n) ___________ protocol.

Stateless

Suppose you wanted to run a Web server or FTP server from your home. What type of IP address would you want?

Static

Image _______________ creates a panoramic image by combining two or more photographs that have overlapping edges.

Stitching

A(n) ___________ file uses a uniform format to store data for each person or thing in the file.

Structured

A(n) __________ is any class from which attributes can be inherited.​

Superclass

At its time of construction, one of the fastest computers in the world is referred to as a(n) _________________.

Supercomputer

When communication is ______________, interchanges happen in real time while all parties are online.

Synchronous

Which of the following terms is NOT part of an email system?

Synchronous

Instant messaging is a(n) ______________, real-time technology for two or more people to type messages back and forth while online.

Synchronous Private

The ________ houses all essential chips and provides connecting circuitry between them.

System board

____________ programmers specialize in developing system software such as operating systems, device drivers, security modules, and communications software.​

Systems

A person who writes and edits software programs is an expert in this.

Systems and data architecture

On a network, which protocol is responsible for dividing files into chunks, adding headers containing information for reassembling packets in their original order, and error checking?

TCP

Which business practice is a technique initiated by top management that involves all employees and all departments and focuses on quality assurance in every product and service offered to customers?

TQM

What type of computer should you consider purchasing if you want a portable system that is great for consuming content such as books, music, and videos but not so great for creating content or multitasking?

Tablet

Formal __________ standards make it possible to create generalized media search engines that can locate media from multiple locations.

Tagging

An information _________ degree focuses on computer equipment and software used by businesses.

Technology

A(n) _______________ uses available technology to work from home or an off-site location.

Telecommuter

An emerging computing platform that is likely to drive innovation and disruption through the next decade called __________ has massive scale, not only in cloud-based hardware technology, but also in the vast amount of data that will be generated, consumed, and analyzed.

The 3rd platform

Which of the following is not an example of an Information Technology Law?

The Espionage Act of 1917

Which of the following transitions will most likely not occur as more HIM functions become computerized?

The HIM department will become more centralized

When you empty the trash on your computer what happens?

The index marks the sectors as available for storing new data

A PHR is a record of health information that is created by the patient. Which of these statements is not true about PHRs?

The information in a PHR is protected by HIPAA privacy laws

What is CPU speed?

The speed at which a computer can process data

A(n) __________ cookie is set by a site other than the one you connected to.

Third-party

How are users connected to the Internet?

Through a web browser

What is the function of a macro?

To produce a full text from abbreviations

Why should hospitals back up their computer systems at least once a day?

To protect stored data

Magnetic and optical media are divided into circular ______ and then further divided into pie-shaped ________.

Tracks, sectors

In a wireless network, RF signals are sent and received by a ______________.

Transceiver

A(n) ____________ work repackages a copyrighted work to add new meaning or produce a work that is used for a purpose different from the original work.

Transformative

__________ are standalone programs that masquerade as useful utilities or applications.

Trojans

3D graphics can be animated.

True

A DSS derives its name from the fact that it provides the tools a decision maker needs to analyze data.

True

A copyright holder has total control over how a work may be used.

True

A document called a system requirements report describes the objectives for an information system.

True

A dropper installs a malicious program on a device, and it works with an entire program. Code injection inserts a segment of malicious code into another program. It carries only a short segment of code rather than an entire program.

True

A hard disk drive is an example of magnetic storage.

True

A multicore processor that executes more than one instruction at a time is referred to as a parallel processor.

True

A vector graphic consists of a set of instructions for creating a picture.

True

After a vector graphic is converted to a bitmap, the resulting graphic no longer has the qualities of a vector graphic.

True

An efficiently designed database uses computed fields whenever possible because they do not require manual data entry.

True

An important characteristic of third-generation programming languages is that the source code can be written with simple tools, such as a word processor, and this code can be easily understood by programmers.​

True

Antivirus software cannot be expected to block threats that do not arrive in the form of malware.

True

Application software for an information system is usually a series of preprogrammed software modules supplied by a software publisher.

True

At an ecommerce site, the merchant's ecommerce application carries out only the first and last stages of the payment process.

True

Brute force attacks methodically try every possible password until the correct one is found.

True

By some estimates, nearly 40% of all online identities are fake.

True

Colossus used binary arithmetic.

True

Domain name servers maintain lists of all domain names and their corresponding IP addresses.

True

Every peripheral device connected to a computer is regarded as an input or output resource.

True

Every storage device has a directory containing a list of its files.

True

Hackers can use ports to communicate with devices in botnets.

True

Human errors are mistakes made by computer operators.

True

IM technology offers a degree of anonymity because typed messages have no associated voice or video.

True

In digital video, as long as the proportion of horizontal and vertical pixels remains the same, the aspect ratio is consistent.

True

In the United States, copyrights do not expire until 70 years after the author's death.

True

LANs use many of the same network technologies as the Internet.

True

Lossy compression throws away some of the original data during the compression process.

True

Microwaves have more carrying capacity than radio waves.

True

Mobile broadband can be used to access the Internet from a laptop or desktop computer.

True

Most blogs are open to the public, so blogging has become a form of personal journalism.

True

Most commercial software is distributed under a single-user license that limits use to one person at a time.

True

Networks can be classified according to their size and geographic scope.

True

Packet loss of less than 2% is required for acceptable streaming, gaming, Skype, and voice calls.

True

Plain, unformatted text is sometimes called ASCII text.

True

Procedural languages encourage programmers to approach problems by breaking down the solution into a series of steps.

True

Prolog programming is all about facts and rules.​

True

Public key encryption requires one key to encrypt data but a different key to decrypt it.

True

Social media sites, such as Wikipedia, YouTube, and Flickr, are examples of content communities.

True

Social networking services tend to emphasize identity and relationships.

True

Some database software provides tools to work with more than one collection of records, as long as the records are somehow related to each other.

True

Spam sent by scammers often uses spoofed email addresses.

True

The Apple II computer included color graphics.

True

The Internet is the world's largest WAN.

True

The Stuxnet virus that disabled Iranian nuclear centrifuges is an example of cyberwarfare.

True

The facts in a Prolog program are useful even without any rules.​

True

The goal of normalization is to minimize data redundancy.

True

The growth of the ICT industry has a generally upward trend.

True

The technical term for ripping music tracks is digital audio extraction.

True

The term stored program means that a series of instructions for a computing task can be loaded into a computer's memory.

True

Web apps are examples of cloud computing.

True

When taking the object-oriented approach to a problem, one of the first steps is to identify the objects that pertain to a solution.​

True

Wikipedia articles can be edited by anyone at any time, which has led some critics to question the accuracy and reliability of Wikipedia information.

True

You can create HTML documents with simple text editors such as Notepad or TextEdit.

True

You can use multiple browsers on a device.

True

You won't find a desktop with application windows on an iOS device.

True

x86 processors use a different instruction set than ARM processors.

True

A(n) ____________ system consists of hardware and application software designed to offer a complete information system solution.

Turnkey

______________________ increases security by verifying identity based on more than just a password or PIN.

Two-factor authentication

A link contains the ________ that links to another Web page.

URL

Every page on the Internet has a unique web address. What is this called?

URL

Which type of problem requires human intuition as the basis for finding a solution?

Unstructured

It is a good idea to ________ your browser when a new version becomes available, mainly to increase security.

Upgrade

Computers can help patients monitor their own health care in many ways. Which choice is not one of those ways?

Using electronic prescriptions

A(n) _________ provides programmers with tools to build substantial sections of a program by pointing and clicking rather than by typing lines of code.

VDE

When you change the size of a(n) _______ graphic, the objects change proportionally and maintain their smooth edges.

Vector

A(n) _______________ allows one computer to simulate the hardware and software of another.

Virtual machine

Early computers that held both programs and data in memory became known as ________ architecture.

Von Neumann

Which type of network covers a large geographical area and usually consists of several smaller networks, which might use different computer platforms and network technologies?

WAN

Smartwatches, smartglasses, and fitness trackers can be classified as _______ computers.

Wearable

Instead of running program files that are stored locally, the code for _______ applications is downloaded along with HTML pages and is executed client-side by the browser.

Web

A(n) ____________ is a company that provides space on a server to house Web pages.

Web hosting service

Which statement is true about the HIM and IT departments in a hospital?

With the arrival of the EHR, they are working more closely together

__________ are the people who directly carry out the organization's mission.

Workers

______ is a markup language designed to describe data.

XML

Transmission speeds are expressed in _______, whereas storage space is expressed in _______.

bits, bytes

A group of eight bits is called a _______.

byte

What interface was created to document the time, dosage, and administration of every medication the patient receives while in the hospital?

eMAR


Set pelajaran terkait

MTA 98-367: Security Fundamentals

View Set

Science: Habitats of Plants & Animals

View Set

30-Hr. TX Law of Promulgated Contracts Course

View Set

10.¿QUÉ HACES TODOS LOS DÍAS?

View Set

Money and Banking (Ch. 15 and 16)

View Set