EHR Week 3 Quiz
What is an authentification protocol in relation to an EHR system?
The steps a system takes to verify the identity of a user
Which of the following is not true of an SaaS model?
The vendor owns the patient data documented by the clinicians and office staff.
Which of the following physical controls is frequently overlooked when a practice moves to an EHR system?
How to secure and dispose of hard-copy documents
What is a patient's CAT scan an example of when it is part of an EHR?
Imaged data
Which of the following would not be considered a benefit of a structured data field within an EHR?
It captures the exact words of a patient
Which of the following statements about a legal source legend is correct?
Its components constitute a patient's legal health record. It is necessary for practices who are using hybrid records. It should be updated as needed to remain accurate. All of the above are correct.
An EHR system would likely use ______ to record laboratory results.
LOINC
A form of unstructured data not reflected in the EHR's data dictionary
Narrative text data
NOC, NIC, and NANDA are all used with what type of standards?
Nursing
Part of HIPAA security standard mandating mechanisms that protect the equipment and the data associated with the EHR system
Physical safeguards
Which of the following data would most likely be in an unstructured data field?
Quote from the patient defining the problem
Which of the following is considered the most robust standard vocabularly that is currently available for use in an EHR system?
SNOMED-CT
Dr. Krandel wants to implement an EHR system. The practice has limited funds to expend for this project. Which of the following architectures would require a lesser initial outlay?
Software-as-a-service model
Data fields where either numbers or dates must be entered, or a selection from a defined list of options must be made
Structure (discrete) data
An automated log-off within an EHR system is an example of which of the following?
Technical safeguard
Which of the following technical security controls require users to take certain steps before it will accept their login?
Authentication protocols
Structured response choices presented within a data field
Drop-down menu (pick list)
Where is the most common location of a wall-mounted computer workstation within a health care practice?
Examination rooms
A physician can view a trend in a patient's health history by using whihc of the following EHR features?
Flow sheets
A practice wants to include a wireless network as part of its EHR system. The practice should consider which of the following?
Wireless systems may interfere with some medical devices.
Steps the EHR system requires users to take before it will accept their login and/or save the data they are entering into the patient's record
authentication protocols
All of the following are examples of human-computer interface devices except:
databases
Which of the following is an example of narrative text within an EHR?
exam notes
First bar of icons across the top of a computer screen that, when chosen via a mouse click, allow standard functions of the software to be performed, making moving through the system easier
menu bar
Select an example of a unique single data point within an EHR data dictionary from the following.
oral temperature chief complaint marital status All of the above
Medications and Insurance are most likely examples of the names of which of the followng EHR features?
tabs
Similar to dividers in a paper-based patient record, these markers highlight major sections of the EHR, making navigation easier
tabs
Part of HIPAA security standard mandating automated processes that limit who is able to access the EHR and what they are able to do with the system; includes encryption of data
technical safeguards
Second bar of icons across the top of a computer screen that, when chosen via a mouse click, allow standard functions of the software to be performed, making moving through the system easier
toolbar
Limitations on what a user can view and do within a patient's EHR based on the user's job responsibilities
user and role based access control