Chapter 6
ethernet
A communication system for connecting several computers so information can be shared.
practice management software
A computer application that allows the user to enter demographic information schedule appointments maintain lists of insurance payers perform billing tasks and generate reports
dumb terminal
A personal computer that doesn't contain a hard drive and allows the user only limited functions, including access to software, the network, and/or the Internet.
firewall
A program or hardware that acts as a barrier between the network and the Internet.
data server
Computer hardware and software that perform data analysis, storage, and archiving; also called a database server.
output device
Computer hardware that displays the processed data from the computere.g.,monitors and printers)
privacy filters
Devices attached to the monitor that allow visualization of the screen contents only if the user is directly in front of the screen; also called monitor filters or privacy screens.
modem
Peripheral computer hardware that connects to the router to provide Internet access to the network or computer.
point-of-care
Something designed to be used at or near where the patient is seen; point-of-care tools and apps are resources for the provider to use when working directly with the patient.
operating system
System software it acts as the computers software administrator by managing integrating and controlling application software and hardware
Ergonomics
The study of workplace equipment design or how to arrange and design devices, machines, or workspace so that people and things interact safely and most efficiently.
e-prescribing
The use of electronic software to communicate with pharmacies and send prescribing information,
1024 bytes
What is one kilobyte equivalent to? a. 1024 bytes b. 1024 MB c. 1024 GB d. 1024 TB
file
a collection of data or program records stored as a unit with a specific name
covered entity
a healthcare facility, healthcare provider, pharmacy, health (insurance) plan, or claims clearinghouse that transmits protected health information electronically
stylus
a pen-shaped device with a variety of tips that is used on touchscreens to write, draw, or enter commands
business associate
a person or business that provides a service to a covered entity that involves access to PHI
software
a set of electronic instructions to operate and perform different computer tasks
computer network
a system that links personal computers and peripheral devices to share information and resources
computer on wheels
a wireless mobile workstation
EMR
an electronic record of health related information about an individual that can be created gathered managed and accessed by authorized clinicians and staff members within a single healthcare organization
EHR
an electronic record that conforms to nationally recognized standards and contains health-related information about a specific patient; can be created, managed, and consulted by authorized clinicians and staff from more than one healthcare organization
interface
an interconnection between systems
claim
an itemized statement of services and costs from a healthcare facility submitted to the health (insurance) plan for payment
input device
any peripheral hardware that allows the user to provide data to the computer
local area network
computers and output devices that are all connected to the facility network and span one building or multiple buildings
wide area network
consists of two or more local area networks; used when healthcare agencies have clinics at a distance
authentication
each employee with network access must log in using a unique password
redundancy
files are copied onto many servers in various locations
security risk analysis
identification of potential threats of computer network breaches, for which action plans for corrective actions are instituted
personal health information (phi)
individually identifiable health information stored or transmitted by covered entities or business associates
malware
malicious software designed to damage or disrupt a system
secondary storage devices
media (e.g., jump drive, flash drive, hard drive) capable of permanently storing data until they are replaced or deleted by the user
revenue
money collected for providing a product or service
hardware
physical equipment of the computer system required for communication and data processing functions
telehealth
refers to remote clinical and nonclinical services, such as provider training, meetings, and continuing education
optical character recognition
scanners convert images to digital text through this process
decryption
the computer process of changing encrypted text to readable or plain text after a user enters a secret key or password
electronic transaction
the electronic exchange of information between two agencies to accomplish financial or administrative healthcare activities
down time
the interval of time during which something, such as hardware or software, is not functioning
media
types of communication (e.g., social media sites); with computers, the term refers to data storage devices
hacker
unauthorized user who attempts to break into computer networks
router
used to allow multiple devices to be on the same network to send and receive information
audit trails
what are records of computer activity used to monitor users' actions within software, including additions, deletions, and viewing of electronic records? a. automatic log-off b. authentication c. firewalls d. audit trails
firewalls
what is a program or hardware device that acts as a barrier or filter between the network and the internet? a. firewalls b. screen savers c. authentication d. privacy filters
electronic medical record
what is an electronic version of a patients paper record? a. electronic health record b. electronic medical record c. practice management d. A and B
use eight or more characters and use a random combination of upper-and lowercase letters, numbers, and symbols
what makes a strong password? a. use a persons name b. use eight or more characters c. use a random combination of upper-and lowercase letters, numbers, and symbols d. B and C
security risk analysis
what means potential threats to the computer system security are identified, the likelihood of such occurrence is determined, and additional safeguards are implemented? a. firewalls b. security risk analysis c. authentication d. privacy filters
practice management
which is a type of software that allows the user to enter demographic information, schedule appointments, maintain lists of insurance payers, perform billing tasks, and generate reports? a. electronic health record b. electronic medical records c. practice management d. Microsoft word and excel
RAM
which is the computer memory used for loading and running programs? a. ROM b. RAM c. Cache d. Hard drive
anti-malware software
which software protects computers against viruses? a. database software b. presentation software c. anti-malware software d. spreadsheet software