HIT Implementation Support Specialist

Ace your homework & exams now with Quizwiz!

Which statement is NOT true of an HIE? A) "HIE" stands for Health Improvement Enterprise. B) It maintains the meaning of healthcare information as it moves between disparate systems. C) It can be used for integration between EHRs. D) It can be set up privately or regionally.

A) "HIE" stands for Health Improvement Enterprise.

In 1995 it is estimated that ____ people were using the Internet. A) 16,000,000 B) 1,800,000,000 C) 18,000,000 D) 1,600,000,000

A) 16,000,000

The WWW was created in ____ by Dr. Tim Berners-Lee and others with the introduction of the Web browser and Web page coding. A) 1989 B) 1969 C) 1940 D) 1995

A) 1989

In the binary number "01011010", the rightmost value of "0" is a placeholder for ____. A) 2^0 B) 2^1 C) 2^2 D) 2^7

A) 2^0

The global standard governing wireless technologies is the ____ standard. A) 802.11 B) 568-A C) UTE D) 802.3

A) 802.11

Project Management can be defined as: A) A carefully planned and organized effort to accomplish a specific, usually one-time, objective. B) A way of handling introducing project status to upper management C) Software D) Hardware

A) A carefully planned and organized effort to accomplish a specific, usually one-time, objective.

Mac OS is an example of _______. A) A machine-based or independent Operating system B) Mobile-based or embedded operating system C) Server-based operating system D) Personal efficiency software

A) A machine-based or independent Operating system

From the choices below, select the best definition of a cloud computing. A) A model for enabling convenient, on-demand network access to a shared pool of configurable computing resources B) Access to systems remote from a user C) A model that allows a physical system that permits a single physical system to appear to contain multiple systems. D) A model that permits multiple physical systems to appear to be a single system.

A) A model for enabling convenient, on-demand network access to a shared pool of configurable computing resources.

What is a PET scan? A) A nuclear medicine imaging device that produces a 3-D image. B) An x-ray, using specialized equipment, that takes cross-sectional pictures of the body. C) A device that creates an image based on sound waves. D) Magnetic imaging equipment that uses a radio frequency pulse to create an image.

A) A nuclear medicine imaging device that produces a 3-D image.

Who is a stakeholder? A) A person with an interest in the information system. B) The person who pays for the information system. C) The person who develops the information system. D) The person who makes all the design decisions for the information system.

A) A person with an interest in the information system.

A candidate key is . . . A) A well-known attribute value that uniquely determines a row in a table. B) An automatically generated numeric value that uniquely determines a row of a table. C) A unique key from another table. D) A key that doesn't belong in the table where it appears.

A) A well-known attribute value that uniquely determines a row in a table.

A natural key is . . . A) A well-known attribute value that uniquely determines a row in a table. B) An automatically generated numeric value that uniquely determines a row of a table. C) A unique key from another tab D) A key that not the primary key.

A) A well-known attribute value that uniquely determines a row in a table.

A natural key is . . . A) A well-known attribute value that uniquely determines a row in a table. B) An automatically generated numeric value that uniquely determines a row of a table. C) A unique key from another table. D) A key that not the primary key.

A) A well-known attribute value that uniquely determines a row in a table.

Total cost of ownership includes A) Acquisition costs, ongoing support costs, and maintenance costs B) Opportunity costs C) Acquisition costs only D) Economic feasibility

A) Acquisition costs, ongoing support costs, and maintenance costs

What is required for a device to communicate over the Internet? A) An IP address and subnet mask. B) A Web browser. C) A Web server. D) An IP address only.

A) An IP address and subnet mask.

________ protect(s) a computer by locating and stopping programs attempting to harm computer operation. A) Antivirus software B) Firewalls C) Routers D) Spyware

A) Antivirus software

______ deliver a software application or access to an application over the Internet on a subscription basis. A) Application service providers B) Internet business services C) Offshore outsourcing D) Internet protocols

A) Application service providers

List the correct order of the OSI model layers, from top (7) to bottom (1). A) Application, Presentation, Session, Transport, Network, Data Link, Physical. B) Application, Presentation, Session, Network, Transport, Data Link, Physical. C) Application, Presentation, Session, Transport, Network, Physical, Data Link. D) Presentation, Application, Session, Transport, Data Link, Physical, Network.

A) Application, Presentation, Session, Transport, Network, Data Link, Physical.

List the correct order of the OSI model layers, from top (7) to bottom (1). A) Application, Presentation, Session, Transport, Network, Data Link, Physical. B) Application, Presentation, Session, Network, Transport, Data Link, Physical. C) Application, Presentation, Session, Transport, Network, Physical, Data Link. D) Presentation, Application, Session, Transport, Data Link, Physical, Network.

A) Application, Presentation, Session, Transport, Network, Data Link, Physical.

Which is NOT a reason why the SDLC is important for EHR systems? A) Because poorly designed software has not yet been linked to security risks. B) The Need for user satisfaction and high quality C) In-house development or integration of an EHR D) Because failure to plan adequately for software integration can limit efficiency and be costly in project over-runs and lost productivity

A) Because poorly designed software has not yet been linked to security risks.

Preventative maintenance involves work that is done ______ a potential problem affects the information system. A) Before B) After C) During D) When

A) Before

Identify the condition that results in the muscles on one side of the face being temporarily paralyzed causing the inability to close the eye and the drooping of one side of the mouth. A) Bell's Palsy B) peripheral neuropathy C) neurofibromatosis D) carpal tunnel syndrome

A) Bell's Palsy

Which of the following are important factors to consider when selecting a computer? Select all that apply. A) Budget B) Storage needs C) Application requirements D) Type of user E) Mobility needs

A) Budget B) Storage needs C) Application requirements D) Type of user E) Mobility needs

The ________________ programming language is an example of a compiled language. A) C B) PHP C) Perl D) Javascript

A) C

A ________ interface is one where the user types in all the commands. A) Command line B) Graphical User C) BIOS D) Windows

A) Command line

A statement that jumps to another module with a string attached that demands execution be returned to the branch-from module after execution of the branched-to module is completed illustrates what kind of branching? A) Conditional branching B) Unconditional branching C) Modular structure branching D) Blind branching

A) Conditional branching

Which form of branching is conducive to structured design? A) Conditional branching B) Unconditional branching C) Modular structure branching D) Blind branching

A) Conditional branching

A programming logic construct that executes code over and over again while or until a certain condition test is satisfied is known by all but which of the following? A) Continue B) Repetition C) Iteration D) Looping

A) Continue

_______ maintenance diagnoses and fixes errors in an operational system. A) Corrective B) Adaptive C) Perfective D) Preventive

A) Corrective

Which is NOT true of HL7? A) Creates communication standards for use only in American healthcare applications. B) Promotes open system architecture. C) Created a structured, message-oriented framework for communication between healthcare applications. D) Created a messaging standard that uses segment headers and delimiters to communicate information.

A) Creates communication standards for use only in American healthcare applications.

Which of the following are example(s) of personal computers? Select all that apply. A) Desktop B) Supercomputer C) Laptop D) Smartphone

A) Desktop C) Laptop D) Smartphone

A domain name is an identification label that defines a realm of administrative autonomy, authority, or control on the Internet, based on the _____. A) Domain Name System B) IEEE 802.3 standard C) Whitehouse D) ICANN

A) Domain Name System

A domain name is an identification label that defines a realm of administrative autonomy, authority, or control on the Internet, based on the _____. A) Domain Name System B) IEEE 802.3 standard C) Whitehouse D) ICANN

A) Domain Name System

Which of the following is involved in data modeling? A) ER-diagram B) SQL C) Implementing the database D) Maintaining the database

A) ER-diagram

Which of the following is involved in data modeling? A) ER-diagram B) SQL C) Implementing the database D) Maintaining the database

A) ER-diagram

___________________ provides information hiding in Object Oriented Programming. A) Encapsulation B) Inheritance C) Polymorphism D) Expressions

A) Encapsulation

The IEEE 802.3 standard governs ____ technologies. A) Ethernet B) Wi-Fi C) Bluetooth D) WiMAX

A) Ethernet

The IEEE 802.3 standard governs ____ technologies. A) Ethernet B) Wi-Fi C) Bluetooth D) WiMAX

A) Ethernet

Which is NOT a reason why integration is an important consideration when installing an EHR? A) Existing systems can usually share data with newer systems without additional programming or configuration. B) Many existing systems are too expensive to replace. C) Many different isolated systems currently exist within healthcare infrastructures. D) Many existing systems are tailored to meet specific departmental needs and not easily duplicated.

A) Existing systems can usually share data with newer systems without additional programming or configuration.

The file _______ identifies the file type. A) Extension B) Name C) Size D) Permissions

A) Extension

___________ is an example of a third generation programming language. A) FORTRAN B) SQL C) Machine code D) Assembly language

A) FORTRAN

Windows VSS is an example of: A) Fault tolerance B) Backup C) System decommissioning D) Antivirus protection

A) Fault tolerance

This type of backup allows a complete system restore with just one source: A) Full backup B) Incremental backup C) Differential backup D) Synthetic full backup

A) Full backup

Protocols such as _____ allow any browser to talk to any Web server. A) HTTP B) SMTP C) FTP D) POP3

A) HTTP

Protocols such as _____ allow any browser to talk to any Web server. A) HTTP B) SMTP C) FTP D) POP3

A) HTTP

An example of health promotion is: A) Hand washing B) Taking nutritional supplements C) Eating fast food D) Smoking cigarettes

A) Hand washing

What does HL7 stand for? A) Health Level 7 B) High Load 7 C) EHR Code of ethics guaranteeing safety

A) Health Level 7

An example of a one-to-many relationship is which of the following? A) Insured to dependents B) Patient to Hospital wrist band ID C) Patient to Insurance Co D) Hospital medical procedure to patient

A) Insured to dependents

An example of a one-to-many relationship is which of the following? A) Insured to dependents B) Patient to Hospital wrist band ID C) Patient to Insurance Co D) Hospital medical procedure to patient

A) Insured to dependents

What is one suggestion to consider when forming a EHR selection committee? A) Invite "movers and shakers" onboard in the decision-making process. B) Invite patients on your committee. C) Exclude as many top administrators as possible since their skill set with regards to EHR systems is often too limited. D) Be sure to limit physician input only to relevant topics such as workflow.

A) Invite "movers and shakers" onboard in the decision-making process.

Which of the following is true about a standardized healthcare language? A) It facilitates the measure of patient outcomes. B) It inhibits the linking of diagnoses. C) It hinders research. D) It interferes with education and practice.

A) It facilitates the measure of patient outcomes.

Which of the following is NOT an advantage that a database has over other forms of storage? A) It is able to store repetitive data. B) Only key data is repetitively stored. C) Security is enhanced. D) Conflicting data occurs less often

A) It is able to store repetitive data.

A _____ is a network with a small geographical area of coverage. A) LAN B) WAN C) MAN D) TAN

A) LAN

A _____ is a network with a small geographical area of coverage. A) LAN B) WAN C) MAN D) TAN

A) LAN

____________ are control structures that allow code to repeat. A) Loops B) If statements C) Assignments D) Objects

A) Loops

Which of the following operating systems support the NTFS file system? Select all that apply. A) Microsoft Windows Vista B) Microsoft Windows 7 C) Microsoft Windows XP D) Microsoft Windows 95

A) Microsoft Windows Vista B) Microsoft Windows 7 C) Microsoft Windows XP

A(n) ________ is an abstraction of a problem. A) Model B) Domain C) Object D) Attribute

A) Model

Examples of Boolean operators include the terms ____. A) NOT, AND, OR B) NOT, AND, * C) AND, OR, CATCH D) OR, TRY, NOT

A) NOT, AND, OR

_________ permissions are set so that users have the ability to view, make changes to, or delete files in a folder. A) NTFS B) Network C) LAN D) Sharing

A) NTFS

A surrogate key is most similar to which of the following? A) Natural key B) Foreign key C) Candidate key D) Door key

A) Natural key

A form of a programming logic construct that only evaluates a conditional test based on the results of a prior conditional test is called which of the following? A) Nested alternation B) Simple alternation C) Case structure alternation D) Compound alternation

A) Nested alternation

What is the most important software that runs on your computer? A) Operating System B) Word processor C) Spreadsheet D) Browser

A) Operating System

Which of the following, according to the IOM, is a software element of an EHR? A) Patient support B) Software C) Hardware

A) Patient support

Which of the following are examples of "programs" used before computers? Select all possible examples. A) Player piano scrolls B) Jacquard looms punched cards C) Blueprints D) Files

A) Player piano scrolls B) Jacquard looms punched cards

A form of a programming logic construct that potentially executes code multiple times, but also may not execute the code at all is called which of the following? A) Pre-test loop B) Post-test loop C) Endless loop D) Periodic

A) Pre-test loop

What is the preferred method to use when closing a suspicious Web site popup window? A) Press Alt + F4 B) Click to close the popup window C) Shut down the computer D) Close all browser windows

A) Press Alt + F4

Attributes must depend on the ____of the entity to which they belong. A) Primary key B) Foreign key C) Relationship D) Domain

A) Primary key

Relationships in the database are carried out with the use of which of the following? A) Primary key to foreign key matches. B) Surrogate key to natural key matches. C) Foreign key to foreign key matches. D) Primary key to primary key matches.

A) Primary key to foreign key matches.

Relationships in the database are carried out with the use of which of the following? A) Primary key to foreign key matches. B) Surrogate key to natural key matches. C) Foreign key to foreign key matches. D) Primary key to primary key matches.

A) Primary key to foreign key matches.

Which of the following can be considered modules in programming? Select all that apply. A) Procedures B) Functions C) Methods D) Objects

A) Procedures B) Functions C) Methods D) Objects

Where can you find up to date information about current computing systems? Select all that apply. A) Recent online reviews B) Current issues of computer magazines C) Year-old issues of computer magazines D) Books published more than a year ago

A) Recent online reviews B) Current issues of computer magazines

What are three things to consider when purchasing an EHR server? A) Reliability, performance, scalability B) Size of the unit, performance, power consumption C) Client-Server, Service Requester, client requests

A) Reliability, performance, scalability

Which is NOT commonly considered a phase of the SDLC? A) Requisition phase B) Requirements analysis phase C) Concept development phase D) Operations and maintenance phase E) Testing phase

A) Requisition phase

The user acceptance testing phase of a project usually occurs immediately before: A) Rollout. B) Project description. C) System backup. D) Project sign-off.

A) Rollout.

A tuple is a synonym in database terminology for which of the following? A) Row B) File C) Column D) Attribute

A) Row

A tuple is a synonym in database terminology for which of the following? A) Row B) File C) Column D) Attribute

A) Row

Which of the following are examples of file utilities? Select all that apply. A) Search B) File compression C) Backup D) Read

A) Search B) File compression C) Backup

A programming logic construct that executes code one statement after the other as they are written in the program is called _____________. A) Sequence B) Concurrency C) Alternation D) Iteration

A) Sequence

Primary keys are most efficient for data retrieval when they are which of the following? A) Short and numeric B) Shared primary keys C) Composite D) Multi-valued

A) Short and numeric

Primary keys are most efficient for data retrieval when they are which of the following? A) Short and numeric B) Shared primary keys C) Composite D) Multi-valued

A) Short and numeric

Which is NOT an important tool for data security? A) Solid-state drive B) Firewall C) Encryption D) Virtual Private Network (VPN) E) Strong passwords

A) Solid-state drive

Which of the following supports the development of electronic health records across the lifespan? A) Standardized healthcare languages B) One type of hardware C) One type of software D) One data repository

A) Standardized healthcare languages

What was the first use of electronic medical records? A) Storing dental records B) Automating antibiotic ordering C) Implementing Computerized Physician Order Entry D) None of the above

A) Storing dental records

_____ forward traffic to devices in their network only, based on MAC addressing. A) Switches B) Routers C) NICs D) Either A or B

A) Switches

_____ forward traffic to devices in their network only, based on MAC addressing. A) Switches B) Routers C) NICs D) Either A or B

A) Switches

There are two types of software: application and _________ software. A) System B) Multimedia C) Process D) Utility

A) System

Hardware can be defined as: A) The physical components that make things work. B) Data needed to tell the computer what to do and how to behave. C) Fast, low cost PC systems that permeate the workplace often less than $500 each. D) A computer designed to efficiently run server applications.

A) The physical components that make things work.

Which of the following best describes a subquery? A) The projection of one query is passed as input to another query. B) The values in one table are combined with the values in another table. C) All of the data from one table is projected. D) None of the data from any tables are projected.

A) The projection of one query is passed as input to another query.

A computer program that is compiled must be compiled separately for each different computer. A) True B) False

A) True

Algorithms are a sequence of steps that describe how a task is performed. A) True B) False

A) True

Assembly language is unique to a particular type of computer. A) True B) False

A) True

Business practices may have to be modified for, and workflow often has to be adapted to, the particular design of the COTS product. A) True B) False

A) True

Business practices may have to be modified for, and workflow often has to be adapted to, the particular design of the COTS product. A) True B) False

A) True

Encapsulation and modularity are important features of Object Oriented Programming. A) True B) False

A) True

End user testing is best suited for less-experienced staff and should represent a cross-section of the end-user environment. A) True B) False

A) True

Folders and directories are logically the same thing. A) True B) False

A) True

HIPAA requires protection not only of information that explicitly links to the patient (e.g., social security number), but also of information that could reasonably be used to identify the patient (e.g., ZIP code). A) True B) False

A) True

In expression evaluation, multiplication has higher precedence than subtraction. A) True B) False

A) True

In transaction processing changes to the database can be retracted before the end of the transaction is reached (true or false). A) true B) false

A) True

Java uses a hybrid approach of compiling and interpreting. A) True B) False

A) True

LISP is a programming language that follows the functional paradigm. A) True B) False

A) True

MIIS is a language that was developed for healthcare applications. A) True B) False

A) True

Maintenance requests are formalized processes to document and fix problems. A) True B) False

A) True

Python is an example of an Object Oriented Programming language. A) True B) False

A) True

SQL is used to create a database (True or False). A) True B) False

A) True

SQL is used to create relationships (True or False). A) True B) False

A) True

SQL is used to create tables (True or False). A) True B) False

A) True

SQL is used to create tables. A) true B) false

A) True

Server applications and client applications can exist on the same physical device. A) True B) False

A) True

Software testers perform actions that may cause software to malfunction. A) True B) False

A) True

System designers develop the database, software and interface designs. A) True B) False

A) True

The device driver for your printer will need to be updated when you do a major upgrade of your operating system. A) True B) False

A) True

The equal sign is the assignment operator in Java. A) True B) False

A) True

The execution of tests should be automated as much as possible. A) True B) False

A) True

The main objective of the systems analysis phase is to build a logical model of the information system. A) True B) False

A) True

The most important software on your computer is the operating system. A) True B) False

A) True

Typically, instance variables are declared to be private. A) True B) False

A) True

UML is an example of a design tool for Object Oriented Programs. A) True B) False

A) True

Today's computers connect the mouse and keyboard via a(n) ____ slot. A) USB B) IDE C) SATA D) PS/2

A) USB

The Veteran's Administration open source EHR is the ____ system. A) VistA B) VA Patient C) MUMPS D) HIPAA

A) VistA

HTML is a(n) ____. A) Web page programming language B) Web page C) IP addressing scheme D) Internet protocol used to communicate with Web servers

A) Web page programming language

The requirements analysis phase of the SDLC can involve all but the following. A) Writing programming code B) Talking to users C) Examining a report D) Analysis of a form

A) Writing programming code

When would you need a new device driver? Select all of the following that are reasons you'd need a new driver. A) You install a new printer. B) You do a major upgrade of your OS. C) You buy a new computer. D) Your driver was corrupted.

A) You install a new printer. B) You do a major upgrade of your OS. C) You buy a new computer. D) Your driver was corrupted.

A module with strong cohesive code with loose coupling is a candidate to become ____________? A) a method of an object B) an independent module C) a module within the application code D) A restricted use module

A) a method of an object

HIPAA requires that health care providers, insurance companies, and employers ____. A) abide by privacy and security standards B) provide employers with medical information required to make hiring decisions C) store medical records in electronic formats D) Both A and C

A) abide by privacy and security standards

Which is NOT a function of the skin? A) temperature regulation B) protection agains pathogens C) absorb nutrients D) housing sensory receptors

A) absorb nutrients

What is the condition that results when adults have too much growth hormone present? A) acromegaly B) diabetes insipidus C) dwarfism D) hyperthyroidism

A) acromegaly

"An electronic record of patient health information containing care received in all health facilities" is the definition of A) an Electronic Health Record. B) an Electronic Medical Record. C) a Computer Based Patient Record. D) a Healthcare Information Record.

A) an Electronic Health Record

Repetitive data can be stored in a(n) ________. A) array B) repository C) assemblage D) order

A) array

Clinical decision support systems are designed to A) assist the clinician in making decisions. B) provide guidelines that must be adhered to. C) remove the clinician from the decision making process. D) replace clinicians with robotic care providers.

A) assist the clinician in making decisions.

In the final design which element of the ER-diagram a name for a piece of data in the database? A) attribute B) relationship C) entity D) domain

A) attribute

Identify the condition that occurs when the prostate gland become enlarged with age and obstructs the flow of urine. A) benign prostatic hypertrophy B) prostatitis C) balanitis D) erectile dysfunction

A) benign prostatic hypertrophy

Machine code is a _______ language. A) binary B) legacy C) scripting D) object oriented

A) binary

A neighbor becomes aware of a medical condition you have been privately batlling for the past six months. The neighbor says that if you do not pay her $5,000, she will use a pay phone to disclose this information to your father. This is an example of _________. A) blackmail B) compromised data C) identify theft D) Impersonation

A) blackmail

The consequences of an error in a health care application _____________. A) can result in loss of life B) is comparable to other industries C) is negligible because it can always be done over D) may make it necessary to work overtime

A) can result in loss of life

Identify the largest part of the brain that is divided into two major hemispheres. A) cerebrum B) cerebellum C) ventricles D) hypothalamus

A) cerebrum

A name of a relationship is used for what purpose? A) clarify the relationship B) is used in programs that access the database. C) becomes code that implements the relationship in the database. D) indicate minimum and maximum cardinality of the relationship.

A) clarify the relationship

In object oriented programming the design of something that a user wants to keep track of is called a _________. A) class B) object C) module D) subtask

A) class

The number of minutes in a day (24 hour period) is a good candidate for being declared as a _______? A) constant B) literal C) variable D) secondary data

A) constant

Which of the following is an inherited disease of the mucus and sweat glands? A) cystic fibrosis B) chronic obstructive pulmonary disease C) primary pulmonary hypertension D) bronchitis

A) cystic fibrosis

Which is NOT a function of the digestive system? A) distribute nutrients B) digest food C) absorb nutrients D) eliminate solid waste

A) distribute nutrients

A _____ IP address can change when you reboot your ISP device. A) dynamic B) static C) DNS D) public

A) dynamic

A _____ IP address can change when you reboot your ISP device. A) dynamic B) static C) DNS D) public

A) dynamic

The main function of a computer is to ____. A) execute instructions B) answer human questions C) service the CPU D) create input signals

A) execute instructions

Virtual computing requires a A) hypervisor B) supervisor C) cloud computing environment D) distributed computing environment

A) hypervisor

Macro viruses usually infect Microsoft Office files and ________. A) install themselves when users click files B) delete all hard disk files on a specified date C) install themselves when the computer reboots D) none of the above

A) install themselves when users click files

Which of the following activities supports global healthcare networking? A) interoperable clinical information systems B) one type of hardware C) one type of software D) one type of Internet provider

A) interoperable clinical information systems

Identify the bean-shaped organs located near the middle of back whose functions include but are not limited to the removal of waste products and extra water from the body, regulation of the acid-base balance, and the regulation of pressure. A) kidneys B) ureters C) urethra D) urinary bladder

A) kidneys

An infinite loop is what type of error? A) logic B) missing keyword C) misspelled word D) syntax

A) logic

Which type of error may require a programmer to redo their pseudocode solution? A) logic B) missing keyword C) misspelled word D) syntax

A) logic

Second normal form of the Normalization process involves which of the following? A) making sure that data within a row when deleted will not eliminate data that will be needed later. B) Columns of data are uniquely named and contain only one piece of data. C) Eliminating transitive dependencies D) Making sure that every determinant is a candidate key

A) making sure that data within a row when deleted will not eliminate data that will be needed later.

The things that an object can do are referred to as ________. A) methods B) attributes C) variables D) modules

A) methods

Which type of tissue is designed to produce body movement? A) muscular B) connective C) epithelial D) nervous

A) muscular

Which of the following is a word root? A) nephr B) nephro C) nephros D) tomy

A) nephr

RAM is installed ____. A) on the motherboard B) in PCI slots C) within the CPU D) in SATA slots

A) on the motherboard

A ______ is a free protocol analyzer software tool that can display unencrypted network traffic on a monitor screen. A) packet sniffer B) malware analyzer C) spyware tracer D) server

A) packet sniffer

Privacy is to _______ as confidentiality is to _______. A) people; data B) security; blackmail C) blackmail; security D) data; people

A) people; data

Microsoft Word, running on a computer, is an example of a(n) ____. A) process B) service C) thread D) event

A) process

An infection of the prostate gland, usually caused by bacteria is: A) prostatitis B) benigh prostatic hypertrophy C) balanitis D) chlamydia

A) prostatitis

A _____ operates at Layer 3 of the OSI model. A) router B) switch C) Web protocol D) network cable

A) router

A syntax error is most like a ___________. A) run on sentence B) standing in two lines at once C) loop process that has no way to end D) improper sequence of events

A) run on sentence

Hard disk storage is known as ____ storage. A) secondary B) volatile C) nonvolatile D) primary

A) secondary

A complex password should include at least ____ characters. A) six B) nine C) five D) eleven

A) six

Unconditional branching is used in ____________. A) spaghetti code B) structured code C) top down design D) mandatory code

A) spaghetti code

A complex password contains at least 6 characters, made up of at least: 1-upper case, 1-lower case, 1-number, and 1-_______ character. A) special B) numeric C) typed D) authorized

A) special

Which directional term means more toward the head or above another structure? A) superior B) medial C) ventral D) caudal

A) superior

Sperm cells are produced in which of the following male reproductive organs? A) testes B) prostate gland C) seminal vesicles D) penis

A) testes

Functional Requirements can best be defined as: A) those processes that you want a system to perform. B) the attributes of the system as a whole or its environment. C) the requirements needed for the hardware to function.

A) those processes that you want a system to perform.

Identify the disorder of the ear that results in a ringing or roaring in your ears which may be caused by hearing loss or exposure to loud noise over a long period of time. A) tinnitus B) acoustic neuroma C) ear wax build up D) otitis media

A) tinnitus

Identify the thin partition located between the external auditory canal and the middle ear: A) tympanic membrane B) cochlea C) auricle D) malleus

A) tympanic membrane

Identify the major female organ that provides the nutritional and protective support for the fetus during development. A) uterus B) vagina C) ovary D) fallopian tubes

A) uterus

From the list provided below, select a valid URL. A) www.whitehouse.gov B) www.google/com C) ww.nih.gov D) [email protected]

A) www.whitehouse.gov

Select all of the following that are part of a test plan. A) Testing deliverables B) Testing goals C) What to do when a test fails D) Maintenance

A, B, C) Testing deliverables, Testing goals, What to do when a test fails

Select all of the following that are a type of software test. A) Usability B) Fire C) Smoke D) Load

A, C, D) Usability, Smoke, Load

In transaction processing changes to the database can be retracted before the end of the transaction is reached. A. True B. False

A. True

1024 bytes x 1024 x 1024 = ____. A) 1 KB B) 1 GB C) 1 TB D) 1,024 KB

B) 1 GB

HITECH requires healthcare institutions to switch to some sort of EHR system by this year to avoid financial penalties: A) 2013 B) 2015 C) 2020 D) 2025

B) 2015

HITECH requires healthcare institutions to switch to some sort of EHR system by this year to avoid financial penalties: A) 2013 B) 2015 C) 2020 D) 2025

B) 2015

Life expectancy at birth in 2007 was approximately A) 76 years. B) 78 years. C) 80 years. D) 82 years.

B) 78 years

What is a use case? A) Background information including organization size and specialty and current systems and hardware in place. B) A technique for documenting the potential requirements of a new system or any type of system change. C) The defined learning curve for users/ administrators. D) Both A and C

B) A technique for documenting the potential requirements of a new system or any type of system change.

The data model is best described as which of the following? A) The database design. B) A volatile diagram that through specification gathering and normalization processes eventually matures into the database design. C) A fixed model from which the database is implemented. D) A diagram that represents only one view of the database.

B) A volatile diagram that through specification gathering and normalization processes eventually matures into the database design.

A surrogate key is . . . A) A well-known attribute value that uniquely determines a row in a table. B) An automatically generated numeric value that uniquely determines a row of a table. C) A unique key from another table. D) A key that not the primary key.

B) An automatically generated numeric value that uniquely determines a row of a table.

Systems performance is measured with ________. A) Fault management B) Benchmark testing C) System faults D) Capacity planning

B) Benchmark testing

A programming logic construct that may either do something or not based on a conditional test is known by all but which of the following? A) Selection B) Choice C) If-Then-Else D) Alternation

B) Choice

Most EHR systems today are based on what kind of computer model? A) Hardware-software B) Client-server C) Hosted

B) Client-server

An attribute is a synonym in database terminology for which of the following? A) Table B) Column C) Record D) Row

B) Column

An attribute is a synonym in database terminology for which of the following? A) Table B) Column C) Record D) Row

B) Column

Which of the following is a translation process that translates an entire program and creates an executable module? A) Sequential B) Compiler C) Interpreter D) Structured execution

B) Compiler

Attributes that contain more than one piece of data such as Address are called . . A) Multi-valued B) Composite C) An unbound domain D) Unspecific

B) Composite

Attributes that contain more than one piece of data such as Address are called . . . A) Multi-valued B) Composite C) An unbound domain D) Unspecific

B) Composite

Which is NOT an important step in creating a testing strategy? A) Identify testing environment. B) Create test scenarios and scripts. C) Identify participants. D) Identify required equipment.

B) Create test scenarios and scripts.

The ____ monitor port replaces the VGA port in today's computer systems. A) HDMI B) DVI C) AGP D) PS/2

B) DVI

A ________ shows how data moves through an information system. A) Data dictionary B) Data flow diagram C) Data element D) Data field

B) Data flow diagram

From the choices below, select the best definition of a network. A) A collection of printers with no media. B) Devices interconnected by some common communication channel. C) A device that sends communication to the Internet. D) A shared folder stored on a server.

B) Devices interconnected by some common communication channel.

From the choices below, select the best definition of a network. A) A collection of printers with no media. B) Devices interconnected by some common communication channel. C) A device that sends communication to the Internet. D) A shared folder stored on a server.

B) Devices interconnected by some common communication channel.

It is best if primary keys . . . A) Are composite B) Do not change in value C) Can be used for all tables in the database D) Are shared

B) Do not change in value

_________ is when the projected benefits of a proposed system outweigh its projected costs. A) Total cost of ownership B) Economic feasibility C) Return on investment D) Ongoing support

B) Economic feasibility

Which part of the database ER-diagram becomes a table in the implemented database? A) Relationships B) Entities C) Attributes D) Primary keys

B) Entities

Which part of the database ER-diagram becomes a table in the implemented database? A) Relationships B) Entities C) Attributes D) Primary keys

B) Entities

A performance baseline is helpful in troubleshooting because it contains a backup of system critical data. A) True B) False

B) False

A variable's value cannot be changed. A) True B) False

B) False

Absolute system security is always possible. A) True B) False

B) False

Classes and objects are exactly the same things. A) True B) False

B) False

Copying software from a friend is always okay. A) True B) False

B) False

Implementation day for the pilot group is the perfect opportunity for IT to celebrate the completion of a successful project with a team-building retreat. A) True B) False

B) False

In Java, variable declarations do not have to include data types. A) True B) False

B) False

In a one-to-many mapping relationship, the relationship is created by just identifying the primary key of a table and placing it in another table as a non-unique attribute. A) True B) False

B) False

In-house software development is usually faster and less expensive than purchasing a commercial software application. A) True B) False

B) False

Local and state laws governing privacy of health information tend to supersede federal laws. A) True B) False

B) False

Machine code includes English words for basic computer commands. A) True B) False

B) False

Perl is a scripting language developed for web browsers. A) True B) False

B) False

Project teams do not require management. A) True B) False

B) False

SQL is an example of a third generation programming language. A) True B) False

B) False

System users are the only stakeholders for an information system. A) True B) False

B) False

The SDLC covers creation of the product, but routine maintenance and ultimate decommissioning are addressed in different models. A) True B) False

B) False

The code used in an application is the same as the database. A) True B) False

B) False

The procedure for sign-off for testing activities identifies the person who will manage defects in the project. A) True B) False

B) False

The scope of the project generally should remain flexible to accommodate future needs and changes. A) True B) False

B) False

Web-based applications have less complex security issues than traditional applications. A) True B) False

B) False

When the condition of an if statement is false, the body of the if statement executes. A) True B) False

B) False

____ permit(s) or deny a computer the ability to connect to another computer. A) Antivirus software B) Firewalls C) Operating systems D) Viruses

B) Firewalls

Files that are stored in non-contiguous clusters are called __________ files. A) Stored B) Fragmented C) Free D) Protected

B) Fragmented

A Web server sends ____ back to the browser, which translates it for display on a monitor. A) TCP/IP B) HTML C) HTTP D) header information

B) HTML

Which of the following best describes a firewall? A) Software that forms a barrier between systems or parts of systems B) Hardware that forms a barrier between systems or parts of systems C) A lead wall around a computer system

B) Hardware that forms a barrier between systems or parts of systems

The term used to describe the mobilization of healthcare information electronically across organizations within a region, community or hospital systems is: A) Regional Extension Center B) Health Information Exchange C) Personal Health Record D) Electronic Prescribing

B) Health Information Exchange

Triage is an important step in: A) Baseline testing. B) Help desk activity. C) Creating the production support team. D) Upgrading the EHR application.

B) Help desk activity.

An example of a many-to-many relationship is which of the following? A) Patient to hospital wrist band ID B) Hospital medical procedure to patient C) Insured to dependents D) Toxicology report to Patient

B) Hospital medical procedure to patient

An example of a many-to-many relationship is which of the following? A) Patient to hospital wrist band ID B) Hospital medical procedure to patient C) Insured to dependents D) Toxicology report to Patient

B) Hospital medical procedure to patient

SQL cannot do which of the following? A) Update the contents of a database B) Identify the user of the system C) Query a database for information D) Execute intrinsic functions

B) Identify the user of the system

Which prioritization level is appropriate for a non-functional device that is not impacting patient care? A). Routine (low) B) Important (medium) C) Urgent (high) D) Critical

B) Important (medium)

What is the process of creating an object of a class called? A) Conditional branching B) Instantiation C) Productizing D) Cookie cutter stamping

B) Instantiation

A(n) _____ connection requires the services of an ISP. A) network B) Internet C) Intranet D) home

B) Internet

A(n) _____ connection requires the services of an ISP. A) network B) Internet C) Intranet D) home

B) Internet

The ____ is a global system of computer networks that communicate using TCP/IP and is a large network made up of many smaller networks. A) Domain Naming System B) Internet C) World Wide Web D) ARPANET

B) Internet

_______ are hardware and/or software that monitor network traffic for malicious activity. A) Routers B) Intrusion Protection Systems C) Packet sniffers D) Antivirus installations

B) Intrusion Protection Systems

_______ is software designed to infiltrate a computer system without the owner's informed consent. A) Hackware B) Malware C) Phishing D) Spyware

B) Malware

Where are programs stored when they are running? A) DVD B) Memory C) Monitor D) Keyboard

B) Memory

iPhone OS is an example of _______. A) A machine-based or independent Operating system B) Mobile-based or embedded operating system C) Server-based operating system D) Personal efficiency software

B) Mobile-based or embedded operating system

______ describes the trend that the number of components on a circuit doubles every two years. A) Computer history B) Moore's Law C) Social netowkring D) Increasing memory size

B) Moore's Law

This is an example of hardware fault tolerance: A) Redundant hard drives in the server B) Multiple-version programs C) Both A and B D) Neither A nor B

B) Multiple-version programs

The hospital reports that a patient arrived at the hospital with a bullet injury. Can the hospital be forced to reveal this patient's medical records? A) Yes. B) No. C) It depends on where the patient was shot. D) Only with the presiding doctor's consent

B) No.

A deletion anomaly happens when . . . A) Data is deleted from one entity and placed in another entity. B) One kind of data is unintentionally deleted along with the data that was intended to be deleted. C) An entire table is deleted instead of a row of data. D) A new entity replaces an old entity.

B) One kind of data is unintentionally deleted along with the data that was intended to be deleted.

Which of the following is NOT an example of word processing software? A) Microsoft Word B) OpenOffice Impress C) OpenOffice Writer D) Corel WordPerfect

B) OpenOffice Impress

When a hard disk drive is being accessed, the _______ spins and the _____ moves until the head is over the proper location on the disk. A) Spindle, arm B) Platter, arm C) Head, arm D) Arm, head

B) Platter, arm

Which definition is incorrect? A) An interface is a point of interaction between components. B) Point-to-point interfacing involves connecting systems end to end, as if in a chain, so that each connects to no more than two others. C) Integration is the process of connecting various subsystems into the larger system, ensuring that subsystems function together as a whole. D) An interface engine routes data through a centralized location.

B) Point-to-point interfacing involves connecting systems end to end, as if in a chain, so that each connects to no more than two others.

A form of a programming logic construct that potentially executes code multiple times and must execute the code at least once is called which of the following? A) Pre-test loop B) Post-test loop C) Endless loop D) Periodic

B) Post-test loop

According to HIPAA rules, who can view your medical information without a signed release? A) Employer B) Primary care physician C) Spouse D) All of the above

B) Primary care physician

Which of the following is one of the four key components of any EHR system? A) Provides mobility for healthcare workers B) Provides "longitudinal health data" on individuals C) Provides secure access by sacrificing efficiency

B) Provides "longitudinal health data" on individuals

Which of the 8 project plan components is properly paired with one of its key aspects? A) Goals/objectives - critical dependencies B) Quality management - performance measuring activities C) Scope - defined, measurable achievement D) Constraints - features and functions

B) Quality management - performance measuring activities

The SQL statement used to retrieve data from a database is which of the following? A) UPDATE B) SELECT C) INSERT D) WHERE

B) SELECT

The SQL statement used to retrieve data from a database is which of the following? A) UPDATE B) SELECT C) INSERT D) WHERE

B) SELECT

A form of a programming logic construct that involves one conditional test or at most two exclusive options and that doesn't involve an AND or an OR operator is called which of the following? A) Nested alternation B) Simple alternation C) Case structure alternation D) Compound alternation

B) Simple alternation

This type of fault tolerance compensates for errors in data structures: A) Hardware fault tolerance B) Software fault tolerance C) System fault tolerance D) Dynamic fault tolerance

B) Software fault tolerance

Programming languages have _______, just like natural languages. A) Code B) Syntax C) Meaning D) Greetings

B) Syntax

What was the oldest tool used for counting and calculations? A) Abacus B) Tally stick C) Slide rule D) Electronic calculator

B) Tally stick

Email was initially limited to A) Voice B) Text C) Video D) Images

B) Text

Which normal form is commonly considered to be all that is necessary for most database situations? A) Second normal form B) Third normal form C) Boyce-Codd form D) Fourth normal form

B) Third normal form

Which normal form is commonly considered to be all that is necessary for most database situations? A) Second normal form B) Third normal form C) Boyce-Codd form D) Fourth normal form

B) Third normal form

_____ is the number of bits sent across the media at any one time that represent your computer's actual communication. A) Mbps B) Throughput C) Goodput D) Bandwidth

B) Throughput

_____ is the number of bits sent across the media at any one time that represent your computer's actual communication. A) Mbps B) Throughput C) Goodput D) Bandwidth

B) Throughput

The testing phase of the SDLC can involve all but the following. A) Formal walkthrough of design B) Translation into machine code C) System tests of program in context with other programs D) Program unit test

B) Translation into machine code

Which of the following is not a step in the SDLC? A) Implementation B) Translation into machine code C) Testing D) Requirements Analysis

B) Translation into machine code

A statement that jumps to another module without any strings attached as to what to do when the machine is finished executing the invoked module illustrates what kind of branching? A) Conditional branching B) Unconditional branching C) Modular structure branching D) Blind branching

B) Unconditional branching

____ permit you to determine who uses your computer A) Power users B) User accounts C) Firewalls D) Complex passwords

B) User accounts

_______________ are programming constructs that store data. A) Assignments B) Variables C) Expressions D) Control structures

B) Variables

Which is NOT a type of safeguard required by HIPAA? A) Organizational requirements B) Virtual safeguards C) Technical safeguards D) Physical safeguards E) Administrative safeguards

B) Virtual safeguards

The IEEE 802.11 standard governs ____ technologies. A) Ethernet B) Wi-Fi C) Bluetooth D) WiMAX

B) Wi-Fi

The IEEE 802.11 standard governs ____ technologies. A) Ethernet B) Wi-Fi C) Bluetooth D) WiMAX

B) Wi-Fi

What is the latest version of Microsoft Windows OS? A) Windows XP B) Windows 7 C) Windows Vista D) Windows NT

B) Windows 7

Some experts recommend ____ first party, ____ third party, and ____ session cookies. A) accepting, accepting, accepting B) accepting, rejecting, allowing C) accepting, allowing, rejecting D) rejecting, allowing, rejecting

B) accepting, rejecting, allowing

Significant healthcare security breaches A) have never occurred. B) are published on a government website C) are not a privacy issue D) are caused by virtual machine use

B) are published on a government website

Identify the condition that causes the inside walls of the airways to become sore, swollen, and narrow, and results in the lungs taking in less air. A) bronchitis B) asthma C) pharyngitis D) cystic fibrosis

B) asthma

Physical security of assets means that objects cannot access data without _______. A) use of a badge B) authentication C) written permission D) the proper security clearance

B) authentication

Network security revolves around the setup and use of _______ to contorl who and how objects are utilized. A) identification B) authentication, authorization, and permissions C) authentication and permissions D) packet sniffers

B) authentication, authorization, and permissions

An example of authorization is when a user ______. A) logs into a computer B) can print a document C) both A and B D) none of the above

B) can print a document

Following the five rights of information management ensures that A) patients will never suffer from medical error. B) clinicians always have the information they need to make a decision regarding patient care. C) all clinicians will make the correct decision regarding patient care. D) patients will be given the correct medication.

B) clinicians always have the information they need to make a decision regarding patient care.

A value that cannot be changed while a program is running is called a ________. A) variable B) constant C) array D) passed variable

B) constant

What medical term refers to the skull? A) carp/o B) crani/o C) oste/o D) vertebr/o

B) crani/o

SQL is a _______ language. A) binary B) data oriented language C) scripting D) object oriented

B) data oriented language

The kind of data stored in memory is described to the computer as a ________. A) memory location B) data type C) primary value D) data group

B) data type

Which term specifically means abnormal condition of the skin? A) dermatopathy B) dermatosis C) dermatoplasty D) dermatitis

B) dermatosis

The slowest type of Internet connection is the ____ connection type. A) satellite B) dialup C) DSL D) Cable

B) dialup

An IP address that that may change when you reboot your cable modem router is referred to as a(n) ____ A) APIPA B) dynamic C) Static D) ISP

B) dynamic

Patient medical records should be send electronically in a(n) ____ format. A) zipped B) encrypted C) HTTP D) IP

B) encrypted

Which is the most superficial layer of skin? A) subcutaneious layer B) epidermis C) dermis D) corium

B) epidermis

Which of the following brain disorders results in recurring seizures and is controlled primarily by medications? A) Parkinson's disease B) epilepsy C) Alzheimer's disease D) transient ischemic attacks

B) epilepsy

The breast condition that has the characteristics of lumpiness, thickening and swelling, and is often associated with the female's menstrual cycle is: A) fibroadenomas B) fibrocystic disease C) cysts D) intraductal papillomas

B) fibrocystic disease

"Count" is which of the following? A) type of statement B) function C) clause D) transaction processing statement

B) function

"Count" is which of the following? A) type of statement B) function C) clause D) transaction processing statement

B) function

The eye disorder that is the result of fluid pressure increases over time that damaging the optic nerve and results in blindness is: A) macular degeneration B) glaucoma C) cataract D) color blindness

B) glaucoma

Private IP addresses _____. A) have meaning on the Internet and in a home network B) have no meaning outside of the home network in which the address resides C) are the same thing as public IP addresses D) None of the above.

B) have no meaning outside of the home network in which the address resides

Private IP addresses _____. A) have meaning on the Internet and in a home network B) have no meaning outside of the home network in which the address resides C) are the same thing as public IP addresses D) None of the above.

B) have no meaning outside of the home network in which the address resides

You search the Web using the term health and informatics not education. What result below best matches your search? A) health network B) health informatics C) health informatics educational opportunities D) informatics and health

B) health informatics

Which type of anemia results from the insufficient iron? A) pernicious anemia B) iron-deficiency anemia C) hemolytic anemia D) thalassemia

B) iron-deficiency anemia

A variable in programming __________. A) is something that can cause a logic error in a program at random times B) is a name given to a place in the memory of the computer C) is a logic construct that changes an outcome depending on circumstances D) is a compile error caused by a logic error

B) is a name given to a place in the memory of the computer

COBOL is a _______ language. A) binary B) legacy C) scripting D) object oriented

B) legacy

One difference between PHRs and EHRs is that PHRs are ____. A) governed by HIPAA B) maintained by individuals C) not for online use D) organized and utilized by medical doctors

B) maintained by individuals

The Referential Integrity Constraint is which of the following? A) making sure that data is within the domain of the attribute B) making sure that a foreign key value is also a value in the primary key to which it belongs C) making sure that the user has permission to access data that they have requested D) making sure that the user is who they say they are

B) making sure that a foreign key value is also a value in the primary key to which it belongs

Which term means inflammation of the heart muscle? A) myositis B) myocarditis C) dermatomyositis D) myopathy

B) myocarditis

A solid piece of material that forms in the kidney results in which of the following conditions? A) interstitial cystitis B) nephrolithiasis C) acute cystitis D) urinary tract infection

B) nephrolithiasis

The Internet is owned by ____. A) Google B) nobody C) the U. S. government D) everybody

B) nobody

The character set of 0-9 is contained in what data type? A) numeric and alphabetic B) numeric and alphanumeric C) alphabetic D) alphabetic and alphanumeric

B) numeric and alphanumeric

A binary digit value of one (1) indicates that electricity is ____. A) stored in RAM B) on C) off D) in a Boolean circuit

B) on

A typical home network connecting to the Internet uses ____ IP addressing. A) only Public B) only private C) both public and private D) HTTP

B) only private

Which of the following endocrine glands has both an exocrine and an endocrine function? A) adrenal B) pancreas C) pineal D) thymus

B) pancreas

Antivirus software works by recognizing ____ and stopping those things from causing harm to your computer. A) files B) patterns of bad behavior C) hackers D) AV software

B) patterns of bad behavior

A _____ topology describes how a network is actually designed and laid out across a campus. A) logical B) physical C) mesh D) star

B) physical

A _____ topology describes how a network is actually designed and laid out across a campus. A) logical B) physical C) mesh D) star

B) physical

Another student informs you that you can purchase a completed research paper online and avoid doing the work yourself. This is an example of ____. A) freeware B) plagiarism C) theft D) pirating intellectual property

B) plagiarism

The watery part of blood is called: A) red cells B) plasma C) white cells D) platelets

B) plasma

The law of ________ regulates the type of information which may be collected and how this information may be used and stored. A) security B) privacy C) confidentiality D) torts

B) privacy

HIPAA requires that health care providers, insurance companies, and employers abide by ________ standards. A) accountability B) privacy and security C) state D) international

B) privacy and security

The American Recovery and Reinvestment Act is being implemented in order to A) provide organizations with funds to purchase information systems. B) provide incentives for organizations to use information systems in a meaningful way. C) force organizations to implement computer provider order entry. D) stimulate the economy by giving funds to information system companies

B) provide incentives for organizations to use information systems in a meaningful way.

Routers can be configured with _____ so they know where to route received traffic. A) switchports B) routing tables C) IP addresses D) WAPs

B) routing tables

Routers can be configured with _____ so they know where to route received traffic. A) switchports B) routing tables C) IP addresses D) WAPs

B) routing tables

A(n) ____ is also known as a query. A) index B) search phrase C) Boolean operator D) Web crawler

B) search phrase

Data that can be derived is called ________ data. A) variable B) secondary C) primary D) passed

B) secondary

Your company decides that it should back up computer files every four hours during the week and at the end of the day on weekends. This process needs to be recorded in the company's _________. A) permissions B) security policy C) WAN documentation D) email

B) security policy

Which of the following organs is NOT part of the cardiovascular system? A) artery B) spleen C) vein D) capillary

B) spleen

A _____ operates at Layer 2 of the OSI model. A) router B) switch C) Web protocol D) network cable

B) switch

A _____ operates at Layer 2 of the OSI model. A) router B) switch C) Web protocol D) network cable

B) switch

An attribute is said to be functionally dependent on another attribute if . . . A) both attributes can be determined by another attribute B) the attribute can be determined by the other attribute C) both attributes are candidate keys D) both attributes are non-unique keys

B) the attribute can be determined by the other attribute

When medical terminology word part provides the general meaning of the word? A) combining vowel B) word root C) suffix D) prefix

B) word root

Malware that works to create a lot of network traffic is referred to as a(n) ________. A) Macro virus B) worm C) adware D) phishing

B) worm

. Which of the following operators is the OR operator in Java? A) == B) || C) && D) !=

B) ||

Which suffix means narrowing? A) -sclerosis B) -rrhexis C) -stenosis D) -ptosis

C) -stenosis

Though the number or order of these steps is not set in stone, we suggested this number of steps for your selection process: A) 6 B) 10 C) 12 D) 24

C) 12

From the list below, select a valid IPv4 address and subnet mask for a laptop: A) 192.168.256.1, 255.255.0.0 B) 80:0cd0:24:dc09:e6f5:23b1:528f:7fe2, /23 C) 192.168.10.200, 255.255.255.0 D) 192.168.10.0, 255.255.265.0

C) 192.168.10.200, 255.255.255.0

From the list below, select a valid IPv4 address and subnet mask for a laptop: A) 192.168.256.1, 255.255.0.0 B) fe80:0cd0:2414:dc09:e6f5:23b1:528f:7fe2, /23 C) 192.168.10.200, 255.255.255.0 D) 192.168.10.0, 255.255.265.0

C) 192.168.10.200, 255.255.255.0

When was the World Wide Web first developed? A) 1969 B) 1979 C) 1989 D) 1999

C) 1989

What is the value assigned to the variable num after the following assignment statement? num = 5 + 5 * 3; A) 18 B) 30 C) 20 D) 15

C) 20

Software can be defined as: A) The nuts and bolts that make things work. B) The physical components of servers. C) A collection of computer programs and related data that provide the instructions telling a computer what to do. D) A collection of computers and devices connected by communications channels that facilitates communications among users and allows users to share resources with other users.

C) A collection of computer programs and related data that provide the instructions telling a computer what to do.

What is an information system? A) A computer program B) A database C) A collection of people, process and technology that generates and uses information in an organization D) None of the above

C) A collection of people, process and technology that generates and uses information in an organization

A foreign key is . . . A) A well-known attribute value that uniquely determines a row in a table. B) An automatically generated numeric value that uniquely determines a row of a table. C) A unique key from another table. D) A key that doesn't belong in the table where it appears.

C) A unique key from another table.

A foreign key is . . . A) A well-known attribute value that uniquely determines a row in a table. B) An automatically generated numeric value that uniquely determines a row of a table. C) A unique key from another table. D) A key that doesn't belong in the table where it appears.

C) A unique key from another table.

What was the first personal computer? A) Apple I B) IBM PC C) Altair D) iMac

C) Altair

A programming logic construct that provides for exclusive options of code to be executed is called __________. A) Sequence B) Concurrency C) Alternation D) Iteration

C) Alternation

Most (if not all) scientific, business, industry, health care and personal use computer problems can be solved with just the three following logic constructs. A) Continue, Choice and Steps B) Recursion, Concurrency and Execution C) Alternation, Sequence and Iteration D) Conditional branch, Unconditional branch and Perform

C) Alternation, Sequence and Iteration

Which of the following diseases of the nervous system results in dementia in older people that progressively worsens until the patient can no longer take care of themselves? A) brain aneurysm B) epilepsy C) Alzheimer's disease D) cerebrovascular stroke

C) Alzheimer's disease

What is a CT scan? A) A nuclear medicine imaging device that produces a 3-D image. B) A device that creates an image based on sound waves. C) An x-ray, using specialized equipment, that takes cross-sectional pictures of the body. D) Magnetic imaging equipment that uses a radio frequency pulse to create an image.

C) An x-ray, using specialized equipment, that takes cross-sectional pictures of the body.

Name three types of servers you may find in a typical EHR system? A) Hardware, RAM, Dell B) Configuration, terminal, VPN C) Application, Database, Citrix D) Internal, external, hosted

C) Application, Database, Citrix

Which is NOT a function of the lymphatic and immune systems? A) Transport fats absorbed by the small intestines B) Primary defense against the invasion of pathogens C) Assist in the blood clotting process D) Collect excess tissue fluid and return it to the circulatory system

C) Assist in the blood clotting process

Which of the following statements regarding the atria is NOT true? A) Atria are the upper chambers B) The two atria are separated by a septum C) Atria pump blood out of the heart D) Atria receive blood into the heart

C) Atria pump blood out of the heart

Access codes, passwords, and key cards are examples of: A) Audits B) Access routes C) Authentication D) Security

C) Authentication

Medical implants use _____ technology to relay information from inside a patient's body to a receiver. A) WiMAX B) Ethernet C) Bluetooth D) CAT 5e

C) Bluetooth

Medical implants use _____ technology to relay information from inside a patient's body to a receiver. A) WiMAX B) Ethernet C) Bluetooth D) CAT 5e

C) Bluetooth

A friend of a patient asks the nurse if the patient is HIV positive. If the nurse provides this information, what is he or she guilty of? A) Breaching information security B) Information by consent C) Breach of confidentiality D) Nothing; this is not illegal

C) Breach of confidentiality

Which part of the computer is its "brain"? A) Monitor B) Memory C) CPU D) Keyboard

C) CPU

Primary keys can be selected from a list of . . . A) Natural keys B) Surrogate keys C) Candidate keys D) Foreign keys

C) Candidate keys

A form of a programming logic construct that involves more than two exclusive options and that doesn't involve an AND or an OR operator is called which of the following? A) Nested alternation B) Simple alternation C) Case structure alternation D) Compound alternation

C) Case structure alternation

______ is commonly applied to conversations between doctors and patients. A) Security B) Privacy C) Confidentiality D) Tort law

C) Confidentiality

Testing of the database can be accomplished by which of the following? A) Create small databases for each view that was gathered during the specification gathering phase and make sure they all produce what the user or report needed. B) Have the users do every transaction by hand for a few days in parallel with the new database to see if the results are the same. C) Create a small test version of the database where queries can be executed and the results monitored. D) Testing is not important since users will have been involved throughout the entire process.

C) Create a small test version of the database where queries can be executed and the results monitored.

Which of the following is an advantage of databases over disk file storage? A) Databases can store data of a repetitive nature and disk file storage cannot. B) Disk file storage requires special expensive hardware and databases do not. C) Data from a database can be input selectively rather than all or nothing as with a disk file. D) Data in a database is not visible all the time as with a disk file.

C) Data from a database can be input selectively rather than all or nothing as with a disk file.

How does data differ from information? A) Data has limited meaning, depending its storage location. B) Information is the same as data. C) Data has no meaning on its own merit. D) None of the above

C) Data has no meaning on its own merit.

What is NOT a category of stage 1 meaningful use criteria? A) Improve care coordination B) Improve population and public health C) Define minimum EHR functionality D) Ensures adequate privacy and security protections for personal health information.

C) Define minimum EHR functionality

What is NOT a category of stage 1 meaningful use criteria? A) Improve care coordination B) Improve population and public health C) Define minimum EHR functionality D Ensure adequate privacy and security protections for personal health information.

C) Define minimum EHR functionality

What is the name of the problem that is solved by creating a new entity and moving some data from the existing entity to the new one so that when data is removed from the original entity, data is not unintentionally lost? A) Insertion anomaly. B) Update anomaly. C) Deletion anomaly. D) Addition anomaly.

C) Deletion anomaly

Which of the following is NOT usually included in a project plan? A) Scope and expectations B) Business and project goals and objectives C) Design specifications D) Roles and responsibilities E) Quality management approach

C) Design specifications

The support team for a production EHR system should do all of the following EXCEPT: A) Manage user requests for access to the system. B) Review daily interface error logs for problems with the system. C) Develop software and new environments to respond to customer needs. D) Provide rapid response to customer issue.

C) Develop software and new environments to respond to customer needs.

Though less commonly used than in the past, _________ are still used today. A) wireless hotspots B) punch cards C) dial-up connections D) touch screens

C) Dial-up connections

Which of the following is not a reason for the diversity of languages? A) Different languages for different purposes B) New languages to take advantage of new features C) Different world cultures have their own computer languages D) Legacy languages tend to stick around

C) Different world cultures have their own computer languages

This type of backup saves only the changes since the last full backup: A) Full backup B) Incremental backup C) Differential backup D) Synthetic full backup

C) Differential backup

The operating system is stored ____. A) in RAM when the computer is running B) on the hard disk C) Either A or B D) None of the above

C) Either A or B

Which of the following utilizes a computer technology that allows physicians to use handheld or personal computer devices to access drug and formularies and transmit prescriptions to a printer or local pharmacy? A) Computerized Provider Order Entry B) Decision Support System C) Electronic Prescribing D) Personal Health Record

C) Electronic Prescribing

A logic error that executes code repetitively and limitlessly? A) Pre-test loop B) Post-test loop C) Endless loop D) Continuous

C) Endless loop

Another name for unconditional branching is ____________. A) endless loop B) Spaghetti C) GoTo D) Blind branching

C) GoTo

Which is NOT a characteristic of the HITECH Act? A) HITECH Act initially rewards institutions for switching to EHRs. B) Starting in 2015, HITECH imposes penalties for noncompliance. C) HITECH helps narrow the initial field of vendors.

C) HITECH helps narrow the initial field of vendors.

Which is NOT a characteristic of the HITECH Act? A) HITECH Act initially rewards institutions for switching to EHRs. B) Starting in 2015, HITECH imposes penalties for noncompliance. C) HITECH helps narrow the initial field of vendors.

C) HITECH helps narrow the initial field of vendors.

A browser uses ____ to communicate with Web servers. A) TCP/IP B) HTML C) HTTP D) coding

C) HTTP

One way to improve data security is to require that all Web access of health records be done via ________. A) HTTP B) XML C) HTTPS D) FTP

C) HTTPS

The _______ is a centralized resource staffed by IT professionals who provide user support. A) Systems maintenance B) User trainers C) Help desk D) Database

C) Help desk

You receive an e-mail with the subject line "Win a prize by forwarding this email" and you decide not to forward this to your friends and family. You took this course of action because it was a(n) ____? A) Virus B) Phishing C) Hoax D) Trojan

C) Hoax

The Domain Naming System maps a(n) ____ to a domain name. A) Web site name B) TCP address C) IP address D) root server

C) IP address

Attributes that functionally determine other attributes are called . . . A) Non-unique identifiers B) Multi-valued identifiers C) Identifiers D) Unique identifiers

C) Identifiers

Which is NOT a goal of the American Recovery and Reinvestment Act? A) Improve communication between healthcare providers B) Improve reporting of immunizations to public health agencies C) Improve access to healthcare in rural areas D) Improve decisions made regarding patient care

C) Improve access to healthcare in rural areas

Which of the following is a translation process that translates and executes one statement at a time? A) Sequential B) Compiler C) Interpreter D) Structured execution

C) Interpreter

What is NOT a true statement regarding the CCHIT? A) CCHIT stands for Certification Commission for Health Information Technology. B) CCHIT has partnered with the US Department of Health and Human Resources. C) It is a government regulatory agency. D) It is becoming increasingly relevant in the EHR arena.

C) It is a government regulatory agency.

What is NOT a true statement regarding the CCHIT? A) CCHIT stands for Certification Commission for Health Information Technology. B) CCHIT has partnered with the US Department of Health and Human Resources. C) It is a government regulatory agency. D) It is becoming increasingly relevant in the EHR arena.

C) It is a government regulatory agency.

Which statement is true of the point-to-point interface method? A) It is a newer, less traditional method. B) Data is routed through a centralized location. C) Its direct linkages can provide secure transmission. D) Both B and C

C) Its direct linkages can provide secure transmission.

What does it mean when a Web site is at the top of a search results list? A) Web crawler HTTP results best match Boolean operators used. B) The top site paid Google the least amount of money for that ranking. C) Keywords on that site best matched the search terms used. D) Either A or C

C) Keywords on that site best matched the search terms used.

Which of the following programming languages was developed specifically for health care applications? A) Java B) C++ C) MUMPS D) Python

C) MUMPS

A wired network connection requires the use of: A) NIC, WAP, switch, router. B) Wireless NIC, WAP, router C) NIC, copper cabling, switch, router D) NIC, WAP, switch.

C) NIC, copper cabling, switch, router

A wired network connection requires the use of: A) NIC, WAP, switch, router. B) Wireless NIC, WAP, router C) NIC, copper cabling, switch, router. D) NIC, WAP, switch.

C) NIC, copper cabling, switch, router.

The half-life of software has the most effect on what phase of a program's life cycle. A) Design B) Implementation C) Obsolescence D) Maintenance

C) Obsolescence

Your own medical information may be stored using a A) USB B) WAN C) PHR D) KVM

C) PHR

Which of the following is NOT a form of software that is free? A) Public Domain B) Open Source C) Packaged D) Freeware

C) Packaged

_________ determines how long it will take for the project to pay for itself. A) Return on investment B) Present value analysis C) Payback analysis D) Benefit analysis

C) Payback analysis

A friend asks you how she can access and control her medical information electronically. Which of the electronic information systems listed below would you direct her to? A) Electronic Health Record B) Electronic Medical Record C) Personal Health Record D) Pharmacy Health Record

C) Personal Health Record

You receive an e-mail without an attachment. The e-mail subject line reads "Bank login required as soon as possible". What type of e-mail did you receive? A) Trojan B) Virus C) Phishing D) Adware

C) Phishing

A(n) ____ jack is used to connect a network cable to a network interface card. A) RJ-11 B) 802.11N C) RJ-45 D) Either A or C

C) RJ-45

In order to realize all the benefits of electronic health records, which of the following represents a common medical language that allows data to be shared? A) Classification B) Terminology C) Requires both classifications and terminologies D) Requires neither classification or terminology

C) Requires both classifications and terminologies

How does a search engine provide you with a result set? A) Web crawler searches Web pages to create a result set. B) Database query to search each Internet Web site. C) Searches its indexed data based on your search criteria. D) None of the above.

C) Searches its indexed data based on your search criteria.

Disks are formatted into _____, which make up tracks. A) Heads B) Arms C) Sectors D) Addresses

C) Sectors

Windows Server 2008 is an example of _______. A) A machine-based or independent Operating system B) Mobile-based or embedded operating system C) Server-based operating system D) Personal efficiency software

C) Server-based operating system

Natural keys have the advantage over surrogate keys of which of the following? A) They are short and almost always numeric. B) They introduce a transitive dependency. C) They are more likely to be known to the user or to the patient/customer. D) Their value is automatic and do not require data entry.

C) They are more likely to be known to the user or to the patient/customer.

What is a disadvantage to building your own in-house software solution? A) Fewer software "bugs" incurred B) Shorter development time C) Training must be developed in house D) A and B

C) Training must be developed in house

What is a disadvantage to building your own in-house software solution? A) Fewer software "bugs" incurred B) Shorter development time C) Training must be developed in house D) A and B

C) Training must be developed in house

What is an appropriate length of time for staff education and training before system implementation? A) Two hours B) Two days C) Two weeks D) Two months E) Two years

C) Two weeks

Which of the following is a design tool used to design objects? A) pseudocode B) Warnier/Orr C) UML D) Flowcharting

C) UML

You live in an area that experiences one minute power outages due to thunderstorms. What type of device should you install so that your computer does not lose power when this occurs? A) Surge protector B) Wireless protector C) UPS D) All of the above

C) UPS

You live in an area that experiences one minute power outages due to thunderstorms. What type of device should you install so that your computer does not lose power when this occurs? A) Surge protector B) Wireless protector C) UPS D) All of the above.

C) UPS

A structured programming language statement could possibly be used for all but which of the following ? A) Statements that define variables, constants, and files B) Statements that execute code repetitively C) Unconditionally branch to another statement D) Statements that assign values to variables

C) Unconditionally branch to another statement

_________ diagrams describe what a system does. A) Activity B) State machine C) Use case D) Component

C) Use case

The most important source of specifications for database development is obtained from which of the following? A) Forms and reports B) Existing files C) Users D) Customers

C) Users

_________ is a way that OS give the illusion of a large memory. A) Physical memory B) Permanent memory C) Virtual memory D) RAM

C) Virtual memory

Search engines search ____ using a proprietary algorithm. A) Web directories B) URLs C) Web pages D) root servers

C) Web pages

Which condition is a result of an infection in the urinary bladder by a bacteria, E. coli? A) interstitial cystitis B) chronic cystitis C) acute cystitis D) urinary incontinence

C) acute cystitis

Which data type is used more often in programming for A-Z? A) numeric B) literal C) alphanumeric D) alphabetic

C) alphanumeric

To create a business letter you would most likely use _______. A) an operating system B) application software for a Specific purpose C) application software for Personal efficiency

C) application software for Personal efficiency

Constraints ensure that____________. A) attributes are related. B) attributes can be considered candidate keys C) attribute values follow rules D) user access to the database is limited

C) attribute values follow rules

The tiny air sacs which allow oxygen to pass through them to eventually be transported to the body are: A) bronchi B) bronchioles C) aveoli D) nares

C) aveoli

The inflammation of the skin covering the head of the penis is: A) prostatitis B) benigh prostatic hypertrophy C) balanitis D) gonorrhea

C) balanitis

The hollow organ in the lower abdomen that stores urine is: A) urethra B) ureters C) bladder D) kidney

C) bladder

What organ is contained in the cranial cavity? A) spinal cord B) heart C) brain D) stomach

C) brain

The motherboard is made up of circuitry and thousands of copper wires known as ____. A) binary code B) RAM C) buses D) Chips

C) buses

"Order By" is which of the following? A) type of statement B) function C) clause D) transaction processing statement

C) clause

"Order By" is which of the following? A) type of statement B) function C) clause D) transaction processing statement

C) clause

Installing ____ updates is important to securing your operating system from attack. A) optional B) crucial C) critical D) recommended

C) critical

. In Object Oriented Programming, __________ and ___________ are stored together. A) integers, floating point numbers B) functions, procedures C) data, methods D) objects, classes

C) data, methods

In the final design which element of the ER-diagram becomes a table? A) attribute B) relationship C) entity D) domain

C) entity

Which term means high blood pressure? A) hypermanometer B) hypotension C) hypertension D) supratension

C) hypertension

Crohn's disease often affects the: A) stomach B) duodenum C) ileum D) common bile duct

C) ileum

A Trojan horse usually ________. A) installs itself on a computer and immediately begins making copies of itself B) destroys data and never installs software C) impersonates a known good file installed on the system by deleting the good file D) attacks Microsoft Office documents

C) impersonates a known good file installed on the system by deleting the good file

The sensory organs used in hearing are found in which part of the ear? A) outer ear B) middle ear C) inner ear D) outer and inner ear

C) inner ear

The _________ data type in Java is used for storing whole numbers. A) float B) char C) int D) boolean

C) int

Which term means pertaining to between the atria? A) intratrial B) interarterial C) interatrial D) transatrial

C) interatrial

Which term means pertaining to within the skin? A) epidermal B)hypodermal C) intradermal D) interdermal

C) intradermal

In a recursive relationship an entity has a relationship with which of the following? A) another entity B) a domain of an attribute C) itself D) multiple relationships with another entity

C) itself

Constraints are which of the following? A) ways of making sure that attributes are related. B) making sure that attributes can be considered candidate keys C) making sure that attribute values follow rules D) limiting user access to the database

C) making sure that attribute values follow rules

A thorough testing phase will catch ___________. A) all errors B) about half of possible errors C) most common, but not all possible errors D) all logic errors

C) most common, but not all possible errors

In Windows peer-to-peer networking, a workgroup is simply a _____. A) domain name B) server concept C) name for the network D) protocol

C) name for the network

In Windows peer-to-peer networking, a workgroup is simply a _____. A) domain name B) server concept C) name for the network D) protocol

C) name for the network

Privacy is to ____ as confidentiality is to ____. A) medical, online B) data, people C) people, data D) None of the above

C) people, data

You receive an email that appears to be from eBay asking you to login to verify a transaction. This is an example of a(n) _______attack. A) worm B) virus C) phishing D) buyware

C) phishing

Which of the following endocrine glands is known as the "master gland"? A) adrenal B) thyroid C) pituitary D) pancreas

C) pituitary

Macroglossia means large tongue. In this word, macro is a: A) suffix. B) word root. C) prefix. D) combining form.

C) prefix.

The inability of the eyes to focus close up as a result of the aging process is known as: A) myopia B) hyperopia C) presbyopia D) astigmatism

C) presbyopia

Data that cannot be derived is called ________ data. A) variable B) secondary C) primary D) passed

C) primary

Which medical term means inflammation of the rectum and anus? A) anitis B) sigmoiditis C) proctitis D) rectitis

C) proctitis

An authenticated object is an object that ________. A) is able to print a document B) in a directory C) proved its identity D) can delete a file in a folder

C) proved its identity

Health information is stored as a(n) ________ in an EHR. A) folder B) table C) record D) entity

C) record

SQL commonly produces or projects which of the following? A) one logical record B) users of the system C) record sets D) one attribute

C) record sets

SQL commonly produces or projects which of the following? A) one logical record B) users of the system C) record sets D) one attribute

C) record sets

Feces are stored in the ______ prior to defecation. A) sigmoid colon B) anus C) rectum D) cecum

C) rectum

An Applet is an example of a _______ language. A) binary B) legacy C) scripting D) object oriented

C) scripting

Health Language 7 (HL7) is an information model that is used to help systems A) speed processing time. B) print system screens. C) share information between information systems. D) translate English into other languages

C) share information between information systems

In three factor authentication, an oject must present _______ to be authenticated. A) something it knows and at least one other authentication factor item B) a username and password C) something it knows, something it has, and something it is D) either A or B

C) something it knows, something it has, and something it is

The term for above the kidney is: A) intrarenal B) pararenal C) suprarenal D) infrarenal

C) suprarenal

A(n) _____ protects a device from spikes in power usually originating with the power company. A) USPS B) switch C) surge protector D) Either A or B

C) surge protector

A(n) _____ protects a device from spikes in power usually originating with the power company. A) USPS B) switch C) surge protector D) Either A or B

C) surge protector

Pseudocode is an example of a(n) ____________ design tool. A) sequential B) object C) text-based D) graphical

C) text-based

The Internet began because ____. A) people realized the business potential of having a global communication system B) scientists needed to be able to share secrets securely C) the U. S. government wanted to be able to communicate, even in the event of a nuclear attack D) Stanford researchers sold the design to ICANN, who began selling IP addresses to ISPs.

C) the U. S. government wanted to be able to communicate, even in the event of a nuclear attack

In wireless networking, a WAP's SSID represents _________. A) the router's name B) the WPA preshared key C) the name of the wireless network D) none of the above

C) the name of the wireless network

Which type of burn damages the deepest layers of the skin and tissues underneath it? A) first degree B) second degree C) third degree D) fourth degree

C) third degree

Encryption is a process whereby communication is made unreadable to _________. A) everyone B) authorized viewers C) unauthorized viewers D) none of the above

C) unauthorized viewers

What database term involves connecting two or more tables together when a user needs data from more than one table in the database? A) Sweeping B) Conduit C) Concatenation D) Relationship

D)

Select a valid IP address and subnet mask from below: A) 192.168.0 and 255.255.255.0 B) 10.10.10.1 and 255.255.255.224 C) 10.10.10.1 and 255.255.256.0 D) 192.168.0.1 and 255.255.280.0

D) 192.168.0.1 and 255.255.280.0

Roughly how much storage does a chest x-ray require? A) 35 megabits B) 20 megabits C) 30 megabytes D) 20 megabytes

D) 20 megabytes

The U.S. Government would like to implement electronic health records for most Americans by the year ______. A) 2030 B) 2016 C) 2020 D) 2014

D) 2014

Which are advantages to using COTS software? A) Development costs are typically lower B) Integrates best with your present IT system components C) Easier learning curve for users and administrators D) A and C

D) A and C

Which are advantages to using COTS software? A) Development costs are typicaly lower B) Integrates best with your present IT system components C) Easier learning curve for users and administrators D) A and C

D) A and C

All of the following should be considered in selection of the pilot group EXCEPT: A) Advice of the steering committee. B) Representativeness of a cross-section of the user community. C) Readiness for the technology. D) Age.

D) Age.

Systems Implementation includes A) Application development B) Testing C) Training D) All of the above

D) All of the above

What is the goal of an information system? A) Improve business knowledge B) Improve business processes and services C) Improve business communications and people collaboration D) All of the above

D) All of the above

Which are stakeholders that could be external service providers? A) Systems analysts B) Systems designers C) Consultants D) All of the above

D) All of the above

You are asked to select the type of type of computer network that best suits your organizational needs. What factors should you take consideration when making this choice? A) Purpose of system, type of hardware, type of organization B) Budget, type of information sytem, purpose of system C) End user work flow, purpose of system, available infrastructure D) All of the above

D) All of the above

This support team member is expert in EHR applications and is able to troubleshoot difficult issues: A) Super user B) Help desk analyst C) Production support consultant D) Application support specialist

D) Application support specialist

_________________ are simple data structures that store multiple pieces of data together. A) Variables B) Loops C) Expressions D) Arrays

D) Arrays

A class can contain which of the following? A) Variables and modules B) A customer's name like "Sam Jones" C) Domains and literals D) Attributes and methods

D) Attributes and methods

Designing the test scenarios is best performed by: A) Less-experienced staff. B) Program experts. C) Workflow experts. D) B and C. E) All of the above.

D) B and C.

_____ is the highest number of bits that can be sent across the media at any one time. A) Mbps B) Throughput C) Goodput D) Bandwidth

D) Bandwidth

_____ is the highest number of bits that can be sent across the media at any one time. A) Mbps B) Throughput C) Goodput D) Bandwidth

D) Bandwidth

A router is a device that ____. A) sends traffic from a private network to the Internet B) sends traffic from the Internet a private network C) is utilized only by home networks D) Both A and B

D) Both A and B

Which are recommended steps for using HL7 as a baseline for your EHR requirements? A) Learn the language: Understand how key words are used within the model. B) Review and select relevant sections relevant to your healthcare setting. C) Understand that no organizational structure exists to the document as it is meant to be loosely interpreted. D) Both A and B.

D) Both A and B.

The project manager's role makes them which of the following? A) The focal point of the project, ensuring the successful completion of project B) The top of a typical hierarchical management role C) Direct responsibility for the activities of all project participants D) Both A and C

D) Both A and C

Which statement is true of an interface engine? A) More separate connectivity points than point-to-point B) More flexible and scalable than point-to-point C) Easier to install and maintain than point-to-point D) Both B and C

D) Both B and C

First normal form of the Normalization process involves which of the following? A) making sure that data within a row when deleted will not eliminate data that will be needed later. B) Making sure that attributes are dependent on the entire primary key and not just part of a composite primary key. C) when a row is inserted into a table, making sure that certain data doesn't disallow the addition because it is not present. D) Columns of data are uniquely named and contain only one piece of data.

D) Columns of data are uniquely named and contain only one piece of data.

A form of a programming logic construct that evaluates more than one conditional test and uses either an AND or an OR operator to connect the conditional tests is called which of the following? A) Nested alternation B) Simple alternation C) Case structure alternation D) Compound alternation

D) Compound alternation

All of the following are included in the Institute of Medicine's definition of public health EXCEPT: A) Prevention of disease B) Promotion of health C) Control of communicable disease D) Curative medical treatment

D) Curative medical treatment

A serial port, also known as a ____ port, can be used to connect to and manage a network device. A) DB-25 B) parallel C) USB to serial D) DB-9

D) DB-9

The purposes of a database include all of the following EXCEPT . . . A) Acquire data. B) Provide internal security. C) Retrieve data on command. D) Data is never repeated.

D) Data is never repeated

The purposes of a database include all of the following EXCEPT . . . A) Acquire data. B) Provide internal security. C) Retrieve data on command. D) Data is never repeated.

D) Data is never repeated.

Which of the following infections is NOT a sexually transmitted disease (STD)? A) Human papillomaviruses B) Gonorrhea C) Trichomoniasis D) Endometriosis

D) Endometriosis

A(n) ________ is a way of organizing files and their data. A) Operating system B) File manager C) BIOS D) File system

D) File system

HIPAA stands for: A) Health Investment Protection and Availability Act B) Health Information Protection and Access Act C) Health Information Portability and Accountability Act D) Health Insurance Portability and Accountability Act E) Health Insurance Prosperity and Access Act

D) Health Insurance Portability and Accountability Act

Home networks usually connect to the Internet through the use of the services provided by a(n) ____. A) ASP B) tier C) national provider D) ISP

D) ISP

Entities in the ER-diagram are object classes in that they are the _____ of something that the user needs to keep track of. A) The actual data values B) Instance C) Actual occurrence D) Idea

D) Idea

Which is NOT an advantage of integrating EHRs? A) Enables hospitals to share patient information. B) Enables providers to meet the HITECH "meaningful use" criteria. C) Enhances billing/payment and reform initiatives. D) Improves security and privacy of patient data. E) Streamlines workflows between hospitals and clinics.

D) Improves security and privacy of patient data.

What is NOT something typically found in a RFP? A) System Implementation plan B) Proposed costs C) Shorter development time D) Institution's financial statement

D) Institution's financial statement

HTTP is a(n) ____. A) Web page programming language B) Web page C) IP addressing scheme D) Internet protocol used to communicate with Web servers

D) Internet protocol used to communicate with Web servers

A programming logic construct that potentially executes code multiple times and contains a clear conditional test that terminates the execution is __________. A) Selection B) Concurrency C) Alternation D) Iteration

D) Iteration

The term used for the process of getting data out of more than one table is which of the following? A) Group By B) And or Or C) Distinct D) Join

D) Join

The term used for the process of getting data out of more than one table is which of the following? A) Group By B) And or Or C) Distinct D) Join

D) Join

_________ describes a common user interface. A) TCP B) USB C) PHR D) KVM

D) KVM

Assembler is a _______ language. A) binary B) legacy C) scripting D) Low-level

D) Low-level

The _____ is used by switches for intranet communications and has no meaning outside of that local network. A) IP address B) subnet mask C) HTTP protocol D) MAC address

D) MAC address

The _____ is used by switches for intranet communications and has no meaning outside of that local network. A) IP address B) subnet mask C) HTTP protocol D) MAC address

D) MAC address

What is an MRI? A) A nuclear medicine imaging device that produces a 3-D image. B) An x-ray, using specialized equipment, that takes cross-sectional pictures of the body. C) A device that creates an image based on sound waves. D) Magnetic imaging equipment that uses a radio frequency pulse to create an image.

D) Magnetic imaging equipment that uses a radio frequency pulse to create an image.

All of the following influence a person's health EXCEPT: A) Income status B) Violent crime exposure C) Healthcare access D) Marital status

D) Marital status

Macro viruses are usually associated with ____ files. A) Open Office B) PDF C) image D) Microsoft Office

D) Microsoft Office

Which of the following is an input device for a personal computer? A) Speaker B) CPU C) Memory D) Mouse

D) Mouse

Attributes that contain data that repeats are called which of the following? A) Composite B) A repeating domain C) Identifiers D) Multi-valued

D) Multi-valued

Which of the following agencies is responsible for oversight of the HITECH initiatives to promote meaningful use of electronic health records? A) NIH B) OCR C) NLM D) ONC

D) ONC or B) OCR--need to check on this one

The motherboard contains ____ slots, into which device expansion cards are inserted. A) RAM B) SATA C) AGP D) PCI

D) PCI

An example of a one-to-one relationship is which of the following? A) Patient to Doctor B) Nurse to work shift C) Drug to pharmaceutical company D) Patient to Hospital wrist band ID

D) Patient to Hospital wrist band ID

An example of a one-to-one relationship is which of the following? A) Patient to Doctor B) Nurse to work shift C) Drug to pharmaceutical company D) Patient to Hospital wrist band ID

D) Patient to Hospital wrist band ID

The C programming language uses the _____________ programming paradigm. A) Object Oriented B) Functional C) Domain specific D) Procedural

D) Procedural

The success of the implementation and roll-out is most evidenced by the: A) End users. B) Expert analysis. C) Technical staff. D) Professional evaluators

D) Professional evaluators

Which project plan component focuses on rules agreed to by team; e.g., reporting, communication, naming conventions, acceptance criteria? A) Scope B) Quality management C) Constraints D) Project Management

D) Project Management

Which of the following is an example of business software? A) Video games B) Electronic medical records C) Recipe manager D) Project management software

D) Project management software

Algorithms are written using _________________. A) A programming language B) Series of 1's and 0's C) Assembly language D) Pseudocode

D) Pseudocode

What database term involves connecting two or more tables together when a user needs data from more than one table in the database? A) Sweeping B) Conduit C) Concatenation D) Relationship

D) Relationship

What language is used to store and retrieve data from a database? A) UML B) DDLC C) DBMS D) SQL

D) SQL

What language is used to store and retrieve data from a database? A) UML B) DDLC C) DBMS D) SQL

D) SQL

__________ permissions are set so that users have the ability to access files and folders over a network. A) NTFS B) Network C) LAN D) Sharing

D) Sharing

SDLC stands for: A) System Development List Creation B) System Depreciation Lifetime Cost C) Software Depreciation Listed Costs D) Software Development Life Cycle

D) Software Development Life Cycle

When considering object oriented languages what is the best reason to break up code into modules? A) Manageable "chunks" of code B) Subtasks C) Structured design D) Strong cohesive code with loose coupling

D) Strong cohesive code with loose coupling

________ testing focuses on the system as a whole. A) Unit B) Integration C) Module testing D) System

D) System

Which stakeholder bridges the gap between the perspectives of different stakeholders? A) Systems designer B) Systems developer C) Systems owner D) Systems analyst

D) Systems analyst

________ permits virtual access to health care services. A) Social networking B) Twitter C) Location based services D) Telemedicine

D) Telemedicine

Which of the following is NOT true about an operating system? A) It is a set of programs that coordinate all activities of hardware resources. B) It is the layer between the application software and the hardware. C) It is unique to each individual computer hardware system. D) There is only one operating system available for all computers.

D) There is only one operating system available for all computers.

Which of the following is NOT true about the paper medical record? A) Can be easily destroyed B) Can be used for one task at a time C) Allows for duplication of information D) Those accessing can be easily tracked

D) Those accessing can be easily tracked

What technology was used in the first general purpose electronic computers? A) Transistors B) Integrated circuits C) Mechanical gears D) Vacuum tubes

D) Vacuum tubes

You were asked to configure wireless authentication. Which protocol should you select? A) WEP B) NTFS C) WLAN D) WPA2

D) WPA2

The ____ is a collection of interconnected documents and other resources, linked by hyperlinks and URLs. A) ARPANET B) Domain Name System C) Internet D) World Wide Web

D) World Wide Web

What type of immunity results from direct exposure to a pathogen? A) natural immunity B) innate immunity C) passive acquired immunity D) active acquired immunity

D) active acquired immunity

A(n) ____ is a set of instructions set out logically to solve a problem. A) Web crawler B) HTML coded page C) Web page D) algorithm

D) algorithm

Identify the condition that results when the body cannot rid itself of harmful wastes, the blood pressure rises, the body retain excess fluids and does not make enough red cells. A) renal failure B) kidney failure C) end stage renal disease D) all responses are used to describe the condition

D) all responses are used to describe the condition

The character set of A-Z is contained in what data type? A) numeric and alphabetic B) numeric and alphanumeric C) numeric D) alphabetic and alphanumeric

D) alphabetic and alphanumeric

Which procedure examines the inside of a joint? A) arthroplasty B) arthrotomy C) arthrocentesis D) arthroscopy

D) arthroscopy

A(n) ____ is a software program that lets a user use Web server resources over the Internet. A) Web page B) URL C) HTML page D) browser

D) browser

One of the leading causes of mortality is A) Alzheimer's disease. B) accidents. C) chronic lower respiratory diseases. D) cancer

D) cancer

Which term means enlarged heart? A) cardiorrhexis B) cardiostenosis C) cardiosclerosis D) cardiomegaly

D) cardiomegaly

Which term means that the fracture is protruding through an open skin wound? A) simple fracture B) compression fracture C) pathologic fracture D) compound fracture

D) compound fracture

A virus is a _________ that can harm a computer and make it inoperable. A) form of bacteria B) worm C) phishing attack D) computer program

D) computer program

Two processes that are executed at the same time are said to be executed _________. A) in unison B) together C) independently D) concurrently

D) concurrently

Viruses usually ______ on other computers. A) replicate themselves B) perform clean-up operations C) act on a specific date D) do not replicate themselves

D) do not replicate themselves

Software and/or hardware that blocks unauthorized communications on a computer is referred to as a(n) ___________. A) packet sniffer B) switch C) hub D) firewall

D) firewall

Computers in a _____ topology will usually be interconnected via a switch. A) logical B) physical C) router D) full mesh

D) full mesh

Computers in a _____ topology will usually be interconnected via a switch. A) logical B) physical C) router D) full mesh

D) full mesh

Which medical term means stomach pain? A) duodenalgia B) gingivalgia C) enteralgia D) gastralgia

D) gastralgia

Flowcharting is an example of a(n) ____________ design tool. A) sequential B) object C) text-based D) graphical

D) graphical

UML is an example of a(n) ____________ design tool. A) sequential B) object C) text-based D) graphical

D) graphical

Which of the following is a prefix? A) abdomen B) abdomino C) tomy D) hyper

D) hyper

A domain name is a(n) ____ that defines a realm of authority on the Internet, based on the DNS. A) IP address B) Web site C) URL D) identification label

D) identification label

In a super to subtype relationship attributes of the super type are which of the following? A) incompatible with the subtypes B) mirror images of the subtypes C) have identical attributes to the attributes of the subtypes D) inherited by the subtypes

D) inherited by the subtypes

An example of authentication is when a user ______. A) is able to delete a file B) can print a document C) shuts down a computer D) logs into a computer

D) logs into a computer

Variable names are associated with values in ________. A) database B) files C) windows D) memory

D) memory

A _____ operates at Layer 1 of the OSI model. A) router B) switch C) Web protocol D) network cable

D) network cable

A _____ operates at Layer 1 of the OSI model. A) router B) switch C) Web protocol D) network cable

D) network cable

Java is a(n) _______ language. A) binary B) legacy C) scripting D) object oriented

D) object oriented

You request the _______ to bring up your word processor. A) word processing package B) application software for a Specific purpose C) application software for Personal efficiency D) operating system

D) operating system

Select the endocrine gland that has other functions in the body in addition to producing hormones. A) adrenal B) thymus C) pituitary D) ovary

D) ovary

Identify the part of the respiratory system that is NOT included in the lower respiratory tract. A) trachea B) bronchi C) lungs D) pharynx

D) pharynx

The brain's meninges, or protective coverings, include: A) pia mater and dura mater B) arachnoid and pia mater C) dura mater only D) pia mater, arachnoid, and dura mater

D) pia mater, arachoid, and dura mater ("PAD")

Another student informs you that you can download software from an online source to avoid paying for it. This is an example of ____. A) copyright infringement B) plagiarism C) open source software D) pirating intellectual property

D) pirating intellectual property

Widespread aching, pain and inflammation in the muscles closest to the trunk is called: A) carpal tunnel syndrome B) fibromyalgia C) repetitive motion disorder D) polymyositis

D) polymyositis

Select the lung condition associated with a sudden blockage in an artery in the lung that is usually a result of a blood clot forming in the leg that breaks loose and travels through the bloodstream to the lung? A) cystic fibrosis B) pneumonia C) primary pulmonary hypertension D) pulmonary embolism

D) pulmonary embolism

The purpose of providing guidelines to health professionals and hospitals on how to adopt and use electronic health record technology is to improve the A) quality of healthcare delivered. B) safety of patients. C) efficiency of services provided. D) quality, safety, and efficiency of patient care.

D) quality, safety, and efficiency of patient care.

A simple step to secure data from those who do not have permission view it is to ________. A) store the data on a flash drive B) move the data on a corporate Web server C) perform a background check on all employees D) require employees to lock their computers when they leave their desk

D) require employees to lock their computers when they leave their desk

Which is NOT a method in which HIV/AIDS may be spread? A) unprotected sex B) shared needles C) childbirth D) shaking hands

D) shaking hands

The first phase in database development is which of the following? A) data modeling B) testing C) deployment D) specification gathering

D) specification gathering

In the word therm/o/meter, -meter is a(n): A) adjective B) prefix C) combining form D) suffix

D) suffix

SMS is used for A) email B) virtual machine management C) VoIP D) text messaging

D) text messaging

The endocrine gland located behind the sternum that secretes hormones which stimulate the production of cells involved in the immune system is the: A) adrenal B) pancreas C) thyroid D) thymus

D) thymus

One big difference between a virus and a worm is that the virus ____. A) can replicate itself B) is not a Trojan horse C) can ask you to login to your bank account D) usually cannot replicate itself

D) usually cannot replicate itself

When users enter data on Web forms, the data should be ________ before it is saved to the database. A) scrubbed B) committed C) balanced D) validated

D) validated

A computer is: A) A system with a processor, memory, storage, keyboard, mouse and monitor. B) A person who computes. C) An electronic programmable device that inputs, processes and outputs data. D) An electronic device that is embedded in objects and that controls the object based on certain inputs. E) All of the above

E) All of the above

Which statement accurately describes a SDLC model? A) The waterfall model emphasizes sequential development. B) The iterative model emphasizes that the product may need to pass through the same phase multiple times, in a cyclical fashion. C) The spiral model emphasizes prototyping as part of the cyclical process. D) Both B and C E) All of the above (A, B, and C)

E) All of the above (A, B, and C)

The most appropriate training strategy is: A) Classroom-style. B) Web-based. C) One-on-one. D) Train the trainer. E) All of the above.

E) All of the above.

Select all of the following that are examples of communications software. A) Email B) Web browsers C) Blog D) Wiki E) All of them

E) All of them

Which is NOT a common form of security breach? A) Password-based attack B) Identity spoofing C) Application layer attack D) Eavesdropping E) Parasite attack

E) Parasite attack

Select all of the following that are examples of healthcare software. A) EHRs and EMRs B) Health Information Systems C) Imaging D) Statistical software E) a,b,c

E) a,b,c

All computers have a keyboard, mouse, and monitor. True/False

False

Solid state drives are now being used on some laptops because solid state drives have moving parts and generate more heat than traditional hard disk drives. True/False

False

A dishwasher has an embedded computer. True/False

True

Personal computers were first developed in the 1970s. True/False

True

Speakers are an example of a computer output device. True/False

True


Related study sets

Women's Health/Disorders and Childbearing Health Protection

View Set

Chapter 14 DNA: The Genetic Material Assignment

View Set

Chapter 35 - Geriatric Emergencies

View Set

Nursing Care of Pts Having Surgery Med Surg Chapter 12/ #7

View Set

Chapter 6 Visit Charges And Compliant Billing

View Set

Chapter 9 (Advanced Inventory Management)

View Set

1.08 MLA Citation and Documentation

View Set