Informatics Midterm
D. (All of these are correct. (Chapter 4))
Some of the disciplines involved in cognitive science include: A. psychology and philosophy. B. neuroscience and linguistics. C. biology and physics. D. All of these are correct.
True (Chapter 6)
Extended and expanded access to clinical research findings and decision support tools has been significantly influenced by the advent of computerization and the Internet. True False
Knowledge processing
the activity or process of gathering or collecting, perceiving, analyzing, synthesizing, saving or storing, manipulating, conveying, and transmitting knowledge
usability
the ease with which people can use an interface to achieve a particular goal. Issues of human performance during computer interactions for specific tasks within a particular context
Individual, technology, task
three components of fit involved in the FITT model:
Expert system
decision support systems that implement the knowledge of one or more human experts
cognitive informatics
field of study made up of the disciplines of neuroscience, linguistics, artificial intelligence, and psychology. This multidisciplinary study of cognition and information sciences investigates human information-processing mechanisms and processes and their engineering applications in computing
True
Browser privacy settings can control how cookies are used True False
A (interpretation of data. (Chapter 1))
A nurse reviews the electronic health record of a patient and identifies a drug allergy to the medication that has been prescribed. The nurse has demonstrated: A. interpretation of data. B. generation of new knowledge. C. informatics competency. D. dissemination of nursing science.
Clinical decision support
A computer-based program designed to assist clinicians in making clinical decisions by filtering or integrating vast amounts of information and providing suggestions for clinical intervention.
D (proxy server.)
A hardware security tool that helps protect an organization against security breaches by issuing masks to protect the identity of a corporation's employees who are accessing the Internet is a(n): A. antivirus program. B. firewall. C. masking program. D. proxy server.
A. (Close the electronic health record immediately (Chapter 1))
A new nurse is documenting in a patient's electronic health record when a visitor approaches the nurse to ask questions. What should the nurse do to ensure confidentiality and security of the patient's electronic health record? A. Close the electronic health record immediately B. Take the visitor to the nurse's station for assistance. C. Continue documenting the record and answer the visitor's questions. D. None of these is correct.
Wisdom, courage, self-control, justice
4 cardinal virtues according to Plato
C. (reason. (Chapter 4))
A nurse is caring for a patient who experiences a complication after surgery. The nurse understands the cause-and-effect relationship because her knowledge is based in: A. empiricism. B. instinct. C. reason. D. intuition.
A. (A moral (Chapter 5))
A nurse is considering a social convention about right and wrong human conduct that has formed a communal social consensus, known as which of the following? A. A moral B. A bioethic C. A value D. A right
A. (A technologically based translator (Chapter 5))
A nurse is discussing options in the treatment plan with a patient who speaks another language. To enhance interaction and exchange of data and information, the nurse will use which of the following? A. A technologically based translator B. An Internet website on the medical condition C. Another nurse to translate the information D. A family member as a translator
C. (communication with other healthcare providers. (Chapter 6))
A nurse is documenting patient data in the electronic health record, which will assist in: A. learning new nursing skills B. all of the above C. communication with other healthcare providers. D. the communication of patient status updates with the patient's friends
A. ("Cognitive informatics examines how humans interact with computers so better information technology systems can be built." (Chapter 4))
A nurse is explaining how cognitive informatics helps improve information technology in health care. Which statement by the nurse is correct? A. "Cognitive informatics examines how humans interact with computers so better information technology systems can be built." B. "Cognitive informatics looks at how the human brain processes data and information that comes from a computer." C. "Cognitive informatics examines how the human brain is similar to a computer." D. "Cognitive informatics helps build complex computer systems for human use."
D. ("Justice refers to fair, equitable, and appropriate treatment no matter what is owed to a person." (Chapter 5))
A nurse is explaining justice in health care to a nursing student. Which statement is correct? A. "Justice is intentionally imposing risks that are unreasonable and unintentionally but carelessly imposing risks." B. "Justice refers to the individual's freedom from controlling interferences by others and from personal limitations that prevent meaningful choices." C. "Justice refers to actions performed that contribute to the welfare of others." D. "Justice refers to fair, equitable, and appropriate treatment no matter what is owed to a person."
B. ("Nursing informatics integrates nursing science with multiple information and analytical sciences to identify, define, manage, and communicate data, information, knowledge and wisdom in nursing practice." (Chapter 6))
A nurse is explaining nursing informatics to a nursing student. Which statement by the nurse is correct, according to the ANA? A. "Nursing informatics is a combination of computer science and mathematics." B. "Nursing informatics integrates nursing science with multiple information and analytical sciences to identify, define, manage, and communicate data, information, knowledge and wisdom in nursing practice." C. "Nursing science is based in computer engineering and sciences." D. "Nursing informatics involves information science and computer technology."
B. (Heart monitor (Chapter 1))
A nurse is performing a physical assessment on a patient with chest pain. Which of the following is a technology that the nurse would use to obtain objective data on the physical status of the patient? A. Electronic nursing journal B. Heart monitor C. Clinical practice guideline D. Electronic health record
B. (Psychology (Chapter 4))
A nurse is reading literature on cognitive science and understands that this discipline is influenced by which field of science? A. Sociology B. Psychology C. Physiology D. Chemistry
A. (data. (Chapter 6))
A nurse is reviewing the conceptual framework of nursing informatics and understands the first concept in this framework is A. data. B. knowledge. C. decision making. D. information.
A. ("Nurses must use social media cautiously to protect patients' rights." (Chapter 5))
A nurse is teaching a nursing student about the use of social media and health care. Which statement is correct by the nurse? A. "Nurses must use social media cautiously to protect patients' rights." B. "Social media is safe for nurses to use because individuals can restrict access to posts." C. "Nurses can use social media at work as long as they don't post pictures of themselves with patients." D. "Posts on social media can be deleted, so caution in posting is overrated."
C. (gathering information and data. (Chapter 1))
A nurse reviews the patient's electronic health record prior to meeting the patient. The nurse is: A. analyzing knowledge and data. B. acquiring knowledge and wisdom. C. gathering information and data. D. applying knowledge from the basic sciences.
D. (All of these are correct. (Chapter 6))
A nurse's knowledge work includes interpreting or evaluating trends in A. laboratory results. B. symptoms. C. outcomes. D. All of these are correct.
C. (acquiring knowledge. (Chapter 1))
A nursing professional reads a nursing journal article on a new patient care technology. This nursing professional is: A. processing knowledge. B. using feedback. C. acquiring knowledge. D. generating knowledge.
False
A password consisting of the ampersand character (&) and the user's birthdate is strong. True False
B. (encourages the evaluator to examine the fit between each two of the components: user and technology, task and technology, and user and task. (Chapter 11)) (pp.221- proposal of a fit between individuals, tasks, and technology (FITT), the model suggests that each of these factors be considered in designing and evaluating the human-technology interfaces. A notable strength of the FITT model is that it encourages the evaluator to examine the fit between the various pairs of components: user and technology, task and technology, and user and task)
A strength of the FITT model is that it: A. observes the steps users are likely to take to use the interface to accomplish typical tasks. B. encourages the evaluator to examine the fit between each two of the components: user and technology, task and technology, and user and task. C. is the least expensive testing method. D. All of these are correct.
B. (downloads increase vulnerabilities to viruses.)
Acceptable use policies in an organization typically restrict downloads of files by employees because: A. employees may waste work time. B. downloads increase vulnerabilities to viruses. C. downloads interfere with backup and storage of data. D. All of these are correct.
C (something the user has.)
An ID badge is an example of authentication by: A. something the user knows. B. something the user is. C. something the user has. D. All of these are correct.
task analysis
An analytic technique that focuses on how a task must be accomplished, including detailed descriptions of task-related activities, task characteristics and complexity, and the environmental conditions required for a person to perform a given task
D. (insulin pump. (Chapter 6))
An example of an expert system is the: A. non-programmed intravenous pump. B. the electrocardiographic monitor. C. pulse oximeter. D. insulin pump.
D. (All of these are correct.)
An organization's confidentiality policy should clearly define: A. which data are confidential. B. procedures for releasing confidential information. C. procedures to follow if confidential information is accidentally released without authorization. D. All of these are correct.
True (Chapter 4)
Artificial intelligence is the field that deals with the conception, development, and implementation of informatics tools based on intelligent technologies. This field attempts to capture the complex processes of human thought and intelligence. True False
B (walking away from a workstation without logging off.)
Behaviors leading to unintentional data breaches include: A. safeguarding an input device. B. walking away from a workstation without logging off. C. using numeral characters in passwords. D. All of these are correct.
True (Chapter 8)
Chronic diseases are of major concern to the United States, not only because of the impact they have on individuals, but also because of the tremendous cost associated with providing treatment for patients with these conditions. Adult-onset diabetes, for example, has reached epidemic proportions. A national health information technology infrastructure will help providers better identify those patients who are at risk for developing this disease and provide treatment strategies to avoid it. True False
D. (All of these are correct. (Chapter 4))
Clinical decision support systems help users to: A. consider consequences of alternative actions. B. provide stores of information. C. make decisions in unfamiliar circumstances. D. All of these are correct.
True (Chapter 11)
Cognitive task analysis usually starts by identifying, through interviews or questionnaires, the particular task and its typicality and frequency. True False
C. (human mental workload. (Chapter 4))
Considering principles of cognitive informatics when designing technology interfaces helps to mitigate: A. information processing. B. use of resources. C. human mental workload. D. None of these is correct.
False (Chapter 11)
Current telehealth technologies are focused on clinicians being able to see patients and not interact with them since audio and streaming video capabilities are costly. True False
True (Chapter 5)
Ethical dilemmas arise when issues raise questions that cannot be answered with a simple, clearly defined rule, fact, or authoritative view. True False
D. (a process of systematically examining varying viewpoints related to moral questions of right and wrong. (Chapter 5))
Ethics is best described as: A. paradigmatic changes that involve rhythmic processes central to the healthcare system. B. a revolution in health care brought on by technologic change. C. ever-changing principles that guide decision making. D. a process of systematically examining varying viewpoints related to moral questions of right and wrong.
True (Chapter 1)
Every nurse must commit to lifelong learning and the use of knowledge in practice in order to be successful. True False
A. (data and information. (Chapter 4))
Experts in computer science strive to understand how the mind processes: A. data and information. B. knowledge. C. sensory input. D. None of these is correct.
D. (All of these are correct. (Chapter 8))
HIPAA was enacted by the federal government for several purposes, including: A. better portability of health insurance as a worker moved from one job to another. B. deterrence of fraud, abuse, and waste within the healthcare delivery system. C. simplification of the administrative functions associated with the delivery of health care, such as reimbursement claims sent to Medicare and Medicaid. D. All of these are correct.
B. (Security of PHI (Chapter 8))
Healthcare organizations typically do not encourage use of personal devices for professional matters, and in many instances they actually have policies in place forbidding employees from using personal devices in the workplace. What is an issue or are issues with "bring your own device" (BYOD)? A. Validity B. Security of PHI C. Portability D. All of these are correct.
B. (Greater than $2 trillion (Chapter 8))
How much is spent on health care in the United States per year? A. Greater than $1 billion B. Greater than $2 trillion C. Less than $2 billion D. Less than $1 trillion
True (Chapter 11)
Human-technology interface problems are a major cause of patient monitoring incidents. It is not always that the technology itself is faulty. In fact, the technology may perform flawlessly, but the interface design may cause human error. True False
B. (it provides continuity of care between care providers and identifies trends. (Chapter 6))
It is important to use standardized terminologies in nursing practice, because: A. data cannot be shared between clinicians. B. it provides continuity of care between care providers and identifies trends. C. it encourages free text documentation by clinicians. D. All of these are correct.
False
It is safe to open an email attachment from a known sender True False
A. (a breach (Chapter 8))
It is termed __________if a nurse knows that a colleague has accessed or attempted to access the record of a patient for whom the colleague is not providing care. A. a breach B. an infringement C. negligent behavior D. a violation
Wisdom
Knowledge applied in a practical way or translated into actions; the use of knowledge and experience to heighten common sense and insight so as to exercise sound judgement in practical matters. Sometimes thought of as the highest form of common sense, resulting from accumulated knowledge or erudition or enlightenment. It is the ability to apply valuable and viable knowledge, experience, understanding, and insight while being prudent and sensible. it is focused on our own minds; it is the synthesis of our experience, insight, understanding, and knowledge. It is the appropriate use of knowledge to solve human problems. it is knowing when and how to apply knowledge
True (Chapter 4)
Knowledge can be defined as the awareness and understanding of a set of information. True False
D. (privacy and confidentiality. (Chapter 5))
New technologies used in health care, such as smartphones and Google Glass, create potential ethical issues associated with: A. cognitive load. B. the human technology interface. C. interoperability. D. privacy and confidentiality.
C. (leaves a digital footprint.)
Organizations are able to monitor who is using the organizational network and what files that user has accessed, because any use of an electronic network: A. constitutes fair use. B. protects against spam. C. leaves a digital footprint. D. All of these are correct.
A. (Ability to share knowledge (Chapter 6))
Paper documentation (paper record) hinders which of the following? A. Ability to share knowledge B. Ability to apply research to patient care C. Ability to use nursing terminology D. Ability to care for patients
B. (information (Chapter 6))
Processing in Nursing Informatics will assist in the transformation of data into ______________, and _____________ into knowledge. A. healthcare B. information C. research D. wisdom
C. (thin clients.)
Some organizations provide offsite employees such as homecare nurses with a network interface device that does not have secure information stored on it. These devices are also known as: A. secure devices. B. networking facilitators. C. thin clients. D. All of these are correct.
D. (assess preferences for a number of design characteristics such as display color, menu buttons, text, photo size, icon metaphor, and layout by selecting, on a computer screen, their preferences for each item from two or three options. (Chapter 11))
Surveys of potential or actual users of a website can be conducted to: A. reveal problems with the decision rules used to tailor content to users. B. encourage the evaluator to examine the fit between each two of the components: user and technology, task and technology, and user and task. C. observe the steps users are likely to take to use the interface to accomplish typical tasks. D. assess preferences for a number of design characteristics such as display color, menu buttons, text, photo size, icon metaphor, and layout by selecting, on a computer screen, their preferences for each item from two or three options.
D. (All of these are correct. (Chapter 11))
Task analysis involves: A. inputs needed for the task. B. how a task must be accomplished. C. constraints on actors' choices on carrying out the task. D. All of these are correct.
True (Chapter 8)
The HIPAA privacy requirements, which went into effect on April 14, 2003, limited the release of protected health information without the patient's knowledge and consent. True False
Knowledge
The awareness and understanding of a set of information and ways that information can be made useful to support a specific task or arrive at a decision; abounds with others' thoughts and information. Information that is synthesized so that relationships are identified and formalized. Understanding that comes through a process of interaction or experience with the world around us. Information that has judgement applied to it or meaning extracted from it. Processed information that helps to clarify or explain some portion of our environment or world that we can use as a basis for action or upon which we can act. Internal process of thinking or cognition. External process of testing, senses, observation, and interacting
True (Chapter 11)
The human interfaces for each of the various technologies are different and can even differ among different brands or versions of the same device. True False
C (reach a rational justifiable decision. (Chapter 5))
The main goal of any ethical decision is to A. promote trust. B. generate knowledge. C. reach a rational justifiable decision. D. promote professionalism.
A. (looking up a colleague's diagnosis and laboratory results. (Chapter 1))
The nurse violates a patient's confidentiality and right to privacy by: A. looking up a colleague's diagnosis and laboratory results. B. providing bedside report containing patient information to the oncoming nurse. C. discussing care-related information with the patient's respiratory therapist. D. discussing a patient's diagnosis with an authorized family member.
True (Chapter 8)
The popularity of social and mobile networking applications is one indication of how new Web-based technologies are changing communication preferences. True False
C (electronic health record (Chapter 8))
The prevalence of healthcare-associated infections demonstrates how the _______ can address healthcare quality issues. A. paper-based chart B. All of these are correct. C. electronic health record D. local database
B. (clinical decision support tools. (Chapter 4))
Understanding of clinical practice decision making using cognitive science principles promotes the development of: A. administrative processing systems. B. clinical decision support tools. C. knowledge warehouses. D. All of these are correct.
B. (allows professionals to communicate more effectively and frequently with in-home patients. (Chapter 11))
Videoconferencing technology: A. is very easy to use. B. allows professionals to communicate more effectively and frequently with in-home patients. C. must be used for telehealth. D. All of these are correct.
workarounds
Ways invented by users to bypass the system to accomplish a task; usually indicate a poor fit of the system or technology to the workflow or the user. Devised methods to beat a system that does not function appropriately or is not suited to the task it was developed to assist with. For example, a nurse might remove the armband for the patient and attach it to the bed if the bar code reader fails to interpret bar codes when the bracelet curves tightly around a small arm
C. (wisdom, courage, self-control, and justice (Chapter 5))
What are the 4 cardinal virtues according to Plato? A. imagination, courage, self-control, and justice B. wisdom, courage, self-control, and revenge C. wisdom, courage, self-control, and justice D. wisdom, independence, self-control, and justice
D. (Hardware and software that support humans interacting with technology (Chapter 11))
What is the human-technology interface? A. Educating users on the use of the system B. Hardware designed to facilitate its software C. Software being designed to make technology work faster D. Hardware and software that support humans interacting with technology
A. (Gramm-Leach-Bliley Act (GLBA) (Chapter 8))
What is the name of the federal legislation in the United States to control how financial institutions handle the private information they collect from individuals? A. Gramm-Leach-Bliley Act (GLBA) B. Sarbanes-Oxley (SOX) Act C. HL7 D. All of these are correct.
A. (feedback. (Chapter 1))
When a nurse uses information from other sources to help rethink, revise, and apply knowledge to a clinical situation, this information is known as: A. feedback. B. knowledge processing. C. knowledge engineering. D. None of these is correct.
D. (All of these (Chapter 1))
Which of the following activities is/are used to build a foundation of knowledge in professional practice? A. Reading research and theory articles B. Attending continuing education programs C. Consulting with expert colleagues and using clinical practice guidelines D. All of these
D. (To foster interdisciplinary collaboration and communication in a healthcare organization (Chapter 1))
Which of the following best describes the central goal of nursing informatics? A. To increase efficiency of care delivery and help to manage costs B. To manage and communicate data, information, knowledge, and wisdom in the delivery of nursing care C. To promote patient safety and prevent falls by assigning a fall risk number to hospitalized patients D. To foster interdisciplinary collaboration and communication in a healthcare organization
A. (Wisdom (Chapter 6))
Which of the following can be described as the appropriate use of knowledge to manage and solve human problems? A. Wisdom B. Information C. Research D. Transformation
C. (Protected health information (Chapter 8))
Which of the following terms is defined as any physical or mental health information created, received, or stored by a "covered entity" that can be used to identify an individual patient, regardless of the form of the health information. A. Provider health information B. Patient health information C. Protected health information D. All of these are correct.
B. (Nonmaleficence (Chapter 5))
Which of the following terms matches this definition: "Do no harm, or an obligation not to inflict harm intentionally" A. Confidentiality B. Nonmaleficence C. Privacy D. ethical decision making
C. (Usability (Chapter 11))
________ is the term that denotes the ease with which people can use an interface to achieve a particular goal A. Workaround B. Situational awareness C. Usability D. All of these are correct.
protected health information
any and all information about a person's health that is tied to any type of personal identification
Feedback
input in the form of opinions about or reactions to something such as shared knowledge. In an information system, this refers to information from the system that is used to make modifications in the input, processing actions, or outputs
cognitive science
interdisciplinary field that studies the mind, intelligence, and behavior from an information processing perspective
situational awareness
the ability to detect, integrate, and understand critical information that leads to an overall understanding of a problem or situation.