MRT 114- Final Exam Study
What is an information system
A collection of related components that interact, the integration of several elements in a business process to effect a specific outcome, a process that refines raw facts (all of the above)
Which of the following systems is designed primarily to support patient care by providing healthcare professionals access to timely, complete, and relevant information for patient care purposes?
Clinical information system
Which IS is designed to provide diagnostic and other expert advice to clinicians from various resources?
Clinical information systems
I am looking to purchase a system that will be used by the physicians to order medications, tests, and other treatment. This system must use alerts and reminders. I must be looking to purchase what type of system?
Clinical provider order entry
The LAST_NAME column of the patients table is considered a
Column
The concept of systems integration refers to the healthcare organization's ability to:
Combine information from any system within the organization
The concept of systems integration refers to the healthcare organization's ability to
Combine information from any system within the organization.
The average length of stay for Hospital A is 4.3 and for Hospital B is 5.1. This is an example of what type of information?
Comparative information
Degree to which the codes capture all the diagnoses and procedures documented in the patients record is called _________________________ since it supports the strength of our conclusions and is the best available approximation of the correct codes
Completeness
The primary reason that healthcare organizations develop business continuity plans is to minimize the effects of:
Computer shutdowns during natural disasters
The act of limiting disclosure of private matters is a definition of:
Confidentiality
Two coders have found the same abbreviations on two records. "O.D" for right eye and "O.D" for overdose. What data quality is lacking here
Consistency
A health information exchange organization that compiles data into one central store of data is called:
Consolidated
Which of the following techniques should be used to determine what information access privileges an employee should have?
Context-based, Role-based, User-based (Any of the above)
Which of the following describes the content of information that should be exchanged among referring providers?
Continuity of care record
Natural language processing:
Converts narrative information to structured data
Identification, authentication, and certification are standards that:
Cover the use of personal ID numbers that restrict the use to a system
Which of the following is true regarding HIPAA security provisions?
Covered entities must establish a contingency management plan.
I am looking for a method of data security. Which of the following would be one choice?
Cryptography
Standards from which organization are used for enabling exchange of clinical images
DICOM
Standards from which organization would be used for enabling exchange of clinical images?
DICOM
HIM supervisor provides statistical report. It shows discharged of many newborns but there are only 10 bassinettes. What characteristic of data quality is applicable?
Data accuracy
Which of the following is not an element of data quality
Data backup
When you were abstracting charts into your UHDDS database you were not using the entire medical record- data quality breached:
Data completeness
Suppose the admitting form of Mrs. Smith's health record indicated that her birth date was 3/21/48. On the discharge summary it was recorded as 7/21/48. Which quality element is missing from the record?
Data consistency
Which of the following describes the step during implementation when data from an old system are able to be incorporated into the new system?
Data conversion
Suppose Dr. Jones entered a progress note in a patients health record 24 hours after he visited the patient. What quality element would be missing?
Data currency
Which of the following terms means that data should be complete, accurate, and consistent
Data integrity
I am looking to purchase an information system that identifies patterns in data. What system should I purchase
Data mining
Which of the following is required by HIPAA standards?
Data must be encrypted when deemed appropriate from the results of a risk assessment.
You were directed to add an additional field to your database. To be sure you entered it in the appropriate range you used a validation rule- this rule helped you with what data quality
Data precision
As an HIM professional, I am involved in data collection, developing the data dictionary and building edits. What role do I have?
Data quality
Ensuring accurate and timely data entry is:
Data quality
The term used to describe the accurate and timely data entry is
Data quality
The protection measures and tools for safeguarding information and information systems is a definition of
Data security
"System build" is the process where
Data tables are loaded and screen layouts customized
You look at database and compare to data dictionary. You realize the disposition was based on the admitting clerk's projection rather than nurses statement at discharge. Data quality breached was
Data validity
A _________________ is a copy of transaction data specifically structured for querying, analysis, reporting, and more rigorous data mining
Data warehouse
A subject oriented collection of data in support of management's decision making process
Data warehouse
Which of the following is a snap shot in time and consolidates data from multiple sources to enhance decision making?
Data warehouse
Which of the following provides organizations with the ability to access data from multiple databases and to combine the results into a single questions-and-reporting interface?
Data warehouse
An information system consists of:
Data, people, process (all of the above)
Which of the following can be described as an organized collection of data saved in a file on a computer?
Database
Chart conversion includes
Deciding what paper-based content should be automated
An information system that alerts a physician when a laboratory value is outside of the normal range is called a(n):
Decision support system
Dr. J ordered lab tests for patient - doctor adds three new meds and computer reminds him that interactions can occur. This is an example of
Decision support system
If a judge asks a record custodian to attest to the permanence of an EHR, the custodian should
Describe contingency plans
The phase of the systems development life cycle that defines how the system will work is
Design
A dietary department donated its old microcomputer to a school. Some old patient data were still on the microcomputer. What controls would have minimized this security breach?
Device and media controls
The most common approaches to converting from an old information system to a new one are the parallel approach, the phased approach, and ____ approach
Direct cutover
The ability for a computer to evaluate narrative speech and structure it given sophisticated rules for addressing context is:
Discrete reportable transcription
Which of the following may be managed in an electronic document management system (EDMS)?
Document images, E-mail, PACS (All of the above)
Which of the following may be managed in an electronic document management system (EDMS
Document images, e-mail, PACS (All of the above)
Which of the following forms of clinical decision support is most likely to be included in a basic EHR system?
Drug-drug contraindication checking
Major problem with the MPI is
Duplicate record numbers
A coding analyst consistently enters the wrong patient gender while entering data in the billing system. What security measures should be in place to minimize this security breach
Edit checks
Which technology would allow a hospital to get as much medical record information online as quickly as possible?
Electronic Document management system
Which of the following is a transition strategy to achieve an EHR
Electronic document management system
Which of the following is a transition strategy to achieve an EHR?
Electronic document management system
Electronic systems used by nurses and physicians to document assessments and findings are called
Electronic point-of-care charting
As an HIM professional, I am involved in screen design and system functionality. What role do I have?
Electronic system design and development
Telecommunications is characterized by
Electronic transmission of data or voice from one location to another
As a nurse, there are clinical practice guidelines that I should follow in caring for my patients. Where can I find these?
Embedded in the EHR
What is the biggest threat to the security of healthcare data
Employees
A number of healthcare organizations share information. These organizations have disparate systems. This describes a(n):
Health information exchange
The federal government envisions a regional health information organization (RHIO) to provide
Health information exchange
My computer is acting strange. My technical support said that I have been infected with a Trojan horse. What does he mean by this?
I have been infected by a computer that gains unauthorized access by masquerading as software that is useful when it can compromise data
A risk analysis is useful to
Identify security threats
What does the term access control mean?
Identifying which data employees should have a right to use
In a health information exchange organization (HIO), patients would most likely be
Identity matching algorithm
In which phase of the systems development life cycle are trial runs of the new system conducted, backup and disaster recover procedures developed, and training of end users conducted?
Implementation
A step-by-step approach to installing, testing, training, and gaining adoption for an EHR is referred to as a(n):
Implementation plan
An employee in the physical therapy department arrives early every morning to snoop through the clinical information system for potential information about neighbors and friends. What security mechanisms should have been implemented that could minimize this security breach?
Information access controls
A(n) _____ can be defined as a collection of related components that interact to perform a task in order to accomplish a goal.
Information system
The right of an individual to keep information about themselves from being disclosed to anyone is a definition of:
Informational privacy
The three elements of a security program are ensuring data availability, protection, and
Integrity
In class, classmates designed and produced the UHDDS database. There were many inconsistencies. The technique to verify consistency of data when two or more persons manipulate the same data is known as
Inter rater reliability
Which of the following is not a database
Interface
Which of the following is not a database?
Interface
I work for a 10-hospital chain that is purchasing five more hospitals. Many of these hospitals have different vendors supplying their information systems. This has resulted in concerns regarding:
Interoperability
A local area network using Internet-based protocols is
Intranet
A local area network using Internet-based protocols is an
Intranet
Which of the following allows corporations to supply Internet services over their LANs?
Intranet
The HIPAA data integrity standard requires that organizations:
Keep documented logs of system access and access attempts
A(n) _____ is a network that connects computers in a relatively small area, such as a room or a building
LAN
LOINC is a terminology that is used for coding
Lab results and other observations
Which of the following is an example of an ancillary system
Lab system
Which of the following is an example of an ancillary system?
Lab system
Which of the following information systems is used for collecting, verifying, and reporting test results?
Laboratory information system
The coding supervisor wants a daily report of health records that need to be coded. Which of the following systems would be best in meeting the supervisor's needs
MIS
The coding supervisor wants a daily report of health records that need to be coded. Which of the following systems would be best in meeting the supervisor's needs?
MIS
Which of the following is used primarily for monitoring performance?
MIS
_____ is a first-generation programming language
Machine
Discrete data may be entered into an EHR via:
Macro, Point-and-click, Voice command (All of the above)
Structured data may be entered into an EHR via:
Macro, Point-and-click, Voice command (All of the above)
These computers are used to handle intensive input/output business transactions
Mainframe systems
Which of the following were the only computers available prior to the late 1960s?
Mainframe systems
Administrative controls include policies and procedures that address the _____ of computer resources.
Management
An IS that supports routine and repetitive tasks that are critical to the operation of the organization such as payroll
Management information system
HIM director receives daily reports on number of new admissions
Management information system
Which of the following systems focuses on providing reports and information to managers for day-to-day operations of the organization?
Management information system
Sterile supply services department is performing their annual inventory check. What IS will they use?
Materials management
Semantics refers to
Meaning of a clinical concept
Semantics refers to:
Meaning of a clinical concept
Data that describes the data to be entered into an EHR are called
Metadata
Data that describes the data to be entered into an EHR is called
Metadata
Which end user would normally use a management information system in their day to day work?
Middle managers
A high-level overview of when EHR components will be implemented is
Migration path
A high-level overview of when EHR components will be implemented is:
Migration path
Our team has written a plan that describes what systems will be implemented in what order in our transition to the EHR. We completed our
Migration path
Use case and sequence diagrams are an example of a:
Modeling language
For HIPAA implementation specifications that are addressable, the covered entity
Must conduct a risk assessment to determine if the specification is appropriate to its environment
_______ is a fifth-generation programming language
Natural
In addition to people, threats to data security include
Natural disasters, Power surges, Hardware malfunctions (All of the above)
Which of the following is a fifth-generation programming language that uses human language to allow users to speak to computers in a more conversational way?
Natural language
Natural language processing
Natural language processing
This type of controls is designed to prevent damage cause by computer hackers.
Network controls
Which of the following enable(s) computers on a network to communicate with each other?
Network protocols
_____ connect computers together in a way that allows for the sharing of information and resources
Networks
RAID technology: a. Provides for server redundancy b.Rapidly processes discrete data in a database c.Reduces narrative notes to encoded form d.None of the above
None of the above
Though the Security Rule does not specify audit frequency, an organization's security policies and procedures be reviewed?
Once a year
A management information system is different from a strategic decision support system in that it produces reports for _____ and tactical decision making
Operational
Which of the following would be an example of two-factor authentication?
Password and retinal scan
Which of the following is (are) considered an application control?
Password management, Edit check, Audit trail (All of the above)
The first computer systems used in healthcare were used primarily to perform payroll and _____ functions.
Patient accounting
A means to reduce the data entry burden for providers but still capture discrete data is:
Patient data entry
A means to reduce the data entry burden for providers but still capture structured data is:
Patient data entry
How are health plans incentivizing providers to use EHRs
Paying for performance
In addition to patient care, clinical information systems may be used for
Peer review, Research, & Quality improvement (All of the above)
In addition to patient care, clinical information systems may be used for:
Peer review, Research, Quality improvement (All of the above)
To ensure CPOE systems supports patient safety, what other systems must be in place
Pharmacy Information systems
To ensure that a computerized provider order entry (CPOE) system supports patient safety, what other system must also be in place?
Pharmacy information system
What system would you expect to perform drug compatibility checks, have information on contraindications and control inventory?
Pharmacy information system
These are safeguards that protect equipment, media, and facilities
Physical access controls
Locks on computer room doors is a type of
Physical control
Standards that dictate how the organization's IT resources are protected from theft and damage are referred to as _____ standards
Physical security
The primary user of computerized provider order entry is a:
Physician
The primary user of computerized provider order entry is:
Physician
In which phase of the systems development life cycle is the primary focus on examining the current system and problems in order to identify opportunities for improvement or enhancement of the system?
Planning and analysis
The physician records his findings while still in the patient's room. This is called:
Point of care documentation
A special web page that offers secure access to data is a(n):
Portal
A _____ uniquely identifies each row in a table and ensures that it is unique
Primary key
This algorithm has the highest rate of success in identifying potential duplicates
Probabilistic
Which of the following best describes an EIS
Produces periodic, exception, and demand reports
Which of the following best describes an EIS?
Produces periodic, exception, and demand reports
An interface is
Program to exchange data
An interface is:
Program to exchange data
Network computers use _____ to communicate using the same language
Protocols
Which of the following is not a characteristic of a DSS
Provides day-to-day reports
Which of the following is a driving force for the EHR in LTC?
Quality of care and patient safety
The user supplies the input to an information system as
Raw facts
In a regional health information organization (RHIO), patients would most likely be Identified using
Record locator service
The data quality term used to describe the degree to which the same results are achieved consistently is
Relability
A(n) _____ stores data in predefined tables consisting of rows and columns
Relational database
Two clerks are extracting data for a registry. Discrepancies are found. What quality component is lacking?
Reliability
Which of the following generally includes a detailed description of the requirements for a new system and guidelines for vendors to follow in bidding for the contract?
Request for proposal
All the following are clinical information systems except
Resource allocation
Which of the following should a systems analyst use to collect information about the requirements of an IS project?
Review existing forms, review existing databases, Observe end users performing their jobs (All of the above)
A business continuity plan should policies and procedures to:
Run the business during the emergency period, Restore data and files on the computer system, Resume normal operation after a disaster (All of the above)
Which of the following vocabularies is likely to be used to describe drugs in clinically relevant form?
RxNorm
_____ is the traditional manner of planning and implementing an information system
SDLC
_____ allows a user to insert, update, delete, and query data from a database.
SQL
A critical element of data retrieval planning is designing
Screen layout
A critical element of data retrieval planning is designing:
Screen layout
Which of the following is used as sketch of the user interface during system development?
Screen prototype
An employee observes an outside individual putting some computer disks in her purse. The employee does not report this security breach. What security measures should have been in place to minimize this threat?
Security incident procedures
The _____ function of a computer allows access to its shared resources and services.
Server
In a network environment, a database shared among several end-user workstations would be stored on a:
Server computer
Which of the following includes computers that share resources such as printers or disk space across a computer network?
Servers
A _____ is a task that runs on a server computer
Service
Which of the following best describes information security
The mechanisms for safeguarding information and information systems
Critique this statement: HIPAA represents an attempt to establish best practices and standards for health information security
This is a true statement.
The quality component that evaluates the time frame in which health records are coded is
Timeliness
What is the purpose of databases?
To store and retrieve data
A tool that helps identify all costs associated with implementing an EHR is a(n):
Total cost of ownership
Which of the following would not be document on an EHR migration path?
Training physicians on how to use the new CPOE
A(n) _____ manages the day-to-day operations of a business
Transaction processing system
Every week, an HIM department director receives info on incomplete records. Summary reports show totals & trends on this Information system
Transaction-processing system
What basic components make up every communications system?
Transmitters, receivers, media, and data
A clinical dashboard is a toolset developed to provide clinicians with the relevant and timely information they need to inform daily decisions that improve quality of patient care
True
Critical Pathways would not be found within PACS
True
Use of CPOE for medical orders is one of the level one meaningful use criteria
True
When was the concept of an EHR first conceived?
1960s
Which of the following statements is true regarding HIPAA security?
HIPAA allows flexibility in the way an institution implements the security standards.
An organized collection of data is
A database
The situation used to describe a combination of paper and electronic health record content is
A hybrid record
Which of the following best describes a data warehouse?
A large storage of data used for strategic decision support
Which of the following information systems is used to assist healthcare providers in the actual diagnosis and treatment of patients
Clinical decision support system
Systems testing of a new information system should be performed by:
A team independent of the project team that developed the system
The tool that allows the Internet user to search for and find information is called
A web browser
Which of the following is required by HIPAA standards
A written contingency plan
In hospitals, automated systems for registering patients and tracking their encounters are commonly known as _____ systems
ADT
In hospitals, automated systems for registering patients and tracking their encounters are commonly known as _____ systems.
ADT
An employee accesses PHI on a computer system that does not relate to her job functions. What security mechanism should have been implemented to minimize this security breach?
Access controls
An example of how security of an EHR is afforded is via
Access controls
Within the context of data security, protecting data privacy basically means defending or safeguarding
Access to information
All are clinical information systems except
Accounts receivable
A(n) _____ is the role the user plays in a system
Actor
Policies and procedures that address the management of computer resources and security are:
Administrative controls
Your pharmacy and Therapeutics committee has asked you to find out more about a computerized order entry system that calculates drug dosages based on a patient parameters. The committee asking for info on:
An expert (AI) system
Security controls built into a computer software program are
Application controls
These are automatic controls that help preserve data confidentiality and integrity
Application controls
Which of the following is a software program that tracks every access to data in the computer system?
Audit trail
Which of the following information systems is used to assist healthcare providers in the actual diagnosis and treatment of patients?
Clinical decision support system
A visitor to the hospital looks at the screen of the admitting clerk's computer workstation when she leaves her desk to copy some admitting documents. What security mechanism would best have minimized this security breach?
Automatic logoff controls
A system that is designed to ensure the medication five rights is:
Bar-code medication administration record
As part of an EHR system selection, due diligence should be done
Before contracting for an EHR product
When a hospital uses many different vendors to support its information system needs, the IT strategy being used is called
Best of breed
The RFP generally includes a detailed description of the system's requirements and provides guidelines for vendors to follow in
Bidding for the contract
Which of the following is an organization's planned response to protect its information in the case of a natural disaster?
Business continuity plan
What is the main focus of the system planning and analysis phase of the systems development life cycle
Business issues
What technology is used to manage data from different source systems, including structured data, scanned document images, and digital forms of medical data?
CDR
Which statement is TRUE concerning CDR and EHR?
CDR supports management of data for an EHR.
To run an analysis on a large set of data from many patients, the best tool is a(n):
CDW
Which of the following is not a characteristic of a DSS?
CHECK THIS ONE! EXAM SAYS ANSWERS WHAT-IF QUESTIONS Provides day-to-day reports
Electronic prescribing is a special case of
CPOE
Electronic prescribing is a special case of:
CPOE
What is an application that uses standard order sets and other clinical decision support that supports physician order entry into the computer
CPOE
Which of the following IS positions has evolved into a more important position since the passage of HIPAA regulations
CSO
Which of the following IS positions has evolved into a more important position since the passage of HIPAA regulations?
CSO
Who is the top information executive responsible for strategic information systems planning and overseeing the organization's information resources management?
Chief information officer
I just received a new job. I have the responsibility of leading physicians in the adoption of clinical information systems. My title must be:
Chief medical informatics officer
The individual responsible for ensuring that everyone follows the organization's data security policies and procedures is the:
Chief security officer
When some computers are used primarily to enter data and others to process data the architecture is called:
Client/server
When some computers are used primarily to enter data and others to process data, the architecture is called:
Client/server
Pharmacy system that generates automatic alerts to contraindicated drugs is
Clinical decision support system
A system that manages data for an entire healthcare business is referred to as
Enterprisewide system
The first and most fundamental strategy for minimizing security threats is to
Establish a security organization
A vocabulary is described as being "controlled" when it
Establishes meaning for terms used in the EHR
A vocabulary is described as being "controlled" when it:
Establishes meaning for terms used in the EHR
Supports strategic decision making
Executive information system
Dr. J is treating a patient with a rare disease. He enters info into system then uses it to determine best protocol for treatment. This is:
Expert system
IS that makes recommended decisions for the users based on the built-in expertise and knowledge
Expert system
What uses Artificial intelligence techniques to capture the knowledge of human experts and to translate and store it in a knowledge base
Expert system
Which of the following is a type of computer network specifically designed to allow direct communication between the networks of separate companies?
Extranets
The HVAC system needs repair- IS for this would be
Facilities management
A visitor walks through the computer department and picks up a CD from an employee's desk. What security controls should have been implemented to prevent this security breach?
Facility access controls
Types of data captured to meet meaningful use criteria (metadata) can be structured or free text
False
Which of the following information systems is considered an administrative information system
Financial information system
Which of the following information systems is considered an administrative information system?
Financial information system
Which of the following is a secondary storage device?
Floppy disk, CD-ROM, Magnetic tape (All of the above)
According to an FBI study, most security breaches occur:
From employees
The _____ provide the objective and scope for the HIPAA Security Rule as a whole
General rules
You use an input mask to make sure ICD-9 codes have fifth digit so the code is at the greatest level of specificity or appropriate level of detail
Granularity
HIPAA requires that policies and procedures be maintained for a minimum of
Six years from date of creation or date when last in effect, whichever is later
Which of the following elements is not considered a basic component of every information system?
Software, Communications technology, Users (None of the above)
I have been asked to justify my request for an electronic document management system. Which of the following would I use?
Space savings
In the HL7 EHR functional model, the section that provides the functionality for public health and performance improvement is:
Supportive
Why is an ideal EHR system one that requires point of care charting?
Supports clinical decision making
Which of the following best describes the function of a management information system
Supports day-to-day activities
Which of the following best describes the function of a management information system?
Supports day-to-day activities
The first phase of the SDLC is the _____ phase
System analysis
What phase of the SDLC creates the object model of the solution environment
System design
Our team is testing our new EHR. Currently we are testing whether or not all of the components will work together. This type of testing is called:
System testing
Which of the following protocols is most closely associated with the Internet
TCP/IP
Data security programs include a variety of measures for safeguarding data and computer programs, including:
Technical measures such as using password protection, Management practices such as prohibiting the sharing of passwords, Physical safeguards such as locking computer rooms (All of the above)
The term used to describe voice and data communications
Telecommunications
I am entering free text and structured data. This is called:
Template-based entry
Discrete data are generally entered into an EHR via
Templates
Structured data are generally entered into an EHR via
Templates
The vision of the EHR is that discrete data would be entered by providers into an EHR via
Templates
The concept of information resource management assumes
That information is a valuable resource that must be managed no matter what form it takes
Our team is testing our new EHR. Currently we are testing whether or not all of the components will work together. This type of testing is called
Unit testing
Which form of system testing ensures that each data element is captured correctly
Unit testing
Which form of system testing ensures that each data element is captured correctly?
Unit testing
In order for organizations to earn Stage 1 Meaningful Use incentives, they must
Use certified EHR technology
What can a healthcare organization implement to help significantly reduce downtime?
Use mirrored processing on redundant servers
What can a healthcare organization implement to help significantly reduce downtime
Use redundant servers with server failover
The degree to which codes accurately reflect the patients diagnoses and procedures
Validity
Which of the following is an example of data collected by a patient monitoring system?
Vital signs
A(n) _____ is a network that connects LANS or other networks together across a large geographical area
WAN
Which of the following connects devices across a large geographical area, such as a state?
WAN
What technology is used to manage data from different source systems, including discrete data, scanned images, and digital forms of data?
What technology is used to manage data from different source systems, including discrete data, scanned images, and digital forms of data?
Which of the following is not an element of data quality?
Which of the following is not an element of data quality?
The ability to electronically put tasks into a queue for someone to perform is called
Work flow
A laboratory employee forgot his user ID badge at home and uses another lab employee's badge to access the computer system. What controls should have been in place to minimize this security breach?
Workforce security awareness training