Exam 7: Technology, Applications, and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A point-of-care health information system includes bedside workstations, biomedical devices, and local area networks (LANs).

(True/False)
4.8/5
(36)

List one difference between thick-client and thin-client computers.

(Short Answer)
4.8/5
(28)

A user interface is often designed by both users and nonusers of the application.

(True/False)
4.8/5
(37)

An executive information system is the same as a decision support system.

(True/False)
4.7/5
(40)

Secure socket layer (SSL) is an example of public key/private key encryption.

(True/False)
4.8/5
(40)

Executive information systems can access community data systems and other external systems for its stated purposes with appropriate authorization.

(True/False)
4.9/5
(40)

Contrast a decision-support and an executive information system.

(Essay)
4.8/5
(39)

Which of the following is an example of a departmental information system?

(Multiple Choice)
4.9/5
(37)

A hospital is trying to determine the cause in the recent increase in the average length of stay. Explain why a data mining approach to answering this question might be useful.

(Short Answer)
4.9/5
(48)

Minimum log data for audit trail purposes contain which of the following?

(Multiple Choice)
4.7/5
(38)

What is one advantage of using thin-clients when upgrading a software application?

(Short Answer)
4.9/5
(38)

Explain what S-HTTP refers to.

(Short Answer)
4.8/5
(42)

A repository of electronic information about many patients is called a ____________________.

(Short Answer)
4.8/5
(36)

List one reason why health care information systems have been able to expand in both scope and presence in most health care organizations.

(Short Answer)
4.8/5
(43)

In what generation language would you find a program generator?

(Short Answer)
4.8/5
(36)

The Health Insurance Portability and Accountability Act (HIPAA) Security Rule specifies specific software applications that are required for two-factor authentication.

(True/False)
4.9/5
(36)

Each health care provider organization should have a disaster recovery plan for critical information because:

(Multiple Choice)
4.8/5
(40)

A physician's office wants to install software to process patient claims to each insurer. Because patients have multiple types of insurance, the software will need to not only transmit the claims but also understand what information needs to be sent to each insurer. Would you choose a two-tier or three-tier architecture for this application? Why?

(Essay)
4.9/5
(36)

A point-of-care system includes order entry medical decision support systems.

(True/False)
4.9/5
(34)

Results reporting is the process of scanning documents into a system.

(True/False)
4.8/5
(38)
Showing 21 - 40 of 65
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)