Exam 8: Technology, Applications and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What are the typical five roles defined in role-based access control (RBAC)?

Free
(Essay)
4.9/5
(38)
Correct Answer:
Verified

(1)Read,
(2)write,
(3)change,
(4)delete,
(5)override.

An industry standard sublanguage, command-driven, designed to manipulate relational databases is known as

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

A

Which is included in a data model?

Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
Verified

D

Define an ERP.

(Essay)
4.8/5
(35)

Within a health care organization, in what department would you expect to find discussions about transmission control protocol/Internet protocol (TCP/IP)?

(Multiple Choice)
4.8/5
(40)

Within an object-oriented database, there are two objects-a social worker and a nurse. There is a third object, employee, of which the social worker and nurse are members. What does the concept of "inheritance" refer to in this example?

(Essay)
4.9/5
(38)

JAVA compilers are usually found in Web browsers.

(True/False)
4.8/5
(36)

Information can be input and retrieved by use of a smartphone.

(True/False)
4.9/5
(26)

Each health care provider organization needs a disaster recovery plan for critical information because

(Multiple Choice)
4.8/5
(43)

A virtual machine is able to be connected directly to the information warehouse.

(True/False)
4.9/5
(37)

All the following are data input devices except

(Multiple Choice)
4.8/5
(34)

A good design of a Web page will enable the user to obtain the information in the fewest possible steps.

(True/False)
4.9/5
(36)

List the two components of a two-tier architecture.

(Short Answer)
4.9/5
(25)

Hypertext links on a Web page are usually used to reference materials that are available on a separate Web site.

(True/False)
4.9/5
(31)

In a database, a row is a data field.

(True/False)
4.7/5
(38)

An example of malware is

(Multiple Choice)
4.9/5
(27)

The Health Insurance Portability and Accountability Act (HIPAA) Security Rule specifies specific software applications that are required for two-factor authentication.

(True/False)
4.7/5
(41)

What is the program called that contains the set of instructions that tells the computer what to do?

(Short Answer)
4.9/5
(39)

Explain why there are issues with physician licensing in telemedicine.

(Essay)
4.8/5
(36)

Symbology is the term used to describe

(Multiple Choice)
4.8/5
(32)
Showing 1 - 20 of 67
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)