Exam 8: Technology, Applications and Security
Exam 1: Health Care Systems83 Questions
Exam 2: The Health Informatics and Information Management Profession50 Questions
Exam 3: Health Information Infrastructure and Systems42 Questions
Exam 4: Health Data Concepts and Information Governance121 Questions
Exam 5: Data Access and Retention53 Questions
Exam 6: Electronic Health Record Systems71 Questions
Exam 7: Classification Systems, Clinical Vocabularies and Terminology66 Questions
Exam 8: Technology, Applications and Security67 Questions
Exam 9: Health Information Systems: Collaboration, Analysis, Design, Implementation, and Operations72 Questions
Exam 10: Statistics and Data Presentation53 Questions
Exam 11: Research and Epidemiology73 Questions
Exam 12: Performance Management and Patient Safety50 Questions
Exam 13: Data Analytics: Reporting, Interpretation, and Use58 Questions
Exam 14: Public Health Informatics40 Questions
Exam 15: Privacy and Health Law59 Questions
Exam 16: Human Resource Management75 Questions
Exam 17: Operational Management40 Questions
Exam 18: Revenue Cycle and Financial Management85 Questions
Select questions type
List one reason why health care information systems have been able to expand in both scope and presence in most health care organizations.
(Essay)
4.9/5
(42)
Clinical context object workstation (CCOW) is specifically mentioned in the Health Insurance Portability and Accountability Act (HIPAA) Security Rule.
(True/False)
4.8/5
(36)
Which of the following is an example of a departmental information system?
(Multiple Choice)
4.8/5
(35)
What is one advantage of using thin-clients when upgrading a software application?
(Essay)
4.9/5
(39)
Voice recognition both records the information being said and understands what is being said.
(True/False)
4.8/5
(38)
List one benefit of using an interface engine instead of a point-to-point interface.
(Essay)
4.9/5
(45)
Communications technology is the connecting medium for local area networks (LANs) and wide area networks (WANs).
(True/False)
4.8/5
(39)
Secure socket layer (SSL) is an example of public key/private key encryption.
(True/False)
4.7/5
(45)
Which of the following would not be an example of an alert found on a CDSS system?
(Multiple Choice)
4.8/5
(41)
A repository of electronic information about many patients is called a ____________________.
(Short Answer)
4.9/5
(32)
Given the relational database model principles, what is the most effective way to store each patient's address?
(Essay)
4.8/5
(35)
A primary feature that a radio frequency identification device (RFID) tag contains that a bar code does not is that
(Multiple Choice)
4.9/5
(37)
A business intelligence system could access community data systems and other external systems for its stated purposes with appropriate authorization.
(True/False)
4.8/5
(38)
Showing 21 - 40 of 67
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)