Exam 8: Technology, Applications and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In the relational model, a patient has two different patient identification numbers from different clinics within a health system. How would the relationship be defined for the patient's social security number and these patient identifiers?

(Short Answer)
4.8/5
(42)

Minimum log data for audit trail purposes contain which of the following?

(Multiple Choice)
4.7/5
(33)

Give an example of a type of document that would be found on an organization's Intranet.

(Essay)
4.8/5
(28)

Frames are required to be in each Web page containing health information.

(True/False)
4.8/5
(38)

A physician's office wants to install software to process patient claims to each insurer. Because patients have multiple types of insurance, the software will need not only to transmit the claims but also to understand what information needs to be sent to each insurer. Would you choose a two-tier or three-tier architecture for this application? Why?

(Essay)
4.9/5
(36)

List one difference between thick-client and thin-client computers.

(Essay)
4.7/5
(41)

A wireless network can be secured with the use of

(Multiple Choice)
4.9/5
(32)

Which is a system designed to acquire, store, retrieve, and display digital images?

(Multiple Choice)
4.9/5
(34)

A point-of-care system may include order entry decision support systems.

(True/False)
4.9/5
(40)

Contrast a decision-support and a business intelligence system.

(Essay)
4.9/5
(40)

Each wireless network has a service set identifier.

(True/False)
4.8/5
(31)

What is the term for a field containing redundant data that links two or more tables in a relational database?

(Multiple Choice)
4.8/5
(37)

A syndromic surveillance system would be used in treating a patient in a physician's office.

(True/False)
4.9/5
(31)

What is the term given to the study of medical computing?

(Short Answer)
4.9/5
(31)

What does the term "store-and-forward" refer to in telemedicine?

(Essay)
4.7/5
(36)

QR code technology allows for all kinds of documents to contain a QR code and be able to be read without a specialized bar code scanner.

(True/False)
4.8/5
(37)

An example of a relational database management system in personal computer software is

(Multiple Choice)
4.8/5
(37)

A hospital is trying to determine the cause of the recent increase in the average length of stay. Explain why a data mining approach to answering this question might be useful.

(Essay)
4.8/5
(37)

Virtual communities are an aggregation of individuals or business partners who interact around a shared interest, where the interaction is at least partially supported and/or mediated by technology.

(True/False)
4.8/5
(33)

The public keys used in encryption are distributed by the U.S. government.

(True/False)
4.8/5
(42)
Showing 41 - 60 of 67
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)