Deck 11: Information Systems Technology

Full screen (f)
exit full mode
Question
The speed of the CPU is measured in a unit of frequency called megahertz.
Use Space or
up arrow
down arrow
to flip the card.
Question
DSL also transmits all data as digital signals and does require access to television connections.
Question
Health care information systems cover a broad range of applications, serving both clinical and administrative functions.
Question
Servers store resources and display them when you request them.
Question
Health care informatics concentrates on how to use technology to facilitate acquiring, processing, interpreting, using, and communicating health care data.
Question
Some mainframe computers are still in use in the business world.
Question
A firewall allows the end user to access the Internet, but prevents unauthorized users from obtaining access to the end user's computer.
Question
A mobile object by itself is able to transmit and receive data to a network.
Question
Central processing units (CPUs) are sometimes called microprocessors.
Question
Hardware refers to all of the physical electronic components of a computer system.
Question
There are many different subsets of informatics.
Question
Mainframes have been largely replaced with servers.
Question
Application programs create the screens end users see and the reports that are printed.
Question
An intranet is similar to the Internet in that it uses the three software components of the World Wide Web.
Question
The domain name is the name given to a server or group of servers connected to the Internet.
Question
Local area network connects computers that are widely separated geographically, typically by cities, countries, or continents.
Question
A significant contribution of informatics to health care is e-prescribing.
Question
Devices like monitors and disk drives are referred to as peripherals.
Question
PDAs are sometimes referred to as palms.
Question
Mobile and wireless objects have decreased the need to create handwritten notes for later entry into a stationary computer, but have not eliminated it.
Question
The level of access to an operating system or application given to a person or group of persons is the security measure called what?

A) encryption
B) preventing damage
C) disaster recovery
D) permission
Question
Which of the following is the best descriptor for an Internet Protocol address?

A) the wording following the @ symbol
B) www.delmarlearning.com
C) the wording prior to the @ symbol
Question
Utility programs generally are used to automate frequently required tasks.
Question
A group of 8 bits is what?

A) a byte
B) the bit digits 0-7
C) equivalent to 1 megahertz
Question
What is the function of HTML?

A) It describes what a Web page should look like.
B) It is a browser that can interpret information and display it on a computer screen.
C) It enables a browser to send requests for pages across the Internet.
Question
The Internet is a worldwide network of smaller networks.
Question
The best way to prevent loss of data is to do what?

A) have a rigorous backup regime
B) install firewalls
C) install virus scanning programs
D) print out hard copies
Question
Which is the best description of the information systems cycle?

A) refers to technical specifications or precise criteria to be used consistently
B) refers to the interconnections created so computers within a company can communicate
C) refers to the succession of stages of an information system
Question
A network consists of which of the following?

A) printers
B) computers
C) both printers and computers
D) neither printers nor computers
Question
When do bytes become meaningful?

A) when the bits are converted to 1 or 2
B) when they are processed in sequence
C) when they are converted to bits
Question
Which of the following statements is most true about Internet Service Providers (ISP)?

A) Many connect directly to the Internet backbone?
B) Only a few connect directly to the Internet backbone.
C) They are not allowed to connect directly to the Internet backbone.
Question
Each byte represents a particular character.
Question
Which of these policies answers the who, what, where, when, why, and how questions of information security?

A) required specifications policy
B) administrative safeguards policy
C) information security policies
Question
A person accesses a computer system and diverts sums of money to his private bank account. What is the term used to describe this type of criminal?

A) white-collar criminals
B) crackers
C) firewall destroyer
D) virus scanners
Question
Using the application of technology to facilitate the learning process is referred to as what?

A) e-learning
B) e-health
C) public health informatics
D) telemedicine
Question
XML is based on a separate language-Extensible Markup Language.
Question
A local university states they have a WAN network. What does this mean?

A) The computer network connects the various campus sites and perhaps the city.
B) The computer network connects geographically widely separated sites, such as cities, countries, or even continents.
C) The computer network connects only a small area, such as adjacent areas or buildings.
Question
Who is responsible for maintaining the Internet?

A) governmental bodies
B) nongovernmental bodies
C) Internet service providers (ISP)
D) no one
Question
A company installs firewalls and virus scanning to address which security measure?

A) permission
B) authentication
C) encryption
D) preventing damage
Question
A group of eight bits is called a byte.
Question
Device that depends on reading and writing data from a rotating disk for its operation is called what?

A) Hard drive
B) Disk drive
C) Flash drive
D) Modem
Question
Match the computer term with the best descriptor.
device that depends on reading and writing data from a rotating disk for its operation

A)hardware
B)software
C)central processing unit (CPUs)
D)disk drive
E)hard drive
F)flash drive
G)peripheral
H)mainframe
I)server
J)application program
K)utility program
L)HTML
M)modem
Question
Match the computer term with the best descriptor.
a programming language

A)hardware
B)software
C)central processing unit (CPUs)
D)disk drive
E)hard drive
F)flash drive
G)peripheral
H)mainframe
I)server
J)application program
K)utility program
L)HTML
M)modem
Question
A physician speaks and the computer translates the information into written text. This is an example of which application?

A) interactive voice recognition
B) voice recognition technology
C) digital imaging
Question
The speed of the CPU is measured in a unit of frequency called ____________________.
Question
What are the physical electronic components of a computer system called?

A) Hardware
B) Software
C) Application program
D) Server
Question
MacOS, UNIX, Solaris, and Windows are examples of ____________________ systems.
Question
Hardware that is added to a host computer to expand its capabilities is called

A) software.
B) server.
C) hardware.
D) modem.
Question
How many different security standards exist?

A) 10
B) 12
C) 18
D) 22
Question
What is a magnetic storage device that stores individual data on the surface of a rapidly rotating metal disk called?

A) Hard drive
B) Disk drive
C) Flash drive
D) Modem
Question
.com, .edu, and .gov are example of ____________________ types.
Question
The Internet began in what year?

A) 1960
B) 1980
C) 1990
D) 2000
Question
This unit of measure with approximately one character is called a

A) byte.
B) kilobyte.
C) bit.
D) megabyte.
Question
Match the computer term with the best descriptor.
hardware that is added to a host computer to expand its capabilities

A)hardware
B)software
C)central processing unit (CPUs)
D)disk drive
E)hard drive
F)flash drive
G)peripheral
H)mainframe
I)server
J)application program
K)utility program
L)HTML
M)modem
Question
A programming language is a created language used to write ____________________ and ____________________ programs.
Question
A computer containing a powerful CPU that controls the activity of the dummy monitor is called what?

A) Central processing unit
B) Mainframe
C) Server
D) HTML
Question
The basic unit of measure is a(n) ____________________, a single digit representing either the number ____________________ or ____________________.
Question
Match the computer term with the best descriptor.
physical electronic components of a computer system

A)hardware
B)software
C)central processing unit (CPUs)
D)disk drive
E)hard drive
F)flash drive
G)peripheral
H)mainframe
I)server
J)application program
K)utility program
L)HTML
M)modem
Question
_________ works with raw data, allowing it to be treated in a similar fashion.

A) Hypertext markup language
B) Standard generalized markup language
C) Programming language
D) Extensible markup language
Question
Match the computer term with the best descriptor.
also called a jump drive; removable data storage device

A)hardware
B)software
C)central processing unit (CPUs)
D)disk drive
E)hard drive
F)flash drive
G)peripheral
H)mainframe
I)server
J)application program
K)utility program
L)HTML
M)modem
Question
Match the computer term with the best descriptor.
computer containing a powerful CPU that controls the activity of the dummy monitor

A)hardware
B)software
C)central processing unit (CPUs)
D)disk drive
E)hard drive
F)flash drive
G)peripheral
H)mainframe
I)server
J)application program
K)utility program
L)HTML
M)modem
Question
Match the term with its definition.
has a central focus of clinical data, not financial or billing information

A)electronic health record (EHR)
B)clinical information system
C)HIMSS (Healthcare Information and Management Systems Society)
D)authorship
E)authentication
Question
Match the computer term with the best descriptor.
performs simple operations on files created by other programs

A)hardware
B)software
C)central processing unit (CPUs)
D)disk drive
E)hard drive
F)flash drive
G)peripheral
H)mainframe
I)server
J)application program
K)utility program
L)HTML
M)modem
Question
Match the computer term with the best descriptor.
programs that tell the computer what to do and how to do it

A)hardware
B)software
C)central processing unit (CPUs)
D)disk drive
E)hard drive
F)flash drive
G)peripheral
H)mainframe
I)server
J)application program
K)utility program
L)HTML
M)modem
Question
Match the term with its definition.
refers to identifying the health care provider who made an entry in the record

A)electronic health record (EHR)
B)clinical information system
C)HIMSS (Healthcare Information and Management Systems Society)
D)authorship
E)authentication
Question
Identify the life cycle phases of IT Projects
Question
Explain the difference between intranet and extranet.
Question
Explain the difference between local area and wide area networks
Question
Match the computer term with the best descriptor.
performs tasks on behalf of the end user

A)hardware
B)software
C)central processing unit (CPUs)
D)disk drive
E)hard drive
F)flash drive
G)peripheral
H)mainframe
I)server
J)application program
K)utility program
L)HTML
M)modem
Question
What three software components must be used in order for the Web to operate?
Question
Explain what a network is and give two examples.
Question
Match the computer term with the best descriptor.
computers that provide shared services to other computers on a network

A)hardware
B)software
C)central processing unit (CPUs)
D)disk drive
E)hard drive
F)flash drive
G)peripheral
H)mainframe
I)server
J)application program
K)utility program
L)HTML
M)modem
Question
Match the term with its definition.
computerized patient record

A)electronic health record (EHR)
B)clinical information system
C)HIMSS (Healthcare Information and Management Systems Society)
D)authorship
E)authentication
Question
Match the computer term with the best descriptor.
works by converting digital computer data into analog sound signals

A)hardware
B)software
C)central processing unit (CPUs)
D)disk drive
E)hard drive
F)flash drive
G)peripheral
H)mainframe
I)server
J)application program
K)utility program
L)HTML
M)modem
Question
Match the term with its definition.
system that integrates data from multiple sources, captures data at the point of care, and supports health care providers in their decision making

A)electronic health record (EHR)
B)clinical information system
C)HIMSS (Healthcare Information and Management Systems Society)
D)authorship
E)authentication
Question
Match the computer term with the best descriptor.
also called microprocessors

A)hardware
B)software
C)central processing unit (CPUs)
D)disk drive
E)hard drive
F)flash drive
G)peripheral
H)mainframe
I)server
J)application program
K)utility program
L)HTML
M)modem
Question
Match the computer term with the best descriptor.
magnetic storage device that stores individual data on the surface of a rapidly rotating metal disk

A)hardware
B)software
C)central processing unit (CPUs)
D)disk drive
E)hard drive
F)flash drive
G)peripheral
H)mainframe
I)server
J)application program
K)utility program
L)HTML
M)modem
Question
Match the term with its definition.
refers to the act of ensuring the entry in the record for both accuracy and authorship

A)electronic health record (EHR)
B)clinical information system
C)HIMSS (Healthcare Information and Management Systems Society)
D)authorship
E)authentication
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/78
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Information Systems Technology
1
The speed of the CPU is measured in a unit of frequency called megahertz.
True
2
DSL also transmits all data as digital signals and does require access to television connections.
False
3
Health care information systems cover a broad range of applications, serving both clinical and administrative functions.
True
4
Servers store resources and display them when you request them.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
5
Health care informatics concentrates on how to use technology to facilitate acquiring, processing, interpreting, using, and communicating health care data.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
6
Some mainframe computers are still in use in the business world.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
7
A firewall allows the end user to access the Internet, but prevents unauthorized users from obtaining access to the end user's computer.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
8
A mobile object by itself is able to transmit and receive data to a network.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
9
Central processing units (CPUs) are sometimes called microprocessors.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
10
Hardware refers to all of the physical electronic components of a computer system.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
11
There are many different subsets of informatics.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
12
Mainframes have been largely replaced with servers.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
13
Application programs create the screens end users see and the reports that are printed.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
14
An intranet is similar to the Internet in that it uses the three software components of the World Wide Web.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
15
The domain name is the name given to a server or group of servers connected to the Internet.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
16
Local area network connects computers that are widely separated geographically, typically by cities, countries, or continents.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
17
A significant contribution of informatics to health care is e-prescribing.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
18
Devices like monitors and disk drives are referred to as peripherals.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
19
PDAs are sometimes referred to as palms.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
20
Mobile and wireless objects have decreased the need to create handwritten notes for later entry into a stationary computer, but have not eliminated it.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
21
The level of access to an operating system or application given to a person or group of persons is the security measure called what?

A) encryption
B) preventing damage
C) disaster recovery
D) permission
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is the best descriptor for an Internet Protocol address?

A) the wording following the @ symbol
B) www.delmarlearning.com
C) the wording prior to the @ symbol
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
23
Utility programs generally are used to automate frequently required tasks.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
24
A group of 8 bits is what?

A) a byte
B) the bit digits 0-7
C) equivalent to 1 megahertz
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
25
What is the function of HTML?

A) It describes what a Web page should look like.
B) It is a browser that can interpret information and display it on a computer screen.
C) It enables a browser to send requests for pages across the Internet.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
26
The Internet is a worldwide network of smaller networks.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
27
The best way to prevent loss of data is to do what?

A) have a rigorous backup regime
B) install firewalls
C) install virus scanning programs
D) print out hard copies
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
28
Which is the best description of the information systems cycle?

A) refers to technical specifications or precise criteria to be used consistently
B) refers to the interconnections created so computers within a company can communicate
C) refers to the succession of stages of an information system
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
29
A network consists of which of the following?

A) printers
B) computers
C) both printers and computers
D) neither printers nor computers
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
30
When do bytes become meaningful?

A) when the bits are converted to 1 or 2
B) when they are processed in sequence
C) when they are converted to bits
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following statements is most true about Internet Service Providers (ISP)?

A) Many connect directly to the Internet backbone?
B) Only a few connect directly to the Internet backbone.
C) They are not allowed to connect directly to the Internet backbone.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
32
Each byte represents a particular character.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
33
Which of these policies answers the who, what, where, when, why, and how questions of information security?

A) required specifications policy
B) administrative safeguards policy
C) information security policies
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
34
A person accesses a computer system and diverts sums of money to his private bank account. What is the term used to describe this type of criminal?

A) white-collar criminals
B) crackers
C) firewall destroyer
D) virus scanners
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
35
Using the application of technology to facilitate the learning process is referred to as what?

A) e-learning
B) e-health
C) public health informatics
D) telemedicine
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
36
XML is based on a separate language-Extensible Markup Language.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
37
A local university states they have a WAN network. What does this mean?

A) The computer network connects the various campus sites and perhaps the city.
B) The computer network connects geographically widely separated sites, such as cities, countries, or even continents.
C) The computer network connects only a small area, such as adjacent areas or buildings.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
38
Who is responsible for maintaining the Internet?

A) governmental bodies
B) nongovernmental bodies
C) Internet service providers (ISP)
D) no one
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
39
A company installs firewalls and virus scanning to address which security measure?

A) permission
B) authentication
C) encryption
D) preventing damage
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
40
A group of eight bits is called a byte.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
41
Device that depends on reading and writing data from a rotating disk for its operation is called what?

A) Hard drive
B) Disk drive
C) Flash drive
D) Modem
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
42
Match the computer term with the best descriptor.
device that depends on reading and writing data from a rotating disk for its operation

A)hardware
B)software
C)central processing unit (CPUs)
D)disk drive
E)hard drive
F)flash drive
G)peripheral
H)mainframe
I)server
J)application program
K)utility program
L)HTML
M)modem
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
43
Match the computer term with the best descriptor.
a programming language

A)hardware
B)software
C)central processing unit (CPUs)
D)disk drive
E)hard drive
F)flash drive
G)peripheral
H)mainframe
I)server
J)application program
K)utility program
L)HTML
M)modem
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
44
A physician speaks and the computer translates the information into written text. This is an example of which application?

A) interactive voice recognition
B) voice recognition technology
C) digital imaging
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
45
The speed of the CPU is measured in a unit of frequency called ____________________.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
46
What are the physical electronic components of a computer system called?

A) Hardware
B) Software
C) Application program
D) Server
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
47
MacOS, UNIX, Solaris, and Windows are examples of ____________________ systems.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
48
Hardware that is added to a host computer to expand its capabilities is called

A) software.
B) server.
C) hardware.
D) modem.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
49
How many different security standards exist?

A) 10
B) 12
C) 18
D) 22
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
50
What is a magnetic storage device that stores individual data on the surface of a rapidly rotating metal disk called?

A) Hard drive
B) Disk drive
C) Flash drive
D) Modem
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
51
.com, .edu, and .gov are example of ____________________ types.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
52
The Internet began in what year?

A) 1960
B) 1980
C) 1990
D) 2000
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
53
This unit of measure with approximately one character is called a

A) byte.
B) kilobyte.
C) bit.
D) megabyte.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
54
Match the computer term with the best descriptor.
hardware that is added to a host computer to expand its capabilities

A)hardware
B)software
C)central processing unit (CPUs)
D)disk drive
E)hard drive
F)flash drive
G)peripheral
H)mainframe
I)server
J)application program
K)utility program
L)HTML
M)modem
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
55
A programming language is a created language used to write ____________________ and ____________________ programs.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
56
A computer containing a powerful CPU that controls the activity of the dummy monitor is called what?

A) Central processing unit
B) Mainframe
C) Server
D) HTML
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
57
The basic unit of measure is a(n) ____________________, a single digit representing either the number ____________________ or ____________________.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
58
Match the computer term with the best descriptor.
physical electronic components of a computer system

A)hardware
B)software
C)central processing unit (CPUs)
D)disk drive
E)hard drive
F)flash drive
G)peripheral
H)mainframe
I)server
J)application program
K)utility program
L)HTML
M)modem
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
59
_________ works with raw data, allowing it to be treated in a similar fashion.

A) Hypertext markup language
B) Standard generalized markup language
C) Programming language
D) Extensible markup language
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
60
Match the computer term with the best descriptor.
also called a jump drive; removable data storage device

A)hardware
B)software
C)central processing unit (CPUs)
D)disk drive
E)hard drive
F)flash drive
G)peripheral
H)mainframe
I)server
J)application program
K)utility program
L)HTML
M)modem
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
61
Match the computer term with the best descriptor.
computer containing a powerful CPU that controls the activity of the dummy monitor

A)hardware
B)software
C)central processing unit (CPUs)
D)disk drive
E)hard drive
F)flash drive
G)peripheral
H)mainframe
I)server
J)application program
K)utility program
L)HTML
M)modem
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
62
Match the term with its definition.
has a central focus of clinical data, not financial or billing information

A)electronic health record (EHR)
B)clinical information system
C)HIMSS (Healthcare Information and Management Systems Society)
D)authorship
E)authentication
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
63
Match the computer term with the best descriptor.
performs simple operations on files created by other programs

A)hardware
B)software
C)central processing unit (CPUs)
D)disk drive
E)hard drive
F)flash drive
G)peripheral
H)mainframe
I)server
J)application program
K)utility program
L)HTML
M)modem
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
64
Match the computer term with the best descriptor.
programs that tell the computer what to do and how to do it

A)hardware
B)software
C)central processing unit (CPUs)
D)disk drive
E)hard drive
F)flash drive
G)peripheral
H)mainframe
I)server
J)application program
K)utility program
L)HTML
M)modem
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
65
Match the term with its definition.
refers to identifying the health care provider who made an entry in the record

A)electronic health record (EHR)
B)clinical information system
C)HIMSS (Healthcare Information and Management Systems Society)
D)authorship
E)authentication
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
66
Identify the life cycle phases of IT Projects
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
67
Explain the difference between intranet and extranet.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
68
Explain the difference between local area and wide area networks
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
69
Match the computer term with the best descriptor.
performs tasks on behalf of the end user

A)hardware
B)software
C)central processing unit (CPUs)
D)disk drive
E)hard drive
F)flash drive
G)peripheral
H)mainframe
I)server
J)application program
K)utility program
L)HTML
M)modem
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
70
What three software components must be used in order for the Web to operate?
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
71
Explain what a network is and give two examples.
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
72
Match the computer term with the best descriptor.
computers that provide shared services to other computers on a network

A)hardware
B)software
C)central processing unit (CPUs)
D)disk drive
E)hard drive
F)flash drive
G)peripheral
H)mainframe
I)server
J)application program
K)utility program
L)HTML
M)modem
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
73
Match the term with its definition.
computerized patient record

A)electronic health record (EHR)
B)clinical information system
C)HIMSS (Healthcare Information and Management Systems Society)
D)authorship
E)authentication
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
74
Match the computer term with the best descriptor.
works by converting digital computer data into analog sound signals

A)hardware
B)software
C)central processing unit (CPUs)
D)disk drive
E)hard drive
F)flash drive
G)peripheral
H)mainframe
I)server
J)application program
K)utility program
L)HTML
M)modem
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
75
Match the term with its definition.
system that integrates data from multiple sources, captures data at the point of care, and supports health care providers in their decision making

A)electronic health record (EHR)
B)clinical information system
C)HIMSS (Healthcare Information and Management Systems Society)
D)authorship
E)authentication
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
76
Match the computer term with the best descriptor.
also called microprocessors

A)hardware
B)software
C)central processing unit (CPUs)
D)disk drive
E)hard drive
F)flash drive
G)peripheral
H)mainframe
I)server
J)application program
K)utility program
L)HTML
M)modem
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
77
Match the computer term with the best descriptor.
magnetic storage device that stores individual data on the surface of a rapidly rotating metal disk

A)hardware
B)software
C)central processing unit (CPUs)
D)disk drive
E)hard drive
F)flash drive
G)peripheral
H)mainframe
I)server
J)application program
K)utility program
L)HTML
M)modem
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
78
Match the term with its definition.
refers to the act of ensuring the entry in the record for both accuracy and authorship

A)electronic health record (EHR)
B)clinical information system
C)HIMSS (Healthcare Information and Management Systems Society)
D)authorship
E)authentication
Unlock Deck
Unlock for access to all 78 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 78 flashcards in this deck.