Deck 4: HIS Application Systems and Technology
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/29
Play
Full screen (f)
Deck 4: HIS Application Systems and Technology
1
Large instances of data are normally stored in a:
A) Programming language.
B) Database.
C) Application.
D) Network.
A) Programming language.
B) Database.
C) Application.
D) Network.
B
2
Traditionally, healthcare organizations have purchased vendor applications, such as commercial off-the-shelf (COTS) or "best of breed" products.
True
3
The software development life cycle (SDLC) methodology phase that comprises developing the preliminary and detailed designs, including how the system will meet functional requirements is called:
A) Operations and Maintenance.
B) Planning and Requirements Definition.
C) Implementation.
D) Design.
A) Operations and Maintenance.
B) Planning and Requirements Definition.
C) Implementation.
D) Design.
D
4
Using interfaces allows a healthcare organization to avoid building applications in silos, and enables the sharing of common data elements, thus bringing greater efficiency than application integration.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
5
A clinical information systems (CIS) application that supports chemistry, pathology, blood bank, instrumentation, calculations, calibrations, and results management areas is called a:
A) Picture archive communications system (PACS).
B) Electronic data interchange (EDI).
C) Laboratory information system (LIS).
D) Radiology information system (RIS).
A) Picture archive communications system (PACS).
B) Electronic data interchange (EDI).
C) Laboratory information system (LIS).
D) Radiology information system (RIS).
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
6
Despite the 2012 Robert Wood Johnson Foundation's annual report findings that hospitals are increasing adopting electronic health record systems, many healthcare organizations are still facing challenges with generating comprehensive reporting, and addressing data silos and data integrity issues.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
7
Which Open Systems Interconnection model (OSI) layer is responsible for routing and ensuring the message arrives to the destination address?
A) Transport Layer
B) Physical Layer
C) Application Layer
D) Network Layer
A) Transport Layer
B) Physical Layer
C) Application Layer
D) Network Layer
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
8
Extranets are networks that typically provide web-based content and access to applications and databases for users who are outside of the organization's internal network.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
9
Local area networks (LANs) are the primary networks used by desktops, servers, and network and other devices, and are used for:
A) Information sharing.
B) Resource sharing.
C) Both A and b
D) None of the above.
A) Information sharing.
B) Resource sharing.
C) Both A and b
D) None of the above.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
10
A multiprotocol label switching (MPLS) circuit is an example of a distributed antennae system (DAS) network
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
11
Dedicated back-end computer systems designed to efficiently and cost-effectively store and transfer a healthcare organization's server data are called:
A) Wireless wide area networks (WWANs).
B) Storage area networks (SANs).
C) Hard drive networks (HDNs).
D) Desktop area networks (DANs).
A) Wireless wide area networks (WWANs).
B) Storage area networks (SANs).
C) Hard drive networks (HDNs).
D) Desktop area networks (DANs).
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
12
A redundant array of independent drives (RAID) 10 hard drive configuration is a combination of RAID 2 and RAID 5, giving it the fastest performance and lowest cost, with the only drawback being limited availability.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
13
Voice over wireless local area network (VoWLAN) technology offers which of the following benefits?
A) Improves packet segmentation ratios by delivering ubiquitous, robust coverage.
B) Enhances voice mail features and functionality through the use of real time location tracking systems (RTLS).
C) Increases roam time and client connectivity issues.
D) Provides advance quality of service (QoS), extended talk-time, and call security.
A) Improves packet segmentation ratios by delivering ubiquitous, robust coverage.
B) Enhances voice mail features and functionality through the use of real time location tracking systems (RTLS).
C) Increases roam time and client connectivity issues.
D) Provides advance quality of service (QoS), extended talk-time, and call security.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
14
Digital signage and wayfinding, and IP television (IPTV) are considered part of the unified communications (UC) family of services.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
15
One of the first decisions facing healthcare organizations is whether they will maintain their own data center facilities, lease one or more commercially owned colocation data center facilities, or outsource (remote host) both their data center facility and computing equipment to a third party.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
16
Electrical power in data centers can be remotely measured and tracked by using a:
A) Branch circuit monitoring system (BCMS).
B) Uninterruptable power supply (UPS).
C) Data center management system (DCMS).
D) Continuous power source (CPS).
A) Branch circuit monitoring system (BCMS).
B) Uninterruptable power supply (UPS).
C) Data center management system (DCMS).
D) Continuous power source (CPS).
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
17
Very early smoke detection apparatus (VESDA) systems are used in data centers to provide ambient or room cooling, heating, ventilating, and air-conditioning.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
18
Which type of secondary data center facility is the least expensive to set up and maintain, but has the limitation of taking the longest to bring an organization's critical systems back online?
A) Hot site
B) Warm site
C) Tepid site
D) Cold site
A) Hot site
B) Warm site
C) Tepid site
D) Cold site
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
19
Virtual tape libraries (VTLs) are backup systems that use disk-based arrays to emulate tape libraries and allow organizations to continue to use existing tape backup software.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
20
Virtual machines (VMs) can run on which type of operating systems (OSs)?
A) Windows
B) Linux
C) UNIX
D) All of the above
A) Windows
B) Linux
C) UNIX
D) All of the above
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
21
Zero-client computers are similar to thin-client computers, but offer the additional advantage of having no local hard drive or OS to secure or maintain.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the choice below is not an advantage of using nonpersistent virtual desktop infrastructure (VDI)?
A) Reduces help desk calls with desktop freezing or crashing, as the user can log off and log in to create a new or "fresh" desktop.
B) Improves IT standardization since each user receives the same desktop image.
C) Dedicated server storage for each VDI desktop and the user's VDI desktop is not needed.
D) Simplifies desktop upgrades because desktop upgrades are performed on the servers and not each desktop.
A) Reduces help desk calls with desktop freezing or crashing, as the user can log off and log in to create a new or "fresh" desktop.
B) Improves IT standardization since each user receives the same desktop image.
C) Dedicated server storage for each VDI desktop and the user's VDI desktop is not needed.
D) Simplifies desktop upgrades because desktop upgrades are performed on the servers and not each desktop.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
23
Single sign-on (SSO) and tap 'n go technologies have the benefit of eliminating the need for users to remember their username and passwords.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
24
What mobile management strategy encompasses managing mobility at the mobile device level, and includes secure email, calendaring, contacts, web browsing, and application store management?
A) Mobile application management (MAM)
B) Mobile device management (MDM)
C) Mobile integration management (MIM)
D) Mobile content management (MCM)
A) Mobile application management (MAM)
B) Mobile device management (MDM)
C) Mobile integration management (MIM)
D) Mobile content management (MCM)
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
25
A comprehensive mobile computing policy, including corresponding set of procedures and an end-user acceptance agreement is needed for healthcare organizations to successfully define and implement at bring your own device (BYOD) strategy
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
26
Which technical area should not be considered when developing a mobile computing strategy?
A) What the virtual private network (VPN) platform will be.
B) Whether enterprise directory integration will be needed.
C) Which devices and native applications will be supported.
D) Which telecommunications management capabilities and restrictions will be applied.
A) What the virtual private network (VPN) platform will be.
B) Whether enterprise directory integration will be needed.
C) Which devices and native applications will be supported.
D) Which telecommunications management capabilities and restrictions will be applied.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
27
Encryption-at-rest is an important control that ensures the security of all data traffic containing confidential or ePHI information, such as network traffic, web activity, email messaging, file transfers, text messaging, and instant messaging.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
28
A critical technology that is designed to automate and intelligently analyze system logs for anomalies and inappropriate activity is called:
A) Asset discovery.
B) An intrusion detection system (IDS).
C) Security information event management (SIEM).
D) A vulnerability assessment.
A) Asset discovery.
B) An intrusion detection system (IDS).
C) Security information event management (SIEM).
D) A vulnerability assessment.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
29
Managed security services are cost-effective information security services that have the benefit of reducing the number of information security personnel needed by the healthcare organization.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck