Deck 4: HIS Application Systems and Technology

Full screen (f)
exit full mode
Question
Large instances of data are normally stored in a:

A) Programming language.
B) Database.
C) Application.
D) Network.
Use Space or
up arrow
down arrow
to flip the card.
Question
Traditionally, healthcare organizations have purchased vendor applications, such as commercial off-the-shelf (COTS) or "best of breed" products.
Question
The software development life cycle (SDLC) methodology phase that comprises developing the preliminary and detailed designs, including how the system will meet functional requirements is called:

A) Operations and Maintenance.
B) Planning and Requirements Definition.
C) Implementation.
D) Design.
Question
Using interfaces allows a healthcare organization to avoid building applications in silos, and enables the sharing of common data elements, thus bringing greater efficiency than application integration.
Question
A clinical information systems (CIS) application that supports chemistry, pathology, blood bank, instrumentation, calculations, calibrations, and results management areas is called a:

A) Picture archive communications system (PACS).
B) Electronic data interchange (EDI).
C) Laboratory information system (LIS).
D) Radiology information system (RIS).
Question
Despite the 2012 Robert Wood Johnson Foundation's annual report findings that hospitals are increasing adopting electronic health record systems, many healthcare organizations are still facing challenges with generating comprehensive reporting, and addressing data silos and data integrity issues.
Question
Which Open Systems Interconnection model (OSI) layer is responsible for routing and ensuring the message arrives to the destination address?

A) Transport Layer
B) Physical Layer
C) Application Layer
D) Network Layer
Question
Extranets are networks that typically provide web-based content and access to applications and databases for users who are outside of the organization's internal network.
Question
Local area networks (LANs) are the primary networks used by desktops, servers, and network and other devices, and are used for:

A) Information sharing.
B) Resource sharing.
C) Both A and b
D) None of the above.
Question
A multiprotocol label switching (MPLS) circuit is an example of a distributed antennae system (DAS) network
Question
Dedicated back-end computer systems designed to efficiently and cost-effectively store and transfer a healthcare organization's server data are called:

A) Wireless wide area networks (WWANs).
B) Storage area networks (SANs).
C) Hard drive networks (HDNs).
D) Desktop area networks (DANs).
Question
A redundant array of independent drives (RAID) 10 hard drive configuration is a combination of RAID 2 and RAID 5, giving it the fastest performance and lowest cost, with the only drawback being limited availability.
Question
Voice over wireless local area network (VoWLAN) technology offers which of the following benefits?

A) Improves packet segmentation ratios by delivering ubiquitous, robust coverage.
B) Enhances voice mail features and functionality through the use of real time location tracking systems (RTLS).
C) Increases roam time and client connectivity issues.
D) Provides advance quality of service (QoS), extended talk-time, and call security.
Question
Digital signage and wayfinding, and IP television (IPTV) are considered part of the unified communications (UC) family of services.
Question
One of the first decisions facing healthcare organizations is whether they will maintain their own data center facilities, lease one or more commercially owned colocation data center facilities, or outsource (remote host) both their data center facility and computing equipment to a third party.
Question
Electrical power in data centers can be remotely measured and tracked by using a:

A) Branch circuit monitoring system (BCMS).
B) Uninterruptable power supply (UPS).
C) Data center management system (DCMS).
D) Continuous power source (CPS).
Question
Very early smoke detection apparatus (VESDA) systems are used in data centers to provide ambient or room cooling, heating, ventilating, and air-conditioning.
Question
Which type of secondary data center facility is the least expensive to set up and maintain, but has the limitation of taking the longest to bring an organization's critical systems back online?

A) Hot site
B) Warm site
C) Tepid site
D) Cold site
Question
Virtual tape libraries (VTLs) are backup systems that use disk-based arrays to emulate tape libraries and allow organizations to continue to use existing tape backup software.
Question
Virtual machines (VMs) can run on which type of operating systems (OSs)?

A) Windows
B) Linux
C) UNIX
D) All of the above
Question
Zero-client computers are similar to thin-client computers, but offer the additional advantage of having no local hard drive or OS to secure or maintain.
Question
Which of the choice below is not an advantage of using nonpersistent virtual desktop infrastructure (VDI)?

A) Reduces help desk calls with desktop freezing or crashing, as the user can log off and log in to create a new or "fresh" desktop.
B) Improves IT standardization since each user receives the same desktop image.
C) Dedicated server storage for each VDI desktop and the user's VDI desktop is not needed.
D) Simplifies desktop upgrades because desktop upgrades are performed on the servers and not each desktop.
Question
Single sign-on (SSO) and tap 'n go technologies have the benefit of eliminating the need for users to remember their username and passwords.
Question
What mobile management strategy encompasses managing mobility at the mobile device level, and includes secure email, calendaring, contacts, web browsing, and application store management?

A) Mobile application management (MAM)
B) Mobile device management (MDM)
C) Mobile integration management (MIM)
D) Mobile content management (MCM)
Question
A comprehensive mobile computing policy, including corresponding set of procedures and an end-user acceptance agreement is needed for healthcare organizations to successfully define and implement at bring your own device (BYOD) strategy
Question
Which technical area should not be considered when developing a mobile computing strategy?

A) What the virtual private network (VPN) platform will be.
B) Whether enterprise directory integration will be needed.
C) Which devices and native applications will be supported.
D) Which telecommunications management capabilities and restrictions will be applied.
Question
Encryption-at-rest is an important control that ensures the security of all data traffic containing confidential or ePHI information, such as network traffic, web activity, email messaging, file transfers, text messaging, and instant messaging.
Question
A critical technology that is designed to automate and intelligently analyze system logs for anomalies and inappropriate activity is called:

A) Asset discovery.
B) An intrusion detection system (IDS).
C) Security information event management (SIEM).
D) A vulnerability assessment.
Question
Managed security services are cost-effective information security services that have the benefit of reducing the number of information security personnel needed by the healthcare organization.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/29
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 4: HIS Application Systems and Technology
1
Large instances of data are normally stored in a:

A) Programming language.
B) Database.
C) Application.
D) Network.
B
2
Traditionally, healthcare organizations have purchased vendor applications, such as commercial off-the-shelf (COTS) or "best of breed" products.
True
3
The software development life cycle (SDLC) methodology phase that comprises developing the preliminary and detailed designs, including how the system will meet functional requirements is called:

A) Operations and Maintenance.
B) Planning and Requirements Definition.
C) Implementation.
D) Design.
D
4
Using interfaces allows a healthcare organization to avoid building applications in silos, and enables the sharing of common data elements, thus bringing greater efficiency than application integration.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
5
A clinical information systems (CIS) application that supports chemistry, pathology, blood bank, instrumentation, calculations, calibrations, and results management areas is called a:

A) Picture archive communications system (PACS).
B) Electronic data interchange (EDI).
C) Laboratory information system (LIS).
D) Radiology information system (RIS).
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
6
Despite the 2012 Robert Wood Johnson Foundation's annual report findings that hospitals are increasing adopting electronic health record systems, many healthcare organizations are still facing challenges with generating comprehensive reporting, and addressing data silos and data integrity issues.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
7
Which Open Systems Interconnection model (OSI) layer is responsible for routing and ensuring the message arrives to the destination address?

A) Transport Layer
B) Physical Layer
C) Application Layer
D) Network Layer
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
8
Extranets are networks that typically provide web-based content and access to applications and databases for users who are outside of the organization's internal network.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
9
Local area networks (LANs) are the primary networks used by desktops, servers, and network and other devices, and are used for:

A) Information sharing.
B) Resource sharing.
C) Both A and b
D) None of the above.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
10
A multiprotocol label switching (MPLS) circuit is an example of a distributed antennae system (DAS) network
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
11
Dedicated back-end computer systems designed to efficiently and cost-effectively store and transfer a healthcare organization's server data are called:

A) Wireless wide area networks (WWANs).
B) Storage area networks (SANs).
C) Hard drive networks (HDNs).
D) Desktop area networks (DANs).
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
12
A redundant array of independent drives (RAID) 10 hard drive configuration is a combination of RAID 2 and RAID 5, giving it the fastest performance and lowest cost, with the only drawback being limited availability.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
13
Voice over wireless local area network (VoWLAN) technology offers which of the following benefits?

A) Improves packet segmentation ratios by delivering ubiquitous, robust coverage.
B) Enhances voice mail features and functionality through the use of real time location tracking systems (RTLS).
C) Increases roam time and client connectivity issues.
D) Provides advance quality of service (QoS), extended talk-time, and call security.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
14
Digital signage and wayfinding, and IP television (IPTV) are considered part of the unified communications (UC) family of services.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
15
One of the first decisions facing healthcare organizations is whether they will maintain their own data center facilities, lease one or more commercially owned colocation data center facilities, or outsource (remote host) both their data center facility and computing equipment to a third party.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
16
Electrical power in data centers can be remotely measured and tracked by using a:

A) Branch circuit monitoring system (BCMS).
B) Uninterruptable power supply (UPS).
C) Data center management system (DCMS).
D) Continuous power source (CPS).
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
17
Very early smoke detection apparatus (VESDA) systems are used in data centers to provide ambient or room cooling, heating, ventilating, and air-conditioning.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
18
Which type of secondary data center facility is the least expensive to set up and maintain, but has the limitation of taking the longest to bring an organization's critical systems back online?

A) Hot site
B) Warm site
C) Tepid site
D) Cold site
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
19
Virtual tape libraries (VTLs) are backup systems that use disk-based arrays to emulate tape libraries and allow organizations to continue to use existing tape backup software.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
20
Virtual machines (VMs) can run on which type of operating systems (OSs)?

A) Windows
B) Linux
C) UNIX
D) All of the above
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
21
Zero-client computers are similar to thin-client computers, but offer the additional advantage of having no local hard drive or OS to secure or maintain.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the choice below is not an advantage of using nonpersistent virtual desktop infrastructure (VDI)?

A) Reduces help desk calls with desktop freezing or crashing, as the user can log off and log in to create a new or "fresh" desktop.
B) Improves IT standardization since each user receives the same desktop image.
C) Dedicated server storage for each VDI desktop and the user's VDI desktop is not needed.
D) Simplifies desktop upgrades because desktop upgrades are performed on the servers and not each desktop.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
23
Single sign-on (SSO) and tap 'n go technologies have the benefit of eliminating the need for users to remember their username and passwords.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
24
What mobile management strategy encompasses managing mobility at the mobile device level, and includes secure email, calendaring, contacts, web browsing, and application store management?

A) Mobile application management (MAM)
B) Mobile device management (MDM)
C) Mobile integration management (MIM)
D) Mobile content management (MCM)
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
25
A comprehensive mobile computing policy, including corresponding set of procedures and an end-user acceptance agreement is needed for healthcare organizations to successfully define and implement at bring your own device (BYOD) strategy
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
26
Which technical area should not be considered when developing a mobile computing strategy?

A) What the virtual private network (VPN) platform will be.
B) Whether enterprise directory integration will be needed.
C) Which devices and native applications will be supported.
D) Which telecommunications management capabilities and restrictions will be applied.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
27
Encryption-at-rest is an important control that ensures the security of all data traffic containing confidential or ePHI information, such as network traffic, web activity, email messaging, file transfers, text messaging, and instant messaging.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
28
A critical technology that is designed to automate and intelligently analyze system logs for anomalies and inappropriate activity is called:

A) Asset discovery.
B) An intrusion detection system (IDS).
C) Security information event management (SIEM).
D) A vulnerability assessment.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
29
Managed security services are cost-effective information security services that have the benefit of reducing the number of information security personnel needed by the healthcare organization.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 29 flashcards in this deck.