Deck 8: Technology, Applications and Security

Full screen (f)
exit full mode
Question
What is the term for a field containing redundant data that links two or more tables in a relational database?

A) Key field
B) Logic field
C) Memo field
D) Note field
Use Space or
up arrow
down arrow
to flip the card.
Question
Which is included in a data model?

A) Data content
B) Data structure
C) Storage method
D) All of the above
Question
An example of malware is

A) An attachment to an e-mail message.
B) A Web site that is collecting personal information without permission of the user.
C) A macro that is operating on a computer without permission of the user.
D) None of the above.
Question
A wireless network can be secured with the use of

A) Wired equivalent privacy protocol.
B) A firewall.
C) A virtual private network.
D) All of the above.
Question
Within a health care organization, in what department would you expect to find discussions about transmission control protocol/Internet protocol (TCP/IP)?

A) Patient accounting
B) Medical records
C) Data communication
D) Software development
Question
An industry standard sublanguage, command-driven, designed to manipulate relational databases is known as

A) SQL.
B) HL7.
C) Q&A.
D) R-ADT.
Question
All the following are data input devices except

A) Printer.
B) Tablet.
C) Smartphone.
D) Keyboard.
Question
An example of a relational database management system in personal computer software is

A) PowerPoint.
B) Word.
C) Access.
D) Excel.
Question
A repository of electronic information about many patients is called a ____________________.
Question
Minimum log data for audit trail purposes contain which of the following?

A) File and user identification
B) Transaction
C) Access time
D) All of the above
Question
Each health care provider organization needs a disaster recovery plan for critical information because

A) The plan allows for additional reimbursement by third-party payers.
B) The plan is automatically implemented when a new computer is purchased.
C) The plan will attract more highly skilled IT employees.
D) The plan is required by HIPAA.
Question
What is the term given to the study of medical computing?
Question
Which is a system designed to acquire, store, retrieve, and display digital images?

A) Registration/admission, discharge, transfer system
B) Database management system
C) Computerized order entry system
D) Picture archiving and communication system
Question
In what generation language would you find a program generator?
Question
Which of the following is an example of a departmental information system?

A) Business Intelligence
B) Radiology
C) Centers for Disease Control and Prevention surveillance
D) Master patient index
Question
Symbology is the term used to describe

A) The abbreviation policy for the health care organization.
B) The font in which a machine-readable code is written.
C) The review of illegible handwriting.
D) None of the above.
Question
Which of the following would not be an example of an alert found on a CDSS system?

A) "The patient is allergic to this drug."
B) "The patient is receiving a similar drug to this order."
C) "Your password is going to expire in 10 days."
D) "The drug being ordered is on a restricted formulary. Call for approval."
Question
What is the program called that contains the set of instructions that tells the computer what to do?
Question
A primary feature that a radio frequency identification device (RFID) tag contains that a bar code does not is that

A) An RFID tag has write-many capabilities.
B) An RFID tag can be printed on labels.
C) An RFID tag number will never be repeated.
D) An RFID tag is less expensive than a bar code.
Question
Which of the following is a data input device?

A) Server
B) Scanner
C) Sensor
D) Both b and c
Question
List three functions that an ADT system can support.
Question
Provide two examples of what can be read by a biometric device.
Question
Define an ERP.
Question
What does the term "store-and-forward" refer to in telemedicine?
Question
List one difference between thick-client and thin-client computers.
Question
In the relational model, a patient has two different patient identification numbers from different clinics within a health system. How would the relationship be defined for the patient's social security number and these patient identifiers?
Question
List one benefit of using an interface engine instead of a point-to-point interface.
Question
What are the typical five roles defined in role-based access control (RBAC)?
Question
Contrast a decision-support and a business intelligence system.
Question
A physician's office wants to install software to process patient claims to each insurer. Because patients have multiple types of insurance, the software will need not only to transmit the claims but also to understand what information needs to be sent to each insurer. Would you choose a two-tier or three-tier architecture for this application? Why?
Question
Given the relational database model principles, what is the most effective way to store each patient's address?
Question
List one reason why health care information systems have been able to expand in both scope and presence in most health care organizations.
Question
Within an object-oriented database, there are two objects-a social worker and a nurse. There is a third object, employee, of which the social worker and nurse are members. What does the concept of "inheritance" refer to in this example?
Question
Give an example of a type of document that would be found on an organization's Intranet.
Question
Explain what S-HTTP refers to.
Question
List the four popular database models.
Question
What is the hierarchical model effective for?
Question
Explain why there are issues with physician licensing in telemedicine.
Question
What is one advantage of using thin-clients when upgrading a software application?
Question
List the two components of a two-tier architecture.
Question
A point-of-care system may include order entry decision support systems.
Question
Explain the differences between a data mart and a data repository.
Question
Information can be input and retrieved by use of a smartphone.
Question
Frames are required to be in each Web page containing health information.
Question
A virtual machine is able to be connected directly to the information warehouse.
Question
A point-of-care health information system includes bedside workstations, biomedical devices, and local area networks (LANs).
Question
A user interface is often designed by both users and nonusers of the application.
Question
The Health Insurance Portability and Accountability Act (HIPAA) Security Rule specifies specific software applications that are required for two-factor authentication.
Question
JAVA compilers are usually found in Web browsers.
Question
In a database, a row is a data field.
Question
Communications technology is the connecting medium for local area networks (LANs) and wide area networks (WANs).
Question
A syndromic surveillance system would be used in treating a patient in a physician's office.
Question
Standard query language (SQL) is designed to enable queries to databases.
Question
The public keys used in encryption are distributed by the U.S. government.
Question
A hospital is trying to determine the cause of the recent increase in the average length of stay. Explain why a data mining approach to answering this question might be useful.
Question
Secure socket layer (SSL) is an example of public key/private key encryption.
Question
Each wireless network has a service set identifier.
Question
Results reporting is the process of scanning documents into a clinical system.
Question
Standard query language (SQL) is a type of database model.
Question
Voice recognition both records the information being said and understands what is being said.
Question
QR code technology allows for all kinds of documents to contain a QR code and be able to be read without a specialized bar code scanner.
Question
A good design of a Web page will enable the user to obtain the information in the fewest possible steps.
Question
Hypertext links on a Web page are usually used to reference materials that are available on a separate Web site.
Question
A business intelligence application is used for the same purpose as a decision support system.
Question
Clinical context object workstation (CCOW) is specifically mentioned in the Health Insurance Portability and Accountability Act (HIPAA) Security Rule.
Question
Virtual communities are an aggregation of individuals or business partners who interact around a shared interest, where the interaction is at least partially supported and/or mediated by technology.
Question
A business intelligence system could access community data systems and other external systems for its stated purposes with appropriate authorization.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/67
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Technology, Applications and Security
1
What is the term for a field containing redundant data that links two or more tables in a relational database?

A) Key field
B) Logic field
C) Memo field
D) Note field
Key field
2
Which is included in a data model?

A) Data content
B) Data structure
C) Storage method
D) All of the above
All of the above
3
An example of malware is

A) An attachment to an e-mail message.
B) A Web site that is collecting personal information without permission of the user.
C) A macro that is operating on a computer without permission of the user.
D) None of the above.
A Web site that is collecting personal information without permission of the user.
4
A wireless network can be secured with the use of

A) Wired equivalent privacy protocol.
B) A firewall.
C) A virtual private network.
D) All of the above.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
5
Within a health care organization, in what department would you expect to find discussions about transmission control protocol/Internet protocol (TCP/IP)?

A) Patient accounting
B) Medical records
C) Data communication
D) Software development
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
6
An industry standard sublanguage, command-driven, designed to manipulate relational databases is known as

A) SQL.
B) HL7.
C) Q&A.
D) R-ADT.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
7
All the following are data input devices except

A) Printer.
B) Tablet.
C) Smartphone.
D) Keyboard.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
8
An example of a relational database management system in personal computer software is

A) PowerPoint.
B) Word.
C) Access.
D) Excel.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
9
A repository of electronic information about many patients is called a ____________________.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
10
Minimum log data for audit trail purposes contain which of the following?

A) File and user identification
B) Transaction
C) Access time
D) All of the above
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
11
Each health care provider organization needs a disaster recovery plan for critical information because

A) The plan allows for additional reimbursement by third-party payers.
B) The plan is automatically implemented when a new computer is purchased.
C) The plan will attract more highly skilled IT employees.
D) The plan is required by HIPAA.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
12
What is the term given to the study of medical computing?
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
13
Which is a system designed to acquire, store, retrieve, and display digital images?

A) Registration/admission, discharge, transfer system
B) Database management system
C) Computerized order entry system
D) Picture archiving and communication system
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
14
In what generation language would you find a program generator?
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following is an example of a departmental information system?

A) Business Intelligence
B) Radiology
C) Centers for Disease Control and Prevention surveillance
D) Master patient index
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
16
Symbology is the term used to describe

A) The abbreviation policy for the health care organization.
B) The font in which a machine-readable code is written.
C) The review of illegible handwriting.
D) None of the above.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following would not be an example of an alert found on a CDSS system?

A) "The patient is allergic to this drug."
B) "The patient is receiving a similar drug to this order."
C) "Your password is going to expire in 10 days."
D) "The drug being ordered is on a restricted formulary. Call for approval."
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
18
What is the program called that contains the set of instructions that tells the computer what to do?
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
19
A primary feature that a radio frequency identification device (RFID) tag contains that a bar code does not is that

A) An RFID tag has write-many capabilities.
B) An RFID tag can be printed on labels.
C) An RFID tag number will never be repeated.
D) An RFID tag is less expensive than a bar code.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is a data input device?

A) Server
B) Scanner
C) Sensor
D) Both b and c
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
21
List three functions that an ADT system can support.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
22
Provide two examples of what can be read by a biometric device.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
23
Define an ERP.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
24
What does the term "store-and-forward" refer to in telemedicine?
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
25
List one difference between thick-client and thin-client computers.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
26
In the relational model, a patient has two different patient identification numbers from different clinics within a health system. How would the relationship be defined for the patient's social security number and these patient identifiers?
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
27
List one benefit of using an interface engine instead of a point-to-point interface.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
28
What are the typical five roles defined in role-based access control (RBAC)?
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
29
Contrast a decision-support and a business intelligence system.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
30
A physician's office wants to install software to process patient claims to each insurer. Because patients have multiple types of insurance, the software will need not only to transmit the claims but also to understand what information needs to be sent to each insurer. Would you choose a two-tier or three-tier architecture for this application? Why?
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
31
Given the relational database model principles, what is the most effective way to store each patient's address?
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
32
List one reason why health care information systems have been able to expand in both scope and presence in most health care organizations.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
33
Within an object-oriented database, there are two objects-a social worker and a nurse. There is a third object, employee, of which the social worker and nurse are members. What does the concept of "inheritance" refer to in this example?
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
34
Give an example of a type of document that would be found on an organization's Intranet.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
35
Explain what S-HTTP refers to.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
36
List the four popular database models.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
37
What is the hierarchical model effective for?
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
38
Explain why there are issues with physician licensing in telemedicine.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
39
What is one advantage of using thin-clients when upgrading a software application?
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
40
List the two components of a two-tier architecture.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
41
A point-of-care system may include order entry decision support systems.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
42
Explain the differences between a data mart and a data repository.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
43
Information can be input and retrieved by use of a smartphone.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
44
Frames are required to be in each Web page containing health information.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
45
A virtual machine is able to be connected directly to the information warehouse.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
46
A point-of-care health information system includes bedside workstations, biomedical devices, and local area networks (LANs).
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
47
A user interface is often designed by both users and nonusers of the application.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
48
The Health Insurance Portability and Accountability Act (HIPAA) Security Rule specifies specific software applications that are required for two-factor authentication.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
49
JAVA compilers are usually found in Web browsers.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
50
In a database, a row is a data field.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
51
Communications technology is the connecting medium for local area networks (LANs) and wide area networks (WANs).
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
52
A syndromic surveillance system would be used in treating a patient in a physician's office.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
53
Standard query language (SQL) is designed to enable queries to databases.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
54
The public keys used in encryption are distributed by the U.S. government.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
55
A hospital is trying to determine the cause of the recent increase in the average length of stay. Explain why a data mining approach to answering this question might be useful.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
56
Secure socket layer (SSL) is an example of public key/private key encryption.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
57
Each wireless network has a service set identifier.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
58
Results reporting is the process of scanning documents into a clinical system.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
59
Standard query language (SQL) is a type of database model.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
60
Voice recognition both records the information being said and understands what is being said.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
61
QR code technology allows for all kinds of documents to contain a QR code and be able to be read without a specialized bar code scanner.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
62
A good design of a Web page will enable the user to obtain the information in the fewest possible steps.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
63
Hypertext links on a Web page are usually used to reference materials that are available on a separate Web site.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
64
A business intelligence application is used for the same purpose as a decision support system.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
65
Clinical context object workstation (CCOW) is specifically mentioned in the Health Insurance Portability and Accountability Act (HIPAA) Security Rule.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
66
Virtual communities are an aggregation of individuals or business partners who interact around a shared interest, where the interaction is at least partially supported and/or mediated by technology.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
67
A business intelligence system could access community data systems and other external systems for its stated purposes with appropriate authorization.
Unlock Deck
Unlock for access to all 67 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 67 flashcards in this deck.