Deck 7: Technology, Applications, and Security

Full screen (f)
exit full mode
Question
Minimum log data for audit trail purposes contain which of the following?

A) File and user identification
B) Transaction
C) Access time
D) All of the above
Use Space or
up arrow
down arrow
to flip the card.
Question
Within a health care organization, in what department would you expect to find discussions about transmission control protocol/Internet (TCP/IP)?

A) Patient accounting
B) Medical records
C) Data communication
D) Software development
Question
A point-of-care health information system includes bedside workstations, biomedical devices, and local area networks (LANs).
Question
Which of the following would not be an example of an alert found on a CDSS system?

A) "The patient is allergic to this drug."
B) "The patient is receiving a similar drug to this order."
C) "Your password is going to expire in 10 days."
D) "The drug being ordered is on a restricted formulary. Call for approval."
Question
What is the term for a field containing redundant data that links two or more tables in a relational database?

A) Key field
B) Logic field
C) Memo field
D) Note field
Question
Which is included in a data model?

A) Data content
B) Data structure
C) Storage method
D) All of the above
Question
Which is a system designed to acquire, store, retrieve, and display digital images?

A) Registration/admission, discharge, transfer system
B) Database management system
C) Communications order entry system
D) Picture archiving and communication system
Question
In a database, a row is a data field.
Question
Which of the following is an example of a departmental information system?

A) Executive information
B) Radiology
C) Centers for Disease Control and Prevention surveillance
D) Master patient index
Question
A common workstation is a minicomputer connected directly to the information warehouse.
Question
An industry standard sublanguage, command driven, designed to manipulate relational databases is known as:

A) SQL.
B) HL7.
C) Q&A.
D) R-ADT.
Question
Each health care provider organization should have a disaster recovery plan for critical information because:

A) The plan allows for additional reimbursement by third-party payers.
B) The plan is automatically implemented when a new computer is purchased.
C) The plan will attract more highly skilled IT employees.
D) The plan is required by HIPAA.
Question
An example of malware is:

A) An attachment to an e-mail message.
B) A Web site that is collecting personal information without permission of the user.
C) A macro that is operating on a computer without permission of the user.
D) None of the above.
Question
A wireless network can be secured with the use of:

A) Wired equivalent privacy protocol.
B) A firewall.
C) A virtual private network.
D) All of the above.
Question
A point-of-care system includes order entry medical decision support systems.
Question
A primary feature that an radio frequency identification device (RFID) tag contains that a bar code does not is:

A) An RFID tag has write-many capabilities.
B) An RFID tag can be printed on labels.
C) An RFID tag number will never be repeated.
D) An RFID tag is less expensive than a bar code.
Question
Which of the following is a data input device?

A) Server
B) Scanner
C) Sensor
D) Both b and c
Question
An example of a relational database management personal computer software is:

A) PowerPoint.
B) Word.
C) Access.
D) Excel.
Question
All the following are data input devices except:

A) Printer.
B) Light pen.
C) Handheld computer.
D) Keyboard.
Question
Symbology is the term used to describe:

A) The abbreviation policy for the health care organization.
B) The font in which a machine-readable code is written.
C) The review of illegible handwriting.
D) None of the above.
Question
A syndromic surveillance system would be used in treating a patient in a physician's office.
Question
Frames are required to be in each Web page containing health information.
Question
Executive information systems can access community data systems and other external systems for its stated purposes with appropriate authorization.
Question
A user interface is often designed by both users and nonusers of the application.
Question
An executive information system is the same as a decision support system.
Question
The public keys used in encryption are distributed by the U.S. government.
Question
The Health Insurance Portability and Accountability Act (HIPAA) Security Rule specifies specific software applications that are required for two-factor authentication.
Question
Standard query language (SQL) is designed to facilitate queries from databases.
Question
A good design of a Web page will enable the user to obtain the information in the fewest possible steps.
Question
A repository of electronic information about many patients is called a ____________________.
Question
Secure socket layer (SSL) is an example of public key/private key encryption.
Question
Information can be input and retrieved by use of a personal data assistant.
Question
Clinical context object workstation (CCOW) is specifically mentioned in the Health Insurance Portability and Accountability Act (HIPAA) Security Rule.
Question
Standard query language (SQL) is a type of database model.
Question
Communications technology is the connecting medium for local area networks (LANs) and wide area networks (WANs).
Question
Hypertext links on a Web page are usually used to reference materials that are available on separate Web site.
Question
Voice recognition both records the information being said as well as understands what is being said.
Question
Each wireless network has a service set identifier.
Question
JAVA compilers are usually found in Web browsers.
Question
Results reporting is the process of scanning documents into a system.
Question
What is one advantage of using thin-clients when upgrading a software application?
Question
List the four popular database models.
Question
Within an object-oriented database, there are two objects-a social worker and a nurse. There is a third object, employee, of which the social worker and nurse are members. What does the concept of "inheritance" refer to in this example?
Question
Define an ERP.
Question
List three functions that an ADT system can support.
Question
In the relational model, a patient has two different patient identification numbers from different clinics within a health system. How would the relationship be defined for the patient's social security number and these patient identifiers?
Question
Explain what S-HTTP refers to.
Question
List one benefit of using an interface engine instead of a point-to-point interface.
Question
A physician's office wants to install software to process patient claims to each insurer. Because patients have multiple types of insurance, the software will need to not only transmit the claims but also understand what information needs to be sent to each insurer. Would you choose a two-tier or three-tier architecture for this application? Why?
Question
List the two components of a two-tier architecture.
Question
List one reason why health care information systems have been able to expand in both scope and presence in most health care organizations.
Question
What does the term "store-and-forward" refer to in telemedicine?
Question
Give an example of a type of document that would be found on an organization's Intranet.
Question
List one difference between thick-client and thin-client computers.
Question
What is the term given to the study of medical computing?
Question
Contrast a decision-support and an executive information system.
Question
What is the hierarchical model effective for?
Question
Given the relational database model principles, what is the most effective way to store each patient's address?
Question
In what generation language would you find a program generator?
Question
What is the program called that contains the set of instructions that tells the computer what to do?
Question
What are the typical five roles defined in role-based access control (RBAC)?
Question
Provide two examples of what can be read by a biometric device.
Question
A hospital is trying to determine the cause in the recent increase in the average length of stay. Explain why a data mining approach to answering this question might be useful.
Question
Explain why there are issues with physician licensing in telemedicine.
Question
Explain the differences between a data mart and a data repository.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/65
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Technology, Applications, and Security
1
Minimum log data for audit trail purposes contain which of the following?

A) File and user identification
B) Transaction
C) Access time
D) All of the above
All of the above
2
Within a health care organization, in what department would you expect to find discussions about transmission control protocol/Internet (TCP/IP)?

A) Patient accounting
B) Medical records
C) Data communication
D) Software development
Data communication
3
A point-of-care health information system includes bedside workstations, biomedical devices, and local area networks (LANs).
True
4
Which of the following would not be an example of an alert found on a CDSS system?

A) "The patient is allergic to this drug."
B) "The patient is receiving a similar drug to this order."
C) "Your password is going to expire in 10 days."
D) "The drug being ordered is on a restricted formulary. Call for approval."
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
5
What is the term for a field containing redundant data that links two or more tables in a relational database?

A) Key field
B) Logic field
C) Memo field
D) Note field
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
6
Which is included in a data model?

A) Data content
B) Data structure
C) Storage method
D) All of the above
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
7
Which is a system designed to acquire, store, retrieve, and display digital images?

A) Registration/admission, discharge, transfer system
B) Database management system
C) Communications order entry system
D) Picture archiving and communication system
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
8
In a database, a row is a data field.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is an example of a departmental information system?

A) Executive information
B) Radiology
C) Centers for Disease Control and Prevention surveillance
D) Master patient index
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
10
A common workstation is a minicomputer connected directly to the information warehouse.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
11
An industry standard sublanguage, command driven, designed to manipulate relational databases is known as:

A) SQL.
B) HL7.
C) Q&A.
D) R-ADT.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
12
Each health care provider organization should have a disaster recovery plan for critical information because:

A) The plan allows for additional reimbursement by third-party payers.
B) The plan is automatically implemented when a new computer is purchased.
C) The plan will attract more highly skilled IT employees.
D) The plan is required by HIPAA.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
13
An example of malware is:

A) An attachment to an e-mail message.
B) A Web site that is collecting personal information without permission of the user.
C) A macro that is operating on a computer without permission of the user.
D) None of the above.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
14
A wireless network can be secured with the use of:

A) Wired equivalent privacy protocol.
B) A firewall.
C) A virtual private network.
D) All of the above.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
15
A point-of-care system includes order entry medical decision support systems.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
16
A primary feature that an radio frequency identification device (RFID) tag contains that a bar code does not is:

A) An RFID tag has write-many capabilities.
B) An RFID tag can be printed on labels.
C) An RFID tag number will never be repeated.
D) An RFID tag is less expensive than a bar code.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is a data input device?

A) Server
B) Scanner
C) Sensor
D) Both b and c
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
18
An example of a relational database management personal computer software is:

A) PowerPoint.
B) Word.
C) Access.
D) Excel.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
19
All the following are data input devices except:

A) Printer.
B) Light pen.
C) Handheld computer.
D) Keyboard.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
20
Symbology is the term used to describe:

A) The abbreviation policy for the health care organization.
B) The font in which a machine-readable code is written.
C) The review of illegible handwriting.
D) None of the above.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
21
A syndromic surveillance system would be used in treating a patient in a physician's office.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
22
Frames are required to be in each Web page containing health information.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
23
Executive information systems can access community data systems and other external systems for its stated purposes with appropriate authorization.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
24
A user interface is often designed by both users and nonusers of the application.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
25
An executive information system is the same as a decision support system.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
26
The public keys used in encryption are distributed by the U.S. government.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
27
The Health Insurance Portability and Accountability Act (HIPAA) Security Rule specifies specific software applications that are required for two-factor authentication.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
28
Standard query language (SQL) is designed to facilitate queries from databases.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
29
A good design of a Web page will enable the user to obtain the information in the fewest possible steps.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
30
A repository of electronic information about many patients is called a ____________________.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
31
Secure socket layer (SSL) is an example of public key/private key encryption.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
32
Information can be input and retrieved by use of a personal data assistant.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
33
Clinical context object workstation (CCOW) is specifically mentioned in the Health Insurance Portability and Accountability Act (HIPAA) Security Rule.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
34
Standard query language (SQL) is a type of database model.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
35
Communications technology is the connecting medium for local area networks (LANs) and wide area networks (WANs).
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
36
Hypertext links on a Web page are usually used to reference materials that are available on separate Web site.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
37
Voice recognition both records the information being said as well as understands what is being said.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
38
Each wireless network has a service set identifier.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
39
JAVA compilers are usually found in Web browsers.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
40
Results reporting is the process of scanning documents into a system.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
41
What is one advantage of using thin-clients when upgrading a software application?
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
42
List the four popular database models.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
43
Within an object-oriented database, there are two objects-a social worker and a nurse. There is a third object, employee, of which the social worker and nurse are members. What does the concept of "inheritance" refer to in this example?
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
44
Define an ERP.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
45
List three functions that an ADT system can support.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
46
In the relational model, a patient has two different patient identification numbers from different clinics within a health system. How would the relationship be defined for the patient's social security number and these patient identifiers?
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
47
Explain what S-HTTP refers to.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
48
List one benefit of using an interface engine instead of a point-to-point interface.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
49
A physician's office wants to install software to process patient claims to each insurer. Because patients have multiple types of insurance, the software will need to not only transmit the claims but also understand what information needs to be sent to each insurer. Would you choose a two-tier or three-tier architecture for this application? Why?
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
50
List the two components of a two-tier architecture.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
51
List one reason why health care information systems have been able to expand in both scope and presence in most health care organizations.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
52
What does the term "store-and-forward" refer to in telemedicine?
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
53
Give an example of a type of document that would be found on an organization's Intranet.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
54
List one difference between thick-client and thin-client computers.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
55
What is the term given to the study of medical computing?
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
56
Contrast a decision-support and an executive information system.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
57
What is the hierarchical model effective for?
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
58
Given the relational database model principles, what is the most effective way to store each patient's address?
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
59
In what generation language would you find a program generator?
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
60
What is the program called that contains the set of instructions that tells the computer what to do?
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
61
What are the typical five roles defined in role-based access control (RBAC)?
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
62
Provide two examples of what can be read by a biometric device.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
63
A hospital is trying to determine the cause in the recent increase in the average length of stay. Explain why a data mining approach to answering this question might be useful.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
64
Explain why there are issues with physician licensing in telemedicine.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
65
Explain the differences between a data mart and a data repository.
Unlock Deck
Unlock for access to all 65 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 65 flashcards in this deck.