ECO 320 FINAL AND MIDTERM EXAM 2025
COMPLETE QUESTIONS AND CORRECT
VERIFIED ANSWERS |ALREADY GRADED A+
1. Which information in an electronic medical record (EMP) helps a nurse plan &
manage a patient's post-operative care after open-heart surgery CORRECT
ANSWERProvider orders
2. Which information in a patient's electronic medical record (EMA), in addition to
the nursing flowsheets & provider orders, helps a nurse plan & manage
fluctuations in blood glucose levels CORRECT ANSWERMAR
3. A nurse is planning the care for a patient admitted to the hospital with COVID-
19 Which list of information in the electronic medical record (EMR) will help the
nurse plan the care for this patient CORRECT ANSWERThe patient's
laboratory results over the last 72 hours
4. Which clinical note type is exempt from being shared with patients according to
the United States Core Data for Interoperability (USC DI) standards CORRECT
ANSWERPsychotherapy notes
5. Operating room (OR) staff are reliant upon a manual white board for patient
tracking. Recently, surgeons have complained that the turnaround time between
surgical cases has increased & blame the manual tracking system. An informatics
nurse recommends expanding use of the existing surgical information system
(SIS). Which resolution can improve this workflow issue CORRECT
ANSWERRadio frequency identification (RFID) in patient labels
,6. An informatics nurse & an emergency nurse are conducting an analysis of a
patient admission from the ER CORRECT ANSWERWhich tool should these
nurses use for a process analysis? SWOT template
7. What is an effective way to reduce the risk of access of electronic protected
health information (ePHI) by unauthorized users CORRECT ANSWERMake
sure all the users adhere to security & confidential policy set forth by the facility
8. How does a healthcare policy assure access to health information by authorized
users CORRECT ANSWERIt creates a reliable method to verify the identities
of users accessing health information
9. Which statement describes the application of meaningful use CORRECT
ANSWERProvider needs to show the use of the Electronic Health Record (EHR)
technology
10. What is the typical role of the informatics nurse CORRECT
ANSWERPlans, coordinates, & facilitates education for all computer
applications & software for nursing or clinical user group
11. A patients glucose blood sugar is 400. What is a one-time kind of report
CORRECT ANSWERAd Hoc
12. Which clinical information technology enables providers to document patient
assessments CORRECT ANSWERVitals signs capture
13. A patient is being transferred to another hospital, however the hospital he is
being transferred to does not have access to the Electronic Health Record (EHR)
,since they use EPIC. How will they receive his Electronic Health Record (EHR)
CORRECT ANSWERContinuity care record from AMR
14. Which statement best describes Nursing Informatics CORRECT
ANSWER"Computer science, decision science, information science,
management science, cognitive science, & organizational theory."
15. The nurse receives report that there are new orders to review. Where does the
nurse look to verify this information CORRECT ANSWERThe Kardex
16. What is the goal of Merit-Based Incentive Payment System (MIPS) &
Meaningful Use (MU) CORRECT ANSWERPatient quality care
17. What is a type of phishing CORRECT ANSWERTrojan
18. What is Data governance CORRECT ANSWERDefines who can take
what action, upon what data, in what situations, using what methods
19. A provider at the hospital had his laptop stolen from his vehicle. What should
be on his laptop to protect it from data breach CORRECT
ANSWEREncryption
20. What is the name of the process that begins with conception & continues
through implementation CORRECT ANSWERSystems Development Life
Cycle (SDLC)
, 21. What is the intent of the Clinical Decision Support (CDS) System
CORRECT ANSWERThis is an application that supports healthcare
practitioners in making patient-care decisions
22. What is the term for sharing a person's personal information with other
individuals electronically CORRECT ANSWERInformation sharing
23. When a physician arrives on the unit, a nurse is asked about the fluid status of a
patient. Where should the nurse find this information CORRECT
ANSWERThe intake & output chart
24. Why is it important to control the number of warnings in Electronic Health
Record (EHR) CORRECT ANSWERAlert fatigue
25. Which change theory begins with creating urgency CORRECT
ANSWERKotter's Models
26. Which act in 2009 did Meaningful Use (MU) originate CORRECT
ANSWERAmerican Recover & Reinvestment Act (ARRA) act in 2009
27. What is the primary concern driving Nursing informatic initiative
CORRECT ANSWERPatient safety
28. What can be installed to allow one operation to access another to enable the
exchange of data CORRECT ANSWERIntegration
29. Which type of chart uses rectangle, oval & diamonds in both CORRECT
ANSWERFlowchart
COMPLETE QUESTIONS AND CORRECT
VERIFIED ANSWERS |ALREADY GRADED A+
1. Which information in an electronic medical record (EMP) helps a nurse plan &
manage a patient's post-operative care after open-heart surgery CORRECT
ANSWERProvider orders
2. Which information in a patient's electronic medical record (EMA), in addition to
the nursing flowsheets & provider orders, helps a nurse plan & manage
fluctuations in blood glucose levels CORRECT ANSWERMAR
3. A nurse is planning the care for a patient admitted to the hospital with COVID-
19 Which list of information in the electronic medical record (EMR) will help the
nurse plan the care for this patient CORRECT ANSWERThe patient's
laboratory results over the last 72 hours
4. Which clinical note type is exempt from being shared with patients according to
the United States Core Data for Interoperability (USC DI) standards CORRECT
ANSWERPsychotherapy notes
5. Operating room (OR) staff are reliant upon a manual white board for patient
tracking. Recently, surgeons have complained that the turnaround time between
surgical cases has increased & blame the manual tracking system. An informatics
nurse recommends expanding use of the existing surgical information system
(SIS). Which resolution can improve this workflow issue CORRECT
ANSWERRadio frequency identification (RFID) in patient labels
,6. An informatics nurse & an emergency nurse are conducting an analysis of a
patient admission from the ER CORRECT ANSWERWhich tool should these
nurses use for a process analysis? SWOT template
7. What is an effective way to reduce the risk of access of electronic protected
health information (ePHI) by unauthorized users CORRECT ANSWERMake
sure all the users adhere to security & confidential policy set forth by the facility
8. How does a healthcare policy assure access to health information by authorized
users CORRECT ANSWERIt creates a reliable method to verify the identities
of users accessing health information
9. Which statement describes the application of meaningful use CORRECT
ANSWERProvider needs to show the use of the Electronic Health Record (EHR)
technology
10. What is the typical role of the informatics nurse CORRECT
ANSWERPlans, coordinates, & facilitates education for all computer
applications & software for nursing or clinical user group
11. A patients glucose blood sugar is 400. What is a one-time kind of report
CORRECT ANSWERAd Hoc
12. Which clinical information technology enables providers to document patient
assessments CORRECT ANSWERVitals signs capture
13. A patient is being transferred to another hospital, however the hospital he is
being transferred to does not have access to the Electronic Health Record (EHR)
,since they use EPIC. How will they receive his Electronic Health Record (EHR)
CORRECT ANSWERContinuity care record from AMR
14. Which statement best describes Nursing Informatics CORRECT
ANSWER"Computer science, decision science, information science,
management science, cognitive science, & organizational theory."
15. The nurse receives report that there are new orders to review. Where does the
nurse look to verify this information CORRECT ANSWERThe Kardex
16. What is the goal of Merit-Based Incentive Payment System (MIPS) &
Meaningful Use (MU) CORRECT ANSWERPatient quality care
17. What is a type of phishing CORRECT ANSWERTrojan
18. What is Data governance CORRECT ANSWERDefines who can take
what action, upon what data, in what situations, using what methods
19. A provider at the hospital had his laptop stolen from his vehicle. What should
be on his laptop to protect it from data breach CORRECT
ANSWEREncryption
20. What is the name of the process that begins with conception & continues
through implementation CORRECT ANSWERSystems Development Life
Cycle (SDLC)
, 21. What is the intent of the Clinical Decision Support (CDS) System
CORRECT ANSWERThis is an application that supports healthcare
practitioners in making patient-care decisions
22. What is the term for sharing a person's personal information with other
individuals electronically CORRECT ANSWERInformation sharing
23. When a physician arrives on the unit, a nurse is asked about the fluid status of a
patient. Where should the nurse find this information CORRECT
ANSWERThe intake & output chart
24. Why is it important to control the number of warnings in Electronic Health
Record (EHR) CORRECT ANSWERAlert fatigue
25. Which change theory begins with creating urgency CORRECT
ANSWERKotter's Models
26. Which act in 2009 did Meaningful Use (MU) originate CORRECT
ANSWERAmerican Recover & Reinvestment Act (ARRA) act in 2009
27. What is the primary concern driving Nursing informatic initiative
CORRECT ANSWERPatient safety
28. What can be installed to allow one operation to access another to enable the
exchange of data CORRECT ANSWERIntegration
29. Which type of chart uses rectangle, oval & diamonds in both CORRECT
ANSWERFlowchart