Health Insurance Portability & Accountability Act (HIPAA) is a Federal Law
designed to facilitate the electronic exchange of information in health care.
Which of the following does not pertain to this law?
a)Privacy protection components of the law limit non-consensual use as
a release or private health information
b) Patients must receive notice of privacy rights
c) Restrictions on access to and use of information is required
d)Criminal and civil sanctions do not exist for improper use and
disclosure correct answersD
Separate computer systems are often linked together in order to share
data and information. When all components of the network are located
within close proximity of one another, perhaps within a single facility, the
network known as a:
e) Wide Area Network (WAN)
f) World Wide Web (WWW)
g)Local Area Network (LAN)
h) Electronic Data Interchange (EDI) correct answersC
Healthcare organizations had established standards to maintain data
security and protect the privacy and confidentiality of patients' records
information. Which one of the following answers does not describe its data
security elements:
i) Protect against system failures
j) Protect against external catastrophic events
k) Facilitate access to computer files to authorized personnel
l) Control access to computer files by unauthorized personnel correct
answersC
W Client/server architecture back-end (server) functions include all of
the following except:
m)Printing
n) Applications program execution
o) Decision support
p) Communication correct answersC
Star networks have an advantage of:
q) Relative ease of wiring the network and relatively fast
communications
r) Facilitating construction of high spend networks that operate over
large distances
s) Ease with which nodes can be added to an existing network
t)Require less cabling than networks using other topologies correct
answersC. 1-refers to Bus networks, 2 refers to ring networks, and 4 is
incorrect because Star networks require more cabling than other networks
,Advantages of outsourcing include all of the following except,
a) Staffing reductions
b) Increased implementation time
c) Smaller capital investments
d) More predictable costs correct answersB
Although purchasing or leasing commercial software is most common, what
is becoming a viable source of information technology and systems for
smaller healthcare organizations?
e) In house design and programming
f) Outsourcing
g)ASP-applications service provider
h) Combining Outsourcing and in-house design correct answersC
Which of the following is NOT one of the three general categories of
information systems used in healthcare organizations:
i) Clinical Information Systems
j) Composite Healthcare Systems
k) Administrative/Financial Systems
l) Decision Support Systems for Strategic Management correct
answersB
A comprehensive information security policy should include all of the
following elements except:
m)Management Policies
n) Data back up and recovery
o) Physical security
p) Technical controls correct answersB
Which of the following is NOT part of the System Development Life Cycle?
q) System Analysis
r) System Adjustment
s) System Implementation
t) System Acquisition correct answersB
The Information Services Advisory Committee provides insight into user
needs and helps gain acceptance of information systems. Which of the
following is NOT a charge of the committee:
u) Encouraging appropriate use of information services
v)Ranking information services investment opportunities and
recommending a rank- ordered list of proposals to the governing board.
w)Providing technical support to implement an integrated information
system.
x)Monitoring performance of the department and suggesting possible
improvements correct answersC
One of the functions of an IS system is to ensure the integrity, quality, and
security of data. Which of the following does not fall in this content area?
, a) Defines measures and terminology
b) Captures historic as opposed to current data
c) Improves the process for data input
d) Guards against data loss correct answersB
In the IT System Development Life Cycle, which is the most important step:
e) System Analysis
f) System Design
g)System Acquisition
h) System Implementation correct answersA
Which of the following is not an actual active IT policy and Procedure
components?
i) Procedures against system failure and catastrophic events
j) Control against viruses
k) Quality of Software
l) Confidentiality for authorized users correct answersC
The importance of the Intranet vs. the Internet is that employees could:
m)Evaluate Policies, Procedure, Protocols and organizational manuals
n) Receive education sessions
o) Communicate and interact with patients
p) All correct answersD
The type of computer network that allows multiple workstations to
share the data contained in files on a server is called:
q) Peer Network
r) File/Server
s) Terminal Host Systems
t) Client/Server Computing correct answersB
Which is not example of a Strategic Decision Support Application?
u) Strategic planning
v) Disease management
w)Marketing
x) Resource allocation correct answersB
Which of the following is not a key part of HIPAA Implementation:
y) Establishment of enhanced privacy protection policies
z) Establishment of compliance committees and private offices
aa)Establishment of clinical guidelines for patient care
ab)Use of HIPAA compliant software correct answersC
Which is not a role of the Information Service Advisory Committee?
ac)Participation in the development of the IS plan, resolving the strategic
priorities, and recommending the plan to the governing board.
ad)Encouraging appropriate use of information services