100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D220 Information Technology in Nursing Questions And Answers

Rating
-
Sold
-
Pages
23
Grade
A+
Uploaded on
16-02-2025
Written in
2024/2025

WGU D220 Information Technology in Nursing Questions And Answers

Institution
WGU D220
Course
WGU D220










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D220
Course
WGU D220

Document information

Uploaded on
February 16, 2025
Number of pages
23
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • wgu d220

Content preview

WGU D220 Information Technology in
Nursing Questions And Answers


1. Which information in an electronic medical record (EMP) helps a nurse plan &
manage a patient's post-operative care after open-heart surgery - Correct Answer-
Provider orders

2. Which information in a patient's electronic medical record (EMA), in addition to the
nursing flowsheets & provider orders, helps a nurse plan & manage fluctuations in blood
glucose levels - Correct Answer-MAR

3. A nurse is planning the care for a patient admitted to the hospital with COVID-19
Which list of information in the electronic medical record (EMR) will help the nurse plan
the care for this patient - Correct Answer-The patient's laboratory results over the last
72 hours

4. Which clinical note type is exempt from being shared with patients according to the
United States Core Data for Interoperability (USC DI) standards - Correct Answer-
Psychotherapy notes

5. Operating room (OR) staff are reliant upon a manual white board for patient tracking.
Recently, surgeons have complained that the turnaround time between surgical cases
has increased & blame the manual tracking system. An informatics nurse recommends
expanding use of the existing surgical information system (SIS). Which resolution can
improve this workflow issue - Correct Answer-Radio frequency identification (RFID) in
patient labels

6. An informatics nurse & an emergency nurse are conducting an analysis of a patient
admission from the ER - Correct Answer-Which tool should these nurses use for a
process analysis? SWOT template

7. What is an effective way to reduce the risk of access of electronic protected health
information (ePHI) by unauthorized users - Correct Answer-Make sure all the users
adhere to security & confidential policy set forth by the facility

8. How does a healthcare policy assure access to health information by authorized
users - Correct Answer-It creates a reliable method to verify the identities of users
accessing health information

,9. Which statement describes the application of meaningful use - Correct Answer-
Provider needs to show the use of the Electronic Health Record (EHR) technology

10. What is the typical role of the informatics nurse - Correct Answer-Plans,
coordinates, & facilitates education for all computer applications & software for nursing
or clinical user group

11. A patients glucose blood sugar is 400. What is a one-time kind of report - Correct
Answer-Ad Hoc

12. Which clinical information technology enables providers to document patient
assessments - Correct Answer-Vitals signs capture

13. A patient is being transferred to another hospital, however the hospital he is being
transferred to does not have access to the Electronic Health Record (EHR) since they
use EPIC. How will they receive his Electronic Health Record (EHR) - Correct Answer-
Continuity care record from AMR

14. Which statement best describes Nursing Informatics - Correct Answer-"Computer
science, decision science, information science, management science, cognitive science,
& organizational theory."

15. The nurse receives report that there are new orders to review. Where does the
nurse look to verify this information - Correct Answer-The Kardex

16. What is the goal of Merit-Based Incentive Payment System (MIPS) & Meaningful
Use (MU) - Correct Answer-Patient quality care

17. What is a type of phishing - Correct Answer-Trojan

18. What is Data governance - Correct Answer-Defines who can take what action, upon
what data, in what situations, using what methods

19. A provider at the hospital had his laptop stolen from his vehicle. What should be on
his laptop to protect it from data breach - Correct Answer-Encryption

20. What is the name of the process that begins with conception & continues through
implementation - Correct Answer-Systems Development Life Cycle (SDLC)

21. What is the intent of the Clinical Decision Support (CDS) System - Correct Answer-
This is an application that supports healthcare practitioners in making patient-care
decisions

22. What is the term for sharing a person's personal information with other individuals
electronically - Correct Answer-Information sharing

, 23. When a physician arrives on the unit, a nurse is asked about the fluid status of a
patient. Where should the nurse find this information - Correct Answer-The intake &
output chart

24. Why is it important to control the number of warnings in Electronic Health Record
(EHR) - Correct Answer-Alert fatigue

25. Which change theory begins with creating urgency - Correct Answer-Kotter's Models

26. Which act in 2009 did Meaningful Use (MU) originate - Correct Answer-American
Recover & Reinvestment Act (ARRA) act in 2009

27. What is the primary concern driving Nursing informatic initiative - Correct Answer-
Patient safety

28. What can be installed to allow one operation to access another to enable the
exchange of data - Correct Answer-Integration

29. Which type of chart uses rectangle, oval & diamonds in both - Correct Answer-
Flowchart

30. What is the intent of the Clinical Decision Support (CDS) System - Correct Answer-
Providing clinicians with knowledge & person specific information

31. Information may be kept secret to those with an only need to know - Correct
Answer-What is this? Information privacy is the right to choose the conditions under
which information is shared, & to ensure the accuracy of collected information.

32. Which statement defines interoperability - Correct Answer-The extent to which
systems & devices can exchange data & interpret that shared data.

33. Which two statement defines healthcare informatics - Correct Answer-Standardized
languages & terminologies to ensure consistent meanings across all settings

34. What is a physical safeguard of ePHI - Correct Answer-Lock on hard drive. Facility
Access Controls Workstation Use Workstation Security - Device & Media Controls

35. What is a technical safeguard ePHI - Correct Answer-Access control. Audit controls.
Authentication.

36. Which government agency recommended to use of bar code medication
administration - Correct Answer-FDA

37. What describes an example of opt-in or opt-out choice regarding the disclosure of
personal health information - Correct Answer-Your information be sent to another facility
$11.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
TestWise

Get to know the seller

Seller avatar
TestWise Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
1 year
Number of followers
1
Documents
110
Last sold
-
SMART STUDY HUB

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions