AND ANSWERS GRADED A+ ASSURED
SUCCESS NEW UPDATE 2025/2026, Exams
of Nursing
What is data called that consists of factual details aggregated or summarized from a group of
health records the provides no means to identify specific patients?
a. Original
b. Source
c. Protected
d. Derived d. Derived
Derived data consist of factual details aggregated or summarized from a group of health records
that provide no means of identifying specific patients. These data should have the same level of
confidentiality as the legal health record.
Which of the following is an example of how an internal user utilizes secondary data?
a. State infectious disease reporting
b. Birth certificates
c. Death certificates
d. Benchmarking with other facilities d. Benchmarking with other facilities
Internal users of secondary data are individuals located within the healthcare facility. For
example, internal users include medical staff and administrative and management staff.
Secondary data enable these users to identify patterns and trends that are helpful in patient
care, long-range planning, budgeting, and benchmarking with other facilities.
1|Page
,After the types of cases to be included in a cancer registry have been determined, what is the
next step in data acquisition?
a. Case registration
b. Case definition
c. Case abstracting
d. Case finding d. Case finding
After the cases to be included have been determined, the next step is usually case finding. Case
finding is a method used to identify the patients who have been seen or treated in the facility
for the particular disease or condition of interest to the registry, such as cancer in the case of a
cancer registry.
For research purposes, an advantage of the Healthcare Cost and Utilization Project (HCUP) is
that it:
a. Contains only Medicare data
b. Is used to determine pay for performance
c. Contains data on all payer types
d. Contains bibliographic listings from medical journals c. Contains data on all payer types
Healthcare Cost and Utilization Project (HCUP) consists of a set of databases that are unique
because they include data on inpatients whose care is paid for by all types of payers, including
Medicare, Medicaid, private insurance, self-paying, and uninsured patients. Data elements
include demographic information, information on diagnoses and procedures, admission and
discharge status, payment sources, total charges, length of stay, and information on the hospital
or freestanding ambulatory surgery center.
An employee views a patient's electronic health record. It is a trigger event if:
a. The employee and patient have the same last name
2|Page
,b. The patient was admitted through the emergency department
c. The patient is over 89 years old
d. A dietitian views a patient's nutrition care plan a. The employee and patient have the same
last name
With appropriate policies and procedures in place, it is the responsibility of the organization and
its managers, directors, CSO, and employees with audit responsibilities to review access logs,
audit trails, failed logins, and other reports. One type of event that would be a trigger event
would include employees viewing records of patients with the same last name or address of the
employee.
Based on this output table, what is the average coding test score for the beginner coder?
Coding Test Score:
Coder Status /Mean / N / Standard Deviation
Advanced / 93. / 5.00000
Intermediate / 89. / 0.70711
Beginner / 73. / 6.42910
Total / 84. / 10.51190
a. 93
b. 6.4
c. 73
d. 90 c. 73
Since the mean is the average and the value next to the "beginner" under coder status is
73.3333, round the value to a whole number and the best answer is 73.
As part of your job responsibilities, you are responsible for reviewing audit trails of access to
patient information. The following are all types of activities that you would monitor except:
3|Page
, a. Every access to every data element or document type
b. Whether the person viewed, created, updated, or deleted the information
c. Physical location on the network where the access occurred
d. Whether the patient setup an account in the patient portal d. Whether the patient setup
an account in the patient portal
The HIPAA Security Rule requires that access to electronic PHI in information systems is
monitored. Included in the same standard is the requirement that covered entities examine the
activity using access audit logs. Often they record: time stamps that record access and use of
the data elements and documents; what was viewed, created, updated, or deleted; the user's
identification; the owner of the record; and the physical location on the network where the
access occurred. Creation of an account through the patient portal by the patient is appropriate
use.
Which of the following is the first step in analyzing data?
a. Knowing your objectives or purpose of the data analysis
b. Starting with basic types of data analysis and work up to more sophisticated analysis
c. Utilizing a statistician to analyze the data
d. Presenting your findings to administration a. Knowing your objectives or purpose of
the data analysis
The first step in analyzing data is to know your objective or the purpose of the data analysis.
Sometimes data do not follow a normal distribution and are pulled toward the tails of the curve.
When this occurs, it is referred to as having a skewed distribution. Because the mean is sensitive
to extreme values or outliers, it gravitates in the direction of the extreme values thus making a
long tail when a distribution is skewed. When the tail is pulled toward the right side, it is called a
__________.
a. Negatively skewed distribution
4|Page