Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

HIT final exam 2023 with complete solution

Rating
-
Sold
-
Pages
10
Grade
A+
Uploaded on
20-05-2023
Written in
2022/2023

What type of entities are regulated by the HIPAA Privacy Rule? health plans, health care clearinghouses, and health care providers Information Technology adoption by the healthcare industry has advanced at a much more rapid rate than other industries false Which of the following factors are considered obstacles to widespread adoption of Information Technology in Healthcare? Fragmented healthcare system, healthcare is highly regulated industry, and there exists a shortage of trained technology professionals to support IT is healthcare Healthcare Information Technology can be defined or described as all of the following EXCEPT: Provides a means to save money from the start Which of the following are considered benefits of Healthcare Information Technology? Eliminates medical transcription, reduces need to physically retrieve charts, reminds prescribers to prescribe less costly drugs, and reduces duplicate diagnostic testing The Department of Health & Human Services answers to which of the following Federal Parent Departments or Agencies? President Which of the following regulatory agencies certifies EHR software systems & the providers who use them? Office of the national coordinator for health information technology Medicare is health insurance for people over the age of ____, or under that age if they have certain disabilities. 65 What are the main goals of the National Institute of Standards and Technology's role in Health Information Technology? Coordinate/harmonize standards, coordinate infrastructure testing, improve EHR usability, extend healthcare's reach through technology, and perform cutting-edge research and development Under the ____ category of the HIPAA Security Rule, a covered entity must ensure that all members of the workforce have appropriate access to ePHI. administrative The Security Rule of HIPAA has a broader short term focus than the Privacy Rule, but a more narrow long term aim. false Which of the following are examples of the types of typical indirect support departments that are found in a general hospital? Health information management, administration, and information technology The HIPAA Identifier Rule mandates that all Covered Entities storing or transmitting ePHI must have a standardized ____. National provider identifier The ____ is responsible for enforcement of the HIPAA Privacy Rule and penalties for noncompliance. office for civil rights Which of the following IS NOT one of the core issues that is specific to the codes of conduct in the healthcare industry supplier standards Typically, a(n) ____________________ hospital has radiology, surgical, maternity, isolation, psychiatric, burn, and laboratory facilities. general Which of the following are requirements for Medicaid reimbursement of patient expenses? patient needs skilled nursing care, patient has income and assets below defined levels, patient must be a united states citizen, and patient must reside in state in which nursing home is located Which of the following is an accurate description of an Assisted Living facility? has residents, not patients Which of the following IS NOT one of the common aspects of hospice care? not eligible for medicare or medicaid reimbursement ____ provide only palliative care. hospices Methods of operation that are specific to the healthcare industry include scope of work, availability of resources, and formality of procedure Organizational structure defines the authority, responsibilities, lines of communication, rights, and duties of a group. true _____________refers to rules for behavior to which a group of people adhere. code of conduct Some governmental organizations report an EMR adoption rate that approaches 50 percent, but it is also reported that their current functionality is not satisfactory. true A significant disadvantage to EMRs is that they cannot be easily and accurately electronically distributed. true Determining which network technology is most appropriate for managing electronic health records (EHR) requires that two broad categories of decisions must be made. These are cloud versus local network and installed applications versus remote access. true One of the characteristics of cloud computing is that the consumer can automatically increase or decrease computing resources without requiring any human interaction from the service provider. true Keyboards, printers, and network devices are examples of ____. hardware What is the most common type of computer network? client-server A print server is a server exclusively dedicated to managing printing functions across the network, while a database server can be responsible for managing file services. false The use of the Internet and IP networks to route and carry telephone calls is called ____. Voice over IP The purpose of a computer network can be summarized in a single word: ____. sharing ____________________ can be defined as the standardized and structured exchange of electronic information between two or more parties using public and/or private networks. Electronic Date interchange The protocol known as ____________________ allows a user to access another remote computer over a network and perform tasks on it as if they were sitting at the remote computer. Remote desktop protocol ____________ is a type of physical interface that is a wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings. Bluetooth A(n) ____ is a device that receives all wireless signals and serves as a bridge between the wireless and wired networks. access point What is the primary function of Imaging Devices? capture information and convert it to an electronic format Which of the following is an electronic version of paper charts found in clinicians offices Electronic medical record In the context of Health Information Technology, Protocols are defined as rules for communication true Solid state storage devices have no fragile moving parts. true A Level 5 trauma center has a(n) ____ on staff 24x7. trauma nurse The ____ is a taxonomy (coding & classification system) that provides for the classification of disease, causes, social conditions and other pertinent data. International Statistical Classification of Diseases and Related Health Problems The Controlled Substances Act of 1970 developed a classification scheme of controlled substances called Schedule drugs, how many "Schedules" are there? 5 Some governmental organizations report an EMR adoption rate that approaches 50 percent, but it is also reported that their current functionality is not satisfactory. Question options: true ____________________ is a measure of the degree of patient disease or injury. acuity During ____________________, the patient's demographic data (contact information, billing information, next of kin, current medications, and other information pertinent to the patient's general condition) are collected. registration ____ questions may include information such as pain levels, location, and intensity. consultation ____ is a type of imaging that uses x-rays. fluoroscopy Examples of Schedule ____ substances include cough and cold preparations containing limited quantities of certain narcotics. 5 ____________is an area of psychiatry that studies the relationship between behavior and the inpatient's overall well-being. behavioral health What do healthcare professionals mean when they say "stat"? Immediately, hurry ____ is the use of electronic systems to store and transmit physician-generated orders to other healthcare professionals in departments such as pharmacy, laboratory, or radiology. computerized physician order entry Cast static shadows of internal body structures on photographic film and is best for images of hard tissues, such as bone x-ray A small capsule that contains a camera, light source, and digital storage is swallowed; later, images of the entire gastrointestinal tract can be reviewed in high resolution capsule endoscopy Used to capture detailed images of the blood flow in the heart during a cardiac stress test. nuclear stress test A positron emitting radiopharmaceutical emits gamma rays that can be viewed as a three-dimensional image of glucose tracer concentration PET scan A large, complex scanning device that uses computers to create image sections or slices by using a penetrating wave. CT scan Used to clinically determine the heart's response to physical stress. vascular stress test Uses very strong magnetic fields to visualize internal body structures magnetic resonance imaging Medical imaging technology that uses the radioactive decay of radiopharmaceuticals in the diagnosis and treatment of disease nuclear medicine Uses high-frequency sound waves to image soft-tissue structures like organs ultrasound Which of the following IS NOT one of the benefits of patient tracking software? orders are standardized across the organization ____ is the medical study of the ears, nose, and throat (ENT). otorhinolaryngology Medical/surgical is frequently one of the smallest medical departments with relatively high patient acuity. false A patient social security number of 123-4T-5678 is an example of ____ in a HL7 message. improperly formatted patient demographics A ____ is a list of medicines reimbursed or covered by a third-party payer. formulary Scanning is the process of converting data printed on paper-based (or other flat) media into electronic format by using a device called a scanner. true ____ are temporary decreases in power line voltage caused by the start-up power demands of many electrical devices. brownouts The information about an image such as the patient name, ID# or results are stored using ____. metadata One of the reasons that HL7 messages can be very complex is due to the____________________ , which are the various categories of healthcare suppliers who use electronic interfaces. provider types The ____ file format has medium quality, small file size and is considered to be lossy. JPG Subunits that are a part of larger medical software systems are called ____. modules ____________________ is data that has no predefined arrangement unstructured data ____________________ is a technique to reduce the size of a digital image file. compression The acronym CPOE means which of the following? Computerized Physician Order Entry Healthcare providers that use controlled substances frequently have well-defined policies & procedures that address their management and use. Which of the following are main components that must be addressed by those policies & procedures? substance audits, availability of locked storage, substance use protocol, and authorization of staff to access substances An Electrocardiogram is best described as: a two-dimensional representation of electrical activity of the heart An electroencephalograph is used to: measure ionic current flows within the brains neurons Image file size is described or measured by the amount of ___________ needed to store the data bytes The process of converting images of hand-written of printed text into computer readable text is also known as: Optical Character Recognition Which of the following is a nonprofit accredited standards development organization that develops standard languages for formatting electronic messages between healthcare providers? HL7 Bedside medication verification is commonly accomplished by: use of barcodes and barcode scanners Formulary checking is part of the e-prescribing process true Below are four troubleshooting steps used in diagnosing interface problems, please put them in the correct order. Identification Generation Determination Confirmation The National Standard for e-prescribing was developed by? National Council for Prescription Drug Programs What is the first step when trying to troubleshoot medical device problems? Check for power In the context of electronic medical devices, what does the acronym UPS stand for? Uninterruptible Power Supply Technical Support groups are frequently organized in to ___________ groups A database stores ____ data. structured ____ machines are large and complex, usually filling a room. MRI A ____ is a malicious program designed to take advantage of a vulnerability in an application or an operating system to enter a computer in order to send copies of itself to other devices that are also connected to the network. worm The Windows permissions setting, ____, permits a user to read, write, change, or delete a file. full control Wood, paper, textiles, and other ordinary combustibles cause Class ____ fires. A Many social engineering attacks rely on psychology, which is the mental and emotional approach rather than the physical. True In a computer access control list, unless granted special permissions, owners can only read the objects (files) that they create. false A modern desktop computer can generate ____ passwords per second. 1 million A ____ lock can lock the door but have access to be unlocked from the outside via a small hole. privacy Temperatures and relative humidity levels that are too low or high, or that change abruptly, may result in unreliable components or even system failures. true Types of fencing deterrents include the use of ____, which provide(s) a nonagressive barrier at the top of a fence. roller barriers In order for a fire to occur, four entities must be present at the same time: ___________. fuel, oxygen, heat, and chemical reaction ____ locks are combination locks that use buttons that must be pushed in the proper sequence to open the door. cipher ____ are the most common type of standard biometric device. fingerprint scanners Software that enters a computer system without the user's knowledge or consent and then performs an unwanted (and usually harmful) action is referred to as________? malware The information security protection goal known as _________ ensures that data is accessible to authorized users. availability In the context of physical security, all of the following tools are used to secure the environment EXCEPT: passwords ____ encrypts the entire system volume (AKA Whole Disk Encryption), including the Windows Registry and any temporary files that might hold confidential information. Essentially, it encrypts everything on the hard drive at once. BitLocker ____ relies on a secret key that is shared between the wireless client device and the AP. Wired Equivalent Privacy Asymmetric cryptography keys work in only one direction. false A hospital must retain a patient's records in an accessible manner in the hospital for up to 25 years after the patient's discharge or up to 18 years for a children. true Because Voice over IP (VoIP) is digital communications transmitted over a network, it can be encrypted using standard LAN encryption technologies. true ___ is an encrypted alternative to the Telnet protocol that is used to access remote computers during Terminal Emulation. Secure Shell Another name for symmetric cryptography is ____ cryptography. private key A(n) ____ uses an unsecured public network, such as the Internet, as if it were a secure private network. Virtual Private Network A ____ is a mathematical value that is entered into a "formula" to produce text that is encrypted or scrambled. Key The symmetric cryptography algorithm _______ is designed to be secure well into the future. Advanced Encryption Standard Encryption under WPA2 is accomplished by using ____. AES Data Encryption Standard (DES) uses a key length of____. 56 bits In general, individual health care providers must retain a patient's LHR for ____ years after the last treatment date, or three years from the patient's death. seven the inability to deny nonrepudiation the practice of hiding the existence of data, usually by embedding it in another image Steganography one of the first widely popular symmetric cryptography algorithms Date Encryption Standard data that is getting ready to be encrypted or scrambled Plaintext data that is in an unencrypted (or unscrambled) form Cleartext changing (or unscrambling) the secret message back to it's original form Decryption symmetric algorithm that employs 48 iterations of encryption Triple Date Encryption Standard changing (or scrambling) original text into a secret message Encryption symmetric algorithm approved in 2000 that is designed to be secure well into the future Advanced Encryption Standard encrypted or scrambled data Ciphertext A robot is a great resource for surgery because it _______________. can respond to speech commands How many degrees of freedom does a robot wrist have? 7 __________________ or telepresence surgery is performed by robotic devices controlled by surgeons at another site. Distance Much computer-aided surgery is _________________ invasive, performing surgery through small incisions. Minimally The surgeon does NOT look at the patient; instead, he or she looks at a monitor on which is projected a picture of the patient. Thus, much computer-assisted surgery is said to be _______________-directed. image One form of minimally invasive robotic surgery is called ___________________ surgery. It does not require external incisions. It is also called natural orifice surgery. virtual _______________ is a computer-controlled, image-directed robot that performs total hip replacements. The FDA approved it in 2008. ROBODOC ____________ is used as an assistant in endoscopic procedures. It uses it's one arm to hold & move the endoscope under the voice-direction of the surgeon. AESOP ________ is a robotic surgical system. It has three interactive robotic arms, one of which holds the endoscope, whereas the two other hold the surgical instruments for the surgeon. ZEUS Which generation robot was one which is termed an insect-type robot? 3rd Which generation of robot has the ability to learn and reproduce? 4th Which of the following would be a built-in fail safe for a robot? the ability to move far away from the patient

Show more Read less
Institution
HIT 3
Course
HIT 3









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
HIT 3
Course
HIT 3

Document information

Uploaded on
May 20, 2023
Number of pages
10
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

CA$19.30
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Arthurmark Chamberlain College Of Nursing
Follow You need to be logged in order to follow users or courses
Sold
45
Member since
3 year
Number of followers
39
Documents
1422
Last sold
4 months ago

3.7

9 reviews

5
5
4
0
3
2
2
0
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions