1. An informatics nurse and an emergency nurse are conducting an analysis of a patient admission
from the ER? Which tool should these nurses use for a process analysis? -✔✔SWOT template
1. What is an effective way to reduce the risk of access of electronic protected health information
(ePHI) by unauthorized users? -✔✔Make sure all users adhere to security and confidential policy set
forth by the facility
What is the goal of MIPS and MU? -✔✔Patient quality care
A provider at the hospital had his laptop stolen from his vehicle. What should be on his laptop to
protect it from data breach? -✔✔Encryption
What is the name of the process that begins with conception and continues through
implementation? -✔✔SDLC
When a physician arrives on the unit, a nurse is asked about the fluid status of a patient. Where
should the nurse find this information? -✔✔Intake and output chart
why is it important to control the number of warnings in EHR? -✔✔alert fatigue
which two technologies support the standardization of healthcare data? -✔✔HL7 and DICOM
what can be installed to allow one operation to access another to enable the exchange of data? -
✔✔Integration
what is a physical safeguard of ePHI? -✔✔Lock on hard drive, Facility Access Controls Workstation
Use Workstation Security - Device and Media Controls
what is a technical safeguard ePHI -✔✔Access control. Audit controls. Authentication.
, An informatics nurse and an ER nurse are conducting an analysis of a patient admission form the er.
which tool should these nurses use for a process analysis? -✔✔SWOT
1. an informatics nurse is developing a web-based application for patient care. which statement
accurately describes the internet? -✔✔A Network or networks
1. what describes an example of opt-in or opt-out choice regarding the disclosure of personal health
information? -✔✔your information sent to another facility
which government organization oversees the meaningful use program? -✔✔CMS
What item describes a basic network code that determines the roles used to create and route
packets of data between network devices? -✔✔Interface
1. Which is a physician's clinical informatics assessment? -✔✔Vital signs
1. The Operating room uses a different system than what is integrated in the EMR. What do you do? -
✔✔chart in one system and it will automatically show up in both systems
1. There are different systems for L &D and the hospital, how would you check for orders and
medications? -✔✔Log out of L&D system and log into the Hospital system
What should providers have on their personal mobile devices to protect it from sharing information
when stolen? -✔✔Authentication and encryption.
1. What are two barriers of adopting the CDS in an EHR? -✔✔Limited resource
Communication information exchange
1. What should healthcare staff who use mobile devices to access ePHI do to protect devices before
they are lost or stolen? -✔✔. Turn off share files.
Which stage of the SDLC would data be collected from the systems users regarding their analysis -
✔✔Needs