WGU D220 (101-180) QUESTIONS WITH
CORRECT ANSWERS
A patient has several allergies when admitted. Where does the nurse check to
confirm this is noted? ANSWER In the patient summary tab or history and
physical
A new order is placed for the start of antiarrhythmic medication by IV drip.
What needs to happen electronically before this medication can be safely given?
ANSWER Scan the patient's armband and the medication
What is a clinical decision support system designed to do? - ANSWER
Suggested care information given to the clinicians
Where is the clinical decision support system displayed in an electronic health
record? - ANSWER By alerts and reminde
Resistance in a healthcare setting to the use of a new electronic health record
exists. The staff insists the prior system was much faster than navigating this
new electronic health record. Which method should be used to motivate staff to
adopt this electronic health record? - ANSWER Involve staff in the
implementation process
Which tool identifies where information technology can enhance efficiency and
support an interdisciplinary healthcare team? - ANSWER A workflow analysis
, Which of the following statements describes electronic protected health
information? - ANSWER It is information used to uniquely identify an
individual
An informatics nurse is creating a web-based application for patient care. Which
statement describes the internet? - ANSWER An unregulated network of
networks
What does role-based access an example of? - ANSWER Authenticity
What term refers to making sure that confidentiality is maintained when
exposing a patient's electronic personal health information? - ANSWER
Security
What are some tips to avoid a security of protected health information? -
ANSWER Only open emails coming from a trusted source, change passwords
at the end of the timeframe established by an organization and do not leave
ePHI up on the screen in an unsecure area
What is the first thing patients should do to access their health records? -
ANSWER Use the patient portal email from the healthcare organization to
create an account
What represents privacy and security risks for telehealth technology? -
ANSWER Patients have the option to use speakerphone in the telehealth apps
What are 3 common reasons for HIPPA violation citations? - ANSWER Lost/
stolen unencrypted devices
social media postings
CORRECT ANSWERS
A patient has several allergies when admitted. Where does the nurse check to
confirm this is noted? ANSWER In the patient summary tab or history and
physical
A new order is placed for the start of antiarrhythmic medication by IV drip.
What needs to happen electronically before this medication can be safely given?
ANSWER Scan the patient's armband and the medication
What is a clinical decision support system designed to do? - ANSWER
Suggested care information given to the clinicians
Where is the clinical decision support system displayed in an electronic health
record? - ANSWER By alerts and reminde
Resistance in a healthcare setting to the use of a new electronic health record
exists. The staff insists the prior system was much faster than navigating this
new electronic health record. Which method should be used to motivate staff to
adopt this electronic health record? - ANSWER Involve staff in the
implementation process
Which tool identifies where information technology can enhance efficiency and
support an interdisciplinary healthcare team? - ANSWER A workflow analysis
, Which of the following statements describes electronic protected health
information? - ANSWER It is information used to uniquely identify an
individual
An informatics nurse is creating a web-based application for patient care. Which
statement describes the internet? - ANSWER An unregulated network of
networks
What does role-based access an example of? - ANSWER Authenticity
What term refers to making sure that confidentiality is maintained when
exposing a patient's electronic personal health information? - ANSWER
Security
What are some tips to avoid a security of protected health information? -
ANSWER Only open emails coming from a trusted source, change passwords
at the end of the timeframe established by an organization and do not leave
ePHI up on the screen in an unsecure area
What is the first thing patients should do to access their health records? -
ANSWER Use the patient portal email from the healthcare organization to
create an account
What represents privacy and security risks for telehealth technology? -
ANSWER Patients have the option to use speakerphone in the telehealth apps
What are 3 common reasons for HIPPA violation citations? - ANSWER Lost/
stolen unencrypted devices
social media postings