EXAM WITH COMPLETE 350+ QUESTIONS AND
CORRECT DETAILED ANSWERS (VERIFIED ANSWERS)
ALREADY GRADED A+ | D220- INFORMATICS
NURSING EXAM | GUARANTEED PASS
1. What is a fishbone diagram & what benefit does it provide? - ✔✔✔
Correct Answer > A tool for analyzing the organizational processes & its
effectiveness. Helps team members visually diagram a problem or
conditions root causes, allowing them to truly diagnose the
problem rather than focusing on symptoms
2. A nurse is planning the care for a patient admitted to the hospital
with COVID-19 Which list of information in the electronic medical
record (EMR) will help the nurse plan the care for this patient -
✔✔✔ Correct Answer > The patient's laboratory results over the last 72
hours.
3. A high number of data-entry fields in electronic health records can
be overwhelming for staff & make it difficult to find where
information should be documented. Which informatics solution
could solve this problem? - ✔✔✔ Correct Answer > Cascading
documentation
,4. How can informatics be used to assess a person's health literacy -
✔✔✔ Correct Answer > Informatics can evaluate the current state &
determine the resources needed to determine a patient's level of
understanding.
5. What legislation provides more rigorous enforcement of HIPPA &
requires notification of breaches & allow pt access to their
electronic records? - ✔✔✔ Correct Answer > HIPPA Breach notification Rule,
US dept of health & human services (HHS) & Office for Civil rights
(OCR) is responsible for enforcing HIPPA
6. Which information in an electronic medical record (EMP) helps a
nurse plan & manage a patient's post-operative care after open-
heart surgery - ✔✔✔ Correct Answer > Provider order
7. Which information in a patient's electronic medical record (EMA),
in addition to the nursing flowsheets & provider orders, helps a
nurse plan & manage fluctuations in blood glucose levels - ✔✔✔
Correct Answer > MAR
8. Which clinical note type is exempt from being shared with
patients according to the United States Core Data for
Interoperability (USC DI) standards - ✔✔✔ Correct Answer > Psychotherapy
notes
,9. Operating room (OR) staff are reliant upon a manual whiteboard
for patient tracking. Recently, surgeons have complained that the
turnaround time between surgical cases has increased & blame
the manual tracking system. An informatics nurse recommends
expanding the use of the existing surgical information system (SIS).
Which resolution can improve this workflow issue? - ✔✔✔ Correct Answer >
Radiofrequency identification (RFID) in patient labels
10. What is an effective way to reduce the risk of access to
electronic protected health information (ePHI) by unauthorized
users - ✔✔✔ Correct Answer > Make sure all the users adhere to the
security & confidential policy set forth by the facility.
11. A patient is being transferred to another hospital, however,
the hospital he is being transferred to does not have access to the
Electronic Health Record (EHR) since they use EPIC. How will they
receive his Electronic Health Record (EHR)? - ✔✔✔ Correct Answer >
Continuity care record from AMR
12. When a physician arrives on the unit, a nurse is asked about
the fluid status of a patient. Where should the nurse find this
information? - ✔✔✔ Correct Answer > The intake & output chart
, 13. Which act in 2009 did Meaningful Use (MU) originate - ✔✔✔
Correct Answer > American Recovery & Reinvestment Act (ARRA) act in
2009
14. What is the intent of the Clinical Decision Support (CDS)
System - ✔✔✔ Correct Answer > Providing clinicians with knowledge &
person-specific information.
15. Which government organization oversees the meaningful
use program - ✔✔✔ Correct Answer > CMS (Centers for Medicare and
Medicaid Services
16. A Nursing Innovator & a medsurg nurse want to capture how
many patients were seen in a day of 24 hours, how would they
best see this - ✔✔✔ Correct Answer > Flowsheet
17. Process for discovering root causes of problems & ID the
solution - ✔✔✔ Correct Answer > Root cause analysis
18. What should providers have on their personal mobile
devices to protect them from sharing information when stolen? -
✔✔✔ Correct Answer > Authentication & encryption