Detailed Answers A+ Pass
This type of chart is used to focus attention on any variation in a process and helps the
team to determine whether that variation is normal or a result of special circumstances.
- Answer - ✔ Control Chart
Resident assessment protocols (RAPs) - Answer - ✔ form a critical link to decisions
about care planning and provide guidance on how to synthesize assessment
information within a comprehensive assessment. The triggers target conditions for
additional assessment and review, as warranted by Minimum Data Set (MDS) item
responses.
The application of information science to the management of healthcare data and
information through computer technology is referred to as: - Answer - ✔ Healthcare
informatics
The facility's Medicare case-mix index has dropped, although other statistical measures
appear constant. The CFO suspects coding errors. What type of coding audit review
should be performed? - Answer - ✔ Focused audit
In a not-for-profit environment, the difference between assets and liabilities is referred to
as - Answer - ✔ net assets
These relationships can be expressed in the following equation: Assets - Liabilities =
Net assets (equity) In this example, add the assets (cash $500,000 + A/R $250,000 +
building $1,000,000 + land $700,000 = $2,450,000) and then subtract the liabilities (A/P
$350,000 + mortgage $600,000 = $950,000) or $2,450,000 - $950,000 = $1,500,000
LOINC - Answer - ✔ Laboratory data are successfully transmitted back and forth from
Community Hospital to three local physician clinics. This successful transmission is
dependent on which of the following standards?
When an entity relational diagram is implemented as a relational database, an entity will
become a(n): - Answer - ✔ Table
For a contract to be valid, it must include three elements. Which of the following is one
of those elements? - Answer - ✔ Consideration
One of benefits of this type of data entry is that it is easy to determine if the data are
complete. - Answer - ✔ Structured data
, This process provides covered entities and business associates with the structural
framework upon which to build their HIPAA Security Plan. - Answer - ✔ Security Risk
Analysis
The facility's Medicare case-mix index has dropped, although other statistical measures
appear constant. The CFO suspects coding errors. What type of coding audit review
should be performed? - Answer - ✔ Focused audit
An employee forgot his user ID badge at home and uses another employee's badge to
access the computer system. What controls should have been in place to minimize this
security breach? - Answer - ✔ Workforce security awareness training
What type of organization works under contract with CMS to conduct Medicare and
Medicaid certification surveys for hospitals? - Answer - ✔ State licensure agencies
A hospital receives a valid request from a patient for copies of her medical records. The
HIM clerk who is preparing the records removes copies of the patient's records from
another hospital where the patient was previously treated. According to HIPAA
regulations, was this action correct? - Answer - ✔ No, the records from the previous
hospital are considered to be included in the designated record set and should be given
to the patient.
During the voluntary review process, the performance of a healthcare entity is
measured against: - Answer - ✔ Accreditation standards
The director of the health information department wanted to determine the level of
physicians' satisfaction with the department's services. The director surveyed the
physicians who came to the department. What type of sample is this? - Answer - ✔
Convenience
What architectural model of health information exchange allows participants to access
data in point-to-point exchange? - Answer - ✔ Federated—inconsistent databases
The original HIPAA legislation required adoption of four identifiers: employers,
providers, health plans, and individuals. Three of these identifiers have been
implemented and one is on hold. Which unique identifier has not been implemented? -
Answer - ✔ Individuals
Under what access security mechanism would an individual be allowed access to ePHI
if he or she has a proper login and password, belongs to a specified group, and his or
her workstation is located in a specific place within the facility? - Answer - ✔ Context-
based
The term "hard coding" refers to: - Answer - ✔ CPT codes that appear in the hospital's
chargemaster