D033 EXAM WITH COMPLETE
SOLUTIONS
Save
A physician is prescribing a refill for his patient who is taking an anti-hypertensive. He
uses a refill choice list to select the correct medication for his patient. What type of
technology is he using?
A. Laboratory Information System
B. Clinical Decision Support
C. BC-MAR
D. Results Management System -ANSB. Clinical Decision Support
In the electronic health record, and other clinical information systems, this unique
identifier is typically the patient's unique medical record number.
A. Primary Key
B. Foreign Key
C. Security Key
D. Access Key -ANSA. Primary Key
Match the type of malicious software with its definition:
a. virus b. worm c. spyware d. phishing e. ransomware
1. Prohibits access to information systems in an organization and demands money to
return the data
2. Gathers information without an organization's knowledge and send information to
another entity
3. Installs itself on a computer attached to a network and moves to all other computers
in the network
4. Replicates itself, modifies other computer programs, inserts its own code, infecting its
host -ANS1. a
2. c
3. b
4. a
When nurses at the oncology center are using the infusion pumps, the controls on the
device and the displays are easy to read. This is a result of the requirements of
Meaningful Use Stage 2, which required that capture and retrieval of data be efficient
and effective. This is an example of:
A. Clinical decision support of data
B. Usability of data
,C. Security control of data
D. Interoperability of data -ANSB. Usability of data
Which of these answers is an acronym for an international standard that promotes
wireless connectivity among devices?
A. IEEE
B. EEG
C. CDS
D. HIMSS -ANSA. IEEE
A quality improvement manager is meeting with school board and other community
members to provide information from the past year on patients admitted to their
emergency department due to drug overdose. where will the QI manager most
efficiently find this information?
A. HIM Department
B. Social Services Database
C. Trauma Registry
D. Electronic Health Record -ANSC. Trauma Registry
Identify the example of a security incident.
A. Jessica shares her log-in information with a new coworker who cannot remember her
own log-in information.
B. Jennifer works nights and ran to answer a call light in a patient's room, and left her
computer monitor on and unattended. No one accessed the information.
C. Contract maintenance staff are repairing a computer without supervision by your
staff.
D. A virus attack destroyed files across several departments. -ANSD. A virus attack
destroyed files across several departments
A physician was flying in for a job interview and the plane was running late, making him
late for the interview. In his haste, he left his cell phone that he used for work
correspondence in the seat pocket in front of his seat. When he was on his way for his
luggage, he realized his phone was not with him and ran back to the plane, only to fine
that crew was cleaning the plane, and no one reported finding a phone. What should he
do?
A. Submit an incident report to administrators at his hospital
B. Call their IT Director and ask him to do a remote wipe
C. Call the Chief Medical Officer to let him know what happened
D. Call the IT director and ask him to Federal Express a new phone to him at his hotel -
ANSB. Call their IT Director and ask him to do a remote wipe
Match the access level with the statement:
, a. Context-Based b. User-Based c. Role-Based D. Emergency
1. All medical assistants working on all floors have this access
2. Sam is a HIM staff member and asked to work for several days with the quality
director who is reviewing charts from the ED
3. Simone is a physical therapist who normally works in the hospital PT department.
She has been asked to go across town to their rehab center because they are short-
staffed, and work there for a month. -ANS1. C
2. B
3. A
Mrs. Jones sees providers at one hospital, two different clinics, and free-standing MRI
center. All these facilities are under the same healthcare system. How will front desk
clerks or registration personnel know Mrs. Jones has been seen in their system at
several facilities.
A. They will ask her when she signs in
B. The registration or front desk personnel would check the MPI
C. The registration or front desk personnel would check the EMPI
D. It doesn't matter because she will receive a new medical record number each time
she sees a provider -ANSC. The registration or front desk personnel would check the
EMPI
I am the database most used at a healthcare organization or clinic because when
someone types in a patient's name, all the data and information related to that patient
can be located. What am I?
A. Hierarchical Database
B. Relational Database
C. Multidimensional Database
D. Data Warehouse -ANSB. Relational Database
An insurance company recently signed a contract to insure 300 factory workers in South
Dakota. After each of the insured completes the required physical and blood work
required by the insurance company, the insurance company performs this type of
analysis to predict the risk they've assumed in insuring this company. After performing
this analysis, the data shows that approximately one-third of the insured will develop
heart disease within the next 10 years, unless they make changes now in diet and
lifestyle choices. Identify a data mining technique that is used in this situation.
A. Association rule learning
B. Cluster Analysis
C. Anomaly detection
D. Regression analysis -ANSD. Regression Analysis
SOLUTIONS
Save
A physician is prescribing a refill for his patient who is taking an anti-hypertensive. He
uses a refill choice list to select the correct medication for his patient. What type of
technology is he using?
A. Laboratory Information System
B. Clinical Decision Support
C. BC-MAR
D. Results Management System -ANSB. Clinical Decision Support
In the electronic health record, and other clinical information systems, this unique
identifier is typically the patient's unique medical record number.
A. Primary Key
B. Foreign Key
C. Security Key
D. Access Key -ANSA. Primary Key
Match the type of malicious software with its definition:
a. virus b. worm c. spyware d. phishing e. ransomware
1. Prohibits access to information systems in an organization and demands money to
return the data
2. Gathers information without an organization's knowledge and send information to
another entity
3. Installs itself on a computer attached to a network and moves to all other computers
in the network
4. Replicates itself, modifies other computer programs, inserts its own code, infecting its
host -ANS1. a
2. c
3. b
4. a
When nurses at the oncology center are using the infusion pumps, the controls on the
device and the displays are easy to read. This is a result of the requirements of
Meaningful Use Stage 2, which required that capture and retrieval of data be efficient
and effective. This is an example of:
A. Clinical decision support of data
B. Usability of data
,C. Security control of data
D. Interoperability of data -ANSB. Usability of data
Which of these answers is an acronym for an international standard that promotes
wireless connectivity among devices?
A. IEEE
B. EEG
C. CDS
D. HIMSS -ANSA. IEEE
A quality improvement manager is meeting with school board and other community
members to provide information from the past year on patients admitted to their
emergency department due to drug overdose. where will the QI manager most
efficiently find this information?
A. HIM Department
B. Social Services Database
C. Trauma Registry
D. Electronic Health Record -ANSC. Trauma Registry
Identify the example of a security incident.
A. Jessica shares her log-in information with a new coworker who cannot remember her
own log-in information.
B. Jennifer works nights and ran to answer a call light in a patient's room, and left her
computer monitor on and unattended. No one accessed the information.
C. Contract maintenance staff are repairing a computer without supervision by your
staff.
D. A virus attack destroyed files across several departments. -ANSD. A virus attack
destroyed files across several departments
A physician was flying in for a job interview and the plane was running late, making him
late for the interview. In his haste, he left his cell phone that he used for work
correspondence in the seat pocket in front of his seat. When he was on his way for his
luggage, he realized his phone was not with him and ran back to the plane, only to fine
that crew was cleaning the plane, and no one reported finding a phone. What should he
do?
A. Submit an incident report to administrators at his hospital
B. Call their IT Director and ask him to do a remote wipe
C. Call the Chief Medical Officer to let him know what happened
D. Call the IT director and ask him to Federal Express a new phone to him at his hotel -
ANSB. Call their IT Director and ask him to do a remote wipe
Match the access level with the statement:
, a. Context-Based b. User-Based c. Role-Based D. Emergency
1. All medical assistants working on all floors have this access
2. Sam is a HIM staff member and asked to work for several days with the quality
director who is reviewing charts from the ED
3. Simone is a physical therapist who normally works in the hospital PT department.
She has been asked to go across town to their rehab center because they are short-
staffed, and work there for a month. -ANS1. C
2. B
3. A
Mrs. Jones sees providers at one hospital, two different clinics, and free-standing MRI
center. All these facilities are under the same healthcare system. How will front desk
clerks or registration personnel know Mrs. Jones has been seen in their system at
several facilities.
A. They will ask her when she signs in
B. The registration or front desk personnel would check the MPI
C. The registration or front desk personnel would check the EMPI
D. It doesn't matter because she will receive a new medical record number each time
she sees a provider -ANSC. The registration or front desk personnel would check the
EMPI
I am the database most used at a healthcare organization or clinic because when
someone types in a patient's name, all the data and information related to that patient
can be located. What am I?
A. Hierarchical Database
B. Relational Database
C. Multidimensional Database
D. Data Warehouse -ANSB. Relational Database
An insurance company recently signed a contract to insure 300 factory workers in South
Dakota. After each of the insured completes the required physical and blood work
required by the insurance company, the insurance company performs this type of
analysis to predict the risk they've assumed in insuring this company. After performing
this analysis, the data shows that approximately one-third of the insured will develop
heart disease within the next 10 years, unless they make changes now in diet and
lifestyle choices. Identify a data mining technique that is used in this situation.
A. Association rule learning
B. Cluster Analysis
C. Anomaly detection
D. Regression analysis -ANSD. Regression Analysis