Questions And Answers latest solution
1. HealthInsurancePortability&AccountabilityAct(HIPAA)isaFederalLaw
.1, .1, .1, .1, .1, .1, ,
.1 .1, .1, .1,
designed to facilitate the electronic exchange of information in health care.
.1, .1, .1, .1, .1, .1, .1, .1, .1, .1, .1,
Which of the following does not pertain to this law?
.1, .1, .1, .1, .1, .1, .1, .1, .1, .1,
a) Privacyprotectioncomponentsofthelawlimitnon-consensualuseasa .1, .1, .1, .1, .1, .1, .1, .1, .1, .1,
release or private health information
.1, .1, .1, .1, .1,
b) Patientsmustreceive noticeofprivacyrights .1, .1, .1, .1, .1, .1,
c) Restrictions on access to and use of information is required .1, .1, .1, .1, .1, .1, .1, .1, .1,
d) Criminalandcivilsanctionsdonotexistforimproperuseanddisclosure ANS:D ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 .1, ,
.1
2. Separatecomputersystemsareoftenlinkedtogetherinordertosharedata and ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 .1,
information.Whenallcomponentsofthenetworkarelocatedwithinclose
,
.1 ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 ,
.1
proximity of one another,perhaps within a single facility,the network known as a:
.1, .1, .1, .1, ,
.1 .1, .1, .1, .1, ,
.1 .1, .1, .1, .1,
a) Wide Area Network (WAN)
.1 , .1 , .1,
b) WorldWideWeb(WWW) ,
.1 ,
.1 .1,
c) LocalArea Network (LAN) .1, .1 , .1 ,
d) ElectronicData Interchange(EDI) ANS:C .1, .1, .1, .1, ,
.1
3. Healthcareorganizationshadestablishedstandardstomaintaindatasecu- rity ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 .1,
and protect the privacy and confidentiality of patients' records informa- tion.
.1, .1, .1, .1, .1, .1, .1, .1, .1, .1, .1,
Which one of the following answers does not describe its data security elements:
,
.1 .1, .1, .1 , .1, .1, .1, .1, .1, .1, .1, .1, .1,
a) Protectagainstsystemfailures .1, .1, .1,
1/102 .1, .1,
,b) Protectagainstexternalcatastrophicevents .1, .1, .1, .1,
c) Facilitate access to computer files to authorized personnel .1 , .1, .1, .1, .1, .1, .1,
d) Controlaccess to computer files by unauthorized personnel ANS:C
.1, .1 , .1 , .1 , .1 , .1 , .1, .1, ,
.1
4. WClient/serverarchitectureback-end(server)functionsincludeallofthe
.1, .1, .1, .1, .1, .1, .1, 1
., .1,
following except:
.1, .1 ,
a) Printing
b) Applicationsprogram execution .1, .1,
c) Decision support .1,
d) Communication ANS:C .1, ,
.1
5. Starnetworkshaveanadvantageof:
.1, .1, .1, .1, .1,
a) Relative ease of wiring the network and relatively fast communications
.1 , .1, .1, .1, .1, .1, .1 , .1, .1,
b) Facilitatingconstructionofhighspendnetworksthatoperateoverlarge .1, .1, .1, .1, .1, .1, .1, .1, .1,
distances
.1,
c) Ease with which nodes can be added to an existing network
.1 , .1, .1, .1 , .1, .1, .1 , .1, .1, .1,
d) Require less cabling than networks using other topologies ANS: C.1-refers to
.1, .1, .1, .1, .1, .1, .1, .1, .1 , ,
.1 .1,
Busnetworks,2 refersto ring networks,and 4 isincorrectbecause Star networks
.1, .1, .1, .1, .1, .1, .1, .1, .1, .1, .1, .1, .1, .1,
require more cabling than other networks
.1, .1, .1, .1, .1, .1,
2/102 .1, .1,
,6. Advantagesofoutsourcingincludeallofthefollowing except, .1, .1, .1, .1, .1, .1, .1, .1,
a) Staffing reductions .1,
b) Increased implementation time .1, .1,
c) Smaller capital investments .1, .1,
d) More predictable costs ANS:B .1 , .1, .1, ,
.1
7. Although purchasing or leasing commercial software is most common, what .1, .1, .1, .1, .1, .1, .1, .1, .1,
isbecomingaviablesourceofinformationtechnologyandsystemsfor smaller
.1, .1, .1, .1, .1, .1, .1, .1, .1, .1, .1, .1,
healthcare organizations?
.1, .1,
a) In house design and programming
.1, .1, .1, .1,
b) Outsourcing
c) ASP-applications service provider .1, .1 ,
d) Combining Outsourcing and in-house design ANS:C .1, .1, .1, .1, .1, ,
.1
8. WhichofthefollowingisNOToneofthethreegeneralcategoriesofinfor-
.1, .1, .1, .1, .1, .1, .1, .1, .1, .1, .1, .1, .1,
mation systems used in healthcare organizations:
.1, .1, .1, .1, .1, .1,
a) ClinicalInformation Systems .1, .1,
b) Composite Healthcare Systems .1, .1,
c) Administrative/Financial Systems .1,
d) Decision Support Systems for Strategic Management ANS:B .1, .1, .1, .1, .1, .1, ,
.1
9. Acomprehensiveinformationsecuritypolicyshouldincludeallofthefol-
.1, .1, .1, .1, .1, .1, .1, .1, .1, .1,
lowing elements except:
.1, .1, .1,
a) Management Policies .1,
b) Data back up and recovery .1 , .1, .1 , .1,
c) Physicalsecurity .1,
d) Technicalcontrols ANS:B ,
.1 .1, ,
.1
g g
.1, .1,
, 10. WhichofthefollowingisNOTpartoftheSystemDevelopmentLifeCycle?
,
.1 ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 ,
.1
a) System Analysis .1,
b) System Adjustment .1,
c) System Implementation .1,
d) System Acquisition ANS:B .1, .1, ,
.1
11. The Information Services Advisory Committee provides insight into user
.1, .1, .1, .1, .1, .1, .1, .1,
needsandhelpsgainacceptanceofinformationsystems.Whichofthefollow- ing is
.1, ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 ,
.1 .1 , .1,
NOT a charge of the committee:
.1, .1, .1, .1, .1, .1,
a) Encouragingappropriateuse of informationservices .1, .1, .1, .1, .1,
b) Rankinginformationservicesinvestmentopportunitiesandrecommending a
.1, .1, .1, .1, .1, .1, .1,
rank-ordered list of proposals to the governing board.
.1, .1, .1, .1, .1, .1, .1, .1,
c) Providingtechnicalsupporttoimplementanintegratedinformationsys-
.1, .1, .1, .1, .1, .1, .1, .1,
tem.
.1,
d) Monitoringperformanceofthedepartmentandsuggesting possibleim- .1, .1, .1, .1, .1, .1, .1, .1,
provements ANS: C
.1, .1, .1,
g g
.1, .1,