Questions & Answers | Verified
/. 1. An informatics nurse and an emergency nurse are conducting an analysis of a
patient admission from the ER? Which tool should these nurses use for a process
analysis? - Answer-✅SWOT template
/.1. What is an effective way to reduce the risk of access of electronic protected health
information (ePHI) by unauthorized users? - Answer-✅Make sure all users adhere to
security and confidential policy set forth by the facility
/.What is the goal of MIPS and MU? - Answer-✅Patient quality care
/.A provider at the hospital had his laptop stolen from his vehicle. What should be on his
laptop to protect it from data breach? - Answer-✅Encryption
/.What is the name of the process that begins with conception and continues through
implementation? - Answer-✅SDLC
/.When a physician arrives on the unit, a nurse is asked about the fluid status of a
patient. Where should the nurse find this information? - Answer-✅Intake and output
chart
/.why is it important to control the number of warnings in EHR? - Answer-✅alert fatigue
/.which two technologies support the standardization of healthcare data? - Answer-
✅HL7 and DICOM
/.what can be installed to allow one operation to access another to enable the exchange
of data? - Answer-✅Integration
/.what is a physical safeguard of ePHI? - Answer-✅Lock on hard drive, Facility Access
Controls Workstation Use Workstation Security - Device and Media Controls
/.what is a technical safeguard ePHI - Answer-✅Access control. Audit controls.
Authentication.
/.An informatics nurse and an ER nurse are conducting an analysis of a patient
admission form the er. which tool should these nurses use for a process analysis? -
Answer-✅SWOT
, /.1. an informatics nurse is developing a web-based application for patient care. which
statement accurately describes the internet? - Answer-✅A Network or networks
/.1. what describes an example of opt-in or opt-out choice regarding the disclosure of
personal health information? - Answer-✅your information sent to another facility
/.which government organization oversees the meaningful use program? - Answer-
✅CMS
/.What item describes a basic network code that determines the roles used to create
and route packets of data between network devices? - Answer-✅Interface
/.1. Which is a physician's clinical informatics assessment? - Answer-✅Vital signs
/.1. The Operating room uses a different system than what is integrated in the EMR.
What do you do? - Answer-✅chart in one system and it will automatically show up in
both systems
/.1. There are different systems for L &D and the hospital, how would you check for
orders and medications? - Answer-✅Log out of L&D system and log into the Hospital
system
/.What should providers have on their personal mobile devices to protect it from sharing
information when stolen? - Answer-✅Authentication and encryption.
/.1. What are two barriers of adopting the CDS in an EHR? - Answer-✅Limited resource
Communication information exchange
/.1. What should healthcare staff who use mobile devices to access ePHI do to protect
devices before they are lost or stolen? - Answer-✅. Turn off share files.
/.Which stage of the SDLC would data be collected from the systems users regarding
their analysis - Answer-✅Needs
/.Which phase of the system life cycle involves using needs assessment to identify the
exportation of the system? - Answer-✅Needs/Design
/.Which MIPS merit-based incentive payment system performance replaces MU for
physicians? - Answer-✅HITCECH act
/.What are 3 common reason for HIPAA violation citations? - Answer-✅Lost or stolen
unencrypted devices
Social media postings
Taking a patient photo with a personal phone