Eustacemaina122
On this page, you find all documents, package deals, and flashcards offered by seller eustacemaina122.
- 519
- 0
- 9
Community
- Followers
- Following
530 items
C170 WGU ALREADY PASSED
An entity is said to be X -dependent if it can exist in the database only when it is associated with 
another related entity occurrence. - existence 
A table that has all key attributes defined has no repeating groups and all its attributes are 
dependent on the primary key is said to be in X. - 1nf 
A determinant is any attribute whose value determines other values within a column. - F 
X is a process that is used for changing attributes to entities. - Normalization 
Any attribute whose value d...
- Exam (elaborations)
- • 6 pages •
An entity is said to be X -dependent if it can exist in the database only when it is associated with 
another related entity occurrence. - existence 
A table that has all key attributes defined has no repeating groups and all its attributes are 
dependent on the primary key is said to be in X. - 1nf 
A determinant is any attribute whose value determines other values within a column. - F 
X is a process that is used for changing attributes to entities. - Normalization 
Any attribute whose value d...
C170 - Data Management Applications ALREADY PASSED
First Normal Form - - when all non-key columns depend on the primary key 
- a table with a primary key is in first normal form 
- a table with no duplicate rows is in first normal form 
Second Normal Form - - when all non-key columns depend on the whole primary key 
- cannot depend on part of a composite primary key 
- a table with a simple primary key is automatically in second normal form 
A table with a simple primary key must be in what normal form? - - second normal form or 
higher 
Third N...
- Exam (elaborations)
- • 13 pages •
First Normal Form - - when all non-key columns depend on the primary key 
- a table with a primary key is in first normal form 
- a table with no duplicate rows is in first normal form 
Second Normal Form - - when all non-key columns depend on the whole primary key 
- cannot depend on part of a composite primary key 
- a table with a simple primary key is automatically in second normal form 
A table with a simple primary key must be in what normal form? - - second normal form or 
higher 
Third N...
C468 ALREADY PASSED
Interface - Computer program that tells two different systems how to exchange data 
Interoperability - The ability of two entities, human or machine, to exchange and predictably use 
data or information while retaining the original meaning of that data 
Integration - The process by which different information systems are able to exchange data in a 
fashion that is seamless to the end user 
Standardized terminology - The implementation of this within the EHR is essential for healthcare 
organizat...
- Exam (elaborations)
- • 3 pages •
Interface - Computer program that tells two different systems how to exchange data 
Interoperability - The ability of two entities, human or machine, to exchange and predictably use 
data or information while retaining the original meaning of that data 
Integration - The process by which different information systems are able to exchange data in a 
fashion that is seamless to the end user 
Standardized terminology - The implementation of this within the EHR is essential for healthcare 
organizat...
C468 Informatics OA study guide
1. An informatics nurse and an emergency nurse are conducting an analysis of a patient admission 
from the ER? Which tool should these nurses use for a process analysis? -SWOT template 
1. What is an effective way to reduce the risk of access of electronic protected health information 
(ePHI) by unauthorized users? -Make sure all users adhere to security and confidential policy set 
forth by the facility 
What is the goal of MIPS and MU? -Patient quality care 
A provider at the hospital had his ...
- Exam (elaborations)
- • 7 pages •
1. An informatics nurse and an emergency nurse are conducting an analysis of a patient admission 
from the ER? Which tool should these nurses use for a process analysis? -SWOT template 
1. What is an effective way to reduce the risk of access of electronic protected health information 
(ePHI) by unauthorized users? -Make sure all users adhere to security and confidential policy set 
forth by the facility 
What is the goal of MIPS and MU? -Patient quality care 
A provider at the hospital had his ...
C468 Informatics OA study guide
1. An informatics nurse and an emergency nurse are conducting an analysis of a patient admission 
from the ER? Which tool should these nurses use for a process analysis? -SWOT template 
1. What is an effective way to reduce the risk of access of electronic protected health information 
(ePHI) by unauthorized users? -Make sure all users adhere to security and confidential policy set 
forth by the facility 
What is the goal of MIPS and MU? -Patient quality care 
A provider at the hospital had his ...
- Exam (elaborations)
- • 7 pages •
1. An informatics nurse and an emergency nurse are conducting an analysis of a patient admission 
from the ER? Which tool should these nurses use for a process analysis? -SWOT template 
1. What is an effective way to reduce the risk of access of electronic protected health information 
(ePHI) by unauthorized users? -Make sure all users adhere to security and confidential policy set 
forth by the facility 
What is the goal of MIPS and MU? -Patient quality care 
A provider at the hospital had his ...
C468 Information Management and the Application of Technology WGU
Information literacy -Defined as the ability to recognize when information is needed as well as 
the skills to find, evaluate and use needed information effectively 
Information -Term used to describe data that has been interpreted 
Information science -Focus on how to gather, process and transform information into knowledge. 
It also incorporates features from 5 other sciences 
-communication science 
-computer science 
-social science 
-library science 
-cognitive science 
Information systems ...
- Exam (elaborations)
- • 9 pages •
Information literacy -Defined as the ability to recognize when information is needed as well as 
the skills to find, evaluate and use needed information effectively 
Information -Term used to describe data that has been interpreted 
Information science -Focus on how to gather, process and transform information into knowledge. 
It also incorporates features from 5 other sciences 
-communication science 
-computer science 
-social science 
-library science 
-cognitive science 
Information systems ...
C468 Information Management
Informatics - "The big oak tree" 
combination of the nursing science, 
computer science and information science. 
It includes information technologies that can help support nursing practice. 
Information technology - "The branch" 
electronic healthcare record, your clinical decisions support tools, bar code medication 
administration, and so on. 
information System - "Another branch" : used to collect, create and distribute useful data. 
This term describes the development, use and managem...
- Exam (elaborations)
- • 17 pages •
Informatics - "The big oak tree" 
combination of the nursing science, 
computer science and information science. 
It includes information technologies that can help support nursing practice. 
Information technology - "The branch" 
electronic healthcare record, your clinical decisions support tools, bar code medication 
administration, and so on. 
information System - "Another branch" : used to collect, create and distribute useful data. 
This term describes the development, use and managem...
C468 Information Management
Informatics -"The big oak tree" 
combination of the nursing science, 
computer science and information science. 
It includes information technologies that can help support nursing practice. 
Information technology -"The branch" 
electronic healthcare record, your clinical decisions support tools, bar code medication 
administration, and so on. 
information System -"Another branch" : used to collect, create and distribute useful data. 
This term describes the development, use and management...
- Exam (elaborations)
- • 17 pages •
Informatics -"The big oak tree" 
combination of the nursing science, 
computer science and information science. 
It includes information technologies that can help support nursing practice. 
Information technology -"The branch" 
electronic healthcare record, your clinical decisions support tools, bar code medication 
administration, and so on. 
information System -"Another branch" : used to collect, create and distribute useful data. 
This term describes the development, use and management...
C468 Knowledge checks 2 WGU
System security involves protection against - deliberate attacks, errors, omissions, disasters and 
viruses 
Which of the following is a mechanism that logs the user off a system after a specified period of 
inactivity on the terminal or computer? - automatic sign off 
The sharing of private information in a situation in which a relationship has been established for the 
purpose of treatment with the understanding this information will remain protected is - 
Confidentiality 
____ is a combo of h...
- Exam (elaborations)
- • 5 pages •
System security involves protection against - deliberate attacks, errors, omissions, disasters and 
viruses 
Which of the following is a mechanism that logs the user off a system after a specified period of 
inactivity on the terminal or computer? - automatic sign off 
The sharing of private information in a situation in which a relationship has been established for the 
purpose of treatment with the understanding this information will remain protected is - 
Confidentiality 
____ is a combo of h...
C468 Nursing Informatics - WGU
Wisdom - Using knowledge and experience to manage and solve problems 
Knowledge - Synthesis of information from several sources to produce a single concept or idea 
Information - Data that has been interpreted 
Data - a collection of numbers, characters, or facts that are gathered according to some 
perceived need for analysis 
Knowledge worker - Individual with a high degree of expertise, education, or experience who 
creates, distributes, and applies knowledge 
Knowledge builder - One who exam...
- Exam (elaborations)
- • 5 pages •
Wisdom - Using knowledge and experience to manage and solve problems 
Knowledge - Synthesis of information from several sources to produce a single concept or idea 
Information - Data that has been interpreted 
Data - a collection of numbers, characters, or facts that are gathered according to some 
perceived need for analysis 
Knowledge worker - Individual with a high degree of expertise, education, or experience who 
creates, distributes, and applies knowledge 
Knowledge builder - One who exam...