D220STUDYSETQUESTIONSWITH b b b b
CORRECT ANSWERS 2025 b b b
1. Which information in an electronic medical record (EMP) helps a nurse plan & manage a pat ient's
b b b b b b b b b b b b b b b b
post-operative care after open-heart surgery - CORRECT ANSWER -Provider orders
b b b b b b b b b b
2. Which information in a patient's electronic medical record (EMA), in addition to the nursing
b b b b b b b b b b b b b
flowsheets & provider orders, helps a nurse plan & manage fluctuations in blood glucose levels
b b b b b b b b b b b b b b b
- CORRECT ANSWER -MAR
b b b
3. A nurse is planning the care for a patient admitted to the hospital with COVID-
b b b b b b b b b b b b b b
19 Which list of information in the electronic medical record (EMR) will help the nurse plan the care
b b b b b b b b b b b b b b b b b
for this patient - CORRECT ANSWER -
b b b b b b b
The patient's laboratory results over the last 72 hours
b b b b b b b b
4. Which clinical note type is exempt from being shared with patients according to the United States
b b b b b b b b b b b b b b b
Core Data for Interoperability (USC DI) standards - CORRECT ANSWER -
b b b b b b b b b b b
Psychotherapy notes b
5. Operating room (OR) staff are reliant upon a manual white board for patient tracking. Recen tly, b b b b b b b b b b b b b b b
surgeons have complained that the turnaround time between surgical cases has increased & blame
b b b b b b b b b b b b b b
the manual tracking system. An informatics nurse recommends expanding use of the existing
b b b b b b b b b b b b b
surgical information system (SIS). Which resolution can improve this workflow issue - CORRECT
b b b b b b b b b b b b b
ANSWER -Radio frequency identification (RFID) in patient labels
b b b b b b b b
6. An informatics nurse & an emergency nurse are conducting an analysis of a patient admissio n from
b b b b b b b b b b b b b b b b
the ER - CORRECT ANSWER -
b b b b b b
Which tool should these nurses use for a process analysis? SWOT template
b b b b b b b b b b b
7. What is an effective way to reduce the risk of access of electronic protected health informati on
b b b b b b b b b b b b b b b b
(ePHI) by unauthorized users - CORRECT ANSWER -
b b b b b b b b
Make sure all the users adhere to security & confidential policy set forth by the facility
b b b b b b b b b b b b b b b
,8. How does a healthcare policy assure access to health information by authorized users -
b b b b b b b b b b b b b
CORRECT ANSWER -
b b b
It creates a reliable method to verify the identities of users accessing health information
b b b b b b b b b b b b b
9. Which statement describes the application of meaningful use - CORRECT ANSWER -
b b b b b b b b b b b
Provider needs to show the use of the Electronic Health Record (EHR) technology
b b b b b b b b b b b b b
10. What is the typical role of the informatics nurse - CORRECT ANSWER -
b b b b b b b b b b b b
Plans, coordinates, & facilitates education for all computer applications & software for nursing or
b b b b b b b b b b b b b
clinical user group
b b b
11. A patients glucose blood sugar is 400. What is a one-time kind of report -
b b b b b b b b b b b b b b
CORRECT ANSWER -Ad Hoc
b b b b
12. Which clinical information technology enables providers to document patient assessments
b b b b b b b b b
- CORRECT ANSWER -Vitals signs capture b b b b
13. A patient is being transferred to another hospital, however the hospital he is being transfer red to
b b b b b b b b b b b b b b b b
does not have access to the Electronic Health Record (EHR) since they use EPIC. How wil l they
b b b b b b b b b b b b b b b b b b
receive his Electronic Health Record (EHR) - CORRECT ANSWER -
b b b b b b b b b b
Continuity care record from AMR b b b b
14. Which statement best describes Nursing Informatics - CORRECT ANSWER -
b b b b b b b b b
"Computer science, decision science, information science, management science, cognitive scie nce,
b b b b b b b b b b
& organizational theory."
b b b
15. The nurse receives report that there are new orders to review. Where does the nurse look to
b b b b b b b b b b b b b b b b
verify this information - CORRECT ANSWER -The Kardex
b b b b b b b b
,16. What is the goal of Merit- b b b b b
Based Incentive Payment System (MIPS) & Meaningful Use (MU) - CORRECT ANSWER - Patient
b b b b b b b b b b b b b
quality care
b b
17. What is a type of phishing - CORRECT ANSWER -Trojan
b b b b b b b b b
18. What is Data governance - CORRECT ANSWER - b b b b b b b
Defines who can take what action, upon what data, in what situations, using what methods
b b b b b b b b b b b b b b
19. A provider at the hospital had his laptop stolen from his vehicle. What should be on his lap top to
b b b b b b b b b b b b b b b b b b b
protect it from data breach - CORRECT ANSWER -Encryption
b b b b b b b b b
20. What is the name of the process that begins with conception & continues through implem
b b b b b b b b b b b b b b
entation - CORRECT ANSWER -Systems Development Life Cycle (SDLC)
b b b b b b b b b
21. What is the intent of the Clinical Decision Support (CDS) System - CORRECT ANSWER - This is an
b b b b b b b b b b b b b b b b b
application that supports healthcare practitioners in making patient-care decisions
b b b b b b b b b
22. What is the term for sharing a person's personal information with other individuals electro
b b b b b b b b b b b b b
nically - CORRECT ANSWER -Information sharing
b b b b b b
23. When a physician arrives on the unit, a nurse is asked about the fluid status of a patient. W here
b b b b b b b b b b b b b b b b b b b
should the nurse find this information - CORRECT ANSWER -The intake & output chart
b b b b b b b b b b b b b b
24. Why is it important to control the number of warnings in Electronic Health Record (EHR) -
b b b b b b b b b b b b b b b
CORRECT ANSWER -Alert fatigue
b b b b
25. Which change theory begins with creating urgency - CORRECT ANSWER -Kotter's Models
b b b b b b b b b b b
, 26. Which act in 2009 did Meaningful Use (MU) originate - CORRECT ANSWER -
b b b b b b b b b b b b
American Recover & Reinvestment Act (ARRA) act in 2009
b b b b b b b b b
27. What is the primary concern driving Nursing informatic initiative - CORRECT ANSWER -
b b b b b b b b b b b b
Patient safety
b b
28. What can be installed to allow one operation to access another to enable the exchange of data -
b b b b b b b b b b b b b b b b b
CORRECT ANSWER -Integration
b b b
29. Which type of chart uses rectangle, oval & diamonds in both - CORRECT ANSWER -
b b b b b b b b b b b b b b
Flowchart
b
30. What is the intent of the Clinical Decision Support (CDS) System - CORRECT ANSWER -
b b b b b b b b b b b b b b
Providing clinicians with knowledge & person specific information
b b b b b b b b
31. Information may be kept secret to those with an only need to know - CORRECT ANSWER - What is b b b b b b b b b b b b b b b b b b
this? Information privacy is the right to choose the conditions under which informatio n is shared, &
b b b b b b b b b b b b b b b b b
to ensure the accuracy of collected information.
b b b b b b b
32. Which statement defines interoperability - CORRECT ANSWER -
b b b b b b b
The extent to which systems & devices can exchange data & interpret that shared data.
b b b b b b b b b b b b b b
33. Which two statement defines healthcare informatics - CORRECT ANSWER -
b b b b b b b b b
Standardized languages & terminologies to ensure consistent meanings across all settings
b b b b b b b b b b
34. What is a physical safeguard of ePHI - CORRECT ANSWER -
b b b b b b b b b b
Lock on hard drive. Facility Access Controls Workstation Use Workstation Security - Device &
b b b b b b b b b b b b b
Media Controls
b b
CORRECT ANSWERS 2025 b b b
1. Which information in an electronic medical record (EMP) helps a nurse plan & manage a pat ient's
b b b b b b b b b b b b b b b b
post-operative care after open-heart surgery - CORRECT ANSWER -Provider orders
b b b b b b b b b b
2. Which information in a patient's electronic medical record (EMA), in addition to the nursing
b b b b b b b b b b b b b
flowsheets & provider orders, helps a nurse plan & manage fluctuations in blood glucose levels
b b b b b b b b b b b b b b b
- CORRECT ANSWER -MAR
b b b
3. A nurse is planning the care for a patient admitted to the hospital with COVID-
b b b b b b b b b b b b b b
19 Which list of information in the electronic medical record (EMR) will help the nurse plan the care
b b b b b b b b b b b b b b b b b
for this patient - CORRECT ANSWER -
b b b b b b b
The patient's laboratory results over the last 72 hours
b b b b b b b b
4. Which clinical note type is exempt from being shared with patients according to the United States
b b b b b b b b b b b b b b b
Core Data for Interoperability (USC DI) standards - CORRECT ANSWER -
b b b b b b b b b b b
Psychotherapy notes b
5. Operating room (OR) staff are reliant upon a manual white board for patient tracking. Recen tly, b b b b b b b b b b b b b b b
surgeons have complained that the turnaround time between surgical cases has increased & blame
b b b b b b b b b b b b b b
the manual tracking system. An informatics nurse recommends expanding use of the existing
b b b b b b b b b b b b b
surgical information system (SIS). Which resolution can improve this workflow issue - CORRECT
b b b b b b b b b b b b b
ANSWER -Radio frequency identification (RFID) in patient labels
b b b b b b b b
6. An informatics nurse & an emergency nurse are conducting an analysis of a patient admissio n from
b b b b b b b b b b b b b b b b
the ER - CORRECT ANSWER -
b b b b b b
Which tool should these nurses use for a process analysis? SWOT template
b b b b b b b b b b b
7. What is an effective way to reduce the risk of access of electronic protected health informati on
b b b b b b b b b b b b b b b b
(ePHI) by unauthorized users - CORRECT ANSWER -
b b b b b b b b
Make sure all the users adhere to security & confidential policy set forth by the facility
b b b b b b b b b b b b b b b
,8. How does a healthcare policy assure access to health information by authorized users -
b b b b b b b b b b b b b
CORRECT ANSWER -
b b b
It creates a reliable method to verify the identities of users accessing health information
b b b b b b b b b b b b b
9. Which statement describes the application of meaningful use - CORRECT ANSWER -
b b b b b b b b b b b
Provider needs to show the use of the Electronic Health Record (EHR) technology
b b b b b b b b b b b b b
10. What is the typical role of the informatics nurse - CORRECT ANSWER -
b b b b b b b b b b b b
Plans, coordinates, & facilitates education for all computer applications & software for nursing or
b b b b b b b b b b b b b
clinical user group
b b b
11. A patients glucose blood sugar is 400. What is a one-time kind of report -
b b b b b b b b b b b b b b
CORRECT ANSWER -Ad Hoc
b b b b
12. Which clinical information technology enables providers to document patient assessments
b b b b b b b b b
- CORRECT ANSWER -Vitals signs capture b b b b
13. A patient is being transferred to another hospital, however the hospital he is being transfer red to
b b b b b b b b b b b b b b b b
does not have access to the Electronic Health Record (EHR) since they use EPIC. How wil l they
b b b b b b b b b b b b b b b b b b
receive his Electronic Health Record (EHR) - CORRECT ANSWER -
b b b b b b b b b b
Continuity care record from AMR b b b b
14. Which statement best describes Nursing Informatics - CORRECT ANSWER -
b b b b b b b b b
"Computer science, decision science, information science, management science, cognitive scie nce,
b b b b b b b b b b
& organizational theory."
b b b
15. The nurse receives report that there are new orders to review. Where does the nurse look to
b b b b b b b b b b b b b b b b
verify this information - CORRECT ANSWER -The Kardex
b b b b b b b b
,16. What is the goal of Merit- b b b b b
Based Incentive Payment System (MIPS) & Meaningful Use (MU) - CORRECT ANSWER - Patient
b b b b b b b b b b b b b
quality care
b b
17. What is a type of phishing - CORRECT ANSWER -Trojan
b b b b b b b b b
18. What is Data governance - CORRECT ANSWER - b b b b b b b
Defines who can take what action, upon what data, in what situations, using what methods
b b b b b b b b b b b b b b
19. A provider at the hospital had his laptop stolen from his vehicle. What should be on his lap top to
b b b b b b b b b b b b b b b b b b b
protect it from data breach - CORRECT ANSWER -Encryption
b b b b b b b b b
20. What is the name of the process that begins with conception & continues through implem
b b b b b b b b b b b b b b
entation - CORRECT ANSWER -Systems Development Life Cycle (SDLC)
b b b b b b b b b
21. What is the intent of the Clinical Decision Support (CDS) System - CORRECT ANSWER - This is an
b b b b b b b b b b b b b b b b b
application that supports healthcare practitioners in making patient-care decisions
b b b b b b b b b
22. What is the term for sharing a person's personal information with other individuals electro
b b b b b b b b b b b b b
nically - CORRECT ANSWER -Information sharing
b b b b b b
23. When a physician arrives on the unit, a nurse is asked about the fluid status of a patient. W here
b b b b b b b b b b b b b b b b b b b
should the nurse find this information - CORRECT ANSWER -The intake & output chart
b b b b b b b b b b b b b b
24. Why is it important to control the number of warnings in Electronic Health Record (EHR) -
b b b b b b b b b b b b b b b
CORRECT ANSWER -Alert fatigue
b b b b
25. Which change theory begins with creating urgency - CORRECT ANSWER -Kotter's Models
b b b b b b b b b b b
, 26. Which act in 2009 did Meaningful Use (MU) originate - CORRECT ANSWER -
b b b b b b b b b b b b
American Recover & Reinvestment Act (ARRA) act in 2009
b b b b b b b b b
27. What is the primary concern driving Nursing informatic initiative - CORRECT ANSWER -
b b b b b b b b b b b b
Patient safety
b b
28. What can be installed to allow one operation to access another to enable the exchange of data -
b b b b b b b b b b b b b b b b b
CORRECT ANSWER -Integration
b b b
29. Which type of chart uses rectangle, oval & diamonds in both - CORRECT ANSWER -
b b b b b b b b b b b b b b
Flowchart
b
30. What is the intent of the Clinical Decision Support (CDS) System - CORRECT ANSWER -
b b b b b b b b b b b b b b
Providing clinicians with knowledge & person specific information
b b b b b b b b
31. Information may be kept secret to those with an only need to know - CORRECT ANSWER - What is b b b b b b b b b b b b b b b b b b
this? Information privacy is the right to choose the conditions under which informatio n is shared, &
b b b b b b b b b b b b b b b b b
to ensure the accuracy of collected information.
b b b b b b b
32. Which statement defines interoperability - CORRECT ANSWER -
b b b b b b b
The extent to which systems & devices can exchange data & interpret that shared data.
b b b b b b b b b b b b b b
33. Which two statement defines healthcare informatics - CORRECT ANSWER -
b b b b b b b b b
Standardized languages & terminologies to ensure consistent meanings across all settings
b b b b b b b b b b
34. What is a physical safeguard of ePHI - CORRECT ANSWER -
b b b b b b b b b b
Lock on hard drive. Facility Access Controls Workstation Use Workstation Security - Device &
b b b b b b b b b b b b b
Media Controls
b b