100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

ANCC Nursing Informatics Certification Review 276 Questions with Verified Answers,100% CORRECT

Beoordeling
-
Verkocht
-
Pagina's
61
Cijfer
A+
Geüpload op
19-04-2024
Geschreven in
2023/2024

ANCC Nursing Informatics Certification Review 276 Questions with Verified Answers HIPPA only applies to organizations that have electronic health records. True False - CORRECT ANSWER False The Informatics nurse is involved with measure to protect the security and confidentiality of patient data because: a. it is a joint commission mandate b. it is regulated by HIPPA legislation c. the major cause of security breaches is human error d. both B and C are correct - CORRECT ANSWER d. It is regulated by HIPPA Legislation and The Major cause of security breeches is human error. Controls to protect data privacy and integrity are both logical and: a. physical b. analytical c. theoretical d. psychological - CORRECT ANSWER b. analytical Which of the following is not a mechanism for protecting the security of health data: a. Automatic sign-offs b. A Strong Password c. Having one password per nursing unit d. Firewalls - CORRECT ANSWER C. Having one password per nursing unit. An audit trail is : a. a log of which project meetings and events have been completed b. an electronic tool that can track system access by individual user who viewed a specific client record. c. a proactive tool to monitor who will be using a system and modifying data. d. used primarily as a data integrity tool - CORRECT ANSWER b. an electronic tool that can track system access by individual user who viewed a specific client record. Data can be represented by all EXCEPT: a. text b. audio c. transmission waves d. video - CORRECT ANSWER a. text Things to consider related to disaster planning include: a. should have only 1 database to make it easier to recover b. all data should be stored onsite so it is accessible c. must have a solid communication plan during disaster and recovery. d. an association or group that shows uniformity - CORRECT ANSWER C. Must have a solid communication plan during disaster and recover. Some examples of physical security for healthcare data are fences, walls, locks, safes, vaults, armed guards, sensors, alarms. True False - CORRECT ANSWER TRUE One way to track the activity that is occurring in a system is: a. a GANTT chart b. an audit trail c. a data backup d. biometrics - CORRECT ANSWER b. an audit trail PHI stands for : a. physician hospital interchange b. password hint indicator c. potential hardware incursion d. protected health information - CORRECT ANSWER d. Protected Health Information If the informatics nurse is concerned that a computer system may not function well during peak times of access the type of testing needed is: a. Functional Testing b. System Integrated testing c. Black box testing d. Load volume testing - CORRECT ANSWER Load Volume Testing What is Load Volume Testing? - CORRECT ANSWER Load/volume testing is a non-functional testing for reliability that assesses the ability of the system to function under various loads, such as at peak times when multiple users in multiple departments are accessing the system. The purpose of load/volume testing is to determine the maximum load capacity and to identify the load at which problems begin to occur. Testing is done at both the safe working load (SWL) and above the SWL. In preparation for the workflow redesign necessitated for implementation of an EHR, the first step should be to a. Assess the EHR requirments b. Conduct surveys about the workflow c. Assess compatibility with the EHR d. Map the current workflow - CORRECT ANSWER map the current workflow Which resource for evidence-based research is provided by the National Library of Medicine? a. BMJ Publishing b. CINAHL c. PubMed d. World View on Evidence based- nursing - CORRECT ANSWER PubMed is a resource for evidence-based research that is provided by the National Library of Medicine, which was developed by the National Center for Biotechnology Information (NCBI). PubMed provides access to numerous databases with 24 million citations from MEDLINE (the National Library of Medicine's bibliographic database with references to life sciences and biomedical sciences), life science journals, and electronic books with links to full text when it is available. When considering transitioning to cloud storage and assessing vendors, the most critical assessment relates to: a. regulatory compliance b. monitoring mechanisms c. cost analysis d. interoperability - CORRECT ANSWER The most critical assessment relates to compliance with regulatory requirements because if the vendor cannot verify that the company meets HIPAA requirements and satisfies the Code of Federal Regulations Title 21, Part 11 (which provides regulations regarding electronic records and electronic signatures), then security of patient data may be inadequate. Other important considerations include cost analysis (including cost of implementation and ongoing costs), monitoring mechanisms, and interoperability. When utilizing a prioritization matrix to prioritize activities as a project manager, the informatics nurse must first establish: a. rating scale and categories b. criteria and timeframe c. criteria and rating scale d. rating scale and timeframe - CORRECT ANSWER the informatics nurse must first establish criteria and a rating scale. The criteria includes those factors that are utilized to determine how important each project is; for example, a project mandated by regulations is more important than a project that may improve customer satisfaction. A rating scale for each project should be established with numeric values (such as 1 to 10) used to demonstrate how effective the project is in meeting the criteria. A typical prioritization matrix may have up to a dozen criteria. An advantage of an identity and access management (IAM) system is that the IAM system: a. provides HIPAA-required encryption for PHI b. satisfies the Code of Federal Regulations Title 21, Part 11 c. meets HIPAA's Security Rule requirements regarding access to PHI d. meets HIPAA's Privacy Rule requirements regarding identification - CORRECT ANSWER An advantage of an identity and access management (IAM) system is that the IAM system meets HIPAA's Security Rule requirements regarding access to PHI through identity management. An IAM system provides, captures, updates, and records user IDs and provides appropriate access privileges, preventing "privilege creep," which increases risks to security. The IAM system should provide authentication (single sign-in and session management), authorization (based on roles, rules, and attributes), user management (provisioning and password management), and a central directory. When utilizing a prioritization matrix to prioritize activities as a project manager, the informatics nurse must first establish: a. rating scale and categories b. criteria and timeframe c. criteria and rating scale d. rating scale and timeframe - CORRECT ANSWER first establish criteria and a rating scale. The criteria includes those factors that are utilized to determine how important each project is; for example, a project mandated by regulations is more important than a project that may improve customer satisfaction. A rating scale for each project should be established with numeric values (such as 1 to 10) used to demonstrate how effective the project is in meeting the criteria. A typical prioritization matrix may have up to a dozen criteria. An advantage of an identity and access management (IAM) system is that the IAM system: a. provides HIPAA-required encryption for PHI b. satisfies the Code of Federal Regulations Title 21, Part 11 c. meets HIPAA's Security Rule requirements regarding access to PHI c. meets HIPAA's Privacy Rule requirements regarding identification - CORRECT ANSWER provides HIPAA-required encryption for PHI Which of the following standardized nursing terminologies is comprised of (1) a problem classification scheme, (2) an intervention scheme, and (3) a problem rating scale for outcomes? a. NANDA-I b. PNDS c. OMAHA c. ICNP - CORRECT ANSWER OMAHA is standardized nursing terminology that is comprised of (1) a problem classification scheme, (2) an intervention scheme, and (3) a problem rating scale for outcome. OMAHA was developed by the Visiting Nurse Association in Omaha, Nebraska, in the 1970s and was later developed further through research projects funded by the US Department of Health and Human Services. OMAHA is in the public domain but must be used as published (as opposed to modified). The smallest possible piece of data utilized in computer processing is the: a. byte b. zettabyte c. nibble d. bit - CORRECT ANSWER Bit The smallest piece of data utilized in computer processing is the bit (binary digit), which comprises zeros (off) and ones (on). Four bits equal one nibble, eight bits equal one byte, 1024 bytes equal one kilobyte, 1024 kilobytes equal one megabyte, and 1024 megabytes equal one gigabyte. Communication software is most commonly used for: a. video files b. e-mail and IM c. audio files d. documents - CORRECT ANSWER e-mail and IM. The network that connects the departments in an organization is likely a(n): a. WAN b. VSN c. MAN d. LAN - CORRECT ANSWER LAN When an institution is transitioning to a CPOE, a primary role of the informatics nurse is that of: a. system designer b. purchasing agent c. liaison d. software modifier - CORRECT ANSWER Liason - When an institution is transitioning to a CPOE, a primary role of the informatics nurse is that of liaison to promote multidisciplinary collaboration and cooperation among the various members of the healthcare team, including nurses, physicians, and IT specialists, to ensure that the end-product has the functionality that is needed for workflow and that it meets the requirements for safety and security. Needs regarding both hardware and software must be clearly communicated to IT personnel. The field of science that attempts to create intelligent technologies and then apply these technologies to the field of informatics is: a. cognitive science b. information science c. artificial intelligence d. cognitive informatics - CORRECT ANSWER AI - Artificial Intelligence. Researchers in artificial intelligence must engineer general intelligence and reasoning skills into the artificial intelligence programs as well as the ability to develop and learn from experiences and errors and to process natural language. One example of an artificial intelligence program is Siri®, which responds to verbal queries and is found on Apple devices, such as the iPhone and iPad. In an EHR with CPOE and CDS, allergy alerts should be triggered: a. after orders are written b. on physician request by accessing a link c. before orders are written d. in response to contraindicated drug orders - CORRECT ANSWER in response to contraindicated drug order. The human-technology interface (HTI): a. connects a user device to the Internet b. allows user interaction with technology c. standardizes applications utilized in all devices d. allows access to the technology only to authorized people - CORRECT ANSWER Allows user interaction with technology. The nurse informaticist (NI) is working on the implementation of a replacement laboratory system. One major consideration in order to have a fully operational system is: A. End-user support B. Stress testing C. Executive level support D. Data conversion - CORRECT ANSWER D. Data Conversion - All responses are important, but in order to move from one system to another the data needs to be moved. The organization has agreed to be the first major test site in which software will be installed. This site is known as a/an: A. Primary site B. Secondary site C. Alpha site D. Beta site - CORRECT ANSWER D. Beta site. Beta site testing is the final stage of testing (usually before commercial release). Primary and secondary sites are not the appropriate terms and alpha site is an initial phase of testing often used in development of software. The Informatics Nurse Specialist is developing a test scenario to determine if the admissions, discharge, and transfer application will work with the clinical documentation and laboratory results reporting modules of a larger electronic health record. This is known as: A. Unit testing B. Acceptance testing C. Integration testing D. System Testing - CORRECT ANSWER C. Integration testing - Integration testing is testing between systems. Unit testing only tests one discrete function and acceptance testing occurs when users test entire system to determine if the system meets the specified requirements of the design. The implementation team has determined that the conversion to the new system will occur department by department, with two weeks in between each installation. This is known as: A. Parallel installation B. Phased installation C. Big bang installation D. Risky installation - CORRECT ANSWER b. phase installation - Phased installation is when the implementation is done in stages, where one phase leads to another. Parallel installation defined: - CORRECT ANSWER Parallel installation occurs when old and new system are implemented simultaneously, and the 2 systems run simultaneously (i.e. paper and electronic, "old" system and "new" system). Which of the following is NOT a major phase in implementation and testing? A. Education and Training B. Conversion and "Go Live C. Operations and Language Barriers D. Implementation Strategies - CORRECT ANSWER C. Operations and language barriers Rationale: Operations and Language Barriers are not a major phase in implementation and testing. In a formal plan for implementation and testing it is not necessary to include: A. Team members B. Vendor representatives C. Executive Staff D. Crisis Coaches - CORRECT ANSWER Crisis coaches. Formal Plan must include: - Staff - Team members - Vendors - Executive staff - External resources A domain is: A. A copy of the software system, or environment, in a particular state B. An implementation strategy involving reiteration C. A go-live conversion factor involving conversion discrepancies D. A data storage device - CORRECT ANSWER A. A copy of the software system, or environment, in a particular state. Rationale: A domain is a copy of the software system, or environment, in a particular state. For example, test system (or domain); development system (or domain), training system and production system. "Bugs" in computer language are not really insects, but A. A testing methodology B. Commentary within the code indicated with an asterisk (*) C. Aberrancies and failures in the system D. The nickname of the coder who designed the first EHR - CORRECT ANSWER c. Abberancies Rationale: "Bugs" in computer language are defined as aberrancies and failures in the system or a coding error. System and Functional Testing: A. Does not include security testing of databases B. Is done in an ad hoc fashion as staff are available C. Addresses cultural impacts of new processes D. Includes multiple subsystems and phases of testing - CORRECT ANSWER D. includes multiple subsystems and phases of testing. Rationale: Systems are usually made up of subsystems and all must be tested. System and Functional Testing must include security testing and must be structured and controlled. Cultural impacts of new processes is not an aspect of testing. When the SDLC is done correctly: A. All steps are done in order for all areas. B. End users have final say on all aspects of the project. C. There is a formal change management process throughout to address new information as it comes to light. D. There is only one phase of implementation. - CORRECT ANSWER There is a formal change management process throughout to address new information as it comes to light. Change management is vital to the installation of a system. There may be several phases, particularly during a phased approach and end-users do not have final say on all aspects of the project and not all steps are done in order for all areas. What are the pieces that require ongoing evaluation? A. Hardware and software B. Interfaces and integrations C. Support D. All of the above - CORRECT ANSWER d. all of the above. Ongoing evaluation is needed on all aspects of the system - hardware, software, interfaces and integrations (which are software), and support. Support can include training as well as help desk operations. Financial evaluation should: A. Have the maximum budget finalized prior to assessment and purchases of priority items conformed to that ceiling, which will not be adjusted B. Involve primarily clinicians working to design the system C. Include both tangible and intangible costs D. Focus on costs for stages one and two primarily - CORRECT ANSWER C. Include both tangible and intangible costs Which is NOT true about backup and recovery: A. Use multiple backup devices B. Perform backups on Wednesdays during peak use C. Use full backups to minimize the time to restore databases D. Test the backups periodically to make sure data can be restored - CORRECT ANSWER B. Perform backups on Wednesdays during peak use Rationale: Backups do not need to happen on a particular day of the week. In practice it is best to backup during periods of least use. The Informatics Nurse is concerned with user support. Procedure manuals will be developed that will: A. Include policies that are changed by the system B. Describe how to perform business tasks while using the system C. Provide step-by-step instructions on how to program the applications D. Outline security controls in the system - CORRECT ANSWER B. Describe how to perform business tasks while using the system Rationale: Users will need to know how to perform their job using the automated system. Most users will not be involved in programming the applications, only using them. During the evaluation phase which of the following tools are used for construction and consistency? A. Setting defaults B. Amending the database C. Formatting and transferring data D. All of the above - CORRECT ANSWER D. all of the above Rationale: All of the above are tools used for construction and consistency. Which of the following is NOT part of documentation testing? A. Proofreading B. Subscriber color preferences C. Readability and accuracy D. Punctuation and grammar - CORRECT ANSWER B. subscriber color preferences. Rationale: Subscriber color preferences is an aspect of usability, not documentation testing. Quality Monitoring: A. Focuses on audit trails to see who is accessing which patient data B. Is one single methodology C. Does not include integration and interfaces D. Is part of system performance maintenance strategies - CORRECT ANSWER D. Is part of system performance maintenance strategies. Rationale: Quality monitoring may include audit trails, but it is more than one methodology. It is a component of a system performance maintenance strategy. Evaluation and support: A. Should be outlined in the original project plan as an ongoing process. B. Are unnecessary once the implementation is complete. C. Does not require dedicated resources. D. Can be done by assigned super users - CORRECT ANSWER a. Should be outlined in the original project plan as an ongoing process. Rationale: Evaluation is a major component of the system design life cycle and planning for evaluation should be included in the original project plan. Work flow: A. Almost never changes with the implementation of a system B. Is reflected solely in policies and procedures C. Changes in many ways including culture, productivity, and clinical practice during an implementation D. Can be determined by individual departments and specialties - CORRECT ANSWER C. Changes in many ways including culture, productivity, and clinical practice during an implementation Rationale: Workflow WILL change with the implementation of the system and is more than simply documenting policies and procedures. The workflow must be determined organization-wide and not be left to individual departments as systems and processes must be integrated. Which is NOT a type of maintenance? A. Corrective B. Preventative C. Flexible D. Emergent - CORRECT ANSWER C. Flexible Rationale: According to the chart in the Module, three types of maintenance are corrective, preventative, and emergent. What are the techniques that apply algorithms for extracting patterns from data stored in data warehouses that are typically not apparent to human decision makers are known as: A. Data mining or knowledge discovery in databases. B. Statistical generation from warehoused data c. Evidence generation from warehoused data d. Data retrieval and cleansing - CORRECT ANSWER A. Data mining or knowledge discovery in databases There is no examples of wisdom in nursing practice, as it is merely a theoretical concept. True False - CORRECT ANSWER FALSE. Rationale: wisdom is defined as understanding, applying and applying with compassion. An example is selecting a protocol to caring for a patient based on patient preferences. What kind of information might be included in a clinical practice guideline? a. typically written as narrative b. background material an evidence c. ranking of strength of evidence d. All of the above. - CORRECT ANSWER D. All of the above: Rationale: a CPG is typically written as a narrative text providing background material and evidence. The strength of that evidence is ranked. Which of the following use a knowledge base and set of rules to analyze data and provide recommendations? a. knowledge generator b. decision support systems c. wisdom wizards d. benchmarkers - CORRECT ANSWER Decision Support Systems (DSS) Rationale a DSS uses a knowledge base and a set of rules to analyze data and provide recommendations. Benchmarking is: a. drawing a line in a doorway at the organization to monitor organizational growth b. a way of finding best practices c. comparing one organization to another d. both B & C - CORRECT ANSWER D. Both B & C. Benchmarking is defined as a way of finding best practices and then comparing ones organization against another. CDSS stands for: a. corporate decision support silos b. clinical decision support systems c. client decision support systems c. customer service support systems - CORRECT ANSWER b. clinical decision support systems Wisdom is : a. information that is used to identify relationships b. the recognition of patterns in data c. the use of knowledge to solve problems c. the use of decision support systems - CORRECT ANSWER b. the recognition of patterns in data The next step in complexity above information is: a. knowledge b. wisdom c. data d. compliance - CORRECT ANSWER a. knowledge These come together in decision support systems: a. data and information b. information and knowledge c. knowledge and wisdom d. data and knowledge - CORRECT ANSWER B. information and knowledge The major difference between Decision support systems (DSS) and Expert systems (ES) is: a. a DSS uses rules and ES uses queries b. that they are synonymous c. DSS is a step up or more complex than ES d. That a DSS leaves the ultimate decision to the decision maker and the ES selects the best solution. - CORRECT ANSWER d. That a DSS leaves the ultimate decision to the decision maker and the ES selects the best solution. What are three clinical decision systems areas in which decision assistance can be found? A. Test solutions, monitoring actions, change in condition B. Optimizing process flow and workflow, monitoring actions, intake and output C. Intake and output, change in condition, choice of treatmen___Incorrect D. Choice of treatment, test solutions, monitoring actions - CORRECT ANSWER A. maybe???? Benchmarking is: A. Taking information and comparing it to another's data to identify strengths and weaknesses Correct B. Using information from other facilities to identify if they have better reimbursement than your facility C. Comparing one nurse to another in different hospitals D. A method used to develop decision support systems - CORRECT ANSWER A. Taking information and comparing it to another's data to identify strengths and weaknesses How is wisdom defined by Nursing Informatics: Scope and Standards of Practice? A. Being an expert in the field of informatics B. Using data to interpret outcomes for the leaders of the organization C. Understanding data and knowledge and applying the knowledge with compassion D. Understanding data and knowledge to improve outcomes - CORRECT ANSWER C. Understanding data and knowledge and applying the knowledge with compassion While caring for a 40-year old patient with terminal cancer, the key area of the clinical practice guideline is to: A. Reduce waste of resources, assist in telling your patient what is going to happen and eliminate errors B. Show the nurse what to do for the patient with a terminal illness C. Assist the patient with questions to ask the nurse about the cause of cancer D. Encourage best practice, eliminate errors and reduce unjustified practice variations - CORRECT ANSWER D. Encourage best practice, eliminate errors and reduce unjustified practice variations One of the steps in creating a clinical practice guideline is to: A. Identify what has always been done in the facility B. Review evidence-based studies C. Discuss what is the easiest process to meet the goal D. Send out a survey about what is currently being practiced - CORRECT ANSWER B. Review evidence-based studies What type of information should be included in the clinical practice guideline? A. Background material and evidence ranking of strength of evidence B. Ranking of strength of evidence and age of the information C. The orders the doctor should write D. How long the patient will be in the hospital - CORRECT ANSWER A. Background material and evidence ranking of strength of evidence What is one metastructure to help organize information management and knowledge generation specific to nursing informatics? A. Knowledge, wisdom and data B. Wisdom C. Data D. Wisdom conceptual framework, knowledge, information and data - CORRECT ANSWER D. Wisdom conceptual framework, knowledge, information and data The key to interpreting data is: A. It must be meaningful B. It must be organized so that patterns and relationships are apparent C. It must be current D. It must be specific to the outcomes being reviewed - CORRECT ANSWER B. It must be organized so that patterns and relationships are apparent ICD-10, The Omaha System, and Clinical Care Classification (CCC) are all examples of which of the following? A. Raw data B. Nomenclatures C. Standardized terminologies D. Clinical practice guidelines - CORRECT ANSWER C. Standardized terminologies What is the difference between a data warehouse and a data mart? A. Data warehouses are large collections of data from several different sources and data marts are where the data is purchased. B. Data warehouses are large collections of data from several different sources and data marts are smaller collections that could be from a single department. C. Data warehouses are where hospitals find how well they are doing and data marts are where the information is inputted. D. Data warehouses are large collections of data from one source which are then sent out to data marts. - CORRECT ANSWER B. Data warehouses are large collections of data from several different sources and data marts are smaller collections that could be from a single department. Information in a data warehouse can be used to: A. Support decision support systems and executive information systems B. Support hospital billing and revenue cycles C. Dispel myths about the cost of care D. Dispel the need for decision support systems and executive information systems - CORRECT ANSWER A. Support decision support systems and executive information systems Data mining in knowledge data discovery (KDD) allows providers to: A. Follow up on the providers' attendance record to meetings B. Find out who has the most patients in their practice C. Apply algorithms for extracting patterns that are not typically apparent to human decision makers Correct D. Find the best time to take a patient out of the intensive care unit - CORRECT ANSWER C. Apply algorithms for extracting patterns that are not typically apparent to human decision makers The transformation and analysis of information must go through validation before being used. What is information validation? A. Process to ensure information in data warehouse is correct, reliable and consistent B. Process to ensure information in data warehouse is from the correct facility C. Process to ensure information in data warehouse is from the correct time submission D. Process to ensure information in data warehouse is correct and from the correct charts - CORRECT ANSWER A. Process to ensure information in data warehouse is correct, reliable and consistent Adult learners who repeatedly cancel attending classes on the new computer system could be classified as which type of adopter? A. Early Adopters B. Early Majority C. Innovators D. Late Adopters - CORRECT ANSWER D. Late Adopters What is the foundational process that a nurse uses in care of patients? A. Information Science B. Nursing Science C. Organizational Theory D. Computer Science - CORRECT ANSWER B. Nursing Science What is the foundation of knowledge? A. Information B. Wisdom C. Data D. Bits - CORRECT ANSWER a. information What is the foundation of wisdom? A. Information B. Knowledge C. Data D. Bytes - CORRECT ANSWER B. Knowledge What is data? a. alphanumeric characters b. discrete entities that are described objectively without interpretation c. groups of numbers without context d. information that has not yet been categorized - CORRECT ANSWER a. alphanumeric characters ??? What is information? A. The building blocks of wisdom B. Organized alphanumeric characters C. Data that are interpreted, organized or structured D. Data that is used to support decision-making - CORRECT ANSWER C. data that are interpreted, organized and structured. What is knowledge? A. The sum of information B. The categorization of data C. Information that has been explained and understood D. Information that is synthesized so that relationships are identified and formalized - CORRECT ANSWER D. Information that is synthesized so that relationships are identified and formalized Metastructures are: A. Large buildings used in health care B. Illnesses that impact an entire population C. Overarching concepts used in theory and science D. Theorems used to solve nursing problems - CORRECT ANSWER C. Overarching concepts used in theory and science One set of vital signs is an example of: A. Knowledge B. Information C. Opinion D. Wisdom - CORRECT ANSWER B. Information Nursing terminology is: A. A body of the terms used in nursing B. The words used that are common to nursing C. Terminology not used by other disciplines D. The foundation of nursing care plans - CORRECT ANSWER A. A body of the terms used in nursing Which is NOT considered a factor that makes nursing informatics a professional discipline in nursing? A. Concern with the phenomena of the discipline of nursing B. Varied definitions about scope of practice C. Defined competencies for the area of specialty nursing practice D. A body of research in the specialty - CORRECT ANSWER B. Varied definitions about scope of practice Nursing informatics is a specialty that integrates which of the following into nursing practice? A. Nursing science with multiple information management and analytical sciences B. Nursing science, patient outcomes, data containment C. Computer science, patient outcomes, data containment D. Information management, data regulation, nursing science - CORRECT ANSWER A. Nursing science with multiple information management and analytical sciences Decision making involves: A. Understanding the data that is presented B. Using decision support tools C. Cognitive processing that results in selecting a choice D. Using wisdom gained from data to make the correct choice - CORRECT ANSWER C. Cognitive processing that results in selecting a choice The HITECH act and HIPAA Privacy and Security rules are intended to: A. Prevent access to patient records B. Provide patients with greater access and control over their PHI C. Allow patients to access their PHI at any time D. Prevent anyone other than the direct caregiver from accessing PHI - CORRECT ANSWER B. Provide patients with greater access and control over their PHI ??? Workflow is: a. a group of steps or tasks b. related tasks that produce an outcome c. a progression of actions that fulfill a distinct work process d. a process from start to end - CORRECT ANSWER d. a process from start to end Which of the following may be a legal issue involved in telehealth? A. Ethical issues regarding the effectiveness of treatment in remote locations B. Practitioner licenses may not allow for care when the patient is in another state C. Differing cultural values regarding healthcare D. Inability to effectively diagnose and treat patients located in another geographic area - CORRECT ANSWER B. Practitioner licenses may not allow for care when the patient is in another state Usability refers to: A. The efficiency and effectiveness of an application B. The location and accessibility of the hardware C. The use of ergonomic concepts D. Enhancing the computer skills of end users - CORRECT ANSWER A. The efficiency and effectiveness of an application Which of the following is NOT one of the approaches to the system development life cycle? A. Waterfall B. Rapid prototyping C. Dynamic development D. Object-oriented system development - CORRECT ANSWER A. Waterfall _____________ is a teaching strategy for educating staff that involves face-to-face and online learning. A. Virtual learning B. Web-based learning C. Group learning D. Hybrid learning - CORRECT ANSWER D. Hybrid learning During the analysis phase of the systems development lifecycle, which of the following occurs? A. The system is designed. B. The implementation education is planned. C. Organizational needs are assessed. D. Work flows and business practices are examined. - CORRECT ANSWER D. workflows and business practices are examined During the feasibility stage of the SDLC, which of the following occurs? A. Workflows are examined for match to the organization. B. The project plan and estimated budgets are determined. C. Interface mapping occurs to identify compatibility. D. Beta testing is completed to provide user acceptance. - CORRECT ANSWER B. The project plan and estimated budgets are determined Integration testing involves: A. Testing by combining software modules to test as a group B. Testing the flow of data across all interfaces C. Testing to determine the effectiveness of the workflow design D. Testing that is done by all disciplines charting on the same practice patient - CORRECT ANSWER B. Testing the flow of data across all interfaces The waterfall SDLC model is: A. Sequential B. Iterative C. Input driven D. Output driven - CORRECT ANSWER A. sequential All of the following are ways to determine the best type of system implementation for your organization EXCEPT: A. Analyze the project B. Consider combining strategies C. Assess your resources D. Avoid combining strategies - CORRECT ANSWER D. Avoid combining strategies Which of the following is a feature of system enhancement? A. Planned by vendor B. Packaged with other enhancements C. Requested by staff or informatics D. Automatically included with system purchase - CORRECT ANSWER C. Requested by staff or informatics Which of the following lists the steps of the planning structure in the correct order, starting with the first step? A. Identify a planning need, determine preliminary resource list, establish goals and timeline B. Establish goals and timeline, identify a planning need, determine preliminary resource list C. Establish goals and timeline, identify a planning need, identify stakeholders D. Identify a planning need, identify stakeholders, establish goals and timeline - CORRECT ANSWER A. Identify a planning need, determine preliminary resource list, establish goals and timeline. ??? A clinical information system contains the following process: A. Input, processing, outputs B. Input, processing, outputs, analysis C. Outputs, inputs, processing, analysis D. Processing, inputs, outputs - CORRECT ANSWER A. Input, processing, outputs In an organization, the CTO is responsible for: A. Information technology infrastructure B. Information processing and data security C. Application of informatics within the system D. Technologic research and development within the organization - CORRECT ANSWER D. Technologic research and development within the organization. Information science is concerned with: A. The stability and security of the technical infrastructure in an organization in order to facilitate the effective retrieval of information B. Obtaining, gathering, organizing, manipulating, managing, storing, retrieving, recapturing, disposing of, distributing or broadcasting information C. The management and application of information in a methodical and systematic manner to facilitate the practice of professionals in a healthcare setting D. The design and use of specific data-capturing capabilities that facilitate and enhance the input and output of healthcare data - CORRECT ANSWER B. Obtaining, gathering, organizing, manipulating, managing, storing, retrieving, recapturing, disposing of, distributing or broadcasting information In order for information to be meaningful, it must be: A. Organized, categorized, quantified, identified, evidence-based, and verified B. Accessible, accurate, timely, complete, cost effective, flexible, reliable, relevant, simple, verifiable and secure C. Available, informational, descriptive, reliable, divisible, secure, controlled, reportable, meaningful and visible D. Approved, practice-based, multidisciplinary, reportable, secured, graphical, input, alphabetical or numeric, standardized and statistical - CORRECT ANSWER A. Organized, categorized, quantified, identified, evidence-based, and verified Information science is the: A. Study of the application and use of knowledge in organizations B. Infrastructure that supports the management of data C. Exploration of the transition of data to wisdom D. Combination of information and science - CORRECT ANSWER A. Study of the application and use of knowledge in organizations Integrated clinical decision support tools can include: A. Alerts, reminders, guidelines, information retrieval, order sets protocols B. Nursing-specific documentation forms and drop down lists C. Advanced order sets with nursing specific content D. Access to online journal articles relevant to patient care - CORRECT ANSWER A. Alerts, reminders, guidelines, information retrieval, order sets protocols The human-technology interface includes the: A. Keyboard and mouse B. Processor C. Network D. Power system - CORRECT ANSWER a. keyboard and mouse Which of the following is a computer in a network with the ability to access shared resources and files through a server? A. Client B. Peripheral device C. Bus D. Modem - CORRECT ANSWER a. client During project discussions about workflow, it is realized that there is insufficient information immediately available to complete the discussion regarding the future state of the system. Which of these would be used to track this item? 1. Gap analysis 2. Parking lot 3. Needs Assessment 4. Process flow - CORRECT ANSWER The correct answer is the parking lot. When you have insufficient information or resources to make a decision, it goes onto the parking lot for follow up. Once you know where you are (current state) and where you are going (future state) you can develop a gap analysis. Current and future states are often mapped out in process flows (sometimes called workflows). Once you have a gap analysis, you can do a needs assessment to determine what you need to do to get to future state. 1. If the informatics nurse is concerned that a computer system may not function well during peak times of access, the type of testing needed is: a. functional testing b. black box testing c. system integration testing d. load/volume testing - CORRECT ANSWER d. load/volume testing Rationale: This is a non-functional testing for reliability that assesses the ability of the system to function under various loads, such as at peak times when multiple users in multiple departments are accessing the system. The purpose of load/volume testing is to determine the maximum load capacity and to identify the load at which problems begin to occur. Testing is done at both the safe working load (SWL) and above the SWL. 1. In preparation for the workflow redesign necessitated for implementation of an EHR, the first step should be to: o assess compatibility with EHR o assess the EHR requirements o map the current workflow conduct surveys about workflow - CORRECT ANSWER map the current workflow 1. Which resource for evidence-based research is provided by the National Library of Medicine? a. PubMed b. CINAHL c. World View on Evidence-Based Nursing d. BMJ Publishing - CORRECT ANSWER a. PubMed 1. When considering transitioning to cloud storage and assessing vendors, the most critical assessment relates to: a. regulatory compliance b. interoperability c. monitoring mechanisms d. cost analysis - CORRECT ANSWER a. regulatory compliance 1. When utilizing a prioritization matrix to prioritize activities as a project manager, the informatics nurse must first establish: a. rating scale and timeframe b. criteria and rating scale c. rating scale and categories d. criteria and timeframe - CORRECT ANSWER b. establish criteria and rating scale Rationale: The criteria includes those factors that are utilized to determine how important each project is; for example, a project mandated by regulations is more important than a project that may improve customer satisfaction. A rating scale for each project should be established with numeric values (such as 1 to 10) used to demonstrate how effective the project is in meeting the criteria. A typical prioritization matrix may have up to a dozen criteria 1. An advantage of an identity and access management (IAM) system is that the IAM system: a. satisfies the Code of Federal Regulations Title 21, Part 11 b. provides HIPAA-required encryption for PHI c. meets HIPAA's Security Rule requirements regarding access to PHI d. meets HIPAA's Privacy Rule requirements regarding identification - CORRECT ANSWER c. meets HIPAA's Security Rule requirements regarding access to PHI. Rationale: o An advantage of an identity and access management (IAM) system is that the IAM system meets HIPAA's Security Rule requirements regarding access to PHI through identity management. An IAM system provides, captures, updates, and records user IDs and provides appropriate access privileges, preventing "privilege creep," which increases risks to security. The IAM system should provide authentication (single sign-in and session management), authorization (based on roles, rules, and attributes), user management (provisioning and password management), and a central directory. 1. Which of the following standardized nursing terminologies is comprised of (1) a problem classification scheme, (2) an intervention scheme, and (3) a problem rating scale for outcomes? a. PNDS b. NANDA-I c. OMAHA d. ICNP - CORRECT ANSWER c. OMAHA Rationale: a research-based and comprehensive practice, documentation, and information management framework based on the nursing or problem-solving process, the clinician-client relationship, and concepts of diagnostic reasoning, clinical judgment, and quality improvement. It was designed for members of various disciplines, including nurses, other health care professionals, and students. It consists of three relational, reliable, and valid clinical components useful from the time of client admission until discharge from service. The components are designed for classifying assessment (problem classification scheme), interventions(intervention scheme), and outcomes measurement (problem rating scale for outcomes). See Appendix on the Omaha System. 1. The smallest possible piece of data utilized in computer processing is the: a. byte b. bit c. nibble d. zettabyte - CORRECT ANSWER b. bit Which of the following types of software is responsible for storage management? a. Operating system b. Communication c. Productivity d. Creativity - CORRECT ANSWER a. operating system 1. Communication software is most commonly used for: a. audio files b. documents c. video files d. e-mail and IM - CORRECT ANSWER d. e-mail and IM 1. The network that connects the departments in an organization is likely a(n): a. VSN b. LAN c. WAN d. MAN - CORRECT ANSWER b. LAN - local area network 1. When an institution is transitioning to a CPOE, a primary role of the informatics nurse is that of: a. system designer b. liaison c. software modifier d. purchasing agent - CORRECT ANSWER b. liaison The field of science that attempts to create intelligent technologies and then apply these technologies to the field of informatics is: a. cognitive science b. cognitive informatics c. artificial intelligence d. information science - CORRECT ANSWER c. artificial intelligence Rationale: The field of science that applies intelligent technologies to the field of informatics is artificial intelligence. Researchers in artificial intelligence must engineer general intelligence and reasoning skills into the artificial intelligence programs as well as the ability to develop and learn from experiences and errors and to process natural language. One example of an artificial intelligence program is Siri®, which responds to verbal queries and is found on Apple devices, such as the iPhone and iPad. 1. In an EHR with CPOE and CDS, allergy alerts should be triggered: a. in response to contraindicated drug orders b. before orders are written c. on physician request by accessing a link after orders are written d. after orders are written - CORRECT ANSWER b. before orders are written Rationale: In an EHR with CPOE and CDS, allergy alerts should be triggered before orders are written and they should be automated. Alerts that occur after orders are written are more likely to be ignored or overridden. Additional alerts, including hard stops, should occur if orders for contraindicated drugs or drugs to which the patient is allergic are ordered despite the original alert. The alerts should be carefully evaluated because excessive alerts may result in "alert fatigue" to the point that clinicians begin to ignore them. 1. The human-technology interface (HTI): a. allows user interaction with technology b. allows access to the technology only to authorized people c. connects a user device to the Internet d. standardizes applications utilized in all devices - CORRECT ANSWER a. allows user interaction with technology Which of the following is not a function of system design? A. Defining the architecture B. Defining the components C. Demanding actions and answers D. Satisfying specific requirements - CORRECT ANSWER c. demanding actions and answers Which of the following is an application of an algorithm? A. Potent application B. Comprehensive application C. Certification application Incorrect D. None of the above. - CORRECT ANSWER d. none of the above System design: A. Defines aspects of a system to satisfy specific requirements. B. Is the first phase of the system life cycle. C. Involves only the current-state process. D. Is not necessarily in keeping with the mission of the organization. - CORRECT ANSWER a. defines aspects of a system to satisfy specific requirements Process and system improvements: A. Do not need to consider outside departments or stakeholders. B. Are more possible when the process is inefficient and outdated. C. Are best achieved when everyone in the organization is a potential advocate. D. Involve transitioning existing processes to electronic tools. - CORRECT ANSWER c. are best achieved when everyone in the organization is a potential advocate. Auditing: A. Processes are designed by the project manager. B. Evaluates whether design input is followed and criteria are met as expected. C. Is strictly a function of critical reaction to a stated behavior D. Is done periodically as a an assessment to spot check usage - CORRECT ANSWER B. Evaluates whether design input is followed and criteria are met as expected. The aim of a logical database design is: A. The application of Codd's Law to every table. B. To provide a logical reference to a given data item to locate it within the physical database. C. The representation of the relationship existing between two data items. Incorrect D. To apply a hashing function to the key to obtain an address. - CORRECT ANSWER A. the application of Codd's Law to every table. What is Codd rules in database? - CORRECT ANSWER Codd's twelve rules are a set of thirteen rules (numbered zero to twelve) proposed by Edgar F. Codd, a pioneer of the relational model for databases, designed to define what is required from a database management system in order for it to be considered relational, i.e., a relational database management system (RDBMS). What does the (System design life cycle)SDLC do? A. Provides guidance in system development. B. Provides a checklist of activities. C. Provides a set of stages for system development. D. All of the above. - CORRECT ANSWER d. all of the above Note: Another common breakdown also contains 5 phases: Requirements Design Implementation Test Maintenance. Quality assurance is: A. The act of giving confidence or the state of being certain. B. An evaluation to indicated needed corrective responses. C. The observation of techniques and activities used to fulfill requirements for quality. D. Planned and systematic activities implemented so that quality requirements will be fulfilled. Correct - CORRECT ANSWER D. Planned and systematic activities implemented so that quality requirements will be fulfilled. What is the outcome of system design? The outcome is: a. The architecture, framework and structure that supports the process in progressing to system implementation and testing. B. A roadmap that allows the testers to determine whether the system can withstand peak volume transactions. C. An assurance that the users will be totally satisfied with the system being designed. D. An accounting of all the costs involved with the selection, implementation, and maintenance of a system. - CORRECT ANSWER a. The architecture, framework and structure that supports the process in progressing to system implementation and testing. RFP refers to: A. Request for Proposal B. Request for Proposed Information C. Reason for Participation D. Rationale for Prospects - CORRECT ANSWER a. request for proposal Which of the following is a key component of system planning? A. Evaluating forensic evidence B. Selecting a project manager and team members C. Evaluating the test results of a patient D. Bill collections - CORRECT ANSWER B. Selecting a project manager and team members Which of the following is a consideration in resource allocation and benefit analysis? A. Determining preferences for which unit to implement first B. Determining the salary for the project leader C. Determining philosophical theories in use D. Determining return on investment - CORRECT ANSWER d. determining return on investment The analysis of vendor, product and market is always and only accomplished by the executive level of the organization. A. True B. False - CORRECT ANSWER b. False What are some tools that a project manager might use in the system planning stage? A. Tracking tools B. Gap analysis C. Project scope D. All of the above - CORRECT ANSWER d. all of the above Team establishment includes choosing team members from a single department or discipline. A. True B. False - CORRECT ANSWER b. false System planning is the first phase in the system life cycle. A. True B. False - CORRECT ANSWER True Three key elements of feasibility include: A. Technical, economic, and operational B. Tactical, educational, and observational C. Traditional, effectiveness, and open system D. Transactional, educational, and object-oriented - CORRECT ANSWER a. technical, economic and operational The nurse informaticist (NI) works in an organization that has purchased another organization, resulting in a new mission, goals, and objectives. The NI knows that this will mean the team must revise the: A. Size of the project team B. Focus of the project C. Strategic plan D. Timeline for the project plan - CORRECT ANSWER C. strategic plan Systems analysis involves which of the following? A. Designing the components of the system B. Testing a system for errors C. Obtaining system requirements D. Constructing a personal health record system - CORRECT ANSWER c. obtaining the requirements ???? The requirement that a system be easy to use would be an example of what type of requirement? A. Technical requirement B. Human computer interaction requirement C. Functional requirement D. Incomplete requirement - CORRECT ANSWER b. human computer interaction requirement Because several disciplines support the foundation of informatics nursing, it is important for the informatics nurse to understand that: a. informatics nursing differs from other disciplines, as it focuses on supporting the process of obtaining data. b. informatics nursing uses the concepts, tools, and methods of various disciplines to facilitate nursing process. c. information technology and nursing technology are synonymous, as they have the same goal. d. the boundaries between the various disciplines are clearly defined. - CORRECT ANSWER b. informatics nursing uses the concepts, tools, and methods of various disciplines to facilitate nursing process. Knowledge that is patterned for use in reasoning is known as: a. artificial intelligence. b. knowledge query. c. knowledge representation. d. neural computing. - CORRECT ANSWER c. knowledge representation Principles of ergonomics include job design, health issues, and: a. application interface. b. end-user interface. c. programming language. d. system integration. - CORRECT ANSWER b. end-user interface. In promoting change, the people who are recognized as opinion leaders and role models are known as the: a. early adopters. b. early majority c. innovators d. risk takers. - CORRECT ANSWER a. early adopters Which document articulates the primary factors that guide professional nursing judgment, regarding confidential patient information? a. Administrative Simplification Provisions. b. Code of Ethics for Nurses with Interpretive Statements. b. Health Insurance Portability and Accountability Act. c. Nursing Informatics: Scope and Standards of Practice. - CORRECT ANSWER b. Code of Ethics for Nurses with Interpretive Statements Ease of navigation, appropriate language, efficiency of use, ease of learning, and intuitiveness are all examples of: a. affective skills. b. behavioral needs. c. system usability. d. user ergonomics. - CORRECT ANSWER c. system usability The basic network protocol that determines the rules used to create and route packets of data between computers is: a. HL7. b. TCP/IP c. URL. d. XML. - CORRECT ANSWER b. TCP/IP rationale: TCP/IP, or the Transmission Control Protocol/Internet Protocol, is a suite of communication protocols used to interconnect network devices on the internet. TCP/IP can also be used as a communications protocol in a private network (an intranet or an extranet). Applications that are designed to run on a common platform, operate in a common environment, and communicate through direct data transfer are known as: a. integrated. b. interfaced. c. normalized. d. optimized. - CORRECT ANSWER a. integrated What is the most common risk to patient privacy and confidentiality? a. An organization's employees. b. Inadequate firewall protection. c. Inadequate system design. d. Viruses, worms, and Trojan horses - CORRECT ANSWER a. An organization's employees. Adherence to a standardized nursing language will lead to: a. a barrier in national interoperability. b. a larger database of interventions. c. improved evaluation of nursing outcomes. d. increased nursing competencies. - CORRECT ANSWER c. improved evaluation of nursing outcomes. The informatics nurse violates a patient's legal right to privacy and confidentiality, by: discussing a patient's diagnosis with an a. authorized family member. b. discussing care-related information with the patient's physical therapist. c. looking up a colleague's diagnosis and laboratory results while he or she is hospitalized. d. providing a handoff report containing patient information to another department. - CORRECT ANSWER c. looking up a colleague's diagnosis and laboratory results while he or she is hospitalized. Using parallel strategy for the roll-out of an electronic medication administration system means that all: a. data entries are cosigned by two health care team members. b. medications are documented using both the current method and the new system. c. notebook computers and bar code scanners are positioned on the same surface. d. vital signs are entered on the same screen as is medication administration. - CORRECT ANSWER b. medications are documented using both the current method and the new system. In project management, the critical path is best described as a series of activities that: a. includes the path with the most slack or float. b. indicates the earliest possible time a project can be completed. c. is scheduled for the next current phase of the process. d. shows the shortest path through the network diagram. - CORRECT ANSWER b. indicates the earliest possible time a project can be completed. The foundation of strategic system planning begins with a review of the: a. existing computing environment. b. health care industry. c. information system plan. d. organization's business mission. - CORRECT ANSWER d. organization's business mission. The focus of data analysis is to: a. collect data from various sources. b. evaluate data for efficiency. c. identify data sources for later inclusion. d. transform data into a usable form. - CORRECT ANSWER d. transform data into a usable form. Which tool tracks resources, milestones, and time frames associated with the implementation of a new clinical program? a. A database. b. An expert system. c. Project management software. d. Spreadsheet software. - CORRECT ANSWER c. Project management software. What process produces a blueprint that details how hardware and software meet the needs of the organization? a. Benchmarking. b. Feasibility study. c. System analysis. d. System design. - CORRECT ANSWER d. system design Adult learners most effectively learn about a new clinical information system when the instructor: a. assumes that the learner knows nothing about the system. b. begins the formal training as early as possible in the implementation process. c. emphasizes the technical specifications of the structure of the system. d. encourages the learner to use previous experience to interpret new learning. - CORRECT ANSWER d. encourages the learner to use previous experience to interpret new learning. As an ambulatory provider reviews the patient's chart, the provider reads lab data from an external organization. This scenario exemplifies: a. a health information exchange. b. a system to update patient records. c. a violation of privacy regulations. d. an electronic health record. - CORRECT ANSWER a. a health information exchange. The problems of an existing system have been identified, along with possible solutions. What is the next step in the systems analysis stage? a. A feasibility study. b. Requirements gathering. c. Systems design. d. Systems testing. - CORRECT ANSWER a. feasibility study What type of testing is performed on functionally grouped components to ensure that the subset works with the entire system? a. Integration. b. System. c. Unit. d. User acceptance - CORRECT ANSWER a. Integration. The informatics nurse is working on a chart to demonstrate the increasing incidence of obesity in the patient population at a health clinic. The data will represent patients who are of normal weight, overweight, obese, and morbidly obese, and it will include the percentage of the total population for each group. This type of data is most effectively represented by a: a. bar chart. b. column chart. c. line chart. d. pie chart. - CORRECT ANSWER a. pie chart Integrating clinical practice guidelines with an electronic health record facilitates quality improvement measurement by: a. comparing guideline parameters to clinical outcomes. b. presenting results at the point of treatment decisions. c. providing reference information to measurement staff. d. representing patient acuity data. - CORRECT ANSWER a. comparing guideline parameters to clinical outcomes. System analysis is the process by which: a. a proposed design is reviewed for feasibility. b. potential vendor solutions are explored. c. the management needs are identified. d. the system's functional requirements are derived from users' needs. - CORRECT ANSWER d. the system's functional requirements are derived from users' needs. Human factor/ergonomics seeks to maximize effectiveness, safety, comfort, convenience and ROI by : - CORRECT ANSWER optimally arranging the physical and material environment. HUman factgors and ergonomics first emerged due to : - CORRECT ANSWER airplane cockpit design in WWII. A topic that can be associated with ergonomics is: a. optimal productivity b. safety and efficiency c. Work-related risks and injuries d. All of the above - CORRECT ANSWER d. All of the above. HCI stands for: - CORRECT ANSWER Human Computer Interaction In software user interface design, the following should be considered: a. design b. development time c. language d. mathematical interpretation - CORRECT ANSWER Design Which of the folliowing puts one at risk for work-related musculoskeletal disorders? a. taking a walk at lunch b. working in cramped spaces c. getting a massage d. getting to bed early - CORRECT ANSWER b. working in cramped spaces When designing screens and reports, the nurse informaticist follows concepts which maximize the ease of use of the system and prevents errors. This demonstrates the principle of : a. economics b. human computer interaction c. symbiosis d. critical intervention - CORRECT ANSWER human computer interaction Which of the following is not true? a. Usability testing can be conducted only by human engineers b. Usability testing can be conducted inexpensively in hospitals c. lack of user input in design and testing is one of the biggest causes of system implementation failure d. nurses and physicians should be involved in systems design - CORRECT ANSWER a. Usability testing can be conducted only by human engineers Human factors can be defined as : a. the study of making more effective user interfaces to computer-based systems b. the field that examines human elements of systems c. the group of methods that can be used to make systems more usable d. the study of technology induced errors. - CORRECT ANSWER a. Usability testing can be conducted only by human engineers An informatics nurse could best illustrate the frequency of different types of error encountered with a new application by using a : a. distribution curve b. Gantt chart c. histogram d. control chart - CORRECT ANSWER c. histogram - shows distribution of numerical data with only one variable. Gantt chart is a PM schedule bar chart. Bar graphs show the relationship for more than 1 variable. The informatics nurse is involved with measures to protect the security and confidentiality of patient data becasue: a. it is a joint commission standard b. it is regulated by HIPPA legislation c. the major cause of security breaches is human error d. both b and c - CORRECT ANSWER d. both b and c Which of hte following is NOT a mechanism for protecting the secuirty of health data: a. automatic sign-off b. a strong password c. having one password per unit d. firewalls - CORRECT ANSWER C. one passoword per unit An audit

Meer zien Lees minder
Instelling
ANCC Nursing Informatics Certification
Vak
ANCC Nursing Informatics Certification











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
ANCC Nursing Informatics Certification
Vak
ANCC Nursing Informatics Certification

Documentinformatie

Geüpload op
19 april 2024
Aantal pagina's
61
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
SuperGrade Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
32
Lid sinds
2 jaar
Aantal volgers
11
Documenten
2218
Laatst verkocht
2 maanden geleden
Excellent Academic Material ,test, assignment, summary ,study Guide and test bank

Am best tutor in different course and assisting student is my first priority by providing them with quality work to enable them to success in their career chose my work for excellent grade, all the best

4,4

5 beoordelingen

5
3
4
1
3
1
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen