COMPLETE SOLUTIONS
Health Insurance Portability & Accountability Act (HIPAA) is a Federal
Law designed to facilitate the electronic exchange of information in
health care. Which of the following does not pertain to this law?
a) Privacy protection components of the law limit non-consensual use
as a release or private health information
b) Patients must receive notice of privacy rights
c) Restrictions on access to and use of information is required
d) Criminal and civil sanctions do not exist for improper use and
disclosure - correct answerD
Separate computer systems are often linked together in order to share
data and information. When all components of the network are located
within close proximity of one another, perhaps within a single facility,
the network known as a:
a) Wide Area Network (WAN)
b) World Wide Web (WWW)
c) Local Area Network (LAN)
d) Electronic Data Interchange (EDI) - correct answerC
Healthcare organizations had established standards to maintain data
security and protect the privacy and confidentiality of patients' records
information. Which one of the following answers does not describe its
data security elements:
a) Protect against system failures
b) Protect against external catastrophic events
c) Facilitate access to computer files to authorized personnel
d) Control access to computer files by unauthorized personnel -
correct answerC
W Client/server architecture back-end (server) functions include all of
the following except:
a) Printing
b) Applications program execution
,c) Decision support
d) Communication - correct answerC
Star networks have an advantage of:
a) Relative ease of wiring the network and relatively fast
communications
b) Facilitating construction of high spend networks that operate over
large distances
c) Ease with which nodes can be added to an existing network
d) Require less cabling than networks using other topologies - correct
answerC. 1-refers to Bus networks, 2 refers to ring networks, and 4 is
incorrect because Star networks require more cabling than other
networks
Advantages of outsourcing include all of the following except,
a) Staffing reductions
b) Increased implementation time
c) Smaller capital investments
d) More predictable costs - correct answerB
Although purchasing or leasing commercial software is most common,
what is becoming a viable source of information technology and
systems for smaller healthcare organizations?
a) In house design and programming
b) Outsourcing
c) ASP-applications service provider
d) Combining Outsourcing and in-house design - correct answerC
Which of the following is NOT one of the three general categories of
information systems used in healthcare organizations:
a) Clinical Information Systems
b) Composite Healthcare Systems
c) Administrative/Financial Systems
d) Decision Support Systems for Strategic Management - correct
answerB
,A comprehensive information security policy should include all of the
following elements except:
a) Management Policies
b) Data back up and recovery
c) Physical security
d) Technical controls - correct answerB
Which of the following is NOT part of the System Development Life
Cycle?
a) System Analysis
b) System Adjustment
c) System Implementation
d) System Acquisition - correct answerB
The Information Services Advisory Committee provides insight into
user needs and helps gain acceptance of information systems. Which
of the following is NOT a charge of the committee:
a) Encouraging appropriate use of information services
b) Ranking information services investment opportunities and
recommending a rank-ordered list of proposals to the governing
board.
c) Providing technical support to implement an integrated information
system.
d) Monitoring performance of the department and suggesting possible
improvements - correct answerC
One of the functions of an IS system is to ensure the integrity, quality,
and security of data. Which of the following does not fall in this content
area?
a) Defines measures and terminology
b) Captures historic as opposed to current data
c) Improves the process for data input
d) Guards against data loss - correct answerB
In the IT System Development Life Cycle, which is the most important
step:
a) System Analysis
, b) System Design
c) System Acquisition
d) System Implementation - correct answerA
Which of the following is not an actual active IT policy and Procedure
components?
a) Procedures against system failure and catastrophic events
b) Control against viruses
c) Quality of Software
d) Confidentiality for authorized users - correct answerC
The importance of the Intranet vs. the Internet is that employees
could:
a) Evaluate Policies, Procedure, Protocols and organizational manuals
b) Receive education sessions
c) Communicate and interact with patients
d) All - correct answerD
The type of computer network that allows multiple workstations to
share the data contained in files on a server is called:
a) Peer Network
b) File/Server
c) Terminal Host Systems
d) Client/Server Computing - correct answerB
Which is not example of a Strategic Decision Support Application?
a) Strategic planning
b) Disease management
c) Marketing
d) Resource allocation - correct answerB
Which of the following is not a key part of HIPAA Implementation:
a) Establishment of enhanced privacy protection policies
b) Establishment of compliance committees and private offices
c) Establishment of clinical guidelines for patient care
d) Use of HIPAA compliant software - correct answerC