ANCC NURSING INFORMATICS CERTIFICATION
REVIEW QUESTIONS
HIPPA only applies to organizations that have electronic health records.
True
False - Answers -False
The Informatics nurse is involved with measure to protect the security and confidentiality
of patient data because:
a. it is a joint commission mandate
b. it is regulated by HIPPA legislation
c. the major cause of security breaches is human error
d. both B and C are correct - Answers -d. It is regulated by HIPPA Legislation and The
Major cause of security breeches is human error.
Controls to protect data privacy and integrity are both logical and:
a. physical
b. analytical
c. theoretical
d. psychological - Answers -b. analytical
Which of the following is not a mechanism for protecting the security of health data:
a. Automatic sign-offs
b. A Strong Password
c. Having one password per nursing unit
d. Firewalls - Answers -C. Having one password per nursing unit.
An audit trail is :
a. a log of which project meetings and events have been completed
b. an electronic tool that can track system access by individual user who viewed a
specific client record.
c. a proactive tool to monitor who will be using a system and modifying data.
d. used primarily as a data integrity tool - Answers -b. an electronic tool that can track
system access by individual user who viewed a specific client record.
Data can be represented by all EXCEPT:
a. text
b. audio
c. transmission waves
d. video - Answers -a. text
Things to consider related to disaster planning include:
a. should have only 1 database to make it easier to recover
b. all data should be stored onsite so it is accessible
c. must have a solid communication plan during disaster and recovery.
,d. an association or group that shows uniformity - Answers -C. Must have a solid
communication plan during disaster and recover.
Some examples of physical security for healthcare data are fences, walls, locks, safes,
vaults, armed guards, sensors, alarms.
True
False - Answers -TRUE
One way to track the activity that is occurring in a system is:
a. a GANTT chart
b. an audit trail
c. a data backup
d. biometrics - Answers -b. an audit trail
PHI stands for :
a. physician hospital interchange
b. password hint indicator
c. potential hardware incursion
d. protected health information - Answers -d. Protected Health Information
If the informatics nurse is concerned that a computer system may not function well
during peak times of access the type of testing needed is:
a. Functional Testing
b. System Integrated testing
c. Black box testing
d. Load volume testing - Answers -Load Volume Testing
What is Load Volume Testing? - Answers -Load/volume testing is a non-functional
testing for reliability that assesses the ability of the system to function under various
loads, such as at peak times when multiple users in multiple departments are accessing
the system. The purpose of load/volume testing is to determine the maximum load
capacity and to identify the load at which problems begin to occur. Testing is done at
both the safe working load (SWL) and above the SWL.
In preparation for the workflow redesign necessitated for implementation of an EHR, the
first step should be to
a. Assess the EHR requirments
b. Conduct surveys about the workflow
c. Assess compatibility with the EHR
d. Map the current workflow - Answers -map the current workflow
Which resource for evidence-based research is provided by the National Library of
Medicine?
a. BMJ Publishing
b. CINAHL
c. PubMed
,d. World View on Evidence based- nursing - Answers -PubMed is a resource for
evidence-based research that is provided by the National Library of Medicine, which
was developed by the National Center for Biotechnology Information (NCBI). PubMed
provides access to numerous databases with 24 million citations from MEDLINE (the
National Library of Medicine's bibliographic database with references to life sciences
and biomedical sciences), life science journals, and electronic books with links to full
text when it is available.
When considering transitioning to cloud storage and assessing vendors, the most
critical assessment relates to:
a. regulatory compliance
b. monitoring mechanisms
c. cost analysis
d. interoperability - Answers -The most critical assessment relates to compliance with
regulatory requirements because if the vendor cannot verify that the company meets
HIPAA requirements and satisfies the Code of Federal Regulations Title 21, Part 11
(which provides regulations regarding electronic records and electronic signatures),
then security of patient data may be inadequate. Other important considerations include
cost analysis (including cost of implementation and ongoing costs), monitoring
mechanisms, and interoperability.
The smallest possible piece of data utilized in computer processing is the:
a. byte
b. zettabyte
c. nibble
d. bit - Answers -Bit
The smallest piece of data utilized in computer processing is the bit (binary digit), which
comprises zeros (off) and ones (on). Four bits equal one nibble, eight bits equal one
byte, 1024 bytes equal one kilobyte, 1024 kilobytes equal one megabyte, and 1024
megabytes equal one gigabyte.
Communication software is most commonly used for:
a. video files
b. e-mail and IM
c. audio files
d. documents - Answers -e-mail and IM.
The network that connects the departments in an organization is likely a(n):
a. WAN
b. VSN
c. MAN
d. LAN - Answers -LAN
When an institution is transitioning to a CPOE, a primary role of the informatics nurse is
that of:
a. system designer
, b. purchasing agent
c. liaison
d. software modifier - Answers -Liason - When an institution is transitioning to a CPOE,
a primary role of the informatics nurse is that of liaison to promote multidisciplinary
collaboration and cooperation among the various members of the healthcare team,
including nurses, physicians, and IT specialists, to ensure that the end-product has the
functionality that is needed for workflow and that it meets the requirements for safety
and security. Needs regarding both hardware and software must be clearly
communicated to IT personnel.
The field of science that attempts to create intelligent technologies and then apply these
technologies to the field of informatics is:
a. cognitive science
b. information science
c. artificial intelligence
d. cognitive informatics - Answers -AI - Artificial Intelligence. Researchers in artificial
intelligence must engineer general intelligence and reasoning skills into the artificial
intelligence programs as well as the ability to develop and learn from experiences and
errors and to process natural language. One example of an artificial intelligence
program is Siri®, which responds to verbal queries and is found on Apple devices, such
as the iPhone and iPad.
In an EHR with CPOE and CDS, allergy alerts should be triggered:
a. after orders are written
b. on physician request by accessing a link
c. before orders are written
d. in response to contraindicated drug orders - Answers -in response to contraindicated
drug order.
The human-technology interface (HTI):
a. connects a user device to the Internet
b. allows user interaction with technology
c. standardizes applications utilized in all devices
d. allows access to the technology only to authorized people - Answers -Allows user
interaction with technology.
The nurse informaticist (NI) is working on the implementation of a replacement
laboratory system. One major consideration in order to have a fully operational system
is:
A. End-user support
B. Stress testing
C. Executive level support
D. Data conversion - Answers -D. Data Conversion - All responses are important, but in
order to move from one system to another the data needs to be moved.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller GEEKA. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $14.49. You're not tied to anything after your purchase.