Muchirigathiru1
On this page, you find all documents, package deals, and flashcards offered by seller muchirigathiru1.
- 2716
- 0
- 0
Community
- Followers
- Following
2716 items
C170 - PRE-ASSESSMENT
A salesperson is authorized to sell many products and a product can be sold by many salespersons. 
Which kind of binary relationship does this scenario describe? 
One-to-one 
One-to-many 
Many-to-many 
One-to-one binary - Many-to-many 
Which two examples are attributes? 
Choose 2 answers 
A person attending a meeting 
An employee number 
A sales meeting 
A meeting code - An employee number 
A meeting code 
Which delete rule sets column values in a child table to a missing value when the matching...
- Exam (elaborations)
- • 19 pages •
A salesperson is authorized to sell many products and a product can be sold by many salespersons. 
Which kind of binary relationship does this scenario describe? 
One-to-one 
One-to-many 
Many-to-many 
One-to-one binary - Many-to-many 
Which two examples are attributes? 
Choose 2 answers 
A person attending a meeting 
An employee number 
A sales meeting 
A meeting code - An employee number 
A meeting code 
Which delete rule sets column values in a child table to a missing value when the matching...
C170 WGU ALREADY PASSED
DML - IUDS, CR 
insert, update, delete, select 
commit, rollback 
INSERT - add new rows 
UPDATE - modify data of existing rows 
DELETE - delete some/all records from database 
can be rolled back 
COMMIT - permanently saves 
ROLLBACK - undo changes 
SELECT - data retrieval 
WHERE - limits rows returned 
used before group by 
ORDER BY - OC 
sorts columns
- Exam (elaborations)
- • 5 pages •
DML - IUDS, CR 
insert, update, delete, select 
commit, rollback 
INSERT - add new rows 
UPDATE - modify data of existing rows 
DELETE - delete some/all records from database 
can be rolled back 
COMMIT - permanently saves 
ROLLBACK - undo changes 
SELECT - data retrieval 
WHERE - limits rows returned 
used before group by 
ORDER BY - OC 
sorts columns
C170 WGU ALREADY PASSED
An entity is said to be X -dependent if it can exist in the database only when it is associated with 
another related entity occurrence. - existence 
A table that has all key attributes defined has no repeating groups and all its attributes are 
dependent on the primary key is said to be in X. - 1nf 
A determinant is any attribute whose value determines other values within a column. - F 
X is a process that is used for changing attributes to entities. - Normalization 
Any attribute whose value d...
- Exam (elaborations)
- • 6 pages •
An entity is said to be X -dependent if it can exist in the database only when it is associated with 
another related entity occurrence. - existence 
A table that has all key attributes defined has no repeating groups and all its attributes are 
dependent on the primary key is said to be in X. - 1nf 
A determinant is any attribute whose value determines other values within a column. - F 
X is a process that is used for changing attributes to entities. - Normalization 
Any attribute whose value d...
C170 - Data Management Applications ALREADY PASSED
First Normal Form - - when all non-key columns depend on the primary key 
- a table with a primary key is in first normal form 
- a table with no duplicate rows is in first normal form 
Second Normal Form - - when all non-key columns depend on the whole primary key 
- cannot depend on part of a composite primary key 
- a table with a simple primary key is automatically in second normal form 
A table with a simple primary key must be in what normal form? - - second normal form or 
higher 
Third N...
- Exam (elaborations)
- • 13 pages •
First Normal Form - - when all non-key columns depend on the primary key 
- a table with a primary key is in first normal form 
- a table with no duplicate rows is in first normal form 
Second Normal Form - - when all non-key columns depend on the whole primary key 
- cannot depend on part of a composite primary key 
- a table with a simple primary key is automatically in second normal form 
A table with a simple primary key must be in what normal form? - - second normal form or 
higher 
Third N...
C468 ALREADY PASSED
Interface - Computer program that tells two different systems how to exchange data 
Interoperability - The ability of two entities, human or machine, to exchange and predictably use 
data or information while retaining the original meaning of that data 
Integration - The process by which different information systems are able to exchange data in a 
fashion that is seamless to the end user 
Standardized terminology - The implementation of this within the EHR is essential for healthcare 
organizat...
- Exam (elaborations)
- • 3 pages •
Interface - Computer program that tells two different systems how to exchange data 
Interoperability - The ability of two entities, human or machine, to exchange and predictably use 
data or information while retaining the original meaning of that data 
Integration - The process by which different information systems are able to exchange data in a 
fashion that is seamless to the end user 
Standardized terminology - The implementation of this within the EHR is essential for healthcare 
organizat...
C468 Informatics OA study guide
1. An informatics nurse and an emergency nurse are conducting an analysis of a patient admission 
from the ER? Which tool should these nurses use for a process analysis? -SWOT template 
1. What is an effective way to reduce the risk of access of electronic protected health information 
(ePHI) by unauthorized users? -Make sure all users adhere to security and confidential policy set 
forth by the facility 
What is the goal of MIPS and MU? -Patient quality care 
A provider at the hospital had his ...
- Exam (elaborations)
- • 7 pages •
1. An informatics nurse and an emergency nurse are conducting an analysis of a patient admission 
from the ER? Which tool should these nurses use for a process analysis? -SWOT template 
1. What is an effective way to reduce the risk of access of electronic protected health information 
(ePHI) by unauthorized users? -Make sure all users adhere to security and confidential policy set 
forth by the facility 
What is the goal of MIPS and MU? -Patient quality care 
A provider at the hospital had his ...
C468 Informatics OA study guide
1. An informatics nurse and an emergency nurse are conducting an analysis of a patient admission 
from the ER? Which tool should these nurses use for a process analysis? -SWOT template 
1. What is an effective way to reduce the risk of access of electronic protected health information 
(ePHI) by unauthorized users? -Make sure all users adhere to security and confidential policy set 
forth by the facility 
What is the goal of MIPS and MU? -Patient quality care 
A provider at the hospital had his ...
- Exam (elaborations)
- • 7 pages •
1. An informatics nurse and an emergency nurse are conducting an analysis of a patient admission 
from the ER? Which tool should these nurses use for a process analysis? -SWOT template 
1. What is an effective way to reduce the risk of access of electronic protected health information 
(ePHI) by unauthorized users? -Make sure all users adhere to security and confidential policy set 
forth by the facility 
What is the goal of MIPS and MU? -Patient quality care 
A provider at the hospital had his ...
C468 Informatics OA study guide
1. An informatics nurse and an emergency nurse are conducting an analysis of a patient admission 
from the ER? Which tool should these nurses use for a process analysis? -SWOT template 
1. What is an effective way to reduce the risk of access of electronic protected health information 
(ePHI) by unauthorized users? -Make sure all users adhere to security and confidential policy set 
forth by the facility 
What is the goal of MIPS and MU? -Patient quality care 
A provider at the hospital had his ...
- Exam (elaborations)
- • 7 pages •
1. An informatics nurse and an emergency nurse are conducting an analysis of a patient admission 
from the ER? Which tool should these nurses use for a process analysis? -SWOT template 
1. What is an effective way to reduce the risk of access of electronic protected health information 
(ePHI) by unauthorized users? -Make sure all users adhere to security and confidential policy set 
forth by the facility 
What is the goal of MIPS and MU? -Patient quality care 
A provider at the hospital had his ...
C468 Information Management and the Application of Technology WGU
Information literacy -Defined as the ability to recognize when information is needed as well as 
the skills to find, evaluate and use needed information effectively 
Information -Term used to describe data that has been interpreted 
Information science -Focus on how to gather, process and transform information into knowledge. 
It also incorporates features from 5 other sciences 
-communication science 
-computer science 
-social science 
-library science 
-cognitive science 
Information systems ...
- Exam (elaborations)
- • 9 pages •
Information literacy -Defined as the ability to recognize when information is needed as well as 
the skills to find, evaluate and use needed information effectively 
Information -Term used to describe data that has been interpreted 
Information science -Focus on how to gather, process and transform information into knowledge. 
It also incorporates features from 5 other sciences 
-communication science 
-computer science 
-social science 
-library science 
-cognitive science 
Information systems ...
C468 Information Management
Informatics - "The big oak tree" 
combination of the nursing science, 
computer science and information science. 
It includes information technologies that can help support nursing practice. 
Information technology - "The branch" 
electronic healthcare record, your clinical decisions support tools, bar code medication 
administration, and so on. 
information System - "Another branch" : used to collect, create and distribute useful data. 
This term describes the development, use and managem...
- Exam (elaborations)
- • 17 pages •
Informatics - "The big oak tree" 
combination of the nursing science, 
computer science and information science. 
It includes information technologies that can help support nursing practice. 
Information technology - "The branch" 
electronic healthcare record, your clinical decisions support tools, bar code medication 
administration, and so on. 
information System - "Another branch" : used to collect, create and distribute useful data. 
This term describes the development, use and managem...