WGU D220 Exam Questions with correct Answers
1. Which information in an electronic medical record (EMP) helps a nurse plan & manage a patient's post-operative care after open-heart surgery - ANSWER-Provider orders
2. Which information in a patient's electronic medical record (EMA), in ad...
Thankyou for the review and success in your coming tests. Please follow me for more and updated learning materials. 
REGARDS
By: Mosesnjogu • 7 months ago
Reply deleted by the user
Seller
Follow
Mosesnjogu
Reviews received
Content preview
WGU D220 Exam Questions with correct Answers 1. Which information in an electronic medical record (EMP) helps a nurse plan & manage a patient's post-operative care after open -heart surgery - ANSWER -Provider orders 2. Which information in a patient's electronic medical record (EMA), in addition to the nursing flowsheets & provider orders, helps a nurse plan & manage fluctuation in blood glucose levels - ANSWER -MAR 3. A nurse is planning the care for a patient admitted to the hospital with COVID -19 Which list of information in the electronic medical record (EMR) will help the nurse plan the care for this patient - ANSWER -The patient's laboratory results over the last 72 hours 4. Which clinical note type is exempt from being shared with patients according to the United States Core Data for Interoperability (USC DI) standards - ANSWER - Psychotherapy notes 5. Operating room (OR) staff are reliant upon a manual white board for patient tracking. Recently, surgeons have complained that the turnaround time between surgical cases has increased & blame the manual tracking system. An informatics nurse recommends expanding use of the existing surgical information system (SIS). Which resolution can improve this workflow issue - ANSWER -Radio frequency identification (RFID) in patient labels 6. An informatics nurse & an emergency nurse are conducting an analysis of a patient admission from the ER - ANSWER -Which tool should these nurses use for a process analysis? SWOT template 7. What is an effective way to reduce the risk of access of electronic protected health information (ePHI) by unauthorized users - ANSWER -Make sure all the users adhere to security & confidential policy set forth by the facility 8. How does a healthcare policy assure access to health information by authorized users - ANSWER -It creates a reliable method to verify the identities of users accessing health information 9. Which statement describes the application of meaningful use - ANSWER -Provider needs to show the use of the Electronic Health Record (EHR) technology 10. What is the typical role of the informatics nurse - ANSWER -Plans, coordinates, & facilitates education for all computer applications & software for nursing or clinical user group 11. A patients glucose blood sugar is 400. What is a one-time kind of report - ANSWER - Ad Hoc 12. Which clinical information technology enables providers to document patient assessments - ANSWER -Vitals signs capture 13. A patient is being transferred to another hospital, however the hospital he is being transferred to does not have access to the Electronic Health Record (EHR) since they use EPIC. How will they receive his Electronic Health Record (EHR) - ANSWER - Continuity care record from AMR 14. Which statement best describes Nursing Informatics - ANSWER -"Computer science, decision science, information science, management science, cognitive science, & organizational theory." 15. The nurse receives report that there are new orders to review. Where does the nurse look to verify this information - ANSWER -The Kardex 16. What is the goal of Merit -Based Incentive Payment System (MIPS) & Meaningful Use (MU) - ANSWER -Patient quality care 17. What is a type of phishing - ANSWER -Trojan 18. What is Data governance - ANSWER -Defines who can take what action, upon what data, in what situations, using what methods 19. A provider at the hospital had his laptop stolen from his vehicle. What should be on his laptop to protect it from data breach - ANSWER -Encryption 20. What is the name of the process that begins with conception & continues through implementation - ANSWER -Systems Development Life Cycle (SDLC) 21. What is the intent of the Clinical Decision Support (CDS) System - ANSWER -This is an application that supports healthcare practitioners in making patient -care decisions 22. What is the term for sharing a person's personal information with other individuals electronically - ANSWER -Information sharing 23. When a physician arrives on the unit, a nurse is asked about the fluid status of a patient. Where should the nurse find this information - ANSWER -The intake & output chart 24. Why is it important to control the number of warnings in Electronic Health Record (EHR) - ANSWER -Alert fatigue 25. Which change theory begins with creating urgency - ANSWER -Kotter's Models 26. Which act in 2009 did Meaningful Use (MU) originate - ANSWER -American Recover & Reinvestment Act (ARRA) act in 2009 27. What is the primary concern driving Nursing informatic initiative - ANSWER -Patient safety 28. What can be installed to allow one operation to access another to enable the exchange of data - ANSWER -Integration 29. Which type of chart uses rectangle, oval & diamonds in both - ANSWER -Flowchart 30. What is the intent of the Clinical Decision Support (CDS) System - ANSWER - Providing clinicians with knowledge & person specific information 31. Information may be kept secret to those with an only need to know - ANSWER -What is this? Information privacy is the right to choose the conditions under which information is shared, & to ensure the accuracy of collected information. 32. Which statement defines interoperability - ANSWER -The extent to which systems & devices can exchange data & interpret that shared data. 33. Which two statement defines healthcare informatics - ANSWER -Standardized languages & terminologies to ensure consistent meanings across all settings 34. What is a physical safeguard of ePHI - ANSWER -Lock on hard drive. Facility Access Controls Workstation Use Workstation Security - Device & Media Controls 35. What is a technical safeguard ePHI - ANSWER -Access control. Audit controls. Authentication. 36. Which government agency recommended to use of bar code medication administration - ANSWER -FDA 37. What describes an example of opt-in or opt-out choice regarding the disclosure of personal health information - ANSWER -Your information be sent to another facility 38. What is an important security consideration related to the use of email application to send & receive patient data - ANSWER -Emails have the potential to go to other users
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through EFT, credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying this summary from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Mosesnjogu. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy this summary for R241,54. You're not tied to anything after your purchase.