Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

EPIC CLN 251/252 Study Set 3 exam 2023 with quality answers

Beoordeling
-
Verkocht
-
Pagina's
18
Cijfer
A+
Geüpload op
29-01-2023
Geschreven in
2022/2023

Name two things that are defined by your role record. Roles define your default Startup Activity, the Hyperspace toolbar, options under the Epic button, the maximum number of workspaces a user can have open, automatic timeout settings, and whether your user's last login department will default the next time she logs in. Explain the difference between role and security. Security determines a user's access to functionality. Role determines where that functionality will appear for a user in Hyperspace. What function does the Role record perform in Epic? A role record determines the layout and ground rules of Hyperspace. Security Class Scenario: Your organization wants its hospital charge nurses to have administrative access to the Patient List activity (Inpatient security point 1 - Patient List Administrator). Otherwise, their access should be the same as that of other inpatient nurses (who use the MODEL IP NURSE Inpatient security class). How would you efficiently take care of this need? • Duplicate the MODEL IP NURSE Inpatient security class, and call the duplicate something like IP CHARGE NURSE. • Add to the duplicate the desired security point. Link all of the charge nurses' user records (or a charge nurse user template) to this duplicate security class. How do you duplicate a security class? Log in to Text as your administrator From the Training Application Access menu, select Chronicles. (Hint: The Training Application Access menu is the initial menu after logging in to Text. If you are in text but not on this screen, press PAGE UP until you reach this screen.) Enter "ECL" at the Database initials prompt. Go to Enter Data Duplicate Security Class. Duplicate the "TRNCLN PEDS IP SECURITY CLASS" security class. Enter a new ID and write it down In Hyperspace, use Chart Search to find "Inpatient Security." Open the new id. In the Comments field, enter a more specific title such as first year residents In the Search field on the Security Points tab, enter "notes cosign required" and press ENTER In front of security point 28 - Notes Cosign Required, click the button to make the security point active. In the Search field on the Security Points tab, enter "order sets" and press ENTER. In front of security point 193 - Edit My Order Sets, click the button to make the security point inactive. 13. Click Accept to save and close your record. Foundation security class • Epic's Foundation System serves as a starting point for customers, as it is configured with providers, users, roles, security classes, profiles, and other settings that reflect our recommendations and best practices. Security Points • Security points are individual keys to pieces of Epic functionality. • Each activity (like Chart Review) is associated with one or more security points. If a user has the security point, he has access to the activity. If he does NOT have the required security point, then he will not be able to launch the activity. • In most cases, the user won't even see the activity, or it might appear as grayed out. • Security points are typically referred to by the type of security class they are found in (Inpatient, EpicCare, Emergency, Shared, etc.) and a number. Security Class • One function of the user template is to assign access to activities in Epic. This access is controlled by records in the Security Class (ECL) master file. Security class records can be shared, so assigning them in the template is an efficient way to grant access to groups of users. • Instead of giving individual security points directly to users, security points of the same type are lumped into security classes, like rings of keys, and then assigned to the appropriate groups of users. Which type of security controls access to hospital functionality, like the MAR and Doc Flowsheets? Inpatient Security Which three security classes does every user need? Inbasket, Shared, and Reporting Workbench Explain the difference between a security class and a security point. A security point grants access to a single piece of functionality; it's like a key. A security class is a collection of security points, like a key ring. Users are linked to security classes either directly or via a template; users are not linked directly to security points. What function does security perform in Epic? Security controls access to functionality— what a user is or is not allowed to do in the system.

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

EPIC CLN 251/252 Study Set 3 - KW,
EPIC CLN 251/252 Study Set 2 - KW,
EPIC CLN 251/251 - KW

Name two things that are defined by your role record. correct answerRoles define your
default Startup Activity, the Hyperspace toolbar, options under the Epic button, the
maximum number of workspaces a user can have open, automatic timeout settings, and
whether your user's last login department will default the next time she logs in.

Explain the difference between role and security. correct answerSecurity determines a
user's access to functionality. Role determines where that functionality will appear for a
user in Hyperspace.

What function does the Role record perform in Epic? correct answerA role record
determines the layout and ground rules of Hyperspace.

Security Class Scenario:
Your organization wants its hospital charge nurses to have administrative access to the
Patient List activity (Inpatient security point 1 - Patient List Administrator). Otherwise,
their access should be the same as that of other inpatient nurses (who use the MODEL
IP NURSE Inpatient security class). How would you efficiently take care of this need?
correct answer• Duplicate the MODEL IP NURSE Inpatient security class, and call the
duplicate something like IP CHARGE NURSE.
• Add to the duplicate the desired security point. Link all of the charge nurses' user
records (or a charge nurse user template) to this duplicate security class.

How do you duplicate a security class? correct answerLog in to Text as your
administrator > From the Training Application Access menu, select Chronicles. > (Hint:
The Training Application Access menu is the initial menu after logging in to Text. If you
are in text but not on this screen, press PAGE UP until you reach this screen.) > Enter
"ECL" at the Database initials prompt. > Go to Enter Data > Duplicate Security Class. >
Duplicate the "TRNCLN PEDS IP SECURITY CLASS" security class. > Enter a new ID
and write it down > In Hyperspace, use Chart Search to find "Inpatient Security." >
Open the new id. > In the Comments field, enter a more specific title such as first year
residents > In the Search field on the Security Points tab, enter "notes cosign required"
and press ENTER > In front of security point 28 - Notes Cosign Required, click the
button to make the security point active. > In the Search field on the Security Points tab,
enter "order sets" and press ENTER. > In front of security point 193 - Edit My Order
Sets, click the button to make the security point inactive.
13. Click Accept to save and close your record.

,Foundation security class correct answer• Epic's Foundation System serves as a
starting point for customers, as it is configured with providers, users, roles, security
classes, profiles, and other settings that reflect our recommendations and best
practices.

Security Points correct answer• Security points are individual keys to pieces of Epic
functionality.
• Each activity (like Chart Review) is associated with one or more security points. If a
user has the security point, he has access to the activity. If he does NOT have the
required security point, then he will not be able to launch the activity.
• In most cases, the user won't even see the activity, or it might appear as grayed out.
• Security points are typically referred to by the type of security class they are found in
(Inpatient, EpicCare, Emergency, Shared, etc.) and a number.

Security Class correct answer• One function of the user template is to assign access to
activities in Epic. This access is controlled by records in the Security Class (ECL)
master file. Security class records can be shared, so assigning them in the template is
an efficient way to grant access to groups of users.
• Instead of giving individual security points directly to users, security points of the same
type are lumped into security classes, like rings of keys, and then assigned to the
appropriate groups of users.

Which type of security controls access to hospital functionality, like the MAR and Doc
Flowsheets? correct answerInpatient Security

Which three security classes does every user need? correct answerInbasket, Shared,
and Reporting Workbench

Explain the difference between a security class and a security point. correct answerA
security point grants access to a single piece of functionality; it's like a key. A security
class is a collection of security points, like a key ring. Users are linked to security
classes either directly or via a template; users are not linked directly to security points.

What function does security perform in Epic? correct answerSecurity controls access to
functionality— what a user is or is not allowed to do in the system.

Who (or what) needs a provider record? correct answerA person or resource if at least
one of the following criteria are met:
• Credentials to display or a specialty/discipline
• Authorizing and/or ordering provider for orders
• Referred-to or referred-by providers for referrals
• Scheduled with patients or appointments in Epic

Who needs a user record? correct answerEveryone at your organization who uses Epic
will need a user record. The User (EMP) master file needs a record for each end user-

, doctors, nurses, front desk staff, billers, etc. The user record is a starting place for
successfully getting staff started with Epic because it acts as a hub where several other
important settings are made.

Default login department correct answerA user will be assigned a default log in so that
whenever the user logs into EPIC the defaulted log in will occur, but will still have the
option to manually choose if needed.

Linkable Template correct answer• User templates (or linkable templates) are records in
the User (EMP) master file that allow you to create a single record to maintain shared
settings for multiple user records. You create a user template for a particular group of
users (for example, medical assistants). In the template, you assign the access to
activities, Hyperspace configuration, profiles, and other settings appropriate to that
group.

User Record correct answerAnyone who needs to log in to Hyperspace needs his/her
own user record. User records determine login IDs, passwords, default login
departments, security (access to functionality), and many other settings.

True or False: In the provider record, you can link to the corresponding user record or a
user template. correct answerFalse. The linking is established in the user record.
Multiple users may not be linked to the same provider record.

Why do MRI machines and classrooms need to have records in the Provider master
file? correct answerThe MRI machines and classrooms are scheduled resources.

Give an example of someone who would need a provider record but NOT a user record.
Explain why. correct answerA physician in your community who gets referrals from your
physicians, but who does not have access to log in to your Epic system.

What are some settings you must make in an individual user record which cannot be set
with linkable templates? correct answerDefault login department, link to templates,
ID/password information

True or False: You can link a user to multiple linkable templates. correct answerTrue.
You can assign more than one template to a user, and that user can choose the
template they want to affect them when they log into Hyperspace.

What four patient workspace settings is the Workflow Engine configured to control?
correct answer1. Activity tabs (to the left of the patient chart)
2. More Activities menu (formerly known as the action menu)
3. Navigators
4. Sidebars (when using widescreen view)
Workflow Engine rules don't eliminate the need for assigning role and profile records to
users. Those records contain many more settings that aren't included in the Workflow
Engine.

Geschreven voor

Vak

Documentinformatie

Geüpload op
29 januari 2023
Aantal pagina's
18
Geschreven in
2022/2023
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$10.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
QUILLSKY Yale University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
521
Lid sinds
3 jaar
Aantal volgers
275
Documenten
13964
Laatst verkocht
2 weken geleden
,STUDY GUIDES,TESTBANKS AND QUALITY EXAMS IS THE KEY TO STUDENTS CAREER EXCELLENCE!!!

On this page, you find all documents, package deals, and flashcards offered by seller MAXGRADES WELCOME TO MAXGRADES ALL THE BEST !!!!!!

3.6

129 beoordelingen

5
50
4
23
3
28
2
6
1
22

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen