Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

FACHE Weeks 1-12 Combined | 304 Questions and Answers

Beoordeling
-
Verkocht
-
Pagina's
52
Cijfer
A+
Geüpload op
17-04-2023
Geschreven in
2022/2023

FACHE Weeks 1-12 Combined | 304 Questions and Answers Health Insurance Portability & Accountability Act (HIPAA) is a Federal Law designed to facilitate the electronic exchange of information in health care. Which of the following does not pertain to this law? a) Privacy protection components of the law limit non-consensual use as a release or private health information b) Patients must receive notice of privacy rights c) Restrictions on access to and use of information is required d) Criminal and civil sanctions do not exist for improper use and disclosure Correct Ans D Separate computer systems are often linked together in order to share data and information. When all components of the network are located within close proximity of one another, perhaps within a single facility, the network known as a: a) Wide Area Network (WAN) b) World Wide Web (WWW) c) Local Area Network (LAN) d) Electronic Data Interchange (EDI) Correct Ans C Healthcare organizations had established standards to maintain data security and protect the privacy and confidentiality of patients' records information. Which one of the following answers does not describe its data security elements: a) Protect against system failures b) Protect against external catastrophic events c) Facilitate access to computer files to authorized personnel d) Control access to computer files by unauthorized personnel Correct Ans C W Client/server architecture back-end (server) functions include all of the following except: a) Printing b) Applications program execution c) Decision support d) Communication Correct Ans C Star networks have an advantage of: a) Relative ease of wiring the network and relatively fast communications b) Facilitating construction of high spend networks that operate over large distances c) Ease with which nodes can be added to an existing network d) Require less cabling than networks using other topologies Correct Ans C. 1-refers to Bus networks, 2 refers to ring networks, and 4 is incorrect because Star networks require more cabling than other networks Advantages of outsourcing include all of the following except, a) Staffing reductions b) Increased implementation time c) Smaller capital investments d) More predictable costs Correct Ans B Although purchasing or leasing commercial software is most common, what is becoming a viable source of information technology and systems for smaller healthcare organizations? a) In house design and programming b) Outsourcing c) ASP-applications service provider d) Combining Outsourcing and in-house design Correct Ans C Which of the following is NOT one of the three general categories of information systems used in healthcare organizations: a) Clinical Information Systems b) Composite Healthcare Systems c) Administrative/Financial Systems d) Decision Support Systems for Strategic Management Correct Ans B A comprehensive information security policy should include all of the following elements except: a) Management Policies b) Data back up and recovery c) Physical security d) Technical controls Correct Ans B Which of the following is NOT part of the System Development Life Cycle? a) System Analysis b) System Adjustment c) System Implementation d) System Acquisition Correct Ans B The Information Services Advisory Committee provides insight into user needs and helps gain acceptance of information systems. Which of the following is NOT a charge of the committee: a) Encouraging appropriate use of information services b) Ranking information services investment opportunities and recommending a rank-ordered list of proposals to the governing board. c) Providing technical support to implement an integrated information system. d) Monitoring performance of the department and suggesting possible improvements Correct Ans C One of the functions of an IS system is to ensure the integrity, quality, and security of data. Which of the following does not fall in this content area? a) Defines measures and terminology b) Captures historic as opposed to current data c) Improves the process for data input d) Guards against data loss Correct Ans B In the IT System Development Life Cycle, which is the most important step: a) System Analysis b) System Design c) System Acquisition d) System Implementation Correct Ans A Which of the following is not an actual active IT policy and Procedure components? a) Procedures against system failure and catastrophic events b) Control against viruses c) Quality of Software d) Confidentiality for authorized users Correct Ans C The importance of the Intranet vs. the Internet is that employees could: a) Evaluate Policies, Procedure, Protocols and organizational manuals b) Receive education sessions c) Communicate and interact with patients d) All Correct Ans D The type of computer network that allows multiple workstations to share the data contained in files on a server is called: a) Peer Network b) File/Server c) Terminal Host Systems d) Client/Server Computing Correct Ans B Which is not example of a Strategic Decision Support Application? a) Strategic planning b) Disease management c) Marketing d) Resource allocation Correct Ans B Which of the following is not a key part of HIPAA Implementation: a) Establishment of enhanced privacy protection policies b) Establishment of compliance committees and private offices c) Establishment of clinical guidelines for patient care d) Use of HIPAA compliant software Correct Ans C Which is not a role of the Information Service Advisory Committee? a) Participation in the development of the IS plan, resolving the strategic priorities, and recommending the plan to the governing board. b) Encouraging appropriate use of information services c) Ranking IS investment opportunities and recommending a rank-ordered list of proposals to the governing board. d) Management of communication hardware Correct Ans D The role of the CIO includes: a) Advise executive team on use of information b) Oversee IT Department for Information Technology c) Oversee IT Department for Telecommunications d) Train and support end users Correct Ans Answer: This is a function of the IT Department PowerPoint Presentation?? The role of the CIO includes: a) Advise executive team on use of information b) Oversee IT Department for Information Technology c) Oversee IT Department for Telecommunications d) Train and support end users Correct Ans Answer: This is a function of the IT Department PowerPoint Presentation?? A three tiered architecture includes the following except the a) Client b) Relational database c) Programs application d) Third server Correct Ans D Key responsibilities of executives in Information Systems include all of the following except: a) Strategic planning b) Maintain technology-focused systems c) System integration d) Information security Correct Ans B. Maintaining a user focus is essential; otherwise end users will not use the system appropriately and effectively Healthcare Managers' responsibilities in telecommunications activities include the following tasks except: a) Choosing software and hardware b) Defining roles and needs of the department c) Helping define specific data for their area's needs d) Overseeing technology activities within their area Correct Ans A The IS department has complete responsibility for the management of certain kinds of information including: a) Patient registration and placement records b) Files of patients unit record numbers c) Patient Medical record numbers d) All of the above Correct Ans D Which answer below defines a terminal-host system network configuration: a) A network that divides computing functions

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

FACHE Weeks 1-12 Combined | 304
Questions and Answers


Health Insurance Portability & Accountability Act (HIPAA) is a Federal Law designed to
facilitate the electronic exchange of information in health care. Which of the following
does not pertain to this law?
a) Privacy protection components of the law limit non-consensual use as a release
or private health information
b) Patients must receive notice of privacy rights
c) Restrictions on access to and use of information is required
d) Criminal and civil sanctions do not exist for improper use and disclosure Correct
Ans ➡ D
Separate computer systems are often linked together in order to share data and
information. When all components of the network are located within close proximity of
one another, perhaps within a single facility, the network known as a:
a) Wide Area Network (WAN)
b) World Wide Web (WWW)
c) Local Area Network (LAN)
d) Electronic Data Interchange (EDI) Correct Ans ➡ C
Healthcare organizations had established standards to maintain data security and protect
the privacy and confidentiality of patients' records information.
Which one of the following answers does not describe its data security elements:
a) Protect against system failures
b) Protect against external catastrophic events
c) Facilitate access to computer files to authorized personnel
d) Control access to computer files by unauthorized personnel Correct Ans
➡ C
W Client/server architecture back-end (server) functions include all of the following
except:
a) Printing
b) Applications program execution
c) Decision support
d) Communication Correct Ans ➡ C
Star networks have an advantage of:
a) Relative ease of wiring the network and relatively fast communications
b) Facilitating construction of high spend networks that operate over large distances
c) Ease with which nodes can be added to an existing network

,d) Require less cabling than networks using other topologies Correct Ans
➡ C. 1-refers to Bus networks, 2 refers to ring networks, and 4 is incorrect because
Star networks require more cabling than other networks

Advantages of outsourcing include all of the following except,
a) Staffing reductions
b) Increased implementation time
c) Smaller capital investments
d) More predictable costs Correct Ans ➡ B
Although purchasing or leasing commercial software is most common, what is
becoming a viable source of information technology and systems for smaller
healthcare organizations?
a) In house design and programming
b) Outsourcing
c) ASP-applications service provider
d) Combining Outsourcing and in-house design Correct Ans ➡ C
Which of the following is NOT one of the three general categories of information
systems used in healthcare organizations:
a) Clinical Information Systems
b) Composite Healthcare Systems
c) Administrative/Financial Systems
d) Decision Support Systems for Strategic Management Correct Ans ➡
B
A comprehensive information security policy should include all of the following
elements except:
a) Management Policies
b) Data back up and recovery
c) Physical security
d) Technical controls Correct Ans ➡ B
Which of the following is NOT part of the System Development Life Cycle?
a) System Analysis
b) System Adjustment
c) System Implementation
d) System Acquisition Correct Ans ➡ B
The Information Services Advisory Committee provides insight into user needs
and helps gain acceptance of information systems. Which of the following is
NOT a charge of the committee:
a) Encouraging appropriate use of information services
b) Ranking information services investment opportunities and recommending a rank-
ordered list of proposals to the governing board.

,c) Providing technical support to implement an integrated information system.
d) Monitoring performance of the department and suggesting possible
improvements Correct Ans ➡ C
One of the functions of an IS system is to ensure the integrity, quality, and security of
data. Which of the following does not fall in this content area?
a) Defines measures and terminology
b) Captures historic as opposed to current data
c) Improves the process for data input
d) Guards against data loss Correct Ans ➡ B
In the IT System Development Life Cycle, which is the most important step:
a) System Analysis
b) System Design
c) System Acquisition
d) System Implementation Correct Ans ➡ A
Which of the following is not an actual active IT policy and Procedure components?
a) Procedures against system failure and catastrophic events
b) Control against viruses
c) Quality of Software
d) Confidentiality for authorized users Correct Ans ➡ C
The importance of the Intranet vs. the Internet is that employees could:
a) Evaluate Policies, Procedure, Protocols and organizational manuals
b) Receive education sessions
c) Communicate and interact with patients
d) All Correct Ans ➡ D
The type of computer network that allows multiple workstations to share the data
contained in files on a server is called:
a) Peer Network
b) File/Server
c) Terminal Host Systems
d) Client/Server Computing Correct Ans ➡ B
Which is not example of a Strategic Decision Support Application?
a) Strategic planning
b) Disease management
c) Marketing
d) Resource allocation Correct Ans ➡ B
Which of the following is not a key part of HIPAA Implementation:
a) Establishment of enhanced privacy protection policies

, b) Establishment of compliance committees and private offices
c) Establishment of clinical guidelines for patient care
d) Use of HIPAA compliant software Correct Ans ➡ C
Which is not a role of the Information Service Advisory Committee?
a) Participation in the development of the IS plan, resolving the strategic
priorities, and recommending the plan to the governing board.
b) Encouraging appropriate use of information services
c) Ranking IS investment opportunities and recommending a rank-ordered list of
proposals to the governing board.
d) Management of communication hardware Correct Ans ➡ D
The role of the CIO includes:
a) Advise executive team on use of information
b) Oversee IT Department for Information Technology
c) Oversee IT Department for Telecommunications
d) Train and support end users Correct Ans ➡ Answer: This is a function of
the IT Department PowerPoint Presentation??

The role of the CIO includes:
a) Advise executive team on use of information
b) Oversee IT Department for Information Technology
c) Oversee IT Department for Telecommunications
d) Train and support end users Correct Ans ➡ Answer: This is a function of
the IT Department PowerPoint Presentation??

A three tiered architecture includes the following except the
a) Client
b) Relational database
c) Programs application
d) Third server Correct Ans ➡ D
Key responsibilities of executives in Information Systems include all of the following
except:
a) Strategic planning
b) Maintain technology-focused systems
c) System integration
d) Information security Correct Ans ➡ B. Maintaining a user focus is
essential; otherwise end users will not use the system appropriately and effectively
Healthcare Managers' responsibilities in telecommunications activities include the
following tasks except:
a) Choosing software and hardware
b) Defining roles and needs of the department
c) Helping define specific data for their area's needs

Geschreven voor

Vak

Documentinformatie

Geüpload op
17 april 2023
Aantal pagina's
52
Geschreven in
2022/2023
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$18.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Cowell Chamberlain College Of Nursng
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
512
Lid sinds
6 jaar
Aantal volgers
483
Documenten
852
Laatst verkocht
5 maanden geleden
EXAMS GURU

SCORE As

4.0

91 beoordelingen

5
46
4
15
3
18
2
4
1
8

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen