Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C468 Information Management and Application of Technology Latest

Rating
-
Sold
-
Pages
50
Grade
A+
Uploaded on
21-02-2024
Written in
2023/2024

WGU C468 Information Management and Application of Technology Latest System security involves protection against A) poor system design B) noncompliant users C) deliberate attacks, errors, omissions, disasters, and viruses D) vendor breech of support contract C) deliberate attacks, errors, omissions, disasters, and viruses Which of the following is a mechanism that logs a user off the system after a specified period of inactivity on the terminal or computer? A) automatic sign-off B) remote access C) automatic access D) automatic password protection A) automatic sign-off The sharing of private information in a situation in which a relationship has been established for the purpose of treatment, or delivery of services, with the understanding that this information will remain protected is _____________? A) information privacy B) privacy C) confidentiality D) information system security C) confidentiality ____________ is a combination of hardware and software that forms a barrier between systems, or different parts of a single system to protect those systems from unauthorized access. A) Antivirus software B) Firewall C) Physical security D) Application security B) Firewall The ability to use a health enterprise's information system from outside locations such as a physician's office is known as ___________. A) remote access B) automatic access C) system connectivity D) auto connectivity A) remote access What are the driving forces behind the Health Information Exchange (HIE) movement? A) provider demands for cost containment B) international demands C) healthcare insurance reform D) federal legislation, and demands for safer, more efficient healthcare

Show more Read less
Institution
Course

Content preview

WGU C468 Information Management and Application of
Technology Latest
System security involves protection against
A) poor system design
B) noncompliant users
C) deliberate attacks, errors, omissions, disasters, and viruses
D) vendor breech of support contract
C) deliberate attacks, errors, omissions, disasters, and viruses
Which of the following is a mechanism that logs a user off the system after a
specified period of inactivity on the terminal or computer?
A) automatic sign-off
B) remote access
C) automatic access
D) automatic password protection
A) automatic sign-off
The sharing of private information in a situation in which a relationship has been
established for the purpose of treatment, or delivery of services, with the
understanding that this information will remain protected is _____________?
A) information privacy
B) privacy
C) confidentiality
D) information system security
C) confidentiality
____________ is a combination of hardware and software that forms a barrier
between systems, or different parts of a single system to protect those systems
from unauthorized access.
A) Antivirus software
B) Firewall
C) Physical security
D) Application security
B) Firewall
The ability to use a health enterprise's information system from outside locations
such as a physician's office is known as ___________.
A) remote access
B) automatic access
C) system connectivity
D) auto connectivity
A) remote access
What are the driving forces behind the Health Information Exchange (HIE)
movement?
A) provider demands for cost containment
B) international demands
C) healthcare insurance reform
D) federal legislation, and demands for safer, more efficient healthcare

,D) federal legislation, and demands for safer, more efficient healthcare
How do Health Information Exchanges (HIEs) impact healthcare delivery?
A) HIEs have the capacity to improve the quality of care delivered by decreasing
access to records
B) HIEs have limited impact at this time
C) HIEs increase the efficiency and potentially the quality of the healthcare
delivery system
D) HIEs have not been shown to impact the safety of care delivered
C) HIEs increase the efficiency and potentially the quality of the healthcare delivery
system
Information and data privacy
A) provide protection for healthcare information only
B) includes the right to choose the conditions and extent to which information is
shared
C) are best maintained through paper backups
D) only applies when a HIPAA release form is signed
B) includes the right to choose the conditions and extent to which information is shared
The Health Information Technology for Economic and Clinical Health Act
(HITECH) is known for all of the following except:

A) Including a privacy rule establishing national standards for protecting health
information
B) Funded workforce training, and new technology research and development in
HIT
C) Ensured the collection of aggregate data that could be used to improve policy
decisions relative to allocation of services and population health
D) Provided funds and incentives to increase the adoption of EHRs by providers
A) Including a privacy rule establishing national standards for protecting health
information
The SWOT analysis is conducted in what phase of information system life cycle?
A) evaluation phase
B) monitoring and control phase
C) implementation phase
D) strategic planning phase
D) strategic planning phase
Training documents are developed and user training occurs in which phase of the
project management life cycle (PMLC)?
A) evaluation phase
B) design/plan phase
C) implementation phase
D) monitoring and control phase
C) implementation phase
Maintenance of an information system includes all of the following except
____________.
A) problem solving and debugging
B) training end users

,C) performing file-backup procedures
D) updating security protections
B) training end users
Who determines the project implementation strategy?
A) the system analyst
B) the vendor
C) the implementation committee
D) the board of directors and CEO
C) the implementation committee
The first task of the project implementation committee is to ____________.
A) gather data
B) develop a timeline
C) recruit key stakeholders
D) establish subcommittees
B) develop a timeline
An advantage to using super users for system training is that ___________.
A) super users leave after the initial training is complete
B) super users have extensive preparation in learning theory
C) super users have a specialized knowledge of both the system and clinical
areas
D) super users have in-depth knowledge of system code
C) super users have a specialized knowledge of both the system and clinical areas
What is the most important factor in maintaining the proper use of an information
system?
A) revenue and resources
B) planning
C) education
D) implementation
C) education
Training class content should address the following area(s):
A) how class trainers were selected
B) basic computer literacy, workflow, policies, and human factors
C) computer-related positions in the facility
D) how to lodge complaints on the information system that was selected
B) basic computer literacy, workflow, policies, and human factors
Personal Health Record (PHR) use for management of chronic conditions is felt to
hold great promise for which of the following reasons?
A) PHRs reduce physician case loads
B) PHRs have conclusively been shown to decrease the number of face-to-face
visits and phone calls
C) PHRs may serve to heighten client disparities
D) PHRs may help health systems achieve greater efficiency through facilitating
prescription refills, communication, and improved coordination of chronic
conditions as well as quality of care

, D) PHRs may help health systems achieve greater efficiency through facilitating
prescription refills, communication, and improved coordination of chronic conditions as
well as quality of care
Client engagement is considered to be critical to achieving healthcare reform.
Fully functional PHRs support which of the following principles that engage
clients in their own care?

A) Client control, individualized care based upon client needs and values, and
shared knowledge with easy flow of information
B) Informed provider choice for out-of-network participants
C) Provider option to participate with email access only
D) To decrease the number of face-to-face visits and phone calls
A) Client control, individualized care based upon client needs and values, and shared
knowledge with easy flow of information
Benefits associated with PHRs include the following:
A) Improved client satisfaction, outcomes and communication with fewer
telephone calls and outpatient visits
B) Improved payer satisfaction and data collection
C) Reduced revenue cycle
D) Reduced coordination of care
A) Improved client satisfaction, outcomes and communication with fewer telephone calls
and outpatient visits
What is the basic premise underlying value-based reimbursement?
A) Physician payment is based on volume of services
B) Client will play a less active role in this payment method
C) Providers are rewarded financially for good results
D) Payment is based on the value of tests and treatments to patient and
organizational outcomes
D) Payment is based on the value of tests and treatments to patient and organizational
outcomes
Which of the following statements most accurately reflects what the Informatics
Nurse Specialist (INS) needs to know when working with end users to purchase
or design an information system relative to reimbursement of services?
A) Can the current system, or the system under consideration, support
reimbursement requirements? Compliance deadlines? Automatic capture of
charges?
B) The INS must be able to manually update the system to ensure compliance
with changes in regulation and reimbursement
C) Hardware preferences drive software selection
D) How much do they want to spend?
A) Can the current system, or the system under consideration, support reimbursement
requirements? Compliance deadlines? Automatic capture of charges?
Which of the following actions on the part of the informatics nurse best
exemplifies strengthening the Meaningful Use of EHR systems?
A) ensuring that the information system staff understand Meaningful Use
requirements

Written for

Course

Document information

Uploaded on
February 21, 2024
Number of pages
50
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$16.39
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
LectDan Teachme2-tutor
Follow You need to be logged in order to follow users or courses
Sold
221
Member since
3 year
Number of followers
157
Documents
7993
Last sold
1 week ago

4.0

48 reviews

5
25
4
12
3
2
2
4
1
5

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions