Board of Governors Exam
Health Insurance Portability & Accountability Act (HIPAA) is a Federal Law
designed to facilitate
the electronic exchange of information in health care. Which of the following does
not pertain to
this law?
a) Privacy protection components of the law limit non-consensual use as a
release or private health
information
b) Patients must receive notice of privacy rights
c) Restrictions on access to and use of information is required
d) Criminal and civil sanctions do not exist for improper use and disclosure
D- Criminal and civil sanctions do not exist for improper use and disclosure
3 multiple choice options
Separate computer systems are often linked together in order to share data and
information. When
all components of the network are located within close proximity of one another,
perhaps within a
single facility, the network known as a:
Local Area Network (LAN)
Healthcare organizations had established standards to maintain data security
and protect the
privacy and confidentiality of patients' records information. Which one of the
following answers
does not describe its data security elements:
a) Protect against system failures
b) Protect against external catastrophic events
c) Facilitate access to computer files to authorized personnel
d) Control access to computer files by unauthorized personnel
,C - Facilitate access to computer files to authorized personnel
W Client/server architecture back-end (server) functions include all of the
following except:
a) Printing
b) Applications program execution
c) Decision support
d) Communication
C-Decision support
Star networks have an advantage of:
a) Relative ease of wiring the network and relatively fast communications
b) Facilitating construction of high spend networks that operate over large
distances
c) Ease with which nodes can be added to an existing network
d) Require less cabling than networks using other topologies
C-Ease with which nodes can be added to an existing network
Advantages of outsourcing include all of the following except:
a) Staffing reductions
b) Increased implementation time
c) Smaller capital investments
d) More predictable costs
B-Increased implementation time
Although purchasing or leasing commercial software is most common, what is
becoming a viable
source of information technology and systems for smaller healthcare
organizations?
, a) In house design and programming
b) Outsourcing
c) ASP-applications service provider
d) Combining Outsourcing and in-house design
C-ASP-applications service provider
Which of the following is NOT one of the three general categories of information
systems used in
healthcare organizations:
a) Clinical Information Systems
b) Composite Healthcare Systems
c) Administrative/Financial Systems
d) Decision Support Systems for Strategic Management
B-Composite Healthcare Systems
A comprehensive information security policy should include all of the following
elements except
a) Management Policies
b) Data back up and recovery
c) Physical security
d) Technical controls
Data back up and recovery
Which of the following is NOT part of the System Development Life Cycle?
a) System Analysis
b) System Adjustment
c) System Implementation
d) System Acquisition
b) System Adjustment
Health Insurance Portability & Accountability Act (HIPAA) is a Federal Law
designed to facilitate
the electronic exchange of information in health care. Which of the following does
not pertain to
this law?
a) Privacy protection components of the law limit non-consensual use as a
release or private health
information
b) Patients must receive notice of privacy rights
c) Restrictions on access to and use of information is required
d) Criminal and civil sanctions do not exist for improper use and disclosure
D- Criminal and civil sanctions do not exist for improper use and disclosure
3 multiple choice options
Separate computer systems are often linked together in order to share data and
information. When
all components of the network are located within close proximity of one another,
perhaps within a
single facility, the network known as a:
Local Area Network (LAN)
Healthcare organizations had established standards to maintain data security
and protect the
privacy and confidentiality of patients' records information. Which one of the
following answers
does not describe its data security elements:
a) Protect against system failures
b) Protect against external catastrophic events
c) Facilitate access to computer files to authorized personnel
d) Control access to computer files by unauthorized personnel
,C - Facilitate access to computer files to authorized personnel
W Client/server architecture back-end (server) functions include all of the
following except:
a) Printing
b) Applications program execution
c) Decision support
d) Communication
C-Decision support
Star networks have an advantage of:
a) Relative ease of wiring the network and relatively fast communications
b) Facilitating construction of high spend networks that operate over large
distances
c) Ease with which nodes can be added to an existing network
d) Require less cabling than networks using other topologies
C-Ease with which nodes can be added to an existing network
Advantages of outsourcing include all of the following except:
a) Staffing reductions
b) Increased implementation time
c) Smaller capital investments
d) More predictable costs
B-Increased implementation time
Although purchasing or leasing commercial software is most common, what is
becoming a viable
source of information technology and systems for smaller healthcare
organizations?
, a) In house design and programming
b) Outsourcing
c) ASP-applications service provider
d) Combining Outsourcing and in-house design
C-ASP-applications service provider
Which of the following is NOT one of the three general categories of information
systems used in
healthcare organizations:
a) Clinical Information Systems
b) Composite Healthcare Systems
c) Administrative/Financial Systems
d) Decision Support Systems for Strategic Management
B-Composite Healthcare Systems
A comprehensive information security policy should include all of the following
elements except
a) Management Policies
b) Data back up and recovery
c) Physical security
d) Technical controls
Data back up and recovery
Which of the following is NOT part of the System Development Life Cycle?
a) System Analysis
b) System Adjustment
c) System Implementation
d) System Acquisition
b) System Adjustment