QUESTIONS AND CORRECT ANSWERS
_____________ is a teaching strategy for educating staff that involves face-to-face and online learning.
A. Virtual learning
B. Web-based learning
C. Group learning
D. Hybrid learning
- ANSWERS-D. Hybrid learning
'Bugs' in computer language are not really insects, but:
a. testing methodology
b. community within the code indicated with an asterisk
c. aberrancies and failures in the system
d. the nickname of the coder who designed the first EHR
- ANSWERS-c. aberrancies and failures in the system
"Bugs" in computer language are not really insects, but
A. A testing methodology
B. Commentary within the code indicated with an asterisk (*)
C. Aberrancies and failures in the system
D. The nickname of the coder who designed the first EHR
- ANSWERS-c. Abberancies
Rationale: "Bugs" in computer language are defined as aberrancies and failures in the system or a coding
error.
1. An advantage of an identity and access management (IAM) system is that the IAM system:
a. satisfies the Code of Federal Regulations Title 21, Part 11
b. provides HIPAA-required encryption for PHI
c. meets HIPAA's Security Rule requirements regarding access to PHI
,d. meets HIPAA's Privacy Rule requirements regarding identification
- ANSWERS-c. meets HIPAA's Security Rule requirements regarding access to PHI.
Rationale: o An advantage of an identity and access management (IAM) system is that the IAM system
meets HIPAA's Security Rule requirements regarding access to PHI through identity management. An IAM
system provides, captures, updates, and records user IDs and provides appropriate access privileges,
preventing "privilege creep," which increases risks to security. The IAM system should provide
authentication (single sign-in and session management), authorization (based on roles, rules, and attributes),
user management (provisioning and password management), and a central directory.
1. Communication software is most commonly used for:
a. audio files
b. documents
c. video files
d. e-mail and IM
- ANSWERS-d. e-mail and IM
1. If the informatics nurse is concerned that a computer system may not function well during peak times of
access, the type of testing needed is:
a. functional testing
b. black box testing
c. system integration testing
d. load/volume testing
- ANSWERS-d. load/volume testing
Rationale: This is a non-functional testing for reliability that assesses the ability of the system to function
under various loads, such as at peak times when multiple users in multiple departments are accessing the
system. The purpose of load/volume testing is to determine the maximum load capacity and to identify the
load at which problems begin to occur. Testing is done at both the safe working load (SWL) and above the
SWL.
1. In an EHR with CPOE and CDS, allergy alerts should be triggered:
a. in response to contraindicated drug orders
b. before orders are written
c. on physician request by accessing a link
after orders are written
,d. after orders are written
- ANSWERS-b. before orders are written
Rationale: In an EHR with CPOE and CDS, allergy alerts should be triggered before orders are written
and they should be automated. Alerts that occur after orders are written are more likely to be ignored or
overridden. Additional alerts, including hard stops, should occur if orders for contraindicated drugs or
drugs to which the patient is allergic are ordered despite the original alert. The alerts should be carefully
evaluated because excessive alerts may result in "alert fatigue" to the point that clinicians begin to ignore
them.
1. In preparation for the workflow redesign necessitated for implementation of an EHR, the first step
should be to:
o assess compatibility with EHR
o assess the EHR requirements
o map the current workflow
conduct surveys about workflow
- ANSWERS-map the current workflow
1. The human-technology interface (HTI):
a. allows user interaction with technology
b. allows access to the technology only to authorized people
c. connects a user device to the Internet
d. standardizes applications utilized in all devices
- ANSWERS-a. allows user interaction with technology
1. The network that connects the departments in an organization is likely a(n):
a. VSN
b. LAN
c. WAN
d. MAN
- ANSWERS-b. LAN - local area network
1. The smallest possible piece of data utilized in computer processing is the:
a. byte
, b. bit
c. nibble
d. zettabyte
- ANSWERS-b. bit
1. When an institution is transitioning to a CPOE, a primary role of the informatics nurse is that of:
a. system designer
b. liaison
c. software modifier
d. purchasing agent
- ANSWERS-b. liaison
1. When considering transitioning to cloud storage and assessing vendors, the most critical assessment
relates to:
a. regulatory compliance
b. interoperability
c. monitoring mechanisms
d. cost analysis
- ANSWERS-a. regulatory compliance
1. When utilizing a prioritization matrix to prioritize activities as a project manager, the informatics nurse
must first establish:
a. rating scale and timeframe
b. criteria and rating scale
c. rating scale and categories
d. criteria and timeframe
- ANSWERS-b. establish criteria and rating scale
Rationale: The criteria includes those factors that are utilized to determine how important each project is;
for example, a project mandated by regulations is more important than a project that may improve
customer satisfaction. A rating scale for each project should be established with numeric values (such as 1
to 10) used to demonstrate how effective the project is in meeting the criteria. A typical prioritization
matrix may have up to a dozen criteria