with answers |\
1. An informatics nurse and an emergency nurse are conducting an analysis
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
of a patient admission from the ER? Which tool should these nurses use for
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
a process analysis? - CORRECT ANSWERS ✔✔SWOT template
|\ |\ |\ |\ |\ |\ |\
1. What is an effective way to reduce the risk of access of electronic
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
protected health information (ePHI) by unauthorized users? - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\
ANSWERS ✔✔Make sure all users adhere to security and confidential policy
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
set forth by the facility
|\ |\ |\ |\ |\
What is the goal of MIPS and MU? - CORRECT ANSWERS ✔✔Patient
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
quality care |\
A provider at the hospital had his laptop stolen from his vehicle. What
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
should be on his laptop to protect it from data breach? - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
ANSWERS ✔✔Encryption |\
What is the name of the process that begins with conception and continues
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
through implementation? - CORRECT ANSWERS ✔✔SDLC
|\ |\ |\ |\ |\
When a physician arrives on the unit, a nurse is asked about the fluid status
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
of a patient. Where should the nurse find this information? - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
ANSWERS ✔✔Intake and output chart |\ |\ |\ |\
, why is it important to control the number of warnings in EHR? - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
ANSWERS ✔✔alert fatigue |\ |\
which two technologies support the standardization of healthcare data? -
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
CORRECT ANSWERS ✔✔HL7 and DICOM |\ |\ |\ |\
what can be installed to allow one operation to access another to enable the
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
exchange of data? - CORRECT ANSWERS ✔✔Integration
|\ |\ |\ |\ |\ |\
what is a physical safeguard of ePHI? - CORRECT ANSWERS ✔✔Lock on
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
hard drive, Facility Access Controls Workstation Use Workstation Security -
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
Device and Media Controls |\ |\ |\
what is a technical safeguard ePHI - CORRECT ANSWERS ✔✔Access
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
control. Audit controls. Authentication.
|\ |\ |\
An informatics nurse and an ER nurse are conducting an analysis of a
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
patient admission form the er. which tool should these nurses use for a
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
process analysis? - CORRECT ANSWERS ✔✔SWOT
|\ |\ |\ |\ |\
1. an informatics nurse is developing a web-based application for patient
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
care. which statement accurately describes the internet? - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\
ANSWERS ✔✔A Network or networks |\ |\ |\ |\