RHIA AHIMA practice Test with
Complete Solutions
12 - ANSWER-Domain 1
The passage of FMLA in 1993 allows the employee annual unpaid time off with retained
job security to attend to family healthcare needs and childbirth. The number of weeks
granted annually is:
1. 6
2 .9
3. 12
4. 24
60 feet - ANSWER-Domain 2
The amount of work space allocation for clerical employees in square fee is
1. 60
2. 90
3. 100
4. 120
A combination of electronic and paper chart - ANSWER-Domain 1
Which of the following is the definition of a hybrid record?
1. An EHR with little access to digital ima
2. A complete electronic health record
3. A combination of electronic and paper chart
4. None of the above
Access controls - ANSWER-Domain 2
Which method uses the employees' role to determine their system security level?
1. Access controls
2. Password assignments
3. Single-ones
4. Biometric devices
Accounts payable - ANSWER-Domain 4
All of the following are examples of an asset EXCEPT:
1. Accounts Receivable
2. Inventory
3. Accounts Payable
4. Buildings
Address deficiencies through education - ANSWER-Domain 2
,A HIM manager developed performance measurements for the inpatient coding staff.
After comparing coders' performance with the standards, the manager identified
problems with the performance of one coder who is continuously making the same
coding errors. What step should the manager take next?
1. Wait to see if the same mistakes reoccur
2. Reassign to ambulatory coding
3. Issue verbal warning to the coder
4. Address deficiencies through education
An integral part of the major service - ANSWER-Domain 1
CPT defines a separate change procedure when performed in conjunction with another
service as:
1. An integral part of the major service
2. One that can be reported in conjunction with a service
3. Not fraudulent when integral to another service
4. A separate change
Analysis - ANSWER-Domain 3
A hospital considers purchasing a new hospital information system. The Information
Systems department begins to survey system users. The hospital is is which phase of
the Systems Development Life Cycle?
1. Analysis
2. Implementation
3. Design
4. Maintenance/evaluation
At will - ANSWER-Domain 5
An employment contract without a specified length of time, in which either party can
terminate with or without cause is known as:
1. Implied
2. At will
3. Good faith
4. Tort law
Audit trails - ANSWER-Domain 2
Which security measures exists in an EHR system to provide evidence of information
system activity such as log-ins, log-outs, and file accesses?
1. Access controls
2. Audit trails
3. Password changes
4. Firewalls
Bar graph - ANSWER-Domain 3
The data display tool which can be used to accommodate nominal, ordinal, discrete,
and continuous data is the:
1. Histogram
, 2. Frequency polygram
3. Bar graph
4. Frequency distribution
Being investigated at the time of admission - ANSWER-Domain 1
the designation of POA assignment to an ICD-10-CM code include chronic conditions
impacting care; acute conditions and those:
1. Identified within 24 hours of the admission
2. Diagnosed upon discharge
3. Being investigated at the time of admission
4. Listed in the family history
Best of fit - ANSWER-Domain 4
One year ago a hospital's Radiology department implemented a state-of-the art
Radiology Information System (RIS) that met all of its requirements. The newly hired
CIO expressed concerns that this system will not meet the organization's long-term
goals as the RIS cannot be integrated with the hospital information system to be
purchased within the next year. The information technology acquisition strategy used by
the Radiology department was most likely:
1. Dual core
2. Best of breed
3. Rip and replace
4. Best of fit
Biometrics - ANSWER-Domain 2
Memorial Hospital implemented iris scanning as a new procedure for patient verification
at registration. The new security technology is known as:
1. Biometrics
2. Smart card
3. Cyptography
4. Behavior metrics
Biometrics - ANSWER-Domain 2
Which technology supports the security of information by utilizing a patient's physical
trait to verify identity?
1. Flash drive
2. Smart card
3. Picture identification
4. Biometrics
Brainstorming - ANSWER-Domain 5
One idea-generated technique used in performance improvement in exploratory
problem analysis is:
1. Flowcharts
2.Brainstorming
3.Affinity diagram
Complete Solutions
12 - ANSWER-Domain 1
The passage of FMLA in 1993 allows the employee annual unpaid time off with retained
job security to attend to family healthcare needs and childbirth. The number of weeks
granted annually is:
1. 6
2 .9
3. 12
4. 24
60 feet - ANSWER-Domain 2
The amount of work space allocation for clerical employees in square fee is
1. 60
2. 90
3. 100
4. 120
A combination of electronic and paper chart - ANSWER-Domain 1
Which of the following is the definition of a hybrid record?
1. An EHR with little access to digital ima
2. A complete electronic health record
3. A combination of electronic and paper chart
4. None of the above
Access controls - ANSWER-Domain 2
Which method uses the employees' role to determine their system security level?
1. Access controls
2. Password assignments
3. Single-ones
4. Biometric devices
Accounts payable - ANSWER-Domain 4
All of the following are examples of an asset EXCEPT:
1. Accounts Receivable
2. Inventory
3. Accounts Payable
4. Buildings
Address deficiencies through education - ANSWER-Domain 2
,A HIM manager developed performance measurements for the inpatient coding staff.
After comparing coders' performance with the standards, the manager identified
problems with the performance of one coder who is continuously making the same
coding errors. What step should the manager take next?
1. Wait to see if the same mistakes reoccur
2. Reassign to ambulatory coding
3. Issue verbal warning to the coder
4. Address deficiencies through education
An integral part of the major service - ANSWER-Domain 1
CPT defines a separate change procedure when performed in conjunction with another
service as:
1. An integral part of the major service
2. One that can be reported in conjunction with a service
3. Not fraudulent when integral to another service
4. A separate change
Analysis - ANSWER-Domain 3
A hospital considers purchasing a new hospital information system. The Information
Systems department begins to survey system users. The hospital is is which phase of
the Systems Development Life Cycle?
1. Analysis
2. Implementation
3. Design
4. Maintenance/evaluation
At will - ANSWER-Domain 5
An employment contract without a specified length of time, in which either party can
terminate with or without cause is known as:
1. Implied
2. At will
3. Good faith
4. Tort law
Audit trails - ANSWER-Domain 2
Which security measures exists in an EHR system to provide evidence of information
system activity such as log-ins, log-outs, and file accesses?
1. Access controls
2. Audit trails
3. Password changes
4. Firewalls
Bar graph - ANSWER-Domain 3
The data display tool which can be used to accommodate nominal, ordinal, discrete,
and continuous data is the:
1. Histogram
, 2. Frequency polygram
3. Bar graph
4. Frequency distribution
Being investigated at the time of admission - ANSWER-Domain 1
the designation of POA assignment to an ICD-10-CM code include chronic conditions
impacting care; acute conditions and those:
1. Identified within 24 hours of the admission
2. Diagnosed upon discharge
3. Being investigated at the time of admission
4. Listed in the family history
Best of fit - ANSWER-Domain 4
One year ago a hospital's Radiology department implemented a state-of-the art
Radiology Information System (RIS) that met all of its requirements. The newly hired
CIO expressed concerns that this system will not meet the organization's long-term
goals as the RIS cannot be integrated with the hospital information system to be
purchased within the next year. The information technology acquisition strategy used by
the Radiology department was most likely:
1. Dual core
2. Best of breed
3. Rip and replace
4. Best of fit
Biometrics - ANSWER-Domain 2
Memorial Hospital implemented iris scanning as a new procedure for patient verification
at registration. The new security technology is known as:
1. Biometrics
2. Smart card
3. Cyptography
4. Behavior metrics
Biometrics - ANSWER-Domain 2
Which technology supports the security of information by utilizing a patient's physical
trait to verify identity?
1. Flash drive
2. Smart card
3. Picture identification
4. Biometrics
Brainstorming - ANSWER-Domain 5
One idea-generated technique used in performance improvement in exploratory
problem analysis is:
1. Flowcharts
2.Brainstorming
3.Affinity diagram