Page 1 of 61
WGU D220 OA EXAM WITH COMPLETE 300+
QUESTIONS AND CORRECT ANSWERS JUST
RELEASED THIS YEAR
Question: 1. What is an effective way to reduce the risk of access of electronic protected health
information (ePHI) by unauthorized users - CORRECT ANSWER✔✔Make sure all the users
adhere to security & confidential policy set forth by the facility
Question: 2. Which information in a patient's electronic medical record (EMA), in addition to
the nursing flowsheets & provider orders, helps a nurse plan & manage fluctuations in blood
glucose levels - CORRECT ANSWER✔✔MAR
Question: 3. A nurse is planning the care for a patient admitted to the hospital with COVID-19
Which list of information in the electronic medical record (EMR) will help the nurse plan the
care for this patient - CORRECT ANSWER✔✔The patient's laboratory results over the last 72
hours
Question: 4. Which clinical note type is exempt from being shared with patients according to
the United States Core Data for Interoperability (USC DI) standards - CORRECT
ANSWER✔✔Psychotherapy notes
, Page 2 of 61
Question: 5. Operating room (OR) staff are reliant upon a manual white board for patient
tracking. Recently, surgeons have complained that the turnaround time between surgical cases
has increased & blame the manual tracking system. An informatics nurse recommends
expanding use of the existing surgical information system (SIS). Which resolution can improve
this workflow issue - CORRECT ANSWER✔✔Radio frequency identification (RFID) in patient
labels
Question: 6. An informatics nurse & an emergency nurse are conducting an analysis of a patient
admission from the ER - CORRECT ANSWER✔✔Which tool should these nurses use for a process
analysis? SWOT template
Question:7. Which information in an electronic medical record (EMP) helps a nurse plan &
manage a patient's post-operative care after open-heart surgery - CORRECT
ANSWER✔✔Provider orders
Question: 8. How does a healthcare policy assure access to health information by authorized
users - CORRECT ANSWER✔✔It creates a reliable method to verify the identities of users
accessing health information
Question: 9. Which statement describes the application of meaningful use - CORRECT
ANSWER✔✔Provider needs to show the use of the Electronic Health Record (EHR) technology
, Page 3 of 61
Question: 10. What is the typical role of the informatics nurse - CORRECT ANSWER✔✔Plans,
coordinates, & facilitates education for all computer applications & software for nursing or
clinical user group
Question: 11. A patients glucose blood sugar is 400. What is a one-time kind of report -
CORRECT ANSWER✔✔Ad Hoc
Question: 12. Which clinical information technology enables providers to document patient
assessments - CORRECT ANSWER✔✔Vitals signs capture
Question: 13. A patient is being transferred to another hospital, however the hospital he is
being transferred to does not have access to the Electronic Health Record (EHR) since they use
EPIC. How will they receive his Electronic Health Record (EHR) - CORRECT
ANSWER✔✔Continuity care record from AMR
Question: 14. Which statement best describes Nursing Informatics - CORRECT
ANSWER✔✔"Computer science, decision science, information science, management science,
cognitive science, & organizational theory."
Question: 15. The nurse receives report that there are new orders to review. Where does the
nurse look to verify this information - CORRECT ANSWER✔✔The Kardex
, Page 4 of 61
Question: 16. What is the goal of Merit-Based Incentive Payment System (MIPS) & Meaningful
Use (MU) - CORRECT ANSWER✔✔Patient quality care
Question: 17. What is a type of phishing - CORRECT ANSWER✔✔Trojan
Question: 18. What is Data governance - CORRECT ANSWER✔✔Defines who can take what
action, upon what data, in what situations, using what methods
Question: 19. A provider at the hospital had his laptop stolen from his vehicle. What should be
on his laptop to protect it from data breach - CORRECT ANSWER✔✔Encryption
Question: 20. What is the name of the process that begins with conception & continues
through implementation - CORRECT ANSWER✔✔Systems Development Life Cycle (SDLC)
Question: 21. What is the intent of the Clinical Decision Support (CDS) System - CORRECT
ANSWER✔✔This is an application that supports healthcare practitioners in making patient-care
decisions
Question: 22. What is the term for sharing a person's personal information with other
individuals electronically - CORRECT ANSWER✔✔Information sharing
WGU D220 OA EXAM WITH COMPLETE 300+
QUESTIONS AND CORRECT ANSWERS JUST
RELEASED THIS YEAR
Question: 1. What is an effective way to reduce the risk of access of electronic protected health
information (ePHI) by unauthorized users - CORRECT ANSWER✔✔Make sure all the users
adhere to security & confidential policy set forth by the facility
Question: 2. Which information in a patient's electronic medical record (EMA), in addition to
the nursing flowsheets & provider orders, helps a nurse plan & manage fluctuations in blood
glucose levels - CORRECT ANSWER✔✔MAR
Question: 3. A nurse is planning the care for a patient admitted to the hospital with COVID-19
Which list of information in the electronic medical record (EMR) will help the nurse plan the
care for this patient - CORRECT ANSWER✔✔The patient's laboratory results over the last 72
hours
Question: 4. Which clinical note type is exempt from being shared with patients according to
the United States Core Data for Interoperability (USC DI) standards - CORRECT
ANSWER✔✔Psychotherapy notes
, Page 2 of 61
Question: 5. Operating room (OR) staff are reliant upon a manual white board for patient
tracking. Recently, surgeons have complained that the turnaround time between surgical cases
has increased & blame the manual tracking system. An informatics nurse recommends
expanding use of the existing surgical information system (SIS). Which resolution can improve
this workflow issue - CORRECT ANSWER✔✔Radio frequency identification (RFID) in patient
labels
Question: 6. An informatics nurse & an emergency nurse are conducting an analysis of a patient
admission from the ER - CORRECT ANSWER✔✔Which tool should these nurses use for a process
analysis? SWOT template
Question:7. Which information in an electronic medical record (EMP) helps a nurse plan &
manage a patient's post-operative care after open-heart surgery - CORRECT
ANSWER✔✔Provider orders
Question: 8. How does a healthcare policy assure access to health information by authorized
users - CORRECT ANSWER✔✔It creates a reliable method to verify the identities of users
accessing health information
Question: 9. Which statement describes the application of meaningful use - CORRECT
ANSWER✔✔Provider needs to show the use of the Electronic Health Record (EHR) technology
, Page 3 of 61
Question: 10. What is the typical role of the informatics nurse - CORRECT ANSWER✔✔Plans,
coordinates, & facilitates education for all computer applications & software for nursing or
clinical user group
Question: 11. A patients glucose blood sugar is 400. What is a one-time kind of report -
CORRECT ANSWER✔✔Ad Hoc
Question: 12. Which clinical information technology enables providers to document patient
assessments - CORRECT ANSWER✔✔Vitals signs capture
Question: 13. A patient is being transferred to another hospital, however the hospital he is
being transferred to does not have access to the Electronic Health Record (EHR) since they use
EPIC. How will they receive his Electronic Health Record (EHR) - CORRECT
ANSWER✔✔Continuity care record from AMR
Question: 14. Which statement best describes Nursing Informatics - CORRECT
ANSWER✔✔"Computer science, decision science, information science, management science,
cognitive science, & organizational theory."
Question: 15. The nurse receives report that there are new orders to review. Where does the
nurse look to verify this information - CORRECT ANSWER✔✔The Kardex
, Page 4 of 61
Question: 16. What is the goal of Merit-Based Incentive Payment System (MIPS) & Meaningful
Use (MU) - CORRECT ANSWER✔✔Patient quality care
Question: 17. What is a type of phishing - CORRECT ANSWER✔✔Trojan
Question: 18. What is Data governance - CORRECT ANSWER✔✔Defines who can take what
action, upon what data, in what situations, using what methods
Question: 19. A provider at the hospital had his laptop stolen from his vehicle. What should be
on his laptop to protect it from data breach - CORRECT ANSWER✔✔Encryption
Question: 20. What is the name of the process that begins with conception & continues
through implementation - CORRECT ANSWER✔✔Systems Development Life Cycle (SDLC)
Question: 21. What is the intent of the Clinical Decision Support (CDS) System - CORRECT
ANSWER✔✔This is an application that supports healthcare practitioners in making patient-care
decisions
Question: 22. What is the term for sharing a person's personal information with other
individuals electronically - CORRECT ANSWER✔✔Information sharing