ANCC Nursing Informatics Certification Review 276 Questions with Verified Answers
HIPPA only applies to organizations that have electronic health
... [Show More] records.
True
False - CORRECT ANSWER False
The Informatics nurse is involved with measure to protect the security and confidentiality of patient data because:
a. it is a joint commission mandate
b. it is regulated by HIPPA legislation
c. the major cause of security breaches is human error
d. both B and C are correct - CORRECT ANSWER d. It is regulated by HIPPA Legislation and The Major cause of security breeches is human error.
Controls to protect data privacy and integrity are both logical and:
a. physical
b. analytical
c. theoretical
d. psychological - CORRECT ANSWER b. analytical
Which of the following is not a mechanism for protecting the security of health data:
a. Automatic sign-offs
b. A Strong Password
c. Having one password per nursing unit
d. Firewalls - CORRECT ANSWER C. Having one password per nursing unit.
An audit trail is :
a. a log of which project meetings and events have been completed
b. an electronic tool that can track system access by individual user who viewed a specific client record.
c. a proactive tool to monitor who will be using a system and modifying data.
d. used primarily as a data integrity tool - CORRECT ANSWER b. an electronic tool that can track system access by individual user who viewed a specific client record.
Data can be represented by all EXCEPT:
a. text
b. audio
c. transmission waves
d. video - CORRECT ANSWER a. text
Things to consider related to disaster planning include:
a. should have only 1 database to make it easier to recover
b. all data should be stored onsite so it is accessible
c. must have a solid communication plan during disaster and recovery.
d. an association or group that shows uniformity - CORRECT ANSWER C. Must have a solid communication plan during disaster and recover.
Some examples of physical security for healthcare data are fences, walls, locks, safes, vaults, armed guards, sensors, alarms.
True
False - CORRECT ANSWER TRUE
One way to track the activity that is occurring in a system is:
a. a GANTT chart
b. an audit trail
c. a data backup
d. biometrics - CORRECT ANSWER b. an audit trail
PHI stands for :
a. physician hospital interchange
b. password hint indicator
c. potential hardware incursion
d. protected health information - CORRECT ANSWER d. Protected Health Information
If the informatics nurse is concerned that a computer system may not function well during peak times of access the type of testing needed is:
a. Functional Testing
b. System Integrated testing
c. Black box testing
d. Load volume testing - CORRECT ANSWER Load Volume Testing
What is Load Volume Testing? - CORRECT ANSWER Load/volume testing is a non-functional testing for reliability that assesses the ability of the system to function under various loads, such as at peak times when multiple users in multiple departments are accessing the system. The purpose of load/volume testing is to determine the maximum load capacity and to identify the load at which problems begin to occur. Testing is done at both the safe working load (SWL) and above the SWL.
In preparation for the workflow redesign necessitated for implementation of an EHR, the first step should be to
a. Assess the EHR requirments
b. Conduct surveys about the workflow
c. Assess compatibility with the EHR
d. Map the current workflow - CORRECT ANSWER map the current workflow
Which resource for evidence-based research is provided by the National Library of Medicine?
a. BMJ Publishing
b. CINAHL
c. PubMed
d. World View on Evidence based- nursing - CORRECT ANSWER PubMed is a resource for evidence-based research that is provided by the National Library of Medicine, which was developed by the National Center for Biotechnology Information (NCBI). PubMed provides access to numerous databases with 24 million citations from MEDLINE (the National Library of Medicine's bibliographic database with references to life sciences and biomedical sciences), life science journals, and electronic books with links to full text when it is available.
When considering transitioning to cloud storage and assessing vendors, the most critical assessment relates to:
a. regulatory compliance
b. monitoring mechanisms
c. cost analysis
d. interoperability - CORRECT ANSWER The most critical assessment relates to compliance with regulatory requirements because if the vendor cannot verify that the company meets HIPAA requirements and satisfies the Code of Federal Regulations Title 21, Part 11 (which provides regulations regarding electronic records and electronic signatures), then security of patient data may be inadequate. Other important considerations include cost analysis (including cost of implementation and ongoing costs), monitoring mechanisms, and interoperability.
When utilizing a prioritization matrix to prioritize activities as a project manager, the informatics nurse must first establish:
a. rating scale and categories
b. criteria and timeframe
c. criteria and rating scale
d. rating scale and timeframe - CORRECT ANSWER the informatics nurse must first establish criteria and a rating scale. The criteria includes those factors that are utilized to determine how important each project is; for example, a project mandated by regulations is more important than a project that may improve customer satisfaction. A rating scale for each project should be established with numeric values (such as 1 to 10) used to demonstrate how effective the project is in meeting the criteria. A typical prioritization matrix may have up to a dozen criteria.
An advantage of an identity and access management (IAM) system is that the IAM system:
a. provides HIPAA-required encryption for PHI
b. satisfies the Code of Federal Regulations Title 21, Part 11
c. meets HIPAA's Security Rule requirements regarding access to PHI
d. meets HIPAA's Privacy Rule requirements regarding identification - CORRECT ANSWER An advantage of an identity and access management (IAM) system is that the IAM system meets HIPAA's Security Rule requirements regarding access to PHI through identity management. An IAM system provides, captures, updates, and records user IDs and provides appropriate access privileges, preventing "privilege creep," which increases risks to security. The IAM system should provide authentication (single sign-in and session management), authorization (based on roles, rules, and attributes), user management (provisioning and password management), and a central directory.
When utilizing a prioritization matrix to prioritize activities as a project manager, the informatics nurse must first establish:
a. rating scale and categories
b. criteria and timeframe
c. criteria and rating scale
d. rating scale and timeframe - CORRECT ANSWER first establish criteria and a rating scale. The criteria includes those factors that are utilized to determine how important each project is; for example, a project mandated by regulations is more important than a project that may improve customer satisfaction. A rating scale for each project should be established with numeric values (such as 1 to 10) used to demonstrate how effective the project is in meeting the criteria. A typical prioritization matrix may have up to a dozen criteria.
An advantage of an identity and access management (IAM) system is that the IAM system:
a. provides HIPAA-required encryption for PHI
b. satisfies the Code of Federal Regulations Title 21, Part 11
c. meets HIPAA's Security Rule requirements regarding access to PHI
c. meets HIPAA's Privacy Rule requirements regarding identification - CORRECT ANSWER provides HIPAA-required encryption for PHI
Which of the following standardized nursing terminologies is comprised of (1) a problem classification scheme, (2) an intervention scheme, and (3) a problem rating scale for outcomes?
a. NANDA-I
b. PNDS
c. OMAHA
c. ICNP - CORRECT ANSWER OMAHA is standardized nursing terminology that is comprised of (1) a problem classification scheme, (2) an intervention scheme, and (3) a problem rating scale for outcome. OMAHA was developed by the Visiting Nurse Association in Omaha, Nebraska, in the 1970s and was later developed further through research projects funded by the US Department of Health and Human Services. OMAHA is in the public domain but must be used as published (as opposed to modified).
The smallest possible piece of data utilized in computer processing is the:
a. byte
b. zettabyte
c. nibble
d. bit - CORRECT ANSWER Bit
The smallest piece of data utilized in computer processing is the bit (binary digit), which comprises zeros (off) and ones (on). Four bits equal one nibble, eight bits equal one byte, 1024 bytes equal one kilobyte, 1024 kilobytes equal one megabyte, and 1024 megabytes equal one gigabyte.
Communication software is most commonly used for:
a. video files
b. e-mail and IM
c. audio files
d. documents - CORRECT ANSWER e-mail and IM.
The network that connects the departments in an organization is likely a(n):
a. WAN
b. VSN
c. MAN
d. LAN - CORRECT ANSWER LAN
When an institution is transitioning to a CPOE, a primary role of the informatics nurse is that of:
a. system designer
b. purchasing agent
c. liaison
d. software modifier - CORRECT ANSWER Liason - When an institution is transitioning to a CPOE, a primary role of the informatics nurse is that of liaison to promote multidisciplinary collaboration and cooperation among the various members of the healthcare team, including nurses, physicians, and IT specialists, to ensure that the end-product has the functionality that is needed for workflow and that it meets the requirements for safety and security. Needs regarding both hardware and software must be clearly communicated to IT personnel.
The field of science that attempts to create intelligent technologies and then apply these technologies to the field of informatics is:
a. cognitive science
b. information science
c. artificial intelligence
d. cognitive informatics - CORRECT ANSWER AI - Artificial Intelligence. Researchers in artificial intelligence must engineer general intelligence and reasoning skills into the artificial intelligence programs as well as the ability to develop and learn from experiences and errors and to process natural language. One example of an artificial intelligence program is Siri®, which responds to verbal queries and is found on Apple devices, such as the iPhone and iPad.
In an EHR with CPOE and CDS, allergy alerts should be triggered:
a. after orders are written
b. on physician request by accessing a link
c. before orders are written
d. in response to contraindicated drug orders - CORRECT ANSWER in response to contraindicated drug order.
The human-technology interface (HTI):
a. connects a user device to the Internet
b. allows user interaction with technology
c. standardizes applications utilized in all devices
d. allows access to the technology only to authorized people - CORRECT ANSWER Allows user interaction with technology.
The nurse informaticist (NI) is working on the implementation of a replacement laboratory system. One major consideration in order to have a fully operational system is:
A. End-user support
B. Stress testing
C. Executive level support
D. Data conversion - CORRECT ANSWER D. Data Conversion - All responses are important, but in order to move from one system to another the data needs to be moved.
The organization has agreed to be the first major test site in which software will be installed. This site is known as a/an:
A. Primary site
B. Secondary site
C. Alpha site
D. Beta site - CORRECT ANSWER D. Beta site. Beta site testing is the final stage of testing (usually before commercial release). Primary and secondary sites are not the appropriate terms and alpha site is an initial phase of testing often used in development of software.
The Informatics Nurse Specialist is developing a test scenario to determine if the admissions, discharge, and transfer application will work with the clinical documentation and laboratory results reporting modules of a larger electronic health record. This is known as:
A. Unit testing
B. Acceptance testing
C. Integration testing
D. System Testing - CORRECT ANSWER C. Integration testing - Integration testing is testing between systems. Unit testing only tests one discrete function and acceptance testing occurs when users test entire system to determine if the system meets the specified requirements of the design.
The implementation team has determined that the conversion to the new system will occur department by department, with two weeks in between each installation. This is known as:
A. Parallel installation
B. Phased installation
C. Big bang installation
D. Risky installation - CORRECT ANSWER b. phase installation - Phased installation is when the implementation is done in stages, where one phase leads to another.
Parallel installation defined: - CORRECT ANSWER Parallel installation occurs when old and new system are implemented simultaneously, and the 2 systems run simultaneously (i.e. paper and electronic, "old" system and "new" system).
Which of the following is NOT a major phase in implementation and testing?
A. Education and Training
B. Conversion and "Go Live
C. Operations and Language Barriers
D. Implementation Strategies - CORRECT ANSWER C. Operations and language barriers
Rationale: Operations and Language Barriers are not a major phase in implementation and testing.
In a formal plan for implementation and testing it is not necessary to include:
A. Team members
B. Vendor representatives
C. Executive Staff
D. Crisis Coaches - CORRECT ANSWER Crisis coaches.
Formal Plan must include: - Staff - Team members - Vendors - Executive staff - External resources
A domain is:
A. A copy of the software system, or environment, in a particular state
B. An implementation strategy involving reiteration
C. A go-live conversion factor involving conversion discrepancies
D. A data storage device - CORRECT ANSWER A. A copy of the software system, or environment, in a particular state.
Rationale: A domain is a copy of the software system, or environment, in a particular state. For example, test system (or domain); development system (or domain), training system and production system.
"Bugs" in computer language are not really insects, but
A. A testing methodology
B. Commentary within the code indicated with an asterisk (*)
C. Aberrancies and failures in the system
D. The nickname of the coder who designed the first EHR - CORRECT ANSWER c. Abberancies
Rationale: "Bugs" in computer language are defined as aberrancies and failures in the system or a coding error.
System and Functional Testing:
A. Does not include security testing of databases
B. Is done in an ad hoc fashion as staff are available
C. Addresses cultural impacts of new processes
D. Includes multiple subsystems and phases of testing - CORRECT ANSWER D. includes multiple subsystems and phases of testing.
Rationale: Systems are usually made up of subsystems and all must be tested. System and Functional Testing must include security testing and must be structured and controlled. Cultural impacts of new processes is not an aspect of testing.
When the SDLC is done correctly:
A. All steps are done in order for all areas.
B. End users have final say on all aspects of the project.
C. There is a formal change management process throughout to address new information as it comes to light.
D. There is only one phase of implementation. - CORRECT ANSWER There is a formal change management process throughout to address new information as it comes to light. Change management is vital to the installation of a system. There may be several phases, particularly during a phased approach and end-users do not have final say on all aspects of the project and not all steps are done in order for all areas.
What are the pieces that require ongoing evaluation?
A. Hardware and software
B. Interfaces and integrations
C. Support
D. All of the above - CORRECT ANSWER d. all of the above. Ongoing evaluation is needed on all aspects of the system - hardware, software, interfaces and integrations (which are software), and support. Support can include training as well as help desk operations.
Financial evaluation should:
A. Have the maximum budget finalized prior to assessment and purchases of priority items conformed to that ceiling, which will not be adjusted
B. Involve primarily clinicians working to design the system
C. Include both tangible and intangible costs
D. Focus on costs for stages one and two primarily - CORRECT ANSWER C. Include both tangible and intangible costs
Which is NOT true about backup and recovery:
A. Use multiple backup devices
B. Perform backups on Wednesdays during peak use
C. Use full backups to minimize the time to restore databases
D. Test the backups periodically to make sure data can be restored - CORRECT ANSWER B. Perform backups on Wednesdays during peak use
Rationale: Backups do not need to happen on a particular day of the week. In practice it is best to backup during periods of least use.
The Informatics Nurse is concerned with user support. Procedure manuals will be developed that will:
A. Include policies that are changed by the system
B. Describe how to perform business tasks while using the system
C. Provide step-by-step instructions on how to program the applications
D. Outline security controls in the system - CORRECT ANSWER B. Describe how to perform business tasks while using the system
Rationale: Users will need to know how to perform their job using the automated system. Most users will not be involved in programming the applications, only using them.
During the evaluation phase which of the following tools are used for construction and consistency?
A. Setting defaults
B. Amending the database
C. Formatting and transferring data
D. All of the above - CORRECT ANSWER D. all of the above
Rationale: All of the above are tools used for construction and consistency.
Which of the following is NOT part of documentation testing?
A. Proofreading
B. Subscriber color preferences
C. Readability and accuracy
D. Punctuation and grammar - CORRECT ANSWER B. subscriber color preferences.
Rationale: Subscriber color preferences is an aspect of usability, not documentation testing.
Quality Monitoring:
A. Focuses on audit trails to see who is accessing which patient data
B. Is one single methodology
C. Does not include integration and interfaces
D. Is part of system performance maintenance strategies - CORRECT ANSWER D. Is part of system performance maintenance strategies.
Rationale: Quality monitoring may include audit trails, but it is more than one methodology. It is a component of a system performance maintenance strategy.
Evaluation and support:
A. Should be outlined in the original project plan as an ongoing process.
B. Are unnecessary once the implementation is complete.
C. Does not require dedicated resources.
D. Can be done by assigned super users - CORRECT ANSWER a. Should be outlined in the original project plan as an ongoing process.
Rationale: Evaluation is a major component of the system design life cycle and planning for evaluation should be included in the original project plan.
Work flow:
A. Almost never changes with the implementation of a system
B. Is reflected solely in policies and procedures
C. Changes in many ways including culture, productivity, and clinical practice during an implementation
D. Can be determined by individual departments and specialties - CORRECT ANSWER C. Changes in many ways including culture, productivity, and clinical practice during an implementation
Rationale: Workflow WILL change with the implementation of the system and is more than simply documenting policies and procedures. The workflow must be determined organization-wide and not be left to individual departments as systems and processes must be integrated.
Which is NOT a type of maintenance?
A. Corrective
B. Preventative
C. Flexible
D. Emergent - CORRECT ANSWER C. Flexible
Rationale: According to the chart in the Module, three types of maintenance are corrective, preventative, and emergent.
What are the techniques that apply algorithms for extracting patterns from data stored in data warehouses that are typically not apparent to human decision makers are known as:
A. Data mining or knowledge discovery in databases.
B. Statistical generation from warehoused data
c. Evidence generation from warehoused data
d. Data retrieval and cleansing - CORRECT ANSWER A. Data mining or knowledge discovery in databases
There is no examples of wisdom in nursing practice, as it is merely a theoretical concept.
True
False - CORRECT ANSWER FALSE.
Rationale: wisdom is defined as understanding, applying and applying with compassion. An example is selecting a protocol to caring for a patient based on patient preferences.
What kind of information might be included in a clinical practice guideline?
a. typically written as narrative
b. background material an evidence
c. ranking of strength of evidence
d. All of the above. - CORRECT ANSWER D. All of the above: Rationale: a CPG is typically written as a narrative text providing background material and evidence. The strength of that evidence is ranked.
Which of the following use a knowledge base and set of rules to analyze data and provide recommendations?
a. knowledge generator
b. decision support systems
c. wisdom wizards
d. benchmarkers - CORRECT ANSWER Decision Support Systems (DSS)
Rationale a DSS uses a knowledge base and a set of rules to analyze data and provide recommendations.
Benchmarking is:
a. drawing a line in a doorway at the organization to monitor organizational growth
b. a way of finding best practices
c. comparing one organization to another
d. both B & C - CORRECT ANSWER D. Both B & C. Benchmarking is defined as a way of finding best practices and then comparing ones organization against another.
CDSS stands for:
a. corporate decision support silos
b. clinical decision support systems
c. client decision support systems
c. customer service support systems - CORRECT ANSWER b. clinical decision support systems
Wisdom is :
a. information that is used to identify relationships
b. the recognition of patterns in data
c. the use of knowledge to solve problems
c. the use of decision support systems - CORRECT ANSWER b. the recognition of patterns in data
The next step in complexity above information is:
a. knowledge
b. wisdom
c. data
d. compliance - CORRECT ANSWER a. knowledge
These come together in decision support systems:
a. data and information
b. information and knowledge
c. knowledge and wisdom
d. data and knowledge - CORRECT ANSWER B. information and knowledge
The major difference between Decision support systems (DSS) and Expert systems (ES) is:
a. a DSS uses rules and ES uses queries
b. that they are synonymous
c. DSS is a step up or more complex than ES
d. That a DSS leaves the ultimate decision to the decision maker and the ES selects the best solution. - CORRECT ANSWER d. That a DSS leaves the ultimate decision to the decision maker and the ES selects the best solution.
What are three clinical decision systems areas in which decision assistance can be found?
A. Test solutions, monitoring actions, change in condition
B. Optimizing process flow and workflow, monitoring actions, intake and output
C. Intake and output, change in condition, choice of treatmen___Incorrect
D. Choice of treatment, test solutions, monitoring actions - CORRECT ANSWER A. maybe????
Benchmarking is:
A. Taking information and comparing it to another's data to identify strengths and weaknesses Correct
B. Using information from other facilities to identify if they have better reimbursement than your facility
C. Comparing one nurse to another in different hospitals
D. A method used to develop decision support systems - CORRECT ANSWER A. Taking information and comparing it to another's data to identify strengths and weaknesses
How is wisdom defined by Nursing Informatics: Scope and Standards of Practice?
A. Being an expert in the field of informatics
B. Using data to interpret outcomes for the leaders of the organization
C. Understanding data and knowledge and applying the knowledge with compassion
D. Understanding data and knowledge to improve outcomes - CORRECT ANSWER C. Understanding data and knowledge and applying the knowledge with compassion
While caring for a 40-year old patient with terminal cancer, the key area of the clinical practice guideline is to:
A. Reduce waste of resources, assist in telling your patient what is going to happen and eliminate errors
B. Show the nurse what to do for the patient with a terminal illness
C. Assist the patient with questions to ask the nurse about the cause of cancer
D. Encourage best practice, eliminate errors and reduce unjustified practice variations - CORRECT ANSWER D. Encourage best practice, eliminate errors and reduce unjustified practice variations
One of the steps in creating a clinical practice guideline is to:
A. Identify what has always been done in the facility
B. Review evidence-based studies
C. Discuss what is the easiest process to meet the goal
D. Send out a survey about what is currently being practiced - CORRECT ANSWER B. Review evidence-based studies
What type of information should be included in the clinical practice guideline?
A. Background material and evidence ranking of strength of evidence
B. Ranking of strength of evidence and age of the information
C. The orders the doctor should write
D. How long the patient will be in the hospital - CORRECT ANSWER A. Background material and evidence ranking of strength of evidence
What is one metastructure to help organize information management and knowledge generation specific to nursing informatics?
A. Knowledge, wisdom and data
B. Wisdom
C. Data
D. Wisdom conceptual framework, knowledge, information and data - CORRECT ANSWER D. Wisdom conceptual framework, knowledge, information and data
The key to interpreting data is:
A. It must be meaningful
B. It must be organized so that patterns and relationships are apparent
C. It must be current
D. It must be specific to the outcomes being reviewed - CORRECT ANSWER B. It must be organized so that patterns and relationships are apparent
ICD-10, The Omaha System, and Clinical Care Classification (CCC) are all examples of which of the following?
A. Raw data
B. Nomenclatures
C. Standardized terminologies
D. Clinical practice guidelines - CORRECT ANSWER C. Standardized terminologies
What is the difference between a data warehouse and a data mart?
A. Data warehouses are large collections of data from several different sources and data marts are where the data is purchased.
B. Data warehouses are large collections of data from several different sources and data marts are smaller collections that could be from a single department.
C. Data warehouses are where hospitals find how well they are doing and data marts are where the information is inputted.
D. Data warehouses are large collections of data from one source which are then sent out to data marts. - CORRECT ANSWER B. Data warehouses are large collections of data from several different sources and data marts are smaller collections that could be from a single department.
Information in a data warehouse can be used to:
A. Support decision support systems and executive information systems
B. Support hospital billing and revenue cycles
C. Dispel myths about the cost of care
D. Dispel the need for decision support systems and executive information systems - CORRECT ANSWER A. Support decision support systems and executive information systems
Data mining in knowledge data discovery (KDD) allows providers to:
A. Follow up on the providers' attendance record to meetings
B. Find out who has the most patients in their practice
C. Apply algorithms for extracting patterns that are not typically apparent to human decision makers Correct
D. Find the best time to take a patient out of the intensive care unit - CORRECT ANSWER C. Apply algorithms for extracting patterns that are not typically apparent to human decision makers
The transformation and analysis of information must go through validation before being used. What is information validation?
A. Process to ensure information in data warehouse is correct, reliable and consistent
B. Process to ensure information in data warehouse is from the correct facility
C. Process to ensure information in data warehouse is from the correct time submission
D. Process to ensure information in data warehouse is correct and from the correct charts - CORRECT ANSWER A. Process to ensure information in data warehouse is correct, reliable and consistent
Adult learners who repeatedly cancel attending classes on the new computer system could be classified as which type of adopter?
A. Early Adopters
B. Early Majority
C. Innovators
D. Late Adopters - CORRECT ANSWER D. Late Adopters
What is the foundational process that a nurse uses in care of patients?
A. Information Science
B. Nursing Science
C. Organizational Theory
D. Computer Science - CORRECT ANSWER B. Nursing Science
What is the foundation of knowledge?
A. Information
B. Wisdom
C. Data
D. Bits - CORRECT ANSWER a. information
What is the foundation of wisdom?
A. Information
B. Knowledge
C. Data
D. Bytes - CORRECT ANSWER B. Knowledge
What is data?
a. alphanumeric characters
b. discrete entities that are described objectively without interpretation
c. groups of numbers without context
d. information that has not yet been categorized - CORRECT ANSWER a. alphanumeric characters ???
What is information?
A. The building blocks of wisdom
B. Organized alphanumeric characters
C. Data that are interpreted, organized or structured
D. Data that is used to support decision-making - CORRECT ANSWER C. data that are interpreted, organized and structured.
What is knowledge?
A. The sum of information
B. The categorization of data
C. Information that has been explained and understood
D. Information that is synthesized so that relationships are identified and formalized - CORRECT ANSWER D. Information that is synthesized so that relationships are identified and formalized
Metastructures are:
A. Large buildings used in health care
B. Illnesses that impact an entire population
C. Overarching concepts used in theory and science
D. Theorems used to solve nursing problems - CORRECT ANSWER C. Overarching concepts used in theory and science
One set of vital signs is an example of:
A. Knowledge
B. Information
C. Opinion
D. Wisdom - CORRECT ANSWER B. Information
Nursing terminology is:
A. A body of the terms used in nursing
B. The words used that are common to nursing
C. Terminology not used by other disciplines
D. The foundation of nursing care plans - CORRECT ANSWER A. A body of the terms used in nursing
Which is NOT considered a factor that makes nursing informatics a professional discipline in nursing?
A. Concern with the phenomena of the discipline of nursing
B. Varied definitions about scope of practice
C. Defined competencies for the area of specialty nursing practice
D. A body of research in the specialty - CORRECT ANSWER B. Varied definitions about scope of practice
Nursing informatics is a specialty that integrates which of the following into nursing practice?
A. Nursing science with multiple information management and analytical sciences
B. Nursing science, patient outcomes, data containment
C. Computer science, patient outcomes, data containment
D. Information management, data regulation, nursing science - CORRECT ANSWER A. Nursing science with multiple information management and analytical sciences
Decision making involves:
A. Understanding the data that is presented
B. Using decision support tools
C. Cognitive processing that results in selecting a choice
D. Using wisdom gained from data to make the correct choice - CORRECT ANSWER C. Cognitive processing that results in selecting a choice
The HITECH act and HIPAA Privacy and Security rules are intended to:
A. Prevent access to patient records
B. Provide patients with greater access and control over their PHI
C. Allow patients to access their PHI at any time
D. Prevent anyone other than the direct caregiver from accessing PHI - CORRECT ANSWER B. Provide patients with greater access and control over their PHI ???
Workflow is:
a. a group of steps or tasks
b. related tasks that produce an outcome
c. a progression of actions that fulfill a distinct work process
d. a process from start to end - CORRECT ANSWER d. a process from start to end
Which of the following may be a legal issue involved in telehealth?
A. Ethical issues regarding the effectiveness of treatment in remote locations
B. Practitioner licenses may not allow for care when the patient is in another state
C. Differing cultural values regarding healthcare
D. Inability to effectively diagnose and treat patients located in another geographic area - CORRECT ANSWER B. Practitioner licenses may not allow for care when the patient is in another state
Usability refers to:
A. The efficiency and effectiveness of an application
B. The location and accessibility of the hardware
C. The use of ergonomic concepts
D. Enhancing the computer skills of end users - CORRECT ANSWER A. The efficiency and effectiveness of an application
Which of the following is NOT one of the approaches to the system development life cycle?
A. Waterfall
B. Rapid prototyping
C. Dynamic development
D. Object-oriented system development - CORRECT ANSWER A. Waterfall
_____________ is a teaching strategy for educating staff that involves face-to-face and online learning.
A. Virtual learning
B. Web-based learning
C. Group learning
D. Hybrid learning - CORRECT ANSWER D. Hybrid learning
During the analysis phase of the systems development lifecycle, which of the following occurs?
A. The system is designed.
B. The implementation education is planned.
C. Organizational needs are assessed.
D. Work flows and business practices are examined. - CORRECT ANSWER D. workflows and business practices are examined
During the feasibility stage of the SDLC, which of the following occurs?
A. Workflows are examined for match to the organization.
B. The project plan and estimated budgets are determined.
C. Interface mapping occurs to identify compatibility.
D. Beta testing is completed to provide user acceptance. - CORRECT ANSWER B. The project plan and estimated budgets are determined
Integration testing involves:
A. Testing by combining software modules to test as a group
B. Testing the flow of data across all interfaces
C. Testing to determine the effectiveness of the workflow design
D. Testing that is done by all disciplines charting on the same practice patient - CORRECT ANSWER B. Testing the flow of data across all interfaces
The waterfall SDLC model is:
A. Sequential
B. Iterative
C. Input driven
D. Output driven - CORRECT ANSWER A. sequential
All of the following are ways to determine the best type of system implementation for your organization EXCEPT:
A. Analyze the project
B. Consider combining strategies
C. Assess your resources
D. Avoid combining strategies - CORRECT ANSWER D. Avoid combining strategies
Which of the following is a feature of system enhancement?
A. Planned by vendor
B. Packaged with other enhancements
C. Requested by staff or informatics
D. Automatically included with system purchase - CORRECT ANSWER C. Requested by staff or informatics
Which of the following lists the steps of the planning structure in the correct order, starting with the first step?
A. Identify a planning need, determine preliminary resource list, establish goals and timeline
B. Establish goals and timeline, identify a planning need, determine preliminary resource list
C. Establish goals and timeline, identify a planning need, identify stakeholders
D. Identify a planning need, identify stakeholders, establish goals and timeline - CORRECT ANSWER A. Identify a planning need, determine preliminary resource list, establish goals and timeline. ???
A clinical information system contains the following process:
A. Input, processing, outputs
B. Input, processing, outputs, analysis
C. Outputs, inputs, processing, analysis
D. Processing, inputs, outputs - CORRECT ANSWER A. Input, processing, outputs
In an organization, the CTO is responsible for:
A. Information technology infrastructure
B. Information processing and data security
C. Application of informatics within the system
D. Technologic research and development within the organization - CORRECT ANSWER D. Technologic research and development within the organization.
Information science is concerned with:
A. The stability and security of the technical infrastructure in an organization in order to facilitate the effective retrieval of information
B. Obtaining, gathering, organizing, manipulating, managing, storing, retrieving, recapturing, disposing of, distributing or broadcasting information
C. The management and application of information in a methodical and systematic manner to facilitate the practice of professionals in a healthcare setting
D. The design and use of specific data-capturing capabilities that facilitate and enhance the input and output of healthcare data - CORRECT ANSWER B. Obtaining, gathering, organizing, manipulating, managing, storing, retrieving, recapturing, disposing of, distributing or broadcasting information
In order for information to be meaningful, it must be:
A. Organized, categorized, quantified, identified, evidence-based, and verified
B. Accessible, accurate, timely, complete, cost effective, flexible, reliable, relevant, simple, verifiable and secure
C. Available, informational, descriptive, reliable, divisible, secure, controlled, reportable, meaningful and visible
D. Approved, practice-based, multidisciplinary, reportable, secured, graphical, input, alphabetical or numeric, standardized and statistical - CORRECT ANSWER A. Organized, categorized, quantified, identified, evidence-based, and verified
Information science is the:
A. Study of the application and use of knowledge in organizations
B. Infrastructure that supports the management of data
C. Exploration of the transition of data to wisdom
D. Combination of information and science - CORRECT ANSWER A. Study of the application and use of knowledge in organizations
Integrated clinical decision support tools can include:
A. Alerts, reminders, guidelines, information retrieval, order sets protocols
B. Nursing-specific documentation forms and drop down lists
C. Advanced order sets with nursing specific content
D. Access to online journal articles relevant to patient care - CORRECT ANSWER A. Alerts, reminders, guidelines, information retrieval, order sets protocols
The human-technology interface includes the:
A. Keyboard and mouse
B. Processor
C. Network
D. Power system - CORRECT ANSWER a. keyboard and mouse
Which of the following is a computer in a network with the ability to access shared resources and files through a server?
A. Client
B. Peripheral device
C. Bus
D. Modem - CORRECT ANSWER a. client
During project discussions about workflow, it is realized that there is insufficient information immediately available to complete the discussion regarding the future state of the system. Which of these would be used to track this item?
1. Gap analysis
2. Parking lot
3. Needs Assessment
4. Process flow - CORRECT ANSWER The correct answer is the parking lot. When you have insufficient information or resources to make a decision, it goes onto the parking lot for follow up. Once you know where you are (current state) and where you are going (future state) you can develop a gap analysis. Current and future states are often mapped out in process flows (sometimes called workflows). Once you have a gap analysis, you can do a needs assessment to determine what you need to do to get to future state.
1. If the informatics nurse is concerned that a computer system may not function well during peak times of access, the type of testing needed is:
a. functional testing
b. black box testing
c. system integration testing
d. load/volume testing - CORRECT ANSWER d. load/volume testing
Rationale: This is a non-functional testing for reliability that assesses the ability of the system to function under various loads, such as at peak times when multiple users in multiple departments are accessing the system. The purpose of load/volume testing is to determine the maximum load capacity and to identify the load at which problems begin to occur. Testing is done at both the safe working load (SWL) and above the SWL. [Show Less]