ANCC Nursing Informatics Certification Review 276 Questions with Verified Answers
HIPPA only applies to organizations that have electronic health
... [Show More] records.
True
False - CORRECT ANSWER False
The Informatics nurse is involved with measure to protect the security and confidentiality of patient data because:
a. it is a joint commission mandate
b. it is regulated by HIPPA legislation
c. the major cause of security breaches is human error
d. both B and C are correct - CORRECT ANSWER d. It is regulated by HIPPA Legislation and The Major cause of security breeches is human error.
Controls to protect data privacy and integrity are both logical and:
a. physical
b. analytical
c. theoretical
d. psychological - CORRECT ANSWER b. analytical
Which of the following is not a mechanism for protecting the security of health data:
a. Automatic sign-offs
b. A Strong Password
c. Having one password per nursing unit
d. Firewalls - CORRECT ANSWER C. Having one password per nursing unit.
An audit trail is :
a. a log of which project meetings and events have been completed
b. an electronic tool that can track system access by individual user who viewed a specific client record.
c. a proactive tool to monitor who will be using a system and modifying data.
d. used primarily as a data integrity tool - CORRECT ANSWER b. an electronic tool that can track system access by individual user who viewed a specific client record.
Data can be represented by all EXCEPT:
a. text
b. audio
c. transmission waves
d. video - CORRECT ANSWER a. text
Things to consider related to disaster planning include:
a. should have only 1 database to make it easier to recover
b. all data should be stored onsite so it is accessible
c. must have a solid communication plan during disaster and recovery.
d. an association or group that shows uniformity - CORRECT ANSWER C. Must have a solid communication plan during disaster and recover.
Some examples of physical security for healthcare data are fences, walls, locks, safes, vaults, armed guards, sensors, alarms.
True
False - CORRECT ANSWER TRUE
One way to track the activity that is occurring in a system is:
a. a GANTT chart
b. an audit trail
c. a data backup
d. biometrics - CORRECT ANSWER b. an audit trail
PHI stands for :
a. physician hospital interchange
b. password hint indicator
c. potential hardware incursion
d. protected health information - CORRECT ANSWER d. Protected Health Information
If the informatics nurse is concerned that a computer system may not function well during peak times of access the type of testing needed is:
a. Functional Testing
b. System Integrated testing
c. Black box testing
d. Load volume testing - CORRECT ANSWER Load Volume Testing
What is Load Volume Testing? - CORRECT ANSWER Load/volume testing is a non-functional testing for reliability that assesses the ability of the system to function under various loads, such as at peak times when multiple users in multiple departments are accessing the system. The purpose of load/volume testing is to determine the maximum load capacity and to identify the load at which problems begin to occur. Testing is done at both the safe working load (SWL) and above the SWL.
In preparation for the workflow redesign necessitated for implementation of an EHR, the first step should be to
a. Assess the EHR requirments
b. Conduct surveys about the workflow
c. Assess compatibility with the EHR
d. Map the current workflow - CORRECT ANSWER map the current workflow
Which resource for evidence-based research is provided by the National Library of Medicine?
a. BMJ Publishing
b. CINAHL
c. PubMed
d. World View on Evidence based- nursing - CORRECT ANSWER PubMed is a resource for evidence-based research that is provided by the National Library of Medicine, which was developed by the National Center for Biotechnology Information (NCBI). PubMed provides access to numerous databases with 24 million citations from MEDLINE (the National Library of Medicine's bibliographic database with references to life sciences and biomedical sciences), life science journals, and electronic books with links to full text when it is available.
When considering transitioning to cloud storage and assessing vendors, the most critical assessment relates to:
a. regulatory compliance
b. monitoring mechanisms
c. cost analysis
d. interoperability - CORRECT ANSWER The most critical assessment relates to compliance with regulatory requirements because if the vendor cannot verify that the company meets HIPAA requirements and satisfies the Code of Federal Regulations Title 21, Part 11 (which provides regulations regarding electronic records and electronic signatures), then security of patient data may be inadequate. Other important considerations include cost analysis (including cost of implementation and ongoing costs), monitoring mechanisms, and interoperability.
When utilizing a prioritization matrix to prioritize activities as a project manager, the informatics nurse must first establish:
a. rating scale and categories
b. criteria and timeframe
c. criteria and rating scale
d. rating scale and timeframe - CORRECT ANSWER the informatics nurse must first establish criteria and a rating scale. The criteria includes those factors that are utilized to determine how important each project is; for example, a project mandated by regulations is more important than a project that may improve customer satisfaction. A rating scale for each project should be established with numeric values (such as 1 to 10) used to demonstrate how effective the project is in meeting the criteria. A typical prioritization matrix may have up to a dozen criteria.
An advantage of an identity and access management (IAM) system is that the IAM system:
a. provides HIPAA-required encryption for PHI
b. satisfies the Code of Federal Regulations Title 21, Part 11
c. meets HIPAA's Security Rule requirements regarding access to PHI
d. meets HIPAA's Privacy Rule requirements regarding identification - CORRECT ANSWER An advantage of an identity and access management (IAM) system is that the IAM system meets HIPAA's Security Rule requirements regarding access to PHI through identity management. An IAM system provides, captures, updates, and records user IDs and provides appropriate access privileges, preventing "privilege creep," which increases risks to security. The IAM system should provide authentication (single sign-in and session management), authorization (based on roles, rules, and attributes), user management (provisioning and password management), and a central directory.
When utilizing a prioritization matrix to prioritize activities as a project manager, the informatics nurse must first establish:
a. rating scale and categories
b. criteria and timeframe
c. criteria and rating scale
d. rating scale and timeframe - CORRECT ANSWER first establish criteria and a rating scale. The criteria includes those factors that are utilized to determine how important each project is; for example, a project mandated by regulations is more important than a project that may improve customer satisfaction. A rating scale for each project should be established with numeric values (such as 1 to 10) used to demonstrate how effective the project is in meeting the criteria. A typical prioritization matrix may have up to a dozen criteria.
An advantage of an identity and access management (IAM) system is that the IAM system:
a. provides HIPAA-required encryption for PHI
b. satisfies the Code of Federal Regulations Title 21, Part 11
c. meets HIPAA's Security Rule requirements regarding access to PHI
c. meets HIPAA's Privacy Rule requirements regarding identification - CORRECT ANSWER provides HIPAA-required encryption for PHI
Which of the following standardized nursing terminologies is comprised of (1) a problem classification scheme, (2) an intervention scheme, and (3) a problem rating scale for outcomes?
a. NANDA-I
b. PNDS
c. OMAHA
c. ICNP - CORRECT ANSWER OMAHA is standardized nursing terminology that is comprised of (1) a problem classification scheme, (2) an intervention scheme, and (3) a problem rating scale for outcome. OMAHA was developed by the Visiting Nurse Association in Omaha, Nebraska, in the 1970s and was later developed further through research projects funded by the US Department of Health and Human Services. OMAHA is in the public domain but must be used as published (as opposed to modified).
The smallest possible piece of data utilized in computer processing is the:
a. byte
b. zettabyte
c. nibble
d. bit - CORRECT ANSWER Bit
The smallest piece of data utilized in computer processing is the bit (binary digit), which comprises zeros (off) and ones (on). Four bits equal one nibble, eight bits equal one byte, 1024 bytes equal one kilobyte, 1024 kilobytes equal one megabyte, and 1024 megabytes equal one gigabyte.
Communication software is most commonly used for:
a. video files
b. e-mail and IM
c. audio files
d. documents - CORRECT ANSWER e-mail and IM.
The network that connects the departments in an organization is likely a(n):
a. WAN
b. VSN
c. MAN
d. LAN - CORRECT ANSWER LAN
When an institution is transitioning to a CPOE, a primary role of the informatics nurse is that of:
a. system designer
b. purchasing agent
c. liaison
d. software modifier - CORRECT ANSWER Liason - When an institution is transitioning to a CPOE, a primary role of the informatics nurse is that of liaison to promote multidisciplinary collaboration and cooperation among the various members of the healthcare team, including nurses, physicians, and IT specialists, to ensure that the end-product has the functionality that is needed for workflow and that it meets the requirements for safety and security. Needs regarding both hardware and software must be clearly communicated to IT personnel.
The field of science that attempts to create intelligent technologies and then apply these technologies to the field of informatics is:
a. cognitive science
b. information science
c. artificial intelligence
d. cognitive informatics - CORRECT ANSWER AI - Artificial Intelligence. Researchers in artificial intelligence must engineer general intelligence and reasoning skills into the artificial intelligence programs as well as the ability to develop and learn from experiences and errors and to process natural language. One example of an artificial intelligence program is Siri®, which responds to verbal queries and is found on Apple devices, such as the iPhone and iPad.
In an EHR with CPOE and CDS, allergy alerts should be triggered:
a. after orders are written
b. on physician request by accessing a link
c. before orders are written
d. in response to contraindicated drug orders - CORRECT ANSWER in response to contraindicated drug order.
The human-technology interface (HTI):
a. connects a user device to the Internet
b. allows user interaction with technology
c. standardizes applications utilized in all devices
d. allows access to the technology only to authorized people - CORRECT ANSWER Allows user interaction with technology.
The nurse informaticist (NI) is working on the implementation of a replacement laboratory system. One major consideration in order to have a fully operational system is:
A. End-user support
B. Stress testing
C. Executive level support
D. Data conversion - CORRECT ANSWER D. Data Conversion - All responses are important, but in order to move from one system to another the data needs to be moved.
The organization has agreed to be the first major test site in which software will be installed. This site is known as a/an:
A. Primary site
B. Secondary site
C. Alpha site
D. Beta site - CORRECT ANSWER D. Beta site. Beta site testing is the final stage of testing (usually before commercial release). Primary and secondary sites are not the appropriate terms and alpha site is an initial phase of testing often used in development of software.
The Informatics Nurse Specialist is developing a test scenario to determine if the admissions, discharge, and transfer application will work with the clinical documentation and laboratory results reporting modules of a larger electronic health record. This is known as:
A. Unit testing
B. Acceptance testing
C. Integration testing
D. System Testing - CORRECT ANSWER C. Integration testing - Integration testing is testing between systems. Unit testing only tests one discrete function and acceptance testing occurs when users test entire system to determine if the system meets the specified requirements of the design.
The implementation team has determined that the conversion to the new system will occur department by department, with two weeks in between each installation. This is known as:
A. Parallel installation
B. Phased installation
C. Big bang installation
D. Risky installation - CORRECT ANSWER b. phase installation - Phased installation is when the implementation is done in stages, where one phase leads to another.
Parallel installation defined: - CORRECT ANSWER Parallel installation occurs when old and new system are implemented simultaneously, and the 2 systems run simultaneously (i.e. paper and electronic, "old" system and "new" system).
Which of the following is NOT a major phase in implementation and testing?
A. Education and Training
B. Conversion and "Go Live
C. Operations and Language Barriers
D. Implementation Strategies - CORRECT ANSWER C. Operations and language barriers
Rationale: Operations and Language Barriers are not a major phase in implementation and testing.
In a formal plan for implementation and testing it is not necessary to include:
A. Team members
B. Vendor representatives
C. Executive Staff
D. Crisis Coaches - CORRECT ANSWER Crisis coaches.
Formal Plan must include: - Staff - Team members - Vendors - Executive staff - External resources
A domain is:
A. A copy of the software system, or environment, in a particular state
B. An implementation strategy involving reiteration
C. A go-live conversion factor involving conversion discrepancies
D. A data storage device - CORRECT ANSWER A. A copy of the software system, or environment, in a particular state.
Rationale: A domain is a copy of the software system, or environment, in a particular state. For example, test system (or domain); development system (or domain), training system and production system.
"Bugs" in computer language are not really insects, but
A. A testing methodology
B. Commentary within the code indicated with an asterisk (*)
C. Aberrancies and failures in the system
D. The nickname of the coder who designed the first EHR - CORRECT ANSWER c. Abberancies
Rationale: "Bugs" in computer language are defined as aberrancies and failures in the system or a coding error.
System and Functional Testing:
A. Does not include security testing of databases
B. Is done in an ad hoc fashion as staff are available
C. Addresses cultural impacts of new processes
D. Includes multiple subsystems and phases of testing - CORRECT ANSWER D. includes multiple subsystems and phases of testing.
Rationale: Systems are usually made up of subsystems and all must be tested. System and Functional Testing must include security testing and must be structured and controlled. Cultural impacts of new processes is not an aspect of testing.
When the SDLC is done correctly:
A. All steps are done in order for all areas.
B. End users have final say on all aspects of the project.
C. There is a formal change management process throughout to address new information as it comes to light.
D. There is only one phase of implementation. - CORRECT ANSWER There is a formal change management process throughout to address new information as it comes to light. Change management is vital to the installation of a system. There may be several phases, particularly during a phased approach and end-users do not have final say on all aspects of the project and not all steps are done in order for all areas.
What are the pieces that require ongoing evaluation?
A. Hardware and software
B. Interfaces and integrations
C. Support
D. All of the above - CORRECT ANSWER d. all of the above. Ongoing evaluation is needed on all aspects of the system - hardware, software, interfaces and integrations (which are software), and support. Support can include training as well as help desk operations.
Financial evaluation should:
A. Have the maximum budget finalized prior to assessment and purchases of priority items conformed to that ceiling, which will not be adjusted
B. Involve primarily clinicians working to design the system
C. Include both tangible and intangible costs
D. Focus on costs for stages one and two primarily - CORRECT ANSWER C. Include both tangible and intangible costs
Which is NOT true about backup and recovery:
A. Use multiple backup devices
B. Perform backups on Wednesdays during peak use
C. Use full backups to minimize the time to restore databases
D. Test the backups periodically to make sure data can be restored - CORRECT ANSWER B. Perform backups on Wednesdays during peak use
Rationale: Backups do not need to happen on a particular day of the week. In practice it is best to backup during periods of least use.
The Informatics Nurse is concerned with user support. Procedure manuals will be developed that will:
A. Include policies that are changed by the system
B. Describe how to perform business tasks while using the system
C. Provide step-by-step instructions on how to program the applications
D. Outline security controls in the system - CORRECT ANSWER B. Describe how to perform business tasks while using the system
Rationale: Users will need to know how to perform their job using the automated system. Most users will not be involved in programming the applications, only using them.
During the evaluation phase which of the following tools are used for construction and consistency?
A. Setting defaults
B. Amending the database
C. Formatting and transferring data
D. All of the above - CORRECT ANSWER D. all of the above
Rationale: All of the above are tools used for construction and consistency.
Which of the following is NOT part of documentation testing?
A. Proofreading
B. Subscriber color preferences
C. Readability and accuracy
D. Punctuation and grammar - CORRECT ANSWER B. subscriber color preferences.
Rationale: Subscriber color preferences is an aspect of usability, not documentation testing.
Quality Monitoring:
A. Focuses on audit trails to see who is accessing which patient data
B. Is one single methodology
C. Does not include integration and interfaces
D. Is part of system performance maintenance strategies - CORRECT ANSWER D. Is part of system performance maintenance strategies.
Rationale: Quality monitoring may include audit trails, but it is more than one methodology. It is a component of a system performance maintenance strategy.
Evaluation and support:
A. Should be outlined in the original project plan as an ongoing process.
B. Are unnecessary once the implementation is complete.
C. Does not require dedicated resources.
D. Can be done by assigned super users - CORRECT ANSWER a. Should be outlined in the original project plan as an ongoing process.
Rationale: Evaluation is a major component of the system design life cycle and planning for evaluation should be included in the original project plan.
Work flow:
A. Almost never changes with the implementation of a system
B. Is reflected solely in policies and procedures
C. Changes in many ways including culture, productivity, and clinical practice during an implementation
D. Can be determined by individual departments and specialties - CORRECT ANSWER C. Changes in many ways including culture, productivity, and clinical practice during an implementation
Rationale: Workflow WILL change with the implementation of the system and is more than simply documenting policies and procedures. The workflow must be determined organization-wide and not be left to individual departments as systems and processes must be integrated.
Which is NOT a type of maintenance?
A. Corrective
B. Preventative
C. Flexible
D. Emergent - CORRECT ANSWER C. Flexible
Rationale: According to the chart in the Module, three types of maintenance are corrective, preventative, and emergent.
What are the techniques that apply algorithms for extracting patterns from data stored in data warehouses that are typically not apparent to human decision makers are known as:
A. Data mining or knowledge discovery in databases.
B. Statistical generation from warehoused data
c. Evidence generation from warehoused data
d. Data retrieval and cleansing - CORRECT ANSWER A. Data mining or knowledge discovery in databases
There is no examples of wisdom in nursing practice, as it is merely a theoretical concept.
True
False - CORRECT ANSWER FALSE.
Rationale: wisdom is defined as understanding, applying and applying with compassion. An example is selecting a protocol to caring for a patient based on patient preferences.
What kind of information might be included in a clinical practice guideline?
a. typically written as narrative
b. background material an evidence
c. ranking of strength of evidence
d. All of the above. - CORRECT ANSWER D. All of the above: Rationale: a CPG is typically written as a narrative text providing background material and evidence. The strength of that evidence is ranked.
Which of the following use a knowledge base and set of rules to analyze data and provide recommendations?
a. knowledge generator
b. decision support systems
c. wisdom wizards
d. benchmarkers - CORRECT ANSWER Decision Support Systems (DSS)
Rationale a DSS uses a knowledge base and a set of rules to analyze data and provide recommendations.
Benchmarking is:
a. drawing a line in a doorway at the organization to monitor organizational growth
b. a way of finding best practices
c. comparing one organization to another
d. both B & C - CORRECT ANSWER D. Both B & C. Benchmarking is defined as a way of finding best practices and then comparing ones organization against another.
CDSS stands for:
a. corporate decision support silos
b. clinical decision support systems
c. client decision support systems
c. customer service support systems - CORRECT ANSWER b. clinical decision support systems
Wisdom is :
a. information that is used to identify relationships
b. the recognition of patterns in data
c. the use of knowledge to solve problems
c. the use of decision support systems - CORRECT ANSWER b. the recognition of patterns in data
The next step in complexity above information is:
a. knowledge
b. wisdom
c. data
d. compliance - CORRECT ANSWER a. knowledge
These come together in decision support systems:
a. data and information
b. information and knowledge
c. knowledge and wisdom
d. data and knowledge - CORRECT ANSWER B. information and knowledge
The major difference between Decision support systems (DSS) and Expert systems (ES) is:
a. a DSS uses rules and ES uses queries
b. that they are synonymous
c. DSS is a step up or more complex than ES
d. That a DSS leaves the ultimate decision to the decision maker and the ES selects the best solution. - CORRECT ANSWER d. That a DSS leaves the ultimate decision to the decision maker and the ES selects the best solution.
What are three clinical decision systems areas in which decision assistance can be found?
A. Test solutions, monitoring actions, change in condition
B. Optimizing process flow and workflow, monitoring actions, intake and output
C. Intake and output, change in condition, choice of treatmen___Incorrect
D. Choice of treatment, test solutions, monitoring actions - CORRECT ANSWER A. maybe????
Benchmarking is:
A. Taking information and comparing it to another's data to identify strengths and weaknesses Correct
B. Using information from other facilities to identify if they have better reimbursement than your facility
C. Comparing one nurse to another in different hospitals
D. A method used to develop decision support systems - CORRECT ANSWER A. Taking information and comparing it to another's data to identify strengths and weaknesses [Show Less]