C468 Information Management and Application of Technology
System security involves protection against
A) poor system design
B) noncompliant
... [Show More] users
C) deliberate attacks, errors, omissions, disasters, and viruses
D) vendor breech of support contract -Answer- C) deliberate attacks, errors, omissions, disasters, and viruses
Which of the following is a mechanism that logs a user off the system after a specified period of inactivity on the terminal or computer?
A) automatic sign-off
B) remote access
C) automatic access
D) automatic password protection -Answer- A) automatic sign-off
The sharing of private information in a situation in which a relationship has been established for the purpose of treatment, or delivery of services, with the understanding that this information will remain protected is _____________?
A) information privacy
B) privacy
C) confidentiality
D) information system security -Answer- C) confidentiality
____________ is a combination of hardware and software that forms a barrier between systems, or different parts of a single system to protect those systems from unauthorized access.
A) Antivirus software
B) Firewall
C) Physical security
D) Application security -Answer- B) Firewall
The ability to use a health enterprise's information system from outside locations such as a physician's office is known as ___________.
A) remote access
B) automatic access
C) system connectivity
D) auto connectivity -Answer- A) remote access
What are the driving forces behind the Health Information Exchange (HIE) movement?
A) provider demands for cost containment
B) international demands
C) healthcare insurance reform
D) federal legislation, and demands for safer, more efficient healthcare -Answer- D) federal legislation, and demands for safer, more efficient healthcare
How do Health Information Exchanges (HIEs) impact healthcare delivery?
A) HIEs have the capacity to improve the quality of care delivered by decreasing access to records
B) HIEs have limited impact at this time
C) HIEs increase the efficiency and potentially the quality of the healthcare delivery system
D) HIEs have not been shown to impact the safety of care delivered -Answer- C) HIEs increase the efficiency and potentially the quality of the healthcare delivery system
Information and data privacy
A) provide protection for healthcare information only
B) includes the right to choose the conditions and extent to which information is shared
C) are best maintained through paper backups
D) only applies when a HIPAA release form is signed -Answer- B) includes the right to choose the conditions and extent to which information is shared
The Health Information Technology for Economic and Clinical Health Act (HITECH) is known for all of the following except:
A) Including a privacy rule establishing national standards for protecting health information
B) Funded workforce training, and new technology research and development in HIT
C) Ensured the collection of aggregate data that could be used to improve policy decisions relative to allocation of services and population health
D) Provided funds and incentives to increase the adoption of EHRs by providers -Answer- A) Including a privacy rule establishing national standards for protecting health information
The SWOT analysis is conducted in what phase of information system life cycle?
A) evaluation phase
B) monitoring and control phase
C) implementation phase
D) strategic planning phase -Answer- D) strategic planning phase
Training documents are developed and user training occurs in which phase of the project management life cycle (PMLC)?
A) evaluation phase
B) design/plan phase
C) implementation phase
D) monitoring and control phase -Answer- C) implementation phase
Maintenance of an information system includes all of the following except ____________.
A) problem solving and debugging
B) training end users
C) performing file-backup procedures
D) updating security protections -Answer- B) training end users
Who determines the project implementation strategy?
A) the system analyst
B) the [Show Less]