FACHE Week 1 – 6 Questions & Answers
Health Insurance Portability & Accountability Act (HIPAA) is a Federal Law designed to facilitate the
electronic
... [Show More] exchange of information in health care. Which of the following does not pertain to this law?
a) Privacy protection components of the law limit non-consensual use as a release or private health
information
b) Patients must receive notice of privacy rights
c) Restrictions on access to and use of information is required
d) Criminal and civil sanctions do not exist for improper use and di - Correct Ans-D
Separate computer systems are often linked together in order to share data and information. When all
components of the network are located within close proximity of one another, perhaps within a single
facility, the network known as a:
a) Wide Area Network (WAN)
b) World Wide Web (WWW)
c) Local Area Network (LAN)
d) Electronic Data Interchange (EDI) - Correct Ans-C
Healthcare organizations had established standards to maintain data security and protect the privacy
and confidentiality of patients' records information. Which one of the following answers does not
describe its data security elements:
a) Protect against system failures
b) Protect against external catastrophic events
c) Facilitate access to computer files to authorized personnel
d) Control access to computer files by unauthorized personnel - Correct Ans-C
W Client/server architecture back-end (server) functions include all of the following except:
a) Printing
b) Applications program execution
c) Decision support
d) Communication - Correct Ans-C
Star networks have an advantage of:
a) Relative ease of wiring the network and relatively fast communications
b) Facilitating construction of high spend networks that operate over large distances
c) Ease with which nodes can be added to an existing network
d) Require less cabling than networks using other topologies - Correct Ans-C. 1-refers to Bus networks, 2
refers to ring networks, and 4 is incorrect because Star networks require more cabling than other
networks
Advantages of outsourcing include all of the following except,
a) Staffing reductions
b) Increased implementation time
c) Smaller capital investments
d) More predictable costs - Correct Ans-B
Although purchasing or leasing commercial software is most common, what is becoming a viable source
of information technology and systems for smaller healthcare organizations?
a) In house design and programming
b) Outsourcing
c) ASP-applications service provider
d) Combining Outsourcing and in-house design - Correct Ans-C
Which of the following is NOT one of the three general categories of information systems used in
healthcare organizations:
a) Clinical Information Systems
b) Composite Healthcare Systems
c) Administrative/Financial Systems
d) Decision Support Systems for Strategic Management - Correct Ans-B
A comprehensive information security policy should include all of the following elements except:
a) Management Policies
b) Data back up and recovery
c) Physical security
d) Technical controls - Correct Ans-B
Which of the following is NOT part of the System Development Life Cycle?
a) System Analysis
b) System Adjustment
c) System Implementation
d) System Acquisition - Correct Ans-B
The Information Services Advisory Committee provides insight into user needs and helps gain
acceptance of information systems. Which of the following is NOT a charge of the committee:
a) Encouraging appropriate use of information services
b) Ranking information services investment opportunities and recommending a rank-ordered list of
proposals to the governing board.
c) Providing technical support to implement an integrated information system.
d) Monitoring performance of the department and sugg - Correct Ans-C
One of the functions of an IS system is to ensure the integrity, quality, and security of data. Which of the
following does not fall in this content area?
Continues... [Show Less]