Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Medicine & Health Science
Q:
The master patient index (MPI) is a database that lists all identifiers assigned to one client in all the information systems used within an enterprise. It assigns a global identification number for each client and allows clients to be identified by demographic information provided at the point of care. When the MPI cannot match a client's record based on demographic data, what is provided to the user?
1. The data dictionary resources
2. Non-citizen information so that the user may find a different identifier
3. All possible matches so that the user may view and select
4. The Social Security number
Q:
The master patient index (MPI) saves work because vital information can be obtained from the database rather than rekeyed with each client visit. This decreases the possibility of making a mistake and eliminates the inadvertent creation of duplicate records. Which of the following are key features of an effective MPI?
Standard Text: Select all that apply.
1. It is flexible enough to allow inclusion of additional identification.
2. It facilitates the evaluation of client care.
3. It locates records in real time for timely retrieval of information.
4. It is easily reconfigured to accommodate network changes.
5. It can grow to fit an organization of any size.
Q:
The term interoperability is used when discussing the large scale electronic exchange of health care information across enterprises for the purpose of accessing and maintaining longitudinal health records. The term interoperability is understood to mean which of the following?
Standard Text: Select all that apply.
1. Has the ability to exchange the structure of the data, but not the meaning of data
2. Has the ability to exchange the structure of data and meaning of data
3. Has the ability to exchange the meaning of data, but not the structure of data
4. Is the ability of two entities, whether human or machine, to exchange and use data
5. It is accurate to use the term interoperabilityinterchangeably with the term interface
Q:
Which of the following measures are recommended for enhancing information security?
Standard Text: Select all that apply.
1. File deletion software is used to overwrite hard disk files, using meaningless information.
2. Storage media that has been erased is disposed of in the dumpster.
3. Individuals routinely witness and record the destruction of records.
4. Papers such as prescriptions, laboratory specimen labels, and identification bracelets are disposed of in the dumpster.
5. Each page of output is assigned a serial number and the numbers are recorded when documents are destroyed.
Q:
What are the benefits of data integration?
Standard Text: Select all that apply.
1. Potential for improved remote access of clinical data from various systems
2. Trend analysis of financial and clinical data
3. Encouraging the use of systems customized to meet department specifications
4. Development of a computer-based patient record
5. Facilitation of data collection for accreditation purposes
Q:
Which of the following is the protection of information against threats to its integrity, inadvertent disclosure, or availability?
1. Information security
2. Survivability
3. Confidentiality
4. Privacy
Q:
Which of the following answers are factors that slow systems integration?
Standard Text: Select all that apply.
1. Vendors' false claims that their information systems are interoperable with other systems
2. Unrealistic institutional timetable set due to a lack of understanding of the complexity of the integration process.
3. Vendors who do not provide enough support and assistance to facilitate the integration efforts.
4. Existing systems are insufficiently documented.
5. Merged institutions do not agree on which systems to use.
Q:
During an attempted carjacking, the female victim slams a car door on the male assailant's hand, possibly causing serious injuries. The assailant runs away. Local police contact the emergency department of a local hospital to determine if anyone matching the assailant's description has been treated for a hand injury. The hospital reveals that they currently have such a patient. The police ask the nurse manager to reveal the identity of the patient. It is noted that no court order has been issued. The nurse manager asks the patient to sign a consent form that allows the hospital to reveal his name and does mention the police. If the patient signs the consent form, what would it be considered?
1. Informed consent
2. Consent
3. HIPAA violation
4. Breech of privacy
Q:
A female client goes to the clinic's office complaining of a cough and fever. She gives her name and date of birth at the admitting registration desk. The registration clerk verifies her current address and asks if she is still covered by IVY insurance. Client responds yes, is given a chart with the number 3948JAV04830 on it, and is directed to the physician's exam room. The physician orders a chest x-ray. The client is sent to the radiology department and checks in with the registration desk. The registration clerk verifies her current address and asks if she is still covered by IVY insurance. The client responds yes and is given an order sheet with the number 3948JAV04830 on it. The admitting office for the clinic and the radiology office use different information systems. The process depicted in this scenario illustrates the use of which of the following?
1. Uniform language
2. Master patient index
3. Data dictionary
4. Clinical data repository
Q:
Which of the following is a state of mind, a specific place, freedom from intrusion, or control over the exposure of self or of personal information?
1. Privacy
2. Confidentiality
3. Security
4. HIPAA
Q:
Which of these is accurate about the Health Insurance Portability and Accountability Act (HIPAA) Security Rule and the use of technology?
1. Does not specify the use of particular technology
2. Refers to the Joint Commission standards for technology
3. Specifies the utilization of HIPAA approved technology
4. Provides a monthly Web-based list of approved technology
Q:
During the course of client care, the 21-year-old client tells the nurse that she had an abortion last year but that no one in her family knows. Which of these terms best describes the situation?
1. Consent
2. Privacy
3. Security
4. Confidentiality
Q:
An overlay occurs when one individual is assigned in the master patient index to another individual's health record. A health care facility has discovered that an overlay has occurred resulting in invalid data being stored in key identifying fields. Which of the following information security areas does this breach affect?
1. Survivability
2. Integrity
3. Availability
4. Inadvertent disclosure
Q:
Survivability is the capability of a system as a whole to fulfill its mission, in a timely manner, in the presence of attacks, failures, or accidents. United States Hospitals (USH) is a large national hospital corporation with processing centralized at their headquarters. USH is reviewing their information security plan. Part of their mission is to provide emergency services to each regional area during catastrophic events. Which of the following indicate that survivability has been specifically considered in the plan?
Standard Text: Select all that apply.
1. One hospital in each regional area has multiple sources of communication with USH central processing.
2. Emergency power generators for all associate hospitals are tested and serviced each week
3. Each night the system at USH central processing is backed up and stored in a remote location.
4. One hospital in each regional area has an emergency protocol in place for communicating directly with the Department of Homeland Security.
5. One hospital in each regional area is especially prepared to maintain information system functionality for the emergency, operating room, lab, and pharmacy units.
Q:
Which one of the following passwords provides the most information and system security?
1. StJohns3821
2. p#3J24q7
3. p#5N24p7#hN5
4. p#3J24q7?hN5
Q:
E-mail is an efficient means of disseminating information quickly and inexpensively. However, HIPAA regulations affect e-mail use and routing infrastructures. When may potentially sensitive information be sent via e-mail?
1. Client's consent was obtained to send information via e-mail
2. Recipient is known to the sender
3. E-mail is sent encrypted.
4. Organization's e-mail system has appropriate firewalls
Q:
A nurse practitioner (NP) approaches a computer terminal at the local health care facility. In order to gain access to client information, the NP must first slide a smartcard through a card reader and then place a finger on a scanner. Which authentication measures were used to verify the NP's authorization to access client data?
Standard Text: Select all that apply.
1. Appearance of the user's name on a screen
2. Biometric authentication
3. Picture authentication package
4. Proximity radio authentication
5. Encrypted pass key authentication
Q:
Software that tracks system access by users, creates a(n) ____ that can reveal unusual activity or inappropriate use of information.
Standard Text:
Q:
Which of the following methods can be incorporated when planning training programs that may alleviate anxiety among the staff?
Standard Text: Select all that apply.
1. Hands-on demonstration
2. Bulletin board messages
3. Use of tent cards
4. Review of newsletter articles
5. Administrative role modeling
Q:
Why do most breaches of confidentiality occur?
1. Malicious behavior
2. System hacking
3. Intent
4. Carelessness
Q:
How can the trainer create an environment in which the staff will retain the information?
1. Train when employees do not have clinical duties
2. Train immediately before a clinical shift
3. Plan training to begin after clinical shifts
4. Plan training for employees' days off
Q:
A certified nursing assistant (CNA) at a local nursing home logs on to the facility's clinical information system. The CNA can only see information about the clients that were assigned by the registered nurse for that day. The CNA cannot see financial data regarding any of the assigned clients. This situation is an example of which of the following?
1. Password protection
2. Computer forensics
3. Access levels
4. User authentication
Q:
_______________ are generated by an information system to warn of missing information or data entry errors.
Standard Text:
Q:
A(n) ____________________ is one of the greatest threats that may come from inside sources, namely employees, contractors, consultants, outsourced services, and vendors who view information inappropriately, disrupt information availability, or corrupt data integrity.
Standard Text:
Q:
___________________ refers to a situation where the end-user is logged in to the information system but is unable to enter or process data.
Standard Text:
Q:
Passwords are a common means to authenticate access to automated records. Which of the following are recommendations for password selection and use?
Standard Text: Select all that apply.
1. Using software to test and eliminate easily compromised passwords
2. Using the browser "password save" feature
3. Deleting and replacing all system user passwords when an employee is terminated
4. Storing passwords in a file on the computer
5. Using the same password for access to all sites or systems
Q:
The _________________ of an information systems training evaluation strategy is to collect subjective participant feedback about the learning experience, identify pre- and post-training skill gaps, and measure knowledge and performance of the stated learning objectives.
Standard Text:
Q:
Which of the following best represents the purpose of training evaluation?
1. Training should be evaluated after the fifth session.
2. Training evaluation is necessary after the class.
3. Training evaluation alters methodology.
4. All super users have the opportunity to evaluate the training process.
Q:
The cost of a new or upgraded system can be burdensome on an organization from a budgetary perspective. Which of the following statements can be considered a return on investment?
1. Employees express satisfaction with their jobs and turnover rate is low.
2. Staff with IT skills is more marketable and have greater job flexibility.
3. The newly trained individual can be granted work release time to train new staff members.
4. After the training, the objectives have not been met.
Q:
The best time to train an end-user is which of the following?
1. Before the system goes live
2. Upon notice that there will be an upgrade
3. After the system goes live
4. As soon as the vendor has been selected
Q:
Which of the following is not a factor to consider when selecting a trainer?
1. Teaching skills
2. Ability to interact
3. Experience with process outcomes
4. Educational approach
Q:
Which of the following factors should be considered when selecting a training site?
Standard Text: Select all that apply.
1. Classroom cost
2. Network connectivity
3. Classroom capacity
4. Training environment
5. Cabling and wiring
Q:
Which of the following describes the philosophical differences between the trainer's and educator's role?
1. Trainers are concerned with outcomes only whereas educators are concerned strictly with the educational process.
2. Trainers focus on behavior change through skill acquisition while concentrate on learning, thinking, and problem solving as a way to change behavior.
3. Any employee can be a trainer whereas an individual must have an advanced degree to be an educator.
4. Trainers rely on skill acquisition through learning, thinking, and problem solving as a way to change behavior, while educators rely on behavioral psychology which focuses on behavior change.
Q:
End-user training classes should be created for which of the following?
1. Physicians, residents, nurse practitioners, and physician assistants
2. Physicians and nurse practitioners only
3. Point-of-care staff only
4. Physicians and staff nurses only
Q:
Which of the following defines project scope?
1. Project scope encompasses the entire life cycle.
2. Project scope describes the details of the system functionality that is slated for automation.
3. Project scope is part of the system implementation process.
4. Project scope is defined by the super users.
Q:
Which form of training would best fit the needs of a night shift worker (11 p.m. to 7 a.m.)?
1. An online tutorial that can be accessed when it fits worker's time off
2. A Listserv set up for e-mail comments and questions
3. A three-hour video that can be run during the worker's shift
4. A full-day workshop that starts shortly after the end of the shift
Q:
Which of the following statements is true about blended learning?
1. The use of blended learning should be appropriate for the content.
2. The use of blended learning is not appropriate for super user training.
3. Blended learning is too complicated for training sessions.
4. Blended learning should only be used for point-of-care staff.
Q:
Which statement regarding the training approach is true?
1. Users may choose online multimedia or online tutorials to enhance retention.
2. Computer-based training should be used whenever data entry is required.
3. Blended learning is popular because it is appropriate for almost any content need.
4. Instructor-led training is still the best approach even though it is now less prevalent.
Q:
Which of the following describes the use of an advanced organizer?
1. The use of an advanced organizer is a way to guide the instruction, manage time, and allow for logical breaks in the classroom instruction.
2. The use of an advanced organizer is a methodological approach to patient care.
3. The use of an advanced organizer is a tethered health information systems.
4. The use of an advanced organizer is an excellent way to prepare novice nurses for their role at the point of care.
Q:
The most essential knowledge for a staff nurse end-user are which of the following?
Standard Text: Select all that apply.
1. Basic equipment troubleshooting procedures
2. Backing up the computer system at the end of each shift
3. Error message content recognition
4. Protocol for dealing with system "freezes" and "crashes"
5. Data entry error log review
Q:
____________________ are employees who are proficient in the use of the information system and can serve as mentors to other end-users in their department.
Standard Text:
Q:
Among the following computer-related policies, which of the following are appropriate?
Standard Text: Select all that apply.
1. A nursing student shared confidential lab results obtained from the system at the request of one of the student's relatives. The policy is to dismiss the student from the clinical site.
2. Both students and employees sign documents that explain the consequence of termination for misuse of the system.
3. Access codes are assigned to authenticate each individual user's identity and may not be shared with anyone.
4. A radiology student makes a copy of a client's MRI report to prepare for the next days clinical. The copy is accidentally left in the waiting room and found by a staff member. The policy is to dismiss the student from the clinical site.
5. Once trained and entered into the system, employees may sign other users in under their access code for documentation purposes when necessary.
Q:
Among the following, which defines the process for determining health care worker information systems training needs?
Standard Text: Select all that apply.
1. User classes are used to refine the types of training courses needed for system implementation.
2. End-users are identified and grouped by job class responsibilities.
3. Training needs of each job class are determined according to what functions each end-user will perform.
4. Training is delivered based upon what administrators decide to automate first.
5. User class is defined and categorized as the personnel who perform similar functions.
Q:
Which of the following are considered steps for identifying training needs?
Standard Text: Select all that apply.
1. Identify user needs
2. Determine content
3. Establishing learning objectives
4. Deciding teaching approach
5. Create evaluation strategy
Q:
Among the following, which indicate that an organization has identified and is managing human factors in the work environment?
Standard Text: Select all that apply.
1. Classroom question and answer periods are regularly kept to a strict limit of five minutes.
2. Tent cards with name and unit of trainees are placed in the classroom at each meeting.
3. Administrators meet with unit supervisors and not staff for fear of intimidating them during the critical implementation phase.
4. A series of noon meetings (lunch provided) called "LunchBytes" are offered for demonstrations and discussion sessions.
5. An article announcing the implementation of the new system and recognizing the staff appears in the local paper.
Q:
_________________________ is a process approach that allows for a full range of evaluation tools, technology, and techniques.
Standard Text:
Q:
A trainer uses the following learning plan: An e-mail push is used for the announcement, a Webinar (Web-based seminar) is used for an overview session, simulations are used for self-paced learning, instant messaging is used for query resolution, a Web meeting is used for demonstration, simulation is used for practice, e-mail is used for feedback, another Webinar is used for a closing session, and a Web-based test is used for evaluation. Identify which training strategy was used for the learning plan.
1. Mixed learning
2. Blended learning
3. Comprehensive learning
4. Flexible learning
Q:
Which of the following are specific factors to consider when selecting a training method?
Standard Text: Select all that apply.
1. Time required to develop program
2. Cost of development and training
3. Application training strategies
4. Learning styles of trainees
5. Learning retention strategies
Q:
Which of the following topics should be included in training class content?
Standard Text: Select all that apply.
1. Computer-related policies
2. Access privileges
3. Computer literacy
4. Error correction
5. System idiosyncrasies
Q:
Which of the following makes training is most effective?
1. It occurs during the nurse's scheduled shift
2. When measurable objectives are employed
3. Training is conducted on the staff's day off
4. Another staff member conducts the session
Q:
Which of the following provides the most effective end-user learning experience?
1. Real client data are utilized for realistic practice.
2. The equipment used for training is the same used in the clinical setting.
3. Two employees share each workstation for mutual encouragement.
4. The live system is used with simulated client data.
Q:
Which of the following is a key element for a successful system implementation?
1. Effective training
2. Incorporating data dictionaries at every terminal
3. Providing a help desk during the day shift
4. Finding a ancillary staff member to assist in trouble shooting the new system
Q:
A proficiency examination is planned to ensure that employees have the requisite knowledge to use a new wireless system. Which statement indicates the best use of testing?
1. Testing is criterion-referenced to evaluate predetermined system competencies.
2. Computer testing is done using a multiple-choice question format.
3. Predetermined competencies are determined by comparing class averages.
4. Norm-referenced testing is used to ensure the most successful employees keep their position.
Q:
Implementation of any system can be facilitated by the committee's understanding of the amount of time that is needed to successfully complete the project. To that end, what is an important staffing concept for administration to consider when appointing members to a technology committee?
1. Committee member must equally divide duties to complete tasks.
2. Committee members should meet more than once a week to complete tasks.
3. All member of the committee need a comprehensive technology background.
4. Relevant committee members can be given alternate work assignments to accommodate the increase in committee work.
Q:
How should health care student training most efficiently be handled by an institution?
1. Each nursing student receives the same amount of training as the staff nurse on the unit.
2. Practical or vocational nursing students are placed in the user class with LPNs or LVNs to access information and document client care.
3. Students must be trained to provide appropriate clinical information to an assigned staff nurse, who will document client care in the system.
4. Students assess and document client care and medication administration by giving their information to the clinical instructor to input into the system.
Q:
Soon after the go-live event, ____________ from the implementation evaluation should be acted on in a timely manner.
Standard Text:
Q:
The training of students often takes the same amount of time and resources as employee training. Which of the following are the most appropriate uses of the computer system for a nursing student assigned to a cardiac unit?
Standard Text: Select all that apply.
1. Order lab tests
2. Document medication administration
3. Document client care
4. Document health assessment findings
5. View test results
Q:
A _________________________ is an excellent and low-tech method to solicit feedback after a system has been implemented.
Standard Text:
Q:
Which of the following statements regarding computer-based training (CBT) are true?
Standard Text: Select all that apply.
1. The accompanying materials require little trainer attention beforehand.
2. Retention is enhanced because technology is used to teach technology.
3. CBT facilitates mastery learning.
4. Vendor-supplied materials require no specific customization.
5. CBT is less costly to develop and revise.
Q:
The ongoing maintenance of the technical issues is the role of which of the following departments?
1. Nursing
2. Information services department
3. Computer programmers
4. Vice president of technology
Q:
A large portion of ongoing maintenance is related to technical and ____________________ issues.
Standard Text:
Q:
Which of the following considerations point to the need for a new system?
Standard Text: Select all that apply.
1. Poor performance
2. Frequent down times
3. Up to date programming language
4. No vendor support
5. Outmoded technology
Q:
Which of the following statements is true about the life cycle?
1. The life cycle has a beginning and an end.
2. The life cycle is ongoing.
3. The life cycle is not relevant to system purchase or upgrades.
4. The life cycle has six distinctive steps.
Q:
Which description best fits a work breakdown structure (WBS)?
1. A project planning software program is selected for use by the steering committee to assist in planning needed changes.
2. The implementation committee learns about the capabilities of a new wireless system.
3. A timeline is developed to determine who will do necessary tasks for the implementation of each project phase.
4. A committee is formed to guide the implementation of a new wireless system.
Q:
Communication during the maintenance phase of the system's life cycle is crucial. Which of the following is most beneficial to the organization during the maintenance phase?
1. A newsletter for users is posted yearly in accessible sites for new information
2. A help desk provides 24/7 telephone user support for employees
3. Users given internet access and procedure manual to troubleshoot problems
4. A list of frequently asked questions (FAQs) posted on a password protected site
Q:
To be effective users of a new documentation system, the staff must be trained. Which shows the most effective use of training for a new computer system?
1. A training environment is set up off site.
2. Training is scheduled during the normal workday.
3. Training is provided with actual live software.
4. Actual client data are stored in the training system.
Q:
Back loading of some pre-existing data must be completed for the system to create accurate medication administration records and billing charges. How is this best accomplished?
1. Selected data from client records are loaded into the system by data entry specialists.
2. Each staff member is responsible for inputting medications for each patient for the 24 hours prior to going live.
3. When the system goes live, data from clients' medication administration records since admission are inputted for all clients.
4. A pharmacist selects needed data from client medication administration records and inputs the data immediately prior to going live.
Q:
Once the go-live date of the system has been established, the production environment is in effect. Which planning is most necessary at this time?
Standard Text: Select all that apply.
1. A newly released software upgrade will be performed so the new system provides users with the latest technology.
2. A website is constructed so employees may answer questionnaires relating to system satisfaction and ask questions as needed.
3. A 24/7 support schedule is initiated to answer questions when necessary.
4. Information back loading is scheduled the day that the system is to go live.
5. The implementation of the system will begin in the emergency department and will move to other units when they signal that they are ready.
Q:
The ________________________ environment is a term that refers to the time when the new system is in operation.
Standard Text:
Q:
Which strategy might cause problems during implementation of a new information system?
1. Once the committee has given information to the vendor regarding system needs, a small addition is requested.
2. An open system is set up such that software upgrades can be implemented quickly and easily.
3. The vendor is asked to fully customize the information system for a specialty organization.
4. The committee verifies that the vendor provides annual maintenance with an additional contract.
Q:
The notion of staggering the implementation of the system is determined during the planning phase by committee members. The rationale behind staggering the implementation of the new system can be related to which of the following statements?
1. The decision to incorporate a roll out model of implementation can be used to identify issues before the entire system goes live.
2. Staggering allows staff members to become more familiar with the new technology.
3. Budgetary constraints are the main factors in determining whether a system should be staggered or fully implemented.
4. Nurses and staff need additional time to accept an unwanted technological change.
Q:
It has been determined from previous experience that eight hours is the minimum time necessary for staff nurses to obtain initial training on the new system. Which of the following is the best way to schedule this training?
1. One eight-hour session is offered six weeks prior to go-live, where employees drop in when they are caught up with work assignments.
2. Eight one-hour sessions are scheduled one month prior to go-live, starting immediately after the employee's shift has ended.
3. Four two-hour sessions are scheduled three months prior to go-live during non-scheduled work time.
4. Two four-hour sessions are offered one month before go-live during non-scheduled work time.
Q:
Which of the following statements is true about the test environment?
1. The findings of the system test always indicate how well the system will perform in the live environment.
2. The test environment is not exactly the same as the live environment, because the live environment is much larger and more complex.
3. The test environment is unnecessary with the progress made in technology.
4. The test environment is done for training purposes.
Q:
_________________ creep is the unexpected and uncontrolled growth of user expectations as the project progresses.
Standard Text:
Q:
Which of the following best defines data dictionaries?
1. Data dictionaries contain lists and definitions of all terms used.
2. Data dictionaries contain actual data.
3. Data dictionaries have nothing to do with data quality.
4. Data dictionaries can be found in the nursing office.
Q:
Although an information system may be replaced, which of the following answer best describes the impact on the information system's life cycle?
1. The life cycle is an ongoing process that never ends.
2. The life cycle and information system are unrelated.
3. The life cycle stops to upgrade the system.
4. The life cycle is altered with any upgrade.
Q:
Which of the following is not an example of a function?
1. Upgrading
2. Order entry
3. Results reporting
4. Documentation
Q:
To change the culture of any work environment, the nurse as a leader can promote innovation and minimize resistance through which of the following?
1. Demanding staff listen to rationale behind the changes
2. Planning a strategy to support people and process changes
3. Asking staff to trust their colleagues
4. Understanding that the change is for their benefit
Q:
Any significant change in the workplace can lead to discomfort and resistance. Which of the following statements can decrease staff resistance to the implementation of a new system?
1. "Give it time, you will like it."
2. "Perhaps you need more staff development programs."
3. "We know what we are doing. The committee has worked on this project for months."
4. "If you find that its functions are not user-friendly, the committee can make the appropriate changes."
Q:
A hospital is implementing a new electronic nurse charting system. When selecting members for the implementation committee, if all are available, which one of these should be given priority?
1. Informatics nurse specialist
2. Experienced consultant
3. Steering committee chairperson
4. Chief information officer