100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU C468 INFORMATION MANAGEMENT AND APPLICATION OF TECHNOLOGY $14.99   Add to cart

Exam (elaborations)

WGU C468 INFORMATION MANAGEMENT AND APPLICATION OF TECHNOLOGY

 0 view  0 purchase

WGU C468 INFORMATION MANAGEMENT AND APPLICATION OF TECHNOLOGY. Genuine and latest for best grades

Preview 4 out of 52  pages

  • July 6, 2023
  • 52
  • 2022/2023
  • Exam (elaborations)
  • Questions & answers
All documents for this subject (4)
avatar-seller
DICKSONtheNURSE
WGU C468 INFORMATION MANAGEMENT AND
APPLICATION OF TECHNOLOGY 2023 LATEST
100% GRADED A+

,WGU C468 Information Management and
Application of Technology

System security involves protection against
A) poor system design
B) noncompliant users
C) deliberate attacks, errors, omissions, disasters, and viruses
D) vendor breech of support contract Correct answer- C) deliberate attacks, errors,
omissions, disasters, and viruses

Which of the following is a mechanism that logs a user off the system after a specified
period of inactivity on the terminal or computer?
A) automatic sign-off
B) remote access
C) automatic access
D) automatic password protection Correct answer- A) automatic sign-off

The sharing of private information in a situation in which a relationship has been
established for the purpose of treatment, or delivery of services, with the understanding
that this information will remain protected is _____________?
A) information privacy
B) privacy
C) confidentiality
D) information system security Correct answer- C) confidentiality

____________ is a combination of hardware and software that forms a barrier between
systems, or different parts of a single system to protect those systems from
unauthorized access.
A) Antivirus software
B) Firewall
C) Physical security
D) Application security Correct answer- B) Firewall

The ability to use a health enterprise's information system from outside locations such
as a physician's office is known as ___________.
A) remote access
B) automatic access
C) system connectivity
D) auto connectivity Correct answer- A) remote access

What are the driving forces behind the Health Information Exchange (HIE) movement?

,A) provider demands for cost containment
B) international demands
C) healthcare insurance reform
D) federal legislation, and demands for safer, more efficient healthcare Correct answer-
D) federal legislation, and demands for safer, more efficient healthcare

How do Health Information Exchanges (HIEs) impact healthcare delivery?
A) HIEs have the capacity to improve the quality of care delivered by decreasing access
to records
B) HIEs have limited impact at this time
C) HIEs increase the efficiency and potentially the quality of the healthcare delivery
system
D) HIEs have not been shown to impact the safety of care delivered Correct answer- C)
HIEs increase the efficiency and potentially the quality of the healthcare delivery system

Information and data privacy
A) provide protection for healthcare information only
B) includes the right to choose the conditions and extent to which information is shared
C) are best maintained through paper backups
D) only applies when a HIPAA release form is signed Correct answer- B) includes the
right to choose the conditions and extent to which information is shared

The Health Information Technology for Economic and Clinical Health Act (HITECH) is
known for all of the following except:

A) Including a privacy rule establishing national standards for protecting health
information
B) Funded workforce training, and new technology research and development in HIT
C) Ensured the collection of aggregate data that could be used to improve policy
decisions relative to allocation of services and population health
D) Provided funds and incentives to increase the adoption of EHRs by providers Correct
answer- A) Including a privacy rule establishing national standards for protecting health
information

The SWOT analysis is conducted in what phase of information system life cycle?
A) evaluation phase
B) monitoring and control phase
C) implementation phase
D) strategic planning phase Correct answer- D) strategic planning phase

Training documents are developed and user training occurs in which phase of the
project management life cycle (PMLC)?
A) evaluation phase
B) design/plan phase
C) implementation phase
D) monitoring and control phase Correct answer- C) implementation phase

, Maintenance of an information system includes all of the following except
____________.
A) problem solving and debugging
B) training end users
C) performing file-backup procedures
D) updating security protections Correct answer- B) training end users

Who determines the project implementation strategy?
A) the system analyst
B) the vendor
C) the implementation committee
D) the board of directors and CEO Correct answer- C) the implementation committee

The first task of the project implementation committee is to ____________.
A) gather data
B) develop a timeline
C) recruit key stakeholders
D) establish subcommittees Correct answer- B) develop a timeline

An advantage to using super users for system training is that ___________.
A) super users leave after the initial training is complete
B) super users have extensive preparation in learning theory
C) super users have a specialized knowledge of both the system and clinical areas
D) super users have in-depth knowledge of system code Correct answer- C) super
users have a specialized knowledge of both the system and clinical areas

What is the most important factor in maintaining the proper use of an information
system?
A) revenue and resources
B) planning
C) education
D) implementation Correct answer- C) education

Training class content should address the following area(s):
A) how class trainers were selected
B) basic computer literacy, workflow, policies, and human factors
C) computer-related positions in the facility
D) how to lodge complaints on the information system that was selected Correct
answer- B) basic computer literacy, workflow, policies, and human factors

Personal Health Record (PHR) use for management of chronic conditions is felt to hold
great promise for which of the following reasons?
A) PHRs reduce physician case loads
B) PHRs have conclusively been shown to decrease the number of face-to-face visits
and phone calls

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller DICKSONtheNURSE. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $14.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67474 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$14.99
  • (0)
  Add to cart