100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Epic Security 101 (Epic Fundamentals) Questions With Complete Solutions $10.99   Add to cart

Exam (elaborations)

Epic Security 101 (Epic Fundamentals) Questions With Complete Solutions

 78 views  1 purchase

Epic Security 101 (Epic Fundamentals) Questions With Complete Solutions

Preview 2 out of 8  pages

  • September 21, 2023
  • 8
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
All documents for this subject (2)
avatar-seller
Classroom
Epic Security 101 ( Epic Fundamentals) Questions
With Complete Solutions
Chronicle correct answer: Database Management System (DBMS) at the core of Epic software.
Chronicles Files correct answer: Each file in the "cabinet" contains a RECORD. Patient Record (EPT) or Provider Record (SER)
Contact Information correct answer: Located in the file, tracks the data over time
Record Item correct answer: Each record contains numbered items. A unique positive integer
Record Value correct answer: A value would include the AMOUNT of 'weight' or the persons height. The data content of an item.
Record Items that NEVER change correct answer: The .1 items is always the record ID
The .2 item is always the record NAME
Item Title correct answer: The item description. Examples: Date, Weight, Blood Pressure Who needs a provider SER? correct answer: C - Has Credentials
A - Authorizes orders
R - Can be Referred to or send referrals
S - Can be Scheduled (can include devices!)
The ROLE Record controls _________ correct answer: The appearance or layout of Hyperspace. The most common role configuration task is updating toolbars and menus.
M - Maximum number of open
workspaces
U - Use last login department
T - Timeout
T - Toolbars and menus
S - Start-up activities
The User Record (EMP) links to.. correct answer: A user role, security classes (ECL) and if needed a provider record (SER). Each person who logs in to Epic needs a user record.
Security Classes are made up of.. correct answer: Security Points. A combination of security points grants you access to many activities or workflows within an application. Security classes combine security points into "key rings". Each application has its own security points and security classes

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Classroom. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

80461 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$10.99  1x  sold
  • (0)
  Add to cart