100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
FACHE Week 1 – 6| 180 QUESTIONS| WITH COMPLETE SOLUTIONS $11.99   Add to cart

Exam (elaborations)

FACHE Week 1 – 6| 180 QUESTIONS| WITH COMPLETE SOLUTIONS

 0 view  0 purchase
  • Course
  • Institution

Which of the following is a violation of federal fair housing law? A) A landlord refuses to rent to anyone under the age of 30. B) A private homeowner advertises a private house share using the phrase: "No minorities." C) private homeowner lives in a duplex and won't rent the other half to a ...

[Show more]

Preview 4 out of 42  pages

  • February 3, 2024
  • 42
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
avatar-seller
FACHE Week 1 – 6| 180 QUESTIONS| WITH
COMPLETE SOLUTIONS

Health Insurance Portability & Accountability Act (HIPAA) is a Federal
Law designed to facilitate the electronic exchange of information in
health care. Which of the following does not pertain to this law?
a) Privacy protection components of the law limit non-consensual use
as a release or private health information
b) Patients must receive notice of privacy rights
c) Restrictions on access to and use of information is required
d) Criminal and civil sanctions do not exist for improper use and
disclosure - correct answerD

Separate computer systems are often linked together in order to share
data and information. When all components of the network are located
within close proximity of one another, perhaps within a single facility,
the network known as a:
a) Wide Area Network (WAN)
b) World Wide Web (WWW)
c) Local Area Network (LAN)
d) Electronic Data Interchange (EDI) - correct answerC

Healthcare organizations had established standards to maintain data
security and protect the privacy and confidentiality of patients' records
information. Which one of the following answers does not describe its
data security elements:
a) Protect against system failures
b) Protect against external catastrophic events
c) Facilitate access to computer files to authorized personnel
d) Control access to computer files by unauthorized personnel -
correct answerC

W Client/server architecture back-end (server) functions include all of
the following except:
a) Printing
b) Applications program execution

,c) Decision support
d) Communication - correct answerC

Star networks have an advantage of:
a) Relative ease of wiring the network and relatively fast
communications
b) Facilitating construction of high spend networks that operate over
large distances
c) Ease with which nodes can be added to an existing network
d) Require less cabling than networks using other topologies - correct
answerC. 1-refers to Bus networks, 2 refers to ring networks, and 4 is
incorrect because Star networks require more cabling than other
networks

Advantages of outsourcing include all of the following except,
a) Staffing reductions
b) Increased implementation time
c) Smaller capital investments
d) More predictable costs - correct answerB

Although purchasing or leasing commercial software is most common,
what is becoming a viable source of information technology and
systems for smaller healthcare organizations?
a) In house design and programming
b) Outsourcing
c) ASP-applications service provider
d) Combining Outsourcing and in-house design - correct answerC

Which of the following is NOT one of the three general categories of
information systems used in healthcare organizations:
a) Clinical Information Systems
b) Composite Healthcare Systems
c) Administrative/Financial Systems
d) Decision Support Systems for Strategic Management - correct
answerB

,A comprehensive information security policy should include all of the
following elements except:
a) Management Policies
b) Data back up and recovery
c) Physical security
d) Technical controls - correct answerB

Which of the following is NOT part of the System Development Life
Cycle?
a) System Analysis
b) System Adjustment
c) System Implementation
d) System Acquisition - correct answerB

The Information Services Advisory Committee provides insight into
user needs and helps gain acceptance of information systems. Which
of the following is NOT a charge of the committee:
a) Encouraging appropriate use of information services
b) Ranking information services investment opportunities and
recommending a rank-ordered list of proposals to the governing
board.
c) Providing technical support to implement an integrated information
system.
d) Monitoring performance of the department and suggesting possible
improvements - correct answerC

One of the functions of an IS system is to ensure the integrity, quality,
and security of data. Which of the following does not fall in this content
area?
a) Defines measures and terminology
b) Captures historic as opposed to current data
c) Improves the process for data input
d) Guards against data loss - correct answerB

In the IT System Development Life Cycle, which is the most important
step:
a) System Analysis

, b) System Design
c) System Acquisition
d) System Implementation - correct answerA

Which of the following is not an actual active IT policy and Procedure
components?
a) Procedures against system failure and catastrophic events
b) Control against viruses
c) Quality of Software
d) Confidentiality for authorized users - correct answerC

The importance of the Intranet vs. the Internet is that employees
could:
a) Evaluate Policies, Procedure, Protocols and organizational manuals
b) Receive education sessions
c) Communicate and interact with patients
d) All - correct answerD

The type of computer network that allows multiple workstations to
share the data contained in files on a server is called:
a) Peer Network
b) File/Server
c) Terminal Host Systems
d) Client/Server Computing - correct answerB

Which is not example of a Strategic Decision Support Application?
a) Strategic planning
b) Disease management
c) Marketing
d) Resource allocation - correct answerB

Which of the following is not a key part of HIPAA Implementation:
a) Establishment of enhanced privacy protection policies
b) Establishment of compliance committees and private offices
c) Establishment of clinical guidelines for patient care
d) Use of HIPAA compliant software - correct answerC

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller juiceyoung81. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $11.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

76658 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$11.99
  • (0)
  Add to cart