WGU C468 INFORMATION MANAGEMENT AND APPLICATION OF TECHNOLOGY
7 views 0 purchase
Course
WGU C468
Institution
WGU C468
WGU C468 INFORMATION MANAGEMENT AND APPLICATION
OF TECHNOLOGYWGU C468 INFORMATION MANAGEMENT AND APPLICATION
OF TECHNOLOGY
System security involves protection against
A) poor system design
B) noncompliant users
C) deliberate attacks, errors, omissions, disasters, and viruses
D) vendor breech...
wgu c468 information management and application of technology
system security involves protection against
which of the following is a mechanism that logs a user off the system a
Written for
WGU C468
All documents for this subject (616)
Seller
Follow
HIGHFLYER
Reviews received
Content preview
WGU C468 INFORMATION MANAGEMENT AND APPLICATION
OF TECHNOLOGY
System security involves protection against
A) poor system design
B) noncompliant users
C) deliberate attacks, errors, omissions, disasters, and viruses
D) vendor breech of support contract
ANSWERS: C) deliberate attacks, errors, omissions, disasters, and viruses
Which of the following is a mechanism that logs a user off the system after a specified period of
inactivity on the terminal or computer?
A) automatic sign-off
B) remote access
C) automatic access
D) automatic password protection
ANSWERS: A) automatic sign-off
The sharing of private information in a situation in which a relationship has been established for the
purpose of treatment, or delivery of services, with the understanding that this information will remain
protected is _____________?
A) information privacy
B) privacy
C) confidentiality
D) information system security
ANSWERS: C) confidentiality
____________ is a combination of hardware and software that forms a barrier between systems, or
different parts of a single system to protect those systems from unauthorized access.
A) Antivirus software
B) Firewall
C) Physical security
D) Application security
ANSWERS: B) Firewall
The ability to use a health enterprise's information system from outside locations such as a
physician's office is known as ___________.
A) remote access
B) automatic access
C) system connectivity
D) auto connectivity
ANSWERS: A) remote access
What are the driving forces behind the Health Information Exchange (HIE) movement?
A) provider demands for cost containment
,B) international demands
C) healthcare insurance reform
D) federal legislation, and demands for safer, more efficient healthcare
ANSWERS: D) federal legislation, and demands for safer, more efficient healthcare
How do Health Information Exchanges (HIEs) impact healthcare delivery?
A) HIEs have the capacity to improve the quality of care delivered by decreasing access to records
B) HIEs have limited impact at this time
C) HIEs increase the efficiency and potentially the quality of the healthcare delivery system
D) HIEs have not been shown to impact the safety of care delivered
ANSWERS: C) HIEs increase the efficiency and potentially the quality of the healthcare delivery
system
Information and data privacy
A) provide protection for healthcare information only
B) includes the right to choose the conditions and extent to which information is shared
C) are best maintained through paper backups
D) only applies when a HIPAA release form is signed
ANSWERS: B) includes the right to choose the conditions and extent to which information is shared
The Health Information Technology for Economic and Clinical Health Act (HITECH) is known for all of
the following except:
A) Including a privacy rule establishing national standards for protecting health information
B) Funded workforce training, and new technology research and development in HIT
C) Ensured the collection of aggregate data that could be used to improve policy decisions relative to
allocation of services and population health
D) Provided funds and incentives to increase the adoption of EHRs by providers
ANSWERS: A) Including a privacy rule establishing national standards for protecting health
information
The SWOT analysis is conducted in what phase of information system life cycle?
A) evaluation phase
B) monitoring and control phase
C) implementation phase
D) strategic planning phase
ANSWERS: D) strategic planning phase
Training documents are developed and user training occurs in which phase of the project
management life cycle (PMLC)?
A) evaluation phase
B) design/plan phase
C) implementation phase
D) monitoring and control phase
,ANSWERS: C) implementation phase
Maintenance of an information system includes all of the following except ____________.
A) problem solving and debugging
B) training end users
C) performing file-backup procedures
D) updating security protections
ANSWERS: B) training end users
Who determines the project implementation strategy?
A) the system analyst
B) the vendor
C) the implementation committee
D) the board of directors and CEO
ANSWERS: C) the implementation committee
The first task of the project implementation committee is to ____________.
A) gather data
B) develop a timeline
C) recruit key stakeholders
D) establish subcommittees
ANSWERS: B) develop a timeline
An advantage to using super users for system training is that ___________.
A) super users leave after the initial training is complete
B) super users have extensive preparation in learning theory
C) super users have a specialized knowledge of both the system and clinical areas
D) super users have in-depth knowledge of system code
ANSWERS: C) super users have a specialized knowledge of both the system and clinical areas
What is the most important factor in maintaining the proper use of an information system?
A) revenue and resources
B) planning
C) education
D) implementation
ANSWERS: C) education
Training class content should address the following area(s):
A) how class trainers were selected
B) basic computer literacy, workflow, policies, and human factors
C) computer-related positions in the facility
D) how to lodge complaints on the information system that was selected
ANSWERS: B) basic computer literacy, workflow, policies, and human factors
, Personal Health Record (PHR) use for management of chronic conditions is felt to hold great promise
for which of the following reasons?
A) PHRs reduce physician case loads
B) PHRs have conclusively been shown to decrease the number of face-to-face visits and phone
calls
C) PHRs may serve to heighten client disparities
D) PHRs may help health systems achieve greater efficiency through facilitating prescription refills,
communication, and improved coordination of chronic conditions as well as quality of care
ANSWERS: D) PHRs may help health systems achieve greater efficiency through facilitating
prescription refills, communication, and improved coordination of chronic conditions as well as quality
of care
Client engagement is considered to be critical to achieving healthcare reform. Fully functional PHRs
support which of the following principles that engage clients in their own care?
A) Client control, individualized care based upon client needs and values, and shared knowledge with
easy flow of information
B) Informed provider choice for out-of-network participants
C) Provider option to participate with email access only
D) To decrease the number of face-to-face visits and phone calls
ANSWERS: A) Client control, individualized care based upon client needs and values, and shared
knowledge with easy flow of information
Benefits associated with PHRs include the following:
A) Improved client satisfaction, outcomes and communication with fewer telephone calls and
outpatient visits
B) Improved payer satisfaction and data collection
C) Reduced revenue cycle
D) Reduced coordination of care
ANSWERS: A) Improved client satisfaction, outcomes and communication with fewer telephone calls
and outpatient visits
What is the basic premise underlying value-based reimbursement?
A) Physician payment is based on volume of services
B) Client will play a less active role in this payment method
C) Providers are rewarded financially for good results
D) Payment is based on the value of tests and treatments to patient and organizational outcomes
ANSWERS: D) Payment is based on the value of tests and treatments to patient and organizational
outcomes
Which of the following statements most accurately reflects what the Informatics Nurse Specialist
(INS) needs to know when working with end users to purchase or design an information system
relative to reimbursement of services?
A) Can the current system, or the system under consideration, support reimbursement requirements?
Compliance deadlines? Automatic capture of charges?
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller HIGHFLYER. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.49. You're not tied to anything after your purchase.