Nursing Informatics: IV

17 Questions | Attempts: 243
Share

SettingsSettingsSettings
Nursing Informatics Quizzes & Trivia

Information Technology


Questions and Answers
  • 1. 

    What is a computer interface program?

    • A.

      A disk operating system

    • B.

      An example of mHealth devices

    • C.

      A program that will decode information between separate systems

    Correct Answer
    C. A program that will decode information between separate systems
  • 2. 

    What are two major types of interfaces?

    • A.

      Point-to-point interface and software reliance systems

    • B.

      CD-ROM and DVD

    • C.

      Divide and Conquer

    • D.

      The world wide web and web browser

    Correct Answer
    A. Point-to-point interface and software reliance systems
  • 3. 

    What are two major items important to integrate computer systems?  

    • A.

      Point-to-point interface and software reliance systems

    • B.

      Data dictionary and Master Patient Index (MPI)

    • C.

      Data security and Capacity

    • D.

      ROM and RAM

    Correct Answer
    B. Data dictionary and Master Patient Index (MPI)
  • 4. 

    What is the primary standard used for biomedical and image-related information in North America?

    • A.

      Medical Information Bus (MIB)

    • B.

      Picture Archiving Communications Systems (PACS)

    • C.

      Digital Imaging Communications in Medicine (DICOM)

    • D.

      Graphic User Interface (GUI)

    Correct Answer
    C. Digital Imaging Communications in Medicine (DICOM)
  • 5. 

    With regards to standardizing by the NIH, what does ISCAR stand for? 

    • A.

      Interventional Surgical Cardiology Admission and Recovery

    • B.

      Information storage creation analysis and retrieval

    • C.

      Imaging Secure Computerized Archival Records

    Correct Answer
    B. Information storage creation analysis and retrieval
  • 6. 

    With regards to standardizing by the NIH, the national infrastructure will be based on which setup?

    • A.

      Physical, cognitive and organizational

    • B.

      Analog, digital and hybrid

    • C.

      Supercomputer, mainframe, microcomputer and handheld

    • D.

      The user's desktop computer, a local area network, a large area network, and national super computers.

    Correct Answer
    D. The user's desktop computer, a local area network, a large area network, and national super computers.
  • 7. 

    What are thin clients?

    • A.

      Dumb terminals

    • B.

      Electronic charts that have been thinned

    • C.

      Malnourished patients

    Correct Answer
    A. Dumb terminals
  • 8. 

    Which is true about Picture archiving communication systems?

    • A.

      Images have restrictions on time and distance

    • B.

      It is a time and resource consuming system

    • C.

      It is used for X-rays procedures, but not mammography, MRIs and endoscopy

    • D.

      It is a filmless medical system

    Correct Answer
    D. It is a filmless medical system
  • 9. 

    What are two types of security programs essential to today's computers?

    • A.

      Firewall and authentic passwords

    • B.

      Antivirus software and spyware detection software

    • C.

      Hippa and phi guidelines

    • D.

      Stringent remote user access

    Correct Answer
    B. Antivirus software and spyware detection software
  • 10. 

    Which is an example of level one user of authenticity?

    • A.

      Requires retinal scanning

    • B.

      Uses encrypted key base authentication

    • C.

      Requires regular password updating

    • D.

      No security is needed

    Correct Answer
    C. Requires regular password updating
    Explanation
    1. Level One Authenticity for security: * Once an individual is logged into the system (using their name and password), their name appears on the screen and their access is tracked as they use the system. * Users are automatically logged out after come period of inactivity and must log in again to continue using the system. * Must update their password (set to a specific level of complexity) on a regular basis. (e.g. monthly).

    Rate this question:

  • 11. 

    Which is an example of level two user of authenticity?

    • A.

      Once logged on name appears on screen and access is tracked

    • B.

      User requires a computer access card (CAC)

    • C.

      Uses biometric authentication or requires fingerprint scanning

    Correct Answer
    B. User requires a computer access card (CAC)
    Explanation
    2. Level Two Authenticity for Security: * Encrypted key-based authentication, * User must present computer access card (CAC) to the system before they can log on, * Log out occurs automatically is CAC is too far from the computer.

    Rate this question:

  • 12. 

    Which is an example of level three user of authenticity?  

    • A.

      Users are logged out after a period of inactivity

    • B.

      Users are logged out if Computer access card (CAC) is too far from computer

    • C.

      Cannot be lost or stolen

    Correct Answer
    C. Cannot be lost or stolen
    Explanation
    3. Level Three Authenticity for security: * Biometric authentication, * Uses something unique to the individual such as fingerprint, retinal scan or face recognition, * Cannot be lost or stolen, * Some newer laptops now come with a a fingerprint scanner built in.

    Rate this question:

  • 13. 

    Arranging patient recording according to ascending patient ID numbers is an example of which type of file organization?

    • A.

      Aggregate

    • B.

      Indexed

    • C.

      Relative

    • D.

      Sequential

    Correct Answer
    D. Sequential
  • 14. 

    Which device converts digital data to audible analog signals and analog signals to digital data?

    • A.

      Controller

    • B.

      Hub

    • C.

      Modem

    • D.

      Router

    Correct Answer
    C. Modem
  • 15. 

    What is used to retrieve and present data from a database management system

    • A.

      Assembler language

    • B.

      C++command

    • C.

      Digital communication code

    • D.

      Query

    Correct Answer
    D. Query
  • 16. 

    Which tool tracks, resources, milestones, and time frames associated with the implementation of a new clinical program?

    • A.

      A database

    • B.

      An expert system

    • C.

      Project management software

    • D.

      Spreadsheet software

    Correct Answer
    C. Project management software
  • 17. 

    Which are not programming languages

    • A.

      SAS and C++

    • B.

      JAVA and Python

    • C.

      SQL and HTML

    • D.

      COBOL and Visual Basic

    Correct Answer
    C. SQL and HTML
    Explanation
    HyperText Markup Language – is a markup language, not a programming language. It is the the building blocks for web pages. was originally called SEQUEL for Structured English Query Language, SQL, still pronounced “sequel”, stands for Query Language, a database querying language, not programming language.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 15, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 19, 2012
    Quiz Created by
    Rose_njarvis
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.