Nursing Informatics: IV

17 Questions | Attempts: 243
Share
Please wait...
Question 1 / 17
0 %
0/100
Score 0/100
1. What is a computer interface program?
Submit
Please wait...
About This Quiz
Nursing Informatics Quizzes & Trivia

Information Technology

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. Which tool tracks, resources, milestones, and time frames associated with the implementation of a new clinical program?
Submit
3. Arranging patient recording according to ascending patient ID numbers is an example of which type of file organization?
Submit
4. What are two major types of interfaces?
Submit
5. Which is an example of level one user of authenticity?

Explanation

1. Level One Authenticity for security: * Once an individual is logged into the system (using their name and password), their name appears on the screen and their access is tracked as they use the system. * Users are automatically logged out after come period of inactivity and must log in again to continue using the system. * Must update their password (set to a specific level of complexity) on a regular basis. (e.g. monthly).

Submit
6. What is used to retrieve and present data from a database management system
Submit
7. What are thin clients?
Submit
8. Which device converts digital data to audible analog signals and analog signals to digital data?
Submit
9. What is the primary standard used for biomedical and image-related information in North America?
Submit
10. With regards to standardizing by the NIH, what does ISCAR stand for? 
Submit
11. What are two types of security programs essential to today's computers?
Submit
12. With regards to standardizing by the NIH, the national infrastructure will be based on which setup?
Submit
13. Which is true about Picture archiving communication systems?
Submit
14. Which are not programming languages

Explanation

HyperText Markup Language – is a markup language, not a programming language. It is the the building blocks for web pages. was originally called SEQUEL for Structured English Query Language, SQL, still pronounced “sequel”, stands for Query Language, a database querying language, not programming language.

Submit
15. Which is an example of level two user of authenticity?

Explanation

2. Level Two Authenticity for Security: * Encrypted key-based authentication, * User must present computer access card (CAC) to the system before they can log on, * Log out occurs automatically is CAC is too far from the computer.

Submit
16. Which is an example of level three user of authenticity?  

Explanation

3. Level Three Authenticity for security: * Biometric authentication, * Uses something unique to the individual such as fingerprint, retinal scan or face recognition, * Cannot be lost or stolen, * Some newer laptops now come with a a fingerprint scanner built in.

Submit
17. What are two major items important to integrate computer systems?  
Submit
View My Results

Quiz Review Timeline (Updated): Mar 15, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 15, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 19, 2012
    Quiz Created by
    Rose_njarvis
Cancel
  • All
    All (17)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What is a computer interface program?
Which tool tracks, resources, milestones, and time frames associated...
Arranging patient recording according to ascending patient ID numbers...
What are two major types of interfaces?
Which is an example of level one user of authenticity?
What is used to retrieve and present data from a database management...
What are thin clients?
Which device converts digital data to audible analog signals and...
What is the primary standard used for biomedical and image-related...
With regards to standardizing by the NIH, what does ISCAR stand...
What are two types of security programs essential to today's...
With regards to standardizing by the NIH, the national infrastructure...
Which is true about Picture archiving communication systems?
Which are not programming languages
Which is an example of level two user of authenticity?
Which is an example of level three user of authenticity?  
What are two major items important to integrate computer systems?...
Alert!

Advertisement