Information Technology > QUESTIONS & ANSWERS > Health Computing / Nursing Informatics C468 Knowledge check WGU 2022 (All)

Health Computing / Nursing Informatics C468 Knowledge check WGU 2022

Document Content and Description Below

Health Computing / Nursing Informatics C468 Knowledge check WGU 2022 1. System security involves protection against - ✔✔deliberate attacks, errors, omissions, disasters and viruses 2. Which of... the following is a mechanism that logs the user off a system after a specified period of inactivity on the terminal or computer? - ✔✔automatic sign off 3. The sharing of private information in a situation in which a relationship has been established for the purpose of treatment with the understanding this information will remain protected is - ✔✔Confidentiality 4. ____ is a combo of hardware and software that forms a barrier between systems or different parts of a single system to protect those systems from unauthorized access - ✔✔Firewall 5. The ability to use a health enterprise's information system from outside locations such as a physician's office is known as ___________. - ✔✔Remote access 6. What are forces behind the Health Information Exchange - ✔✔Federal legislation and demands for safer more efficient healthcare 7. How do Health Information Exchanges (HIEs) impact healthcare delivery? - ✔✔HIEs increase the efficiency and potentially the quality of the healthcare delivery system 8. Information & Data privacy - ✔✔includes the right to choose the condition and extent to which information is shared 9. The Health Information Technology for Economic & Clinical Health Act (HITECH) is - ✔✔Included a privacy rule establishing national standards for protecting health information. 10. The SWOT analysis is conducted in which phase of the information system Strengths Weakness Opportunities Threats - ✔✔Strategic planning stage 11. Training documents are developed and user training occurs in which phase of the project - ✔✔Implementation phase 12. Maintenance of an information system includes all of the following - ✔✔problem solving/debugging updating security protections performing file back up procedures 13. Who determines the project implementation strategy? - ✔✔The implementation committee 14. The first task of the project implementation team is to ________. - ✔✔develop a timeline 15. An advantage to using superusers for system training is that - ✔✔super users have a specialized knowledge of both the system and clinical areas. 16. What is the most important factor in maintaining the proper use of an information system ? - ✔✔Education 17. Training class content should address the following area(s): - ✔✔basic computer literacy , workflow, policies and human factors. 18. Personal Health Record (PHR) use for management of chronic conditions is felt to hold great promises for which reason. - ✔ [Show More]

Last updated: 1 year ago

Preview 1 out of 5 pages

Add to cart

Instant download

document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Add to cart

Instant download

Reviews( 0 )

$8.50

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

REQUEST DOCUMENT
86
0

Document information


Connected school, study & course


About the document


Uploaded On

May 13, 2022

Number of pages

5

Written in

Seller


seller-icon
Nutmegs

Member since 3 years

577 Documents Sold


Additional information

This document has been written for:

Uploaded

May 13, 2022

Downloads

 0

Views

 86

Document Keyword Tags

What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·