Chapter 24- Technology Flashcards
Which organization established the requirements for meaningful use in regard to electronic health records?
Centers for Medicine & Medicaid Services
(CMS)
A(n) _______________ is any peripheral hardware that allows the user to provide data to the computer.
Input device
Flash drives and jump drives belong to which of the following categories?
Secondary storage devices
Which of the following examples of keyboard categories represent function keys?
F1, F2, F3
A(n) _____________ is used to allow multiple devices to be used on the same network.
router
Which of the following types of scanners is also called an automatic document feeder (ADF)?
Sheet fed scanner
Something designed to be used at or near where the patient is seen is called:
Point of care
A communication system for connecting several computers so information can be shared is called a(n)
Ethernet
What is a program or hardware device that acts as a barrier or filter between the network and the internet called?
Firewall
Monitors and printers belong to which of the following categories?
Output device
EMR-
Electronic Medical Record
* Single Healthcare Org.
EHR-
Electronic Health Record
- Multiple Healthcare Organizations
Personal Computer-
is a single- user electronic data processing device, personal computers can also be used be mobile computers.
Example: Desktop computers, Laptop computers, tablet, pc
Input:
is any peripheral hardware that allows the user tp provide data to the computer.
Example: Keyboard, Scanners
Output:
The data entered to the computer is the processed by it.
Example: Monitor , Printer etc.
Data Back Up:
Depending on the size of the facility, the network may be backed up once to several times a day.
Practice Management Software Program:
is used for scheduling appointments, new patient registration, billing, coding and managing finances.
- Daily functions
Firewall:
A program or hardware device that acts
Network:
A group of interconnected computer.
Encrypted Data:
prevents unauthorized users from reading the information.
(secret code)
Security Risk Analysis:
Audit Trails:
record of computer activity used to monitor user’s actions within software including additions, deletions, and viewing of electronic records.
LAN:
Local Area Network
WAN:
Wide Area Network
can use satellites
Network that spans a relatively large geographic area and consists of two or more local area networks (LAN’s)