Clinical Informatics Board Review (Mankowitz) Flashcards

1
Q

Equation for RRR

A

ARR / Risk in Control Group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is process mining?

A

Method of workflow analysis involving review of event log of an information system to see how various tasks are carried out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a value stream map and when is it used?

A
  • AKA end-to-end system map
  • Shows all inputs, throughputs and outputs of a process
  • Helps identify waste
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Difference between bit vs byte vs hexadecimal vs kilobyte vs megabyte

A
  • Bit = binary digit
  • Byte = 8 bits
  • Hexadecimal = base 16
    8 bits can be represented as 2-digit hex number
  • Kilobyte = 1024 bytes
  • Megabyte = 1024 kilobytes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Difference between FORTRAN and BASIC

A

FORTRAN
- Compiled language that needs to be passed through complier to convert source code to machine code.
- ENTIRE PROGRAM needs to be complete before comiler can begin.

BASIC
- Interpreted language that is passed through an interpreter
- Each line of program can be translated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does a control structure refer to in programming?

A

Linguistic mechanisms that programmers use to tell a computer what to do (e.g. if/then/else block)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does a loop refer to in programming?

A

Executes code over and over until a certain condition is met (e.g. for/next loop, while loop)

Iteration = each time the loop is run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

4 parts of the cycle in Spiral Model of software depvelopment

A
  1. Analysis
  2. Evaluation
  3. Development
  4. Planning
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is rapid application development (RAD)

A
  • Like spiral, attempts to reduce project risk by breaking project into smaller chunks
  • Adheres to strict timelines (timeboxes). If there are delays, requirements are reduced to fit the timebox.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Difference between slicing and dicing

A

Slicing = looking at subsection of data when ONE of the dimensions is held constant

Dicing = looking at subsection of data when >1 dimensions are held constant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an OLAP cube

A

Online analytic processing (OLAP) cube is used to gather business intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

2 types of firewalls

A
  1. Packet filter - inspects packet to ensure it is coming from an acceptable source but does not inspect the contents of the packet
  2. Stateful inspection - inspects source + content of the packet. Bidirectional so helps prevent users from disseminating PHI
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Network Address Translation

A

Process by which computers in a private network are able to share a public-facing address without divulging their local address. Usually done by router, but many firewalls also incorporate this functionality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is tinyint in SQL?

A

Whole number between -127 and +129

2^8 (256) possibilities –> can be stored in 8 bites (one byte)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is unsigned int in SQL?

A

Whole numbers between 0 and 4,294,967,295 –> 2^32 different possibilities –> requires 4 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Terms for each component of floating point numbers

A

Ex) 3.5015 x 10^2

3.5015 = mantissa/significand
10 = base
2 = exponent

17
Q

What is the goal and 3 stages of data mining

A

Goal: Look for patterns or relationships among different variables and work backward to see if causation exists

  1. Exploration
  2. Model building
  3. Deployment
18
Q

2 ways to meet HIPAA Privacy Rule

A
  1. Expert determination method - standard met when expert deems that risk of identifying an individual is very small based on population as a whole and availability of public databases
  2. Safe Harbor method (MORE COMMON) - data considered de-identifid when all 18 identifiers are removed
19
Q

What is A/B testing

A

User testing that involves prototyping 2 different interfaces for the same task or series of tasks.

Participants randomly assigned to A or B prototype and usability testing team records outcomes for each.

20
Q

What is BATNA

A

Best Alternative To a Negotiated Agreement = fallback options when negotiating

21
Q

Pruitt’s model of conflict management

A

Stratified by degree of assertiveness and cooperativeness

  • Problem Solving (we both win)
  • Yielding (I lose - you win)
  • Contending (I win - you lose)
  • Inaction (we both lose)
22
Q

Rahim’s model of conflict management

A
  • Integrating (we both win)
  • Obliging (I lose - you win)
  • Dominating (I win - you lose)
  • Avoiding (we both lose)
23
Q

What does satisficing refer to in decision making?

A

Research is conducted only until an acceptability threshold is met. Less information needed to make decision compared to maximizer.

24
Q

Kotter’s 8 steps to manage change

A
  1. Create a sense of urgency
  2. Create a guiding coalition
  3. Develop a vision and strategy
  4. Communicate the vision
  5. Empower employees
  6. Generate short term wins
  7. Consolidate gains to produce more change
  8. Institutionalize new approaches