LAB Flashcards

1
Q

any system that captures, stores, manages or transmits information related to
the health of individuals or the activities of organisations that work within the
health sector.

A

Health Information Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

incorporates things such as

A

district level routine information systems,
○ disease surveillance systems, and
○ also includes laboratory information systems,
○ hospital patient administration systems (PAS) and
○ human resource management information systems (HRMIS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

comprise data collected at
regular intervals at public, private, and community-level health facilities and
institution

A

●District Level Routine Information System statistics are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

the continuous, systematic collection,
analysis and interpretation of health-related data needed for the planning,
implementation, and evaluation of public health practice.

A

Disease Surveillance Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

computer software that processes,
stores and manages data from all stages of medical processes and tests

A

Laboratory Information Systems –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

developed out of the
automation of administrative paperwork in healthcare organisations,
particularly hospitals, and are one of the core components of a hospital’s IT
infrastructure

A

Hospital Patient Administration Systems (PAS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a
centralized repository of employee master data from the human resource
management group. A system that stores, processes and manages employee
data, such as names, addresses, etc.

A

Human Resource Management Information Systems (HRMIS) –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

is an integrated effort to collect, process, report and use health
information and knowledge

A

Health Information Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a health system requires reliable health statistics that
are disaggregated by sex, age and socioeconomic characteristics

A

all levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

decisions informed by evidence contribute to more
efficient resource allocation

A

policy level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

information about the quality and effectiveness of
services can contribute to better outcomes

A

delivery level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

health information resources system

A

inputs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

indicators, data sources, data management

A

processses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

information products , dissemination and use

A

outputs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

These include the legislative, regulatory and planning frameworks required for a fully functioning health
information system, and the resources that are required for such a system to be functional.

A

Health Information Systems Resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A core set of indicators and related targets is the basis for a health information system plan and strategy.
Indicators need to encompass determinants of health; health system inputs, outputs and outcomes; and
health statu

A

Indicators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

These can be divided into two main categories; (1) population-based approaches (censuses, civil
registration and population surveys) and (2) institution-based data (individual records, service records
and resource records).

A

Data Sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

covers all aspects of data handling from collection, storage,
quality-assurance and flow, to processing, compilation and analysis

A

data management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Data must be transformed into information that will become the basis
for evidence and knowledge to shape health action

A

Information Products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

value of health information is enhanced by making it readily
accessible to decision-makers and by providing incentives for, or
otherwise facilitating, information use

A

Dissemination and Use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Consists of all organizations, people and actions whose
primary intent is to promote, restore or maintain health

A

health system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Improving health and health equity

A

Health system goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

oute from inputs to health outcomes

A

Health system goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

system building blocks of health system

A

service delivery, health frameworks, information, medical products, financing, leadership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

overall goals of health system

A

improved health
responsiveness
social and financial risk protection
improved efficiency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

underlying premises of PHIS

A

Improved health
Better measurement
Network to galvanize partners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Increase availability and use of timely, reliable health information in
countries and globally through shared agreement

A

goal phis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Create a harmonized framework for the Philippines’ health
information system

Strengthen country health information system

improve access to and use of health information

A

Objective of PHIS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Health Information System Comprehensive Approach

A

public health data
hospital data
health accounts
census
vital statistics
survey data
regulation data
administrative data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

ACTIVITIES UNDERTAKEN OF PHIS

A

Establishment of Philippine Health Information Network
(PHIN)
● Customization of Health Metric Network (HMN)
assessment tool
● Central office inventory of existing ISs
● NEC started integration of Disease Surveillance System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

ACTIVITIES UNDERTAKEN

A

Draft framework for ISs technical integration
● Development of the Knowledge Management (KM) for
Health Strategy
● KM tool kits defined and started development
● Health portal (interactive website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Philippine Health Information Network

A

● DOH
FNRI
● DILG
● WHO
● NSO
● NSCB
● PCHRD
● UPCM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

BFAD, Drug testing

A

● Regulatory –

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Hospital operation, Blood Bank,
Filariasis, Malaria, disease registries, surveillance
systems..

A

Service delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

PRISM

A

Performance of Routine Information System
Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

raises the important question of

A

whether an information
system is appropriately designed to work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

acts as a reality check for assessing
whether the organizational mechanisms are in place for
producing the desired results.

A

PRISM framework

38
Q

influencing RHIS performance are multiple.
● Motivating the members of an organization remains a
challenge despite giving them training on data collection
registers and reporting forms

A

Behavioral Determinants

39
Q

are often confused with behavioral determinants,
especially related to RHIS knowledge and skills.
● Technical determinants are defined as those factors that
are related to information technology or need special
know‐how, such as software development for data
processing and analysis, development of indicators,
designing data collection forms, and procedural manuals

A

technical determinants

40
Q

reemphasizes RHIS processes and makes the
determinants an essential part of the framework

A

PRISM Framework

41
Q

prism framework parts

A

inputs, process, outputs, outcomes, impact

42
Q

any event or action that
could cause a loss of or damage to computer hardware,
software, data, information, or processing capability

A

computer security risk

43
Q

Computer security risks

A

hackers
crackers
script kiddies
corporate spies
unethical employer
cyberextortion
cyberterrorists

43
Q

Information transmitted …………..

A

has a higher
degree of security risk than information kept on an
organization’s premises

43
Q

Web site that evaluates
your computer to check for Internet and e-mail
vulnerabilities

A

online security service

43
Q

affects the computer negatively by altering the way the computer works

A

virus

44
Q

copies itself repeatedly, using up resources and shuttinh down the computer network

A

worm

45
Q

a malicious program that hides within or looks like a legitimate program

A

trojan horse

46
Q

program that hides in a computer and allow someone from a remote location to take full control

A

rootkit

47
Q

infected computer has

A

slow operating system
less memory
files being corrupted
files being deleted
screen displays unusual message or image

48
Q

hardware
and/or software that
protects a network’s
resources from intrusion

A

firewall

49
Q

analyzes all network traffic
assess system vulnerabilities
identifies any unauthorized intrusions

A

intrusion detection software

50
Q

vulnerable computer that is set up to entice an intruder to break into it

A

honeypot

51
Q

is the use of computer or network without permission

A

unauthorized access

52
Q

is the use of computer or its data for illegal; or unapproved activities

A

unauthorized use

53
Q

who can access a computer, when they can access
it, and what actions they can take

A

Access controls

54
Q

CAPTCHA

A

Completely Automated Public Turing test to tell Computers and Humans Apart

55
Q

any item
that you must carry to gain
access to a computer or
computer facility

A

possessed object

56
Q

authenticates a person’s identity
by translating a personal
characteristic into a digital code
that is compared with a digital
code in a computer

A

biometric device

57
Q

is the act of stealing computer equipment

A

hardware theft

58
Q

act of defacing or destroying computer equipment

A

hardware vandalism

59
Q

steals software media
intentionally erases programs
illegally copies a program
illegally registers a program

A

software theft

60
Q

occurs when someone steals
personal or confidential information

A

Information theft

61
Q

a process of converting readable data
into unreadable characters to prevent unauthorized
access

A

encryption

62
Q

is the prolonged malfunction of a computer

A

System Failure

63
Q

factors can lead to system failure

A

–Aging hardware
–Natural disasters
–Electrical power problems
*Noise, undervoltages, and overvoltages
–Errors in computer programs

64
Q

Two ways to protect from system failures

A

surge protectors and
uninterruptable power supplies (UPS

65
Q

Health Concerns of Computer Use

A

Repetitive strain injury (RSI)
–Carpal tunnel syndrome (CTS)
–Computer vision syndrome (CVS)

66
Q

applied science devoted to
incorporating comfort, efficiency, and safety into the
design of items in the workplace

A

Ergonomics

67
Q

viewing angle

A

20 degree

68
Q

viewing distance

A

18 to 28 inches

68
Q

elbows

A

90 degree

69
Q

keyboard height

A

23 to 28 inches

70
Q

adjustable chair

A

4 to 5 legs for stability

71
Q

feet

A

flat on floor

72
Q

occurs when the computer consumes someone’s entire social life

A

Computer Addiction

72
Q

 craves computer time
 overjoy when at the computer
 unable to stop computer activity
 irritable when not at the computer
 neglects family and friends
 problems at work or school

A

computer addiction

72
Q

guidelines that govern the use of computers and information systems

A

computer ethics

72
Q

not all information in the web is correct

A

information accuracy

72
Q

the rights to which creators are entitled
for their work

A

 Intellectual property rights

72
Q

written guideline that helps determine whether
a specific computer is ethical or unethical.
written guideline that helps determine whether
a specific computer is ethical or unethical.

A

IT CONDUCT of CODE

73
Q

protects any tangible form of expression

A

copyright

73
Q

reducing the electricity and environmental
waste while using a computer

A

green computing

74
Q
  • do not leave the computer running
    overnight
  • recycle paper
  • recycle toner cartridges
  • use paperless methods of
    communicate
A

ways to keep green computing

74
Q

right of individuals and companies to deny
or restrict the collection and use of information
about them

A

 INFORMATION PRIVACY

75
Q

huge databases store data online
important to safeguard your information

A

INFORMATION PRIVACY

75
Q

small text file that a web server stores on the computer

A

cookie

76
Q

unsolicited email message

A

SPAM

77
Q

send an official looking email that attempts to obtain personal and financial information

A

phishing

78
Q

attempts to obtain personal and financial info through spoofing

A

pharming

79
Q

WEBISITES USE COOKIES FOR:

A

allow for personalization
store users’ password
assist with online shopping
track how often users visit a site
target advertisement