Overall Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What are some areas where clinical scientists may work with medical IT?

A

Access patient records, patient calculations, patient reports, system management, R&D, software development, data acquisition and analysis, computer modelling, procurement, corporate user (emails etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The role of the clinical scientist is in every part of the life cycle of a system, what are the stages of the lifecycle?

A

Planning, specification, procurement, installation, acceptance, commissioning, QA, maintenance, clinical user, decommissioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Instead of a comprehensive electronic health/patient record that includes all information, what typically happens?

A

Subset of a patients record focussed on a particular discipline (eg radiology system) that communicate data with each other, could all look like one system from the outside

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do we ensure that the system knows patient A in one system is the same as patient B in a different system?

A

Master patient index (MPI), links a unique identifier (eg NHS number) and the real patient (links patient data across various sources)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a patient administration system (PAS)?

A

Central admin system that knows about the patients new into the organisation and their appointments. Might include basic info of test results and their doctors. (could include master patient index but not always)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the main radiology systems?

A

Radiology Information System (RIS) and Picture Archive and Communications System (PACS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purposes of a Radiology Information System (RIS)?

A

Scheduling of imaging, resource management, inventory tracking, reporting of imaging, presentation of reports, report sign-off, billing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purposes of a Picture Archive and Communications System (PACS)?

A

Storage of images and other data, visualisation of images and data transfer between systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Instead of having a PACS workstation to access the PACS server and a RIS workstation to access the RIS server, what do we usually have instead?

A

Have a web server that collects information from the PACS and RIS servers, then a workstation accesses this central point to show the end user both together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a modality in medical IT?

A

Any computer controlled clinical equipment (eg scanners, workstations, potentially software packages)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does it mean that most imaging equipment (eg scanners) are standalone equipment?

A

Not reliant on other components so they can work in isolation and perform their basic function (eg could scan without workstation working)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Is a server (could be one or multiple machines) a virtual central point that everything is going through?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is connected to a server (eg for PACS or OMS) in medical IT?

A

A database, storage, client applications and modalities (client = using data, modality = adding to data, could be the same thing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does a database tend to store?

A

Basic text data and numbers (eg records, file names of images)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does ‘storage’ from a server tend to store?

A

Images (binary type data) - larger files than database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the main radiotherapy systems?

A

Treatment Planning System (TPS), dose checking system, Record and Verify (RV or VR) System (at linac) and Oncology Management System (OMS) (equivalent to EHR, RIS, PACS and PAS together)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does networking allow?

A
  1. A complex system to be made up of connected individual components
  2. One clinical system to communicate with another
  3. Multiple systems to be used in the care of a patient
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the two ways that a network can be represented diagramatically?

A

Logical diagram (how systems link to each other and focuses on flow of data) and physical diagram (physical connections between components)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are different types of architecture of network applications?

A

Client/server, standalone, hybrid and peer to peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the client-server architecture of network applications?

A

Separates tasks between the providers of a resource or service called servers and service requester called clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the peer to peer architecture of network applications?

A

One system sends direct to another without going through some sort of intermediary (like a server)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Why should we be sceptical of client-server architectures?

A

It can be confusing as to where the client is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is an extreme form of the client/server architecture?

A

Application servers (applications presented via a web browser and all processing performed on server)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does the acronyms in the ISO OSI model of networking stand for?

A

ISO = International Standards Organisation
OSI = Open Systems Interconnection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Why is a model of networking like the ISO OSI model required in order to transfer data instead of sending data directly?

A

It wouldn’t work because there’s different operating systems, different suppliers and different protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the ISO OSI model of networking for?

A

Standardised model of transferring information by breaking the data down until you can physically transfer the data (eg cable, microwave transfer etc) before rebuilding the data until it can be interpreted on the other side

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are the 7 stages on each side of the ISO OSI model of networking?

A

Application layer, presentation layer, session layer, transport layer, network layer, data link layer and physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What model has replaced the ISO OSI model of networking and the one we typically use for hospital networks?

A

TCP/ IP model (Transmission Control Protocol/ Internet Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

How many layers are in the TCP/ IP model?

A

5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are the layers of the TCP/ IP model?

A

Application layer, transport layer, internet layer, data link layer and physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which layer does the Transmission Control Protocol (TCP) operate in the TCP/ IP model?

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What layer does the Internet Protocol (IP) operate in the TCP/ IP model?

A

Internet Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What could be counted as the Application Layer of TCP/ IP model?

A

What we interact with on the computer (PACS or email client for example)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

The Internet Protocol (IP) in the TCP/ IP model is implicitly referring to what version?

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What other version is sometimes used in the Internet Protocol (IP) in the TCP/ IP model?

A

6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Why was version 6 of the Internet Protocol introduced?

A

There was a concern that we would run out of addresses with version 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is the Internet Protocol (IP) in the TCP/ IP model for?

A

It is a way of uniquely identifying a device’s interface on a network to facilitate data transfer to that interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

An IP version 4 address is how many bits and represented by how many bytes?

A

32 bit number represented by a series of 4 bytes. (4 lots of 3 numbers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A byte in an IP v4 address is a number in what range?

A

0 to 255 (2^8=256 values)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

How is an IP v4 address usually represented?

A

aaa.bbb.ccc.ddd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

How many possible address are there for the IP v4 format?

A

2^32 (4 billion)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What restrictions must an IP address have?

A

It must be unique on a network, each byte between 0-255 and other devices know how to reach each

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Two computers on a network will both have what?

A

Each have a network card with an IP address on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

There’s a rule with the Internet Protocol that network devices are only allowed to accept what information?

A

Information that has been intended for that network device (so information may get sent along a network connection but get rejected at the device)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What are methods of transferring data between devices in a network with IP address?

A

Direct connection, connection via hub, connection via switch, connection via gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is the connection via hub method of transferring data to different connected devices with IP addresses?

A

The hub passes data to all connected devices, which gets rejected by all except the one that it is intended for (don’t often see hubs today)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Why did switches replace hubs for transferred data between devices?

A

It is inefficient to send large volumes of data to every device so the network can easily be paralysed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is the connection via switch method of transferring data to different connected devices with IP addresses?

A

The switch passes data on to the intended device in the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is the benefits of using a connection via switch to transfer data to different connected devices with IP addresses?

A

More secure and efficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Do switches have an IP address itself and why?

A

Yes because bigger networks have multiple switches for each subnet that send data between them before going to a different device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What number do switch IP addresses use as the final number?

A

1 by convention (not always)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

With multiple switches in a bigger network, how do they communicate with each other to transfer data to a connected device?

A

Via the ‘gateway’ of the first switch (or router) before going to the next switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

When is a gateway required when transferring data with IP addresses?

A

When you need to transfer data outside of your network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What is a router?

A

A special class of a switch and its job is to connect lots of networks together so connected to lots of other routers or switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is the group name for these devices: hub, switch, gateway, router?

A

Infrastructure components or network devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What is a subnet?

A

It is a sub-network that is part of a larger network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What two pieces of information defines a subnet?

A

Subnet address (any address in the range but usually the first one) and a netmask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What do the numbers in the netmask represent?

A

Which numbers are allowed to change or not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What is the purpose of a network?

A

It allows us to work out what’s on the same network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Do you ever have a zero in the middle of a net mask?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

If a netmask is 255.255.255.0, what does this mean?

A

The first three sets of numbers of an IP address aren’t allowed to change in order to be in the same network but the fourth number is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

In technical documentation, a representation of an IP address will have a / sign then the number of bits, how is this calculated?

A

In the netmask, each 255 is 8 bits and 128 is 1 bit (240 is 4 bits) so add them up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What are private subnets?

A

Private IP address ranges which can be allocated at will but must not appear on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

How many private subnets are there?

A

3 (technically 4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Why are private subnets used? (could be at home or internally within organisations)

A

Convenient as can allocate at will and secure as they do not appear on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What are the 3 IP addresses that are private subnets?

A

10.0.0.0 (class A)
172.16.0.0 (class B)
192.168.0.0 (class C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What is the netmask for the private subnet 10.0.0.0 (class A) and how many bits are in it?

A

255.0.0.0 and 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What is the address range for the private subnet 10.0.0.0 (class A)?

A

10.0.0.0 - 10.255.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What is the netmask for the private subnet 172.16.0.0 (class B) and how many bits are in it?

A

255.240.0.0 and 12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

What is the address range for the private subnet 172.16.0.0 (class B)?

A

172.16.0.0 - 172.31.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What is the netmask for the private subnet 192.168.0.0 (class C) and how many bits are in it?

A

255.255.0.0 and 16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

What is the address range for the private subnet 192.168.0.0 (class C)?

A

192.168.0.0 - 192.168.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

What is Network Address Translation (NAT)?

A

A mechanism by which traffic from a host on a private subnet can be directed to the Internet and it allows ranges of addresses to be reused

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

What handles Network Address Translation (NAT)?

A

Switches and other network infrastructure components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

How do you get replies when using a private subnet and network address translation?

A

The traffic from your address is tagged in transit so replies are routed back to your private address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What is the 4th type of private subnet called?

A

Loopback address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

What is the IP address for the loopback address?

A

127.0.0.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

What is the purpose of the loopback address?

A

It directs traffic back to the local computer without it reaching any ‘real’ network interface so it allows network services to operate without a network being present

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

What is the address range for the loopback address 127.0.0.1?

A

Any address in 127.0.0.0/8 (so any address starting with 127)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

How many bits is an IP version 6 address?

A

128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Why are IPv6 sometimes not used in a healthcare environment?

A

Compatibility issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

In an IP version 6 address, how many sections are there that are bounded by a colon?

A

8 (8 lots of 4 characters)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

What is the Transmission Control Protocol (TCP)?

A

It manages data transfer as a series of bundles of information called packets, which each have a series of bytes, instead of all the data and these are sent across a network then reassembled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

What is the structure of a TCP packet from top to bottom?

A

TCP header, length, source port, destination port, sequence number, checksum, other information and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

What does the TCP header in the TCP packet do?

A

It identified it as a TCP packet (useful for a switch)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

What do the sequence number in the TCP packet do?

A

It allows assembly of the data block by describing what order the packets should be place in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

What is the checksum in the TCP packet?

A

It is a number generated from a calculation of the data and if it is repeated with a different result, we will know corruption has occurred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Behind every IP address, there could be multiple applications communicating on that device, what are these called?

A

Ports or internet sockets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

What is the form of a port number?

A

Any 16 bit integer (0 - 65,535)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

How is the port number identified for a certain IP address?

A

It is following a colon after the IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Below what port number is reserved for specific applications?

A

1024

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Other than TCP packets, what other type of packet could there be?

A

Universal Datagram Protocol (UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

For TCP packets, are packets acknowledged as they are received?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

What is the structure of UDP packets?

A

UDP header, source port, destination port, checksum, and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Are UDP or TCP packets more simple?

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

When are UDP packets used?

A

Streaming information when data integrity is not as important but it is quicker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

For UDP packets, are packets acknowledged as they are received?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Who allocates the standard reserved ports?

A

Internet Assigned Numbers Authority (IANA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

What is the Media Access Control (MAC) Address and what is its format?

A

Physical address of a physical device eg the hardware (IP address is a virtual address on a network). 6 lots of 2 separated by colons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

What layer of the IP/TCP model does the Media Access Control (MAC) address operate?

A

Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

How is the Media Access Control (MAC) Address represented?

A

By 6 bytes with a unique prefix for the manufacturer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Typically, does every network interface have a globally unique MAC address or can they be reused?

A

Globally unique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

What terms are used to describe the scale of a network?

A

Local Area Network (LAN), Wide Area Network (WAN) and Metropolitan Area Network (MAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

What does a Local Area Network (LAN) refer to?

A

Small geographical area (could be a hospital or a room, difficult to define exactly)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

What is a Metropolitan Area Network (MAN)?

A

Special case of a WAN (Wide Area Network) distributed over a city

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

What is the Health and Social Care Network (HSCN)? (used to be N3)

A

Private network linking NHS and special care organisations (can include private suppliers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

What does the Directory Name Service (DNS) do?

A

They link hostnames (eg website address) to IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

What do Virtual Private Networks (VPN) do?

A

Allow secure connections to networks from external locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

How do VPNs work in hospitals?

A

It creates an encrypted tunnel from the network device (eg home PC) back to the hospital server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

What is the ethernet?

A

A family of wired computer networking technologies used in LANs, WANs, MANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

What is network bandwidth sometimes referred to as?

A

Maximum throughput

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

What is the network bandwidth?

A

The rate at which data can be transferred in one direction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

What is the units for network bandwidth?

A

Data volume per unit time, eg Megabits per second (Mbps)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

What factors could affect the network bandwidth?

A

Data transport process speed (eg a packet must be acknowledged every time it is received for TCP), connection may be half or full duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

What does it mean for a network connection to be half or full duplex?

A

Half duplex is when only one party can communicate at a time whereas full duplex, both parties can communicate simultaneously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

How many bytes are in one kilobyte?

A

2^10 bytes = 1024 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

How many bytes are in one megabyte?

A

2^10 x 2^10 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

How many bytes are in one gigabyte?

A

2^10 megabytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

What is the definition of network latency and its units?

A

The time taken for a packet to travel from the sender to receiver. Units of time, usually milliseconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

What are some of the purposes of a ping?

A

It verifies a route between source and destination exist, measures network latency, for example

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

What are the main two data exchange standards that we are concerned with?

A

DICOM and HL7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Why are data exchange standards required?

A

Standardised language is important so that different components (with different manufacturers) can communicate with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

What is an open standard?

A

A standard that is available to everyone (may be free or not) that anybody who wants to implement that standard is able to follow the rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Are DICOM and HL7 open standards?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Are TCP/IP and UDP open standards?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

What are the different levels of sources of standards and an example of each?

A

International Standards Organisations (eg ISO), National Standards Organisations (eg BSI), Professional Standards (eg IPEM, NEMA) and Corporate/Organisational Standards (eg NHS DAPB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Is adherence to standards voluntary or mandatory?

A

Generally voluntary but it may be written in law eg Health and Social Care Act (depends on the country whereas the standard is the same regardless of where its implemented)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

What does DICOM stand for?

A

Digital Imaging and COmmunications in Medicine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

What does DICOM cover?

A

Digital images and associated data (eg date and time, name of operator, respiratory motion)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

What body coordinates DICOM?

A

NEMA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

Who is DICOM mainly for?

A

Mostly manufacturers but also users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

What version of DICOM are we on?

A

3.0 (different years after but always 3.0)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

What is the scope of DICOM?

A

Standard data types and services, transfer of data across a network, storage onto media, compatibility between systems (conformance with standards), data compression, security, image display and output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

What is a data element according to DICOM?

A

Unit of information with defined data type and structure. Standard elements are uniquely indexed by a tag and name (eg patients name, slice position)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

What is an information object according to DICOM?

A

Set of elements which together describe a physical entity (eg CT slice, digital radiograph). Subcategory of this is an instance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

What is a service class/ group according to DICOM?

A

Action that can be performed on information objects (eg transferring data, archiving, printing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

What is a Service Object Pair (SOP) in DICOM?

A

A defined action which can be performed on a particular object (eg storage of a CT slice)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

What is the name and its acronym for the group of service classes in DICOM?

A

DICOM Message Service Element (DIMSE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

What are the most common DIMSE service classes under DICOM?

A

Verification, storage, query, retrieve, printing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

What three pieces of information is needed to uniquely identify a system in a DICOM environment?

A

IP address or hostname, port for receiving data, Application Entity Title (AET)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

Under DICOM, service classes can by implemented by application software by who?

A

Service Class User (SCU) or Service Class Provider (SCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

What could be an example of Query/Retrieve under DICOM?

A

A user querying a piece of information from PACS and then PACS sending it back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

What are Unique Identifiers (UIDs) that are used in DICOM (not only DICOM uses this)?

A

String of up to 64 characters (0-9 and full stops) in length that are assigned to SOP (Service Object Pair) classes and assigned to instances of objects. Globally unique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

What does each part for the Unique Identified (UID) under DICOM represent?

A

DICOM. country, root owner (eg manufacturer) and any numbers to make it unique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

A DICOM file has what prefix to show it is a DICOM file?

A

DICM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

What is an example form of a tag in a DICOM file that is unique to the data type?

A

Example (0010, 0010)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

What is the Endian in DICOM?

A

Transfer syntax - the way in which bytes are numerically stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

What are the different types of Endian?

A

Implicit VR Little Endian, Explicit VR Little Endian and Explicit VR Big Endian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

What form of Endian must every system be able to speak?

A

Implicit VR Little Endian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

What is DICOM conformance?

A

How a system has been designed to implement a standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

What is a DICOM conformance statement?

A

It specifies supported information objects, service classes, SOPs. communication protocols and storage protocols (says what it does, not what it doesn’t do)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

What are the benefits of DICOM?

A

Widely accepted standard format (improve compatibility and well defined standard objects/ services), robust, reliable format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

What are the limitations of DICOM?

A

Conformance does not guarantee compatibility, complex standard and very broad scope, may require complex local configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

What could be some issues with DICOM?

A

Incompatibility between systems, configuration problem, unexpected results, proposed development of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

What does HL7 stand for?

A

Health Level 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

Whereas DICOM is more in the realm of clinical scientists, who manages HL7 in a healthcare organisation?

A

IT and informatics departments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

Who manages HL7?

A

HL7 Consortium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

What type of data is HL7 concerned with?

A

Communication of message between clinical information systems (text or numerical data, not image) eg patient demographics, scheduling infor, lab results, radiology results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

If PACS looks at DICOM mostly (not strictly), what standard does RIS use typically?

A

HL7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

What is the name of how to convert an appointment list in HL7 to DICOM?

A

DICOM worklist format from PACS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

What is the HL7 message format?

A

A message is a series of segments which themselves contain a series of composites (fields)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

What versions of HL7 do we typically use?

A

Version 2.x (2.6 most commonly used) or Version 3 (mostly NHS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

What is the form of HL7 version 2.x messages?

A

Binary or ASCII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

What is the form of HL7 version 3 messages?

A

XML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

What are Integration Engines (also called Trust Integration Engines/ TIEs in the NHS)?

A

Convert one HL7 feed into multiple feeds by data mapping between input feed and outputs (eg change NHS number to hospital number for a particular system)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

When is the only time physicists are involved with HL7?

A

If it affects a physics managed system (eg radiotherapy OMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

What does the organisation with the acronym IHE stand for?

A

Integrating the Healthcare Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

What do IHE do?

A

They work with manufacturers to improve compatibility between systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

What are IHE Profiles?

A

Standard ways of communicating between systems, typically using DICOM and HL7, for particular real-world applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

What are the ‘Integration Statements’ that manufacturers release?

A

Which IHE Profiles they meet with a particular product

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

What is information governance?

A

Rules to keep data safe

172
Q

What could happen if we do not have information governance?

A

Lack of trust from patients leads to them withholding vital information for their care and reseacrh

173
Q

What does the IAO role stand for and who is usually in this role in an NHS Trust?

A

Information Asset Owner and department heads

174
Q

What does the SIRO role stand for and who is usually in this role in an NHS Trust?

A

Senior Information Risk Owner and board level member

175
Q

What does the IAA role stand for and who is usually in this role in an NHS Trust?

A

Information Asset Administrator and operational staff responsible for set information assets

176
Q

What UK laws matches with the EU General Data Protection Regulation (GDPR) 2016?

A

Data Protection Act 2018 and UK GDPR

177
Q

Who administers both the Data Protection Act (DPA), GDPR and Freedom Of Information Act (FOIA)?

A

Information Commissioner’s Office (ICO)

178
Q

Does the Freedom Of Information Act (FOIA) 2000 allow people to access their own personal data or information about an organisation and what it is doing?

A

General and specific information about the organisation and what it is doing. Not about personal data to people

179
Q

Does DPA and GDPR refer to general information about an organisation or personal information about a specific individual?

A

Personal information about a specific individual

180
Q

What does Personal Data refer to under GDPR?

A

Information than can identify a person either directly or indirectly

181
Q

Under GDPR, what is the difference between the Data Controller and the Data Processor?

A

The data controller determines the purposes and means of the processing of personal data, whereas the data processor processes the data on behalf of the controller

182
Q

What are the 7 +1 principles for processing personal data in Article 5 of GDPR?

A

(a) Lawfulness, fairness and transparency. (b) Purpose limitation. (c) Data minimisation. (d) Accuracy. (e) Storage Limitation. (includes disposal) (f) Integrity and confidentiality. (g) Security. (+1) (a) Accountability

183
Q

What is Article 6 of GDPR concerned with?

A

Lawful bases

184
Q

What is Article 7 of GDPR concerned with?

A

The prohibiting of processing special categories of personal data (eg racial, political etc), and permissions of when this is allowed

185
Q

Data can be stored via Retention Policies and sometimes can be transferred to a PoD, what is this?

A

Place of Deposit, which is a secure location where data can be kept forever

186
Q

What is a Data Protection Impact Assessment under GDPR?

A

A process to identify and minimises data protection risks

187
Q

What is the DPO role under GDPR?

A

Data Protection Officer

188
Q

When is a Data Protection Impact Assessment required and who may be involved?

A

Any new processing that is likely to result in a high risk to individuals. DPO should be consulted and topic experts

189
Q

What should be included in a Data Protection Impact Assessment (DPIA)?

A

Nature, scope and context of processing. Assess necessity. Identify risks (likelihood and severity). Identify measures for mitigation

190
Q

What is the right of access under GDPR?

A

Individuals have the right to obtain a copy of their personal data, also called subject access

191
Q

What is the right of erasure under GDPR?

A

Individuals have the right to have personal data erased. Request can be declined but have to have a reason

192
Q

What is a personal data breach under GDPR and DPA?

A

Breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data

193
Q

Who should be notified when there has been a personal data breach that is likely to be a risk, as identified by an assessment?

A

ICO

194
Q

What is the difference between the Caldicott principles and GDPR? (they are quite similar)

A

Caldicott is only for the best interest of the patient, not legal

195
Q

What are the Caldicott principles for?

A

Ensure people’s information is kept confidential and used appropriately. Refers to patient-identifiable information.

196
Q

What are the 7 Caldicott principles?

A

Justified purpose. Only when necessary. Only use minimum. Access restricted (need-to-know). Understand your responsibility. Comply with law. Duty to share can be as important as duty to protect patient confidentiality

197
Q

Should the Caldicott be different or the same person as the SIRO?

A

Different

198
Q

Do all NHS Trusts need a Caldicott Guardian?

A

Yes

199
Q

What is the Computer Misuse Act?

A

Criminalises unauthorised access to data

200
Q

What is the aim of the Freedom of Information Act?

A

Drive transparency in the affairs of public authorities with publication schemes and gives people access to information

201
Q

Whereas as GDPR request can be by any means, how do Freedom of Information Act request have to be?

A

In writing (including email) with a clear description of the information required

202
Q

What are absolute exemptions to Freedom of Information Act requests?

A

Personal information, accessible by other means, security, court records

203
Q

What is the only criminal offence under the Freedom of Information Act?

A

Alter, deface, block, erase or conceal any record with the intention of preventing disclosure

204
Q

In GDPR, under the article 5 principle about storage limitation (e), what does it say about identification?

A

Data should be kept in a form that permits identification of data subjects for no longer than is necessary for the intended purpose

205
Q

Where are the retention guidelines for data storage limitation?

A

NHS Code of Practice

206
Q

What is anonymisation?

A

Process of de-identifying data so that the data subject cannot be identified (can’t go back - extreme de-identification)

207
Q

Does GDPR apply to anonymised data?

A

No, it is no longer personal data but still under other rules

208
Q

What is de-identification?

A

Identity of an individual removed from a dataset (doesn’t need full de-identification, can be partial)

209
Q

What is functional anonymisation?

A

De-identification performed such that the risk of re-identification is deemed acceptable (as it is impossible to prove no risk)

210
Q

What is pseudonymisation?

A

Dataset de-identified with a link maintained back to the individual (can look anonymous superficially)

211
Q

What is the risk appetite?

A

Level of risk that is acceptable

212
Q

What is the risk assessment process for data-related tasks?

A

Consider the data situation, risk appetite and sensitivity. Do risk assessment using this information, decide if risk is acceptable and mitigate risks if not. Perform task and verify original requirements are met. Record it all

213
Q

According to the ICO, is consent required for the process of deidentification?

A

No, if there is no likelihood that anonymisation will causes unwarranted damage or distress

214
Q

What does it mean when patient data is ‘de-identified to the point of publication’?

A

Data does not contain direct or indirect identifiers and no reasonable prospect of the patient being identifiable

215
Q

What is the difference between pseudonymisation and anonymisation?

A

Whether there is other data (like a mapping table) that links patient to pseudonym or is some way recoverable (eg decryption or finite number of codes). Pseudonymisation is reversible or some way able to link back but anonymisation is not

216
Q

Is pseudonymised data covered by GDPR?

A

No

217
Q

What is data reduction?

A

Data processed to extract only what is required for subsequent study (eg radiomics - method that extracts features from medical images)

218
Q

Why is it important to have at least 3-5 people in a category of de-identified data and what is a good way of doing this?

A

A small cohort makes it easier to identify a person. Use ranges for characteristics (eg age or height in a range)

219
Q

What are the three key principles of information assurance?

A

CIA triad: Confidentiality, integrity and availability. (article 5 (f) GDPR)

220
Q

What is an information assurance audit?

A

Regularly reviewing performance against standards, codes of practice and/or best practice

221
Q

What practical element for clinical systems may lead to having to compromise on it being a robust IT system?

A

It also needs to fulfil a clinical function effectively, so needs to balance both

222
Q

What toolkits are there for top management to use for information security management?

A

Information Governance Toolkit and Data Security and Protection Toolkit

223
Q

What does NCSC stand for?

A

National Cyber Security Centre

224
Q

There are data security standards from the National Data Guardian. They are split into groups called what and what are do each of these groups address?

A

Leadership obligations is the name of the groupings. People, process and technology issues.

225
Q

What is the Digital Technology Assessment Criteria (DTAC) and what is it used for?

A

Brings together legislation and best practice during procurement of digital technology (health IT systems) and can be used by the NHS or manufacturers

226
Q

Are you allowed to use equipment if it doesn’t pass the DTAC?

A

Yes but have to accept the risk

227
Q

What is a medical image?

A

Representation of the human body that depends on the physics of the imaging process

228
Q

Is data lost in a processed image (including image fusion)?

A

Yes

229
Q

What is ImageJ used for?

A

Mainly direct image processing applications and troubleshooting

230
Q

What is IQWorks used for?

A

Evaluation of image quality

231
Q

What does MHRA stand for, which is an agency of the UKs Department of Health and Social Care?

A

Medicines and Healthcare products Regulatory Agency

232
Q

Who manages the public access register of medical devices on the UK market?

A

MHRA

233
Q

What does IEC stand for? (similar to ISO)

A

International Electrotechnical Commission

234
Q

What is the EU regulation name for medical device regulation?

A

Medical Device Regulations (MDR)

235
Q

What is the UK regulation name for medical device regulation?

A

Medical Device Directive (MDD)

236
Q

What is the UK’s version of the EU CE mark?

A

UKCA

237
Q

What is in the scope of the Medical Device Directive (MDD)?

A

Any apparatus, appliance, or software, whether used alone or in combination, intended by the manufacturer to be used by human beings for a medical purpose (includes in vitro diagnostic devices)

238
Q

What is out of scope of the Medical Device Directive?

A

Research use only and in-house manufacture

239
Q

What do the MDR add to what is considered a medical device?

A

They are intended to be used for prediction, prognosis and products for cleaning/disinfecting medical devices

240
Q

What agency advises the UK as to whether software is a medical device (SaMD)?

A

MHRA

241
Q

What counts as ‘software’, when considering Software as a Medical Device (SaMD)?

A

Computer programmes or functional documents (eg pdf with treatment decision flow chart, spreadsheets for calculations, docs with macros)

242
Q

What determines whether a device has a medical purpose?

A

It is determined by what the manufacturer states in the device’s labelling, instructions for use and any promotional materials

243
Q

Why would a manufacturer not want a product to not be classed as a medical device?

A

Cost (eg accreditation) and bounded by law

244
Q

How do manufacturers of Software as Medical Devices (SaMD) meet regulation?

A

Ensure it is safe and effective with these stages: design, evidence collection (clinical evaluation), Conformity assessment, registration (with MHRA), labelling, place on the market or put into service, post market surveillance

245
Q

What are the classes for medical devices for a UKCA mark?

A

Class I (low risk), IIa, IIb, III (high risk)

245
Q

When are clinical calculators likely to be considered a medical device?

A

When the calculation/result cannot be easily verified

245
Q

Is software likely to be a medical device if it is an accessory to a specific medicine/device, intended to influence actual treatment or results in a diagnosis or prognosis?

A

Yes

246
Q

Are general fitness/wellbeing monitors likely to be considered to be for a medical purpose?

A

Not typically

247
Q

If the regulations are the ‘what’, standards are the …?

A

How

248
Q

What is the risk management international standard for medical devices?

A

ISO 14971 Medical Devices - Application of Risk Management To Medical Devices

249
Q

What are the clinical risk management standards for the NHS?

A

DCB0129 and DCB0160

250
Q

Why do we do software development?

A

Enhance or add functionality, research and development, automate processes, implement control systems, and manage instruments

251
Q

When is a Quality Management System required for software development?

A

When developing a medical device, but good practice otherwise

252
Q

What stages are in the ‘prerequisite’ section of software development?

A

Software planning, requirements analysis, architectural and detailed design

253
Q

What stages are in the ‘Construction/programming/coding’ section of software development?

A

Unit implementation and verification, integration and integration testing, and system testing

254
Q

What stages are in the ‘maintenance and governance’ section of software development?

A

System testing, software release, maintenance plan, risk management, change control

255
Q

What is the Unified Modelling Language (UML)?

A

It is a standardised graphical language with its own syntax and semantics

256
Q

What is the purpose of Unified Modelling Language (UML)?

A

Representing design entities and relationships, like a system’s architectural blueprint diagram. Useful for software development

257
Q

Why is it important that the Unified Modelling Language (UML) is standardised?

A

It supports common understanding in communicating design ideas

258
Q

What are the 6 stages of the software development lifecycle (SDLC)?

A

Plan, design, implement (code), test, deploy, maintain

259
Q

What are SDLC (software development lifecycle) models for?

A

It presents the lifecycle in an organised fashion to help organisations implement it

260
Q

What are some SDLC (software development life cycle) models?

A

Waterfall model, V-model and agile model

261
Q

What is the waterfall model for SDLC?

A

It is a linear and sequential model, where the next development phase cannot begin until the previous phase is completed with no overlap

262
Q

What is the V-model for SDLC also called?

A

Verification and validation model

263
Q

What is the V-model for SDLC?

A

It is sequential with an associated testing phase with each development phase at the same time. Where one side of the V is design and the other side is testing and the bottom is implementation (coding)

264
Q

What is the difference between validation and verification?

A

Validation is whether it matches the users requirements and verification is whether it matches the design and it works as planned

265
Q

What is the agile model for SDLC?

A

Quick development cycle with incremental improvements (iterations) with regular testing and lots of iterations as only small and few changes each time

266
Q

What are the main types of software development testing?

A

Verification and validation

267
Q

What are sub-categories of verification testing?

A

Unit tests (restricted to a block of code), integration testing (modules working together), system testing

268
Q

What are sub-categories of validation testing?

A

User acceptance testing (meets specification) and clinical validation testing (does it benefit as expected)

269
Q

What other types of software development testing are there? (other than verification and validation)

A

Usability, compatibility, security, compliance, accessibility, and performance and stress testing

270
Q

What is continuous integration in software development?

A

A set of tests automatically running at each build

271
Q

What is test driven development for software?

A

Developers start by writing a test which verifies that the intended functionality outcome is achieved and then work to make sure the software passes the test

272
Q

What is behaviour driven development for software?

A

It focusses on behaviour of an application from the end users perspective. It creates a specification and acceptance criteria first

273
Q

What organisational requirement documentation is needed for software development?

A

Software development policy, style guide and training records

274
Q

What project specific documentation is needed for software development?

A

Justification document, medical device assessment, risk assessments/ hazard log, software requirements spec, software-specific design documentation, verification/ validation evidence, version tracking, user manual, clinical safety report

275
Q

What is pseudocode?

A

Informal language a human could speak for describing how an algorithm or a program will work

276
Q

What is the name for the specific approach to using pseudocode to streamline the creation of code within routines?

A

Pseudocodes Programming Process (PPP)

277
Q

What are some of the rules that should be followed with pseudocode?

A

Natural language, avoid programming language, write at the level of intent (meaning rather than how it will be implemented), low level with more detail, pseudocode should be comments of code

278
Q

What should the layout of code be?

A

Self-documenting (eg appropriate names of variables and procedures), process flow should e clearly identified and written in files that can easily navigated

279
Q

What is debugging?

A

The process of identifying the root cause of an error and correcting it

280
Q

What are the steps of the debugging process?

A

Error identification (either in testing or using the software), error analysis, and fix and validation

281
Q

What is a relational database?

A

A type of database that stores and provides access to data points that are related to one another in the form of tables

282
Q

What is a database?

A

An organised collection of data or a type pf data store based on the use of a database management system (DBMS)

283
Q

What are the two types of traditional data processing systems of databases?

A

On-Line Transaction Processing (OLTP) and On-Line Analytical Processing (OLAP)

284
Q

What does ACID stand for (about databases)?

A

Atomicity, Consistency, Isolation, Durability

285
Q

If a database transaction is compliant with the properties of ACID, what does it guarantee?

A

Data validity and integrity despite errors, power failures and other mishaps with transactions

286
Q

What is a transaction in terms of databases?

A

A sequence of database operations (single logical operation) that satisfies the ACID properties

287
Q

When is online transaction processing (OLTP) used?

A

Transactional processing and real-time updates. Handles a large number of small transactions. ‘Line of business’ applications

288
Q

What type of database does online transaction processing (OLTP) use?

A

Relational databases

289
Q

Is online transaction processing (OLTP) and online analytical processing (OLAP) ACID compliant?

A

OLTP is but OLAP is not necessarily

290
Q

What is online analytical processing (OLAP) used for?

A

Data warehousing. It is used for analysing and extracting insights from large volumes of data

291
Q

What type of data processing system is typically used for PACS and RIS systems (and other clinical systems)?

A

OLTP

292
Q

Are OLAP and OLTP databases normalised on denormalised?

A

OLTP = normalised
OLAP = de-normalised

293
Q

What does it mean that OLTP databases are normalised?

A

Each piece of information is only stored once to minimise redundancy by reducing duplication that takes up storage

294
Q

What are the benefits of normalised databases and is it good for querying?

A

Quick to work on and updating all parts at the same time. Not good for querying

295
Q

The Kimball Star Schema model is what type of database?

A

OLAP database

296
Q

What are facts and dimensions in the Kimball Star Schema OLAP model?

A

Facts = events that have taken place and/or something we can measure and dimensions = information related to facts

297
Q

What is a Enterprise Bus Matrix? (made by Kimball)

A

A data warehouse planning tool, where the relationship between facts and dimensions are the matrix rows and columns

298
Q

What is the Extract, Transform and Load (ETL) process?

A

The process of combining data from multiple sources (extract), standardising it (transform - maybe deidentifying or reconciling) and putting it into a data warehouse (load)

299
Q

What sort of document do data warehouses tend to look like?

A

Excel spreadsheet

300
Q

What does granularity mean in relation to data warehousing?

A

How subdivided the information should be recorded. More granular = more detail. Should record in smallest grain possible

301
Q

What is the structured data type?

A

Anything standardised (eg numbers, results of calculations, codified text)

302
Q

What is the unstructured data type?

A

Not standardised (eg free text, hand written/ dictated document, images, tumour/OAR outlines)

303
Q

What type of database is suited for structured data types?

A

Regular data warehouse (OLAP)

304
Q

What can be done with unstructured data types?

A

More processing to make it structured to put in a data warehouse or put in NoSQL database

305
Q

What is the Structured Query Language (SQL)?

A

A standard programming language designed for accessing, modifying and extracting information from relational databases

306
Q

What are some database analysis tools?

A

Straight SQL queries (eg access, excel, matlab), business reporting tools, data exploration tools, ‘big data’ tools and data mining

307
Q

What is an alternative to data warehousing?

A

Data virtualisation

308
Q

What is data virtualisation?

A

For a query request from a client application, translating the query to a virtual database to pass on to retrieve information from a particular system, without requiring technical details about the data

309
Q

What is artificial intelligence?

A

Computers and machines to mimic the problem-solving and decision-making capabilities of the human mind

310
Q

What is machine learning?

A

A branch of artificial intelligence that focuses on the use of data and algorithms to imitate the way that humans learn, gradually improving its accuracy

311
Q

What are applications of AI in medical imaging?

A

Automating laborious or time-intensive tasks (eg automatic image segmentation, identifying images for further review, auto-contouring), accelerate MRI, patient scheduling

312
Q

What are general classes of AI models?

A

Image or data classification, regression (predict output based on input), object detection, generative AI

313
Q

What is the Turing test?

A

Measures the maturity of AI by seeing if a computer’s output is distinguishable from that of a human, then it passes the test

314
Q

What are reverse Turing tests being made for?

A

To distinguish between AI and humans

315
Q

What does the feedback loop do after an algorithm performs processing? (assuming it has a feedback loop)

A

Changes the outputs, whereas without a feedback loop, the model should always produce the same outputs for the same inputs

316
Q

Why can outputs be degraded when an AI model has a feedback loop?

A

The bias of the person submitting the inputs

317
Q

When training an AI model, what is each complete learning cycle called?

A

An epoch (internal feedback loop)

318
Q

When training an AI model, what do more epochs do?

A

Make the model more accurate but its longer to train

319
Q

What should the training inputs of an AI model be?

A

A broad range of data

320
Q

After an AI model has been trained, what type of parameters are saved?

A

Hyperparameters

321
Q

What different types of datasets are used for AI models?

A

Dataset for model development split into a training set, tuning set, and internal validation data set (unseen data) and dataset for model validation, which is an external validation set (unseen data)

322
Q

What is a confusion matrix as applied to AI models?

A

It is a matrix with the actual value (positive/negative) on one side and the output predicted value based on the model. Each square is then true/false positive and true/false negative

323
Q

What is the Receiver Operator Characteristic (ROC) curve and what would be ideal?

A

A graph of true positive against false positive, where ideally the area would be 1 (ie only true positives)

324
Q

What does each point on the Receiver Operating Characteristic (ROC) represent?

A

The true positive vs false positive rate at one decision threshold

325
Q

What are clinical scientist roles in AI?

A

User of AI, specifying applications for AI, training models, implementing and testing models, developing QA programme

326
Q

Why is bias an issue in AI models compared to humans?

A

Humans are adept at recognising situations not previously encountered and adapting accordingly, whereas models are not

327
Q

How do we reduce bias in AI models?

A

Sufficient breadth of training data. Maybe have different models for different groups. Test pre-trained models using data representative of local population. Ability to re-train model using local data

328
Q

What are some challenges with adopting AI?

A

Who can access the data, who is responsible for decision making, how to preserve transparency and inform patients accurately (GDPR article 5)

329
Q

What does GDPR article 22 say about the data subject’s rights in related to AI?

A

They have the right not to be subject to a decision based solely on automated processing, unless there is explicit consent

330
Q

Under IRMER, does the operator have to be a person or can it be AI?

A

Has to be a person

331
Q

What is a real-time system?

A

Any information processing system which must respond to externally generated input stimuli within a finite and specified period

332
Q

In a real-time system, is the failure to respond in time better or worse than a wrong response?

A

Equally bad

333
Q

What is an embedded system?

A

A combination of computer hardware and software designed for a specific function (embedded computer system - can include real-time components like a real-time computer)

334
Q

What are the levels of criticality in the classification of real-time systems?

A

Hard = imperative responses occur within deadline
Soft = deadlines are important but will still function if occasionally missed
Firm = soft but no benefit from late delivery of service

335
Q

What are examples of hard, soft and firm real-time systems?

A

Hard = flight control system or defibrillator
Soft = data acquisition system
Firm = on demand streaming of a videa

336
Q

What is the different roles of time in the classification of real-time systems?

A

Time-aware = system operation references absolute time values (eg starts when it turns on or certain wall clock time)
Reactive = system produces output within deadline as measured from input and references relative time values (eg control systems)

337
Q

What are the different structures of real-time systems?

A

Time-triggered (eg computation triggered by set time or periodic activity).
Event-triggered (computation triggered by an external or internal event)

338
Q

For event-triggered real-time systems, what is the difference between sporadic and aperiodic tasks?

A

Sporadic tasks have a known minimum inter-arrival time, whereas aperiodic can arrive at any time

339
Q

Why is guaranteed response times an important feature of real-time systems?

A

Need to know the worse case response times, as predictability is essenetial

340
Q

What are some characteristics of a real-time system?

A

Guaranteed response times, interacts with special purpose hardware, numerical computation, large and complex, extreme reliability and safety

341
Q

Do typical embedded configurations for real-time systems have an operating system?

A

No, the programme includes the operating system components

342
Q

What is the operating system for in real-time systems?

A

It acts as a translation layer between the user programme and the hardware

343
Q

Is an operating system (OS) configuration better or worse than an embedded configuration for real-time operation?

A

Worse, embedded is more simplified for real-time systems

344
Q

What are some real-time programming languages?

A

Java is commonly used, C, Ada

345
Q

What are the key concepts with reliability of a real-time system?

A

Faults, errors and failures, failure modes, fault prevention and fault tolerance, and redundancy

346
Q

What is the difference between safety and reliability with systems?

A

Safety is about avoiding harm and is the probability that conditions that can lead to mishaps do not occur.
Reliability is a measure of how well the system performs to its specification. Linked but different

347
Q

What is the link between failure, errors and faults of a system?

A

When a system deviates from its specified behaviour, this is a failure, and these are a result of errors (unexpected problems internal to the system) and their mechanical or algorithmic cause are called faults

348
Q

What are the different types of faults in a system?

A

Transient fault, permanent faults, intermittent fault (transient faults that occur from time to time)

349
Q

What are the two types of real-time system bugs?

A

Bohrbugs = reproducible and identifiable.
Heisenbugs = only active under rare conditions

350
Q

Does software deteriorate over time?

A

No it is either correct or incorrect but faults can remain dormant for long periods

351
Q

What is a bug?

A

A design defect in an engineered system that causes an undesired result.

352
Q

What are two approaches to faults?

A

Fault prevention (aims to eliminate possibility of faults before it goes operational) and fault tolerance (enables system to function in the presence of faults)

353
Q

What are the two stages of fault prevention?

A

Fault avoidance and fault removal

354
Q

What is failure modes and effects analysis (FMEA)?

A

A structured method to identify potential failure modes in a system and their causes and effects during the early design stages

355
Q

What are failure modes?

A

The ways, or modes, in which something might fail.

356
Q

What categories of failure modes are there and example of each?

A

Value domain (eg constraint or value error), timing domain (early, late, omission - fail silent, fail stop) and arbitrary (fail uncontrolled)

357
Q

How does fault avoidance attempt to limit the introduction of faults during system construction?

A

Reliable hardware components, refined techniques for interconnection of components, rigorous specification, proven design methodologies (software and hardware)

358
Q

What are examples of procedures for fault removal (finding and removing the causes of errors)?

A

Design reviews program verification, code inspections and system testing

359
Q

Why is system testing never able to be exhaustive and remove all potential faults?

A

Tests should the presence of faults, not absence. Realistic testing conditions difficult. Accuracy of simulation mode.

360
Q

What are the levels of fault tolerance?

A

Full fault tolerance, graceful degradation, fail safe, catastrophic failure (unacceptable)

361
Q

What is full fault tolerance?

A

System operates with faults with not significant loss of functionality of performance)

362
Q

What is gradual degradation? (level of fault tolerance)

A

Fail soft, system continues to operate in the presence of errors with partial degradation of functionality or performance during recovery or repair

363
Q

What is fail safe? (level of fault tolerance)

A

The system maintains its integrity whilst accepting a temporary halt in its operation

364
Q

What level of fault tolerance do most safety critical systems ideally have and what do many have in practice?

A

Ideally full fault tolerance but many settle for graceful degradation

365
Q

What is redundancy as a fault-tolerant technique?

A

Extra elements in a system to detect and recover from faults that are redundant as they are not required in a perfect system (called protective redundancy)

366
Q

Why is it difficult to know how much redundancy to include in systems for fault tolerance?

A

They are restrained by cost and size of the system, and also lead to more complexity, which can make it less reliable

367
Q

What is exception handling with errors in systems and software development?

A

An error recovery mechanism that happens when an anomalous event (exception) occurs in a programme. It avoids the system crashing and stops the disruption of the normal operation.

368
Q

What is the Directory Name Service (DNS)?

A

Phonebook of the internet, which translates domain names to IP addresses

369
Q

What is a domain name?

A

Human readable name thats associated with a physical IP address on the internet

370
Q

On a domain name, is the left or right hand sections (between full stops) a bigger group that controls the other side?

A

Right

371
Q

What does the Internet Assigned Numbers Authority (IANA) do?

A

Manage root DNS, coordinate allocation of IP addresses, protocol assignments

372
Q

What does https stand for?

A

Hypertext transfer protocol secure

373
Q

What is HTML?

A

The standard markup language that is used to structure a web page and its content.

374
Q

What does a web browser do?

A

Interprets HTML to render web page and calls HTTP methods against web server

375
Q

What is HTTP (hypertext transfer protocol)?

A

It is an application layer in the IP suite model (TCP/IP) for data communication on the world wide web and is used to load webpages using hypertext links

376
Q

What does HTML stand for?

A

HyperText Markup Language

377
Q

How is HTML written?

A

In the form of HTML elements, which include tags written between angled brackets. These tags are usually paired with the content located between a start and end tag

378
Q

Is HTML traditionally a programming language?

A

No, it is a markup language

379
Q

What number HTML is the current version?

A

5

380
Q

What tag indicates a document is HTML 5?

A

<!DOCTYPE html>

381
Q

What symbol is used at the start of an end tag in HTML?

A

\

382
Q

What is scripting?

A

It is a type of coding that makes websites interactive and automates tasks a human would normally complete

383
Q

What are the two types of scripting?

A

Client-side scripting = processed entirely by browser on the client device
Server-side scripting = processed at the server level and resultant HTML passed back to browser

384
Q

What is the difference between a web browser and web server?

A

A web browser is a software program used to access the world wide web (internet) and displaying pages, whereas a web server is the software that provides its users with the documents they request via their web browsers

385
Q

What is connected to a web server?

A

Database and storage on on side and web browswer on the other

386
Q

In client-side scripting, the web browser requests a page with embedded client-side script to the web server, what happens next?

A

Web server delivers requested web page with embedded script. Browser processes script and displays

387
Q

What are some client-side scripting languages?

A

JavaScript (can be used for both scripting types), HTML, CSS

388
Q

What are the advantages of client-side scripting?

A

Speed, simplicity, versatile, reduced server load

389
Q

What are the disadvantages of client-side scripting?

A

Less secure, difficulty in maintaining compatibility as a variety of client browsers

390
Q

In serve-side scripting, the client requests page with embedded client-side script to the web server, what happens next?

A

Web server processes script and delivers resulting page

391
Q

What are some server-side scripting languages?

A

Javascript, PHP, python

392
Q

What are the pre-requisites to server-side scripting?

A

Web server has appropriate scripting engine installed and web page name must have the correct file extension

393
Q

What are the advantages of server-side scripting?

A

Better to work with databases, no issues with client browser compatibility, can be run independently of client PC settings, more security for the data

394
Q

What are the disadvantages of server-side scripting?

A

Requires scripting software to be installed on the server and can be slower if server is busy

395
Q

What does XML stand for?

A

eXtensible Markup Language

396
Q

What is XML?

A

A markup language that is used for storing data as structured information and defines a set of rules to describe the content and structure of data in a document

397
Q

Does XML use tags (like HTML)?

A

Yes but the author invents these (in HTML, these are pre-defined)

398
Q

What is data encryption?

A

A security method that translate data into a code that can only be read by people with access to a secret key or password

399
Q

What types of data need to be encrypted?

A

Any sensitive information that could be: Data at rest, data in transit and data in use

400
Q

Does data encryption prevent interception of data in transit?

A

No, it denies the message content to the interceptor by making it unreadable

401
Q

What are the two main types of data encryption?

A

Symmetric and asymmetric

402
Q

What is symmetric encryption?

A

The same key is used for encryption and decryption. The key changes the content in some way

403
Q

What standard is currently being used as a symmetric encryption algorithm?

A

Advanced Encryption Standard

404
Q

What is the disadvantage of symmetric encryption?

A

Key must be kept secret, which can be difficult if exchanging over the internet or large network. Less secure than asymmetric

405
Q

What is a key used in cryptography?

A

A long, random and unpredictable string of letters and numbers used to encrypt or decrypt data

406
Q

What is asymmetric encryption?

A

A pair of mathematically linked keys (key pair) is used to encrypt and decrypt the data. One is a public key freely available to anyone and the private key is kept secret

407
Q

What are the different keys in asymmetric encryption used for?

A

The public key is used for encryption and the private key is used for decryption

408
Q

What are the disadvantages of asymmetric encryption?

A

Slower than symmetric encryption (more processing power). Concern of loss of private key

409
Q

What is a public key certificate?

A

An electronic document from the certificate authority to prove the validity of a public key and verifies the identity of its owner

410
Q

What is meant by a ‘good quality’ medical image?

A

Appropriate for the clinical application, optimised (image quality vs dose) and not necessarily the highest quality image possible

411
Q

What is undersampling/aliasing and how can it be avoided?

A

Not sampling data frequently enough, leading to an inability to resolve small details and artefacts. Solution = use a sampling frequency twice the frequency of the signal

412
Q

What does the ‘A’ in ACID mean?

A

Atomicity = each transaction is a single unit that either succeeds or fails - all or nothing process

413
Q

What does the ‘C’ in ACID mean?

A

Consistency = only data that follows database rules can be added

414
Q

What does the ‘I’ in ACID mean?

A

Isolation = multiple transactions at once don’t affect each other

415
Q

What does the ‘D’ in ACID mean?

A

Durability = Stable through system failure (eg power outage), ie once a transaction has been committed to a database, it will remain so

416
Q

What are the different categories of medical devices? (not classes)

A

Non-invasive, invasive (inserted into body’s orifices), surgically invasive, active (requires external power source) and implantable

417
Q

When is software as a medical device classified as class IIa?

A

When intended to provide info to make decisions for diagnosis or therapeutic purposes and if it is intended to monitor physiological processes (unless vital and lead to patients in danger for both instances = IIb)

418
Q

What are keys for in relational databases?

A

They maintain the relationship between the tables and also uniquely identifies the data from a table

419
Q

What is a primary key in relational databases?

A

It is a field (column) used to uniquely identify every record in the database

420
Q

What is a foreign key in relational databases?

A

A foreign key is a column or columns in a table that references the primary key of another table

421
Q

How many primary keys are allowed in a relational database table?

A

Only one

422
Q

In relational databases, is the primary key in one table a foreign or primary key in another table?

A

Foreign key

423
Q

In relational database tables, what is a typical primary key?

A

An identifier, like a patient ID or a car licence plate

424
Q

What is a data warehouse?

A

A type of database that stores highly structured information from various sources, and it contains both current and historical data to analyse large amounts of data

425
Q

What are data exchange standards?

A

They define a common format and give shared rules for data exchange