Review questions Flashcards

1
Q

A signature in the medical record serves which of the following purposes?
Select one:

a.
Identity

b.
Ownership

c.
Authorship

d.
Completeness

A

Intent: an electronic signature is a symbol that signifies intent such as an approval of terms, confirmation that the signer reviewed and approved the content, or the signer authored the document and approves the content.

Identity: the signature identifies the person signing.

Integrity: a signature guards the integrity of the document against repudiation (the signer claiming the entry is invalid) or alteration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The primary organizational goal for health information technology (IT) governance is to ensure that the:
Select one:

a.
Solutions chosen meet the needs of clinicians

b.
Expenditures for health IT solutions are appropriately tracked

c.
Board of Directors are adequately informed about health IT progress

d.
Investments in health IT generate business value

A

d.
Investments in health IT generate business value

Innovators - These are people who want to be the first to try the innovation. They are venturesome and interested in new ideas. These people are very willing to take risks and are often the first to develop new ideas. Very little, if anything, needs to be done to appeal to this population.

Early Adopters - These are people who represent opinion leaders

Early Majority - These people are rarely leaders, but they do adopt new ideas before the average person. That said, they typically need to see evidence that the innovation works before they are willing to adopt it. Strategies to appeal to this population include success stories and evidence of the innovation’s effectiveness.

Late Majority - These people are skeptical of change and will only adopt an innovation after it has been tried by the majority

Laggards - These people are bound by tradition and very conservative. They are very skeptical of change and are the hardest group to bring on board. Strategies to appeal to this population include statistics, fear appeals, and pressure from people in the other adopter groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The four major functions of radiologic picture archiving and communications system (PACS) include image acquisition, image archival, image transmission and
Select one:

a.
Radiology transcriptionists for checking the report

b.
Display stations for soft-copy viewing

c.
Financial systems for billing purposes

d.
Compute engines for image compression

A

acquisition, image archival, image transmission and image display

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is an early example of a consulting model of computer decision-support system in which explicit effort is required to seek advice?
Select one:

a.
MYCIN

b.
HyperCritic

c.
HELP

d.
G-CARE

A

MyCIN
MYCIN required the user to request assistance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You are the clinical informatics project lead for a new private telepsychiatry facility in Alex, Oklahoma (a remote town of 550 persons). Which of the following is the most pertinent barrier to implementation of this project?
Select one:

a.
Concern about patient acceptance of behavioral health services via telepsychiatry

b.
Reimbursement issues related to having telepsychiatry practitioners from Norman, OK practice in Alex, OK

c.
Concern over the encroachment of telepsychiatry services on neighboring Veterans Affairs Medical Center telemedicine services

d.
Psychiatrist concern over the impact of telepsychiatry on their clinical workflow

A

provider barriers have been found to be a consistent and prominent barrier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Financial accounting produces the documents typically associated with accounting such as income statements, balance sheets and cash flow statements. Which of the following is a component of the Cash Flow Statement?
Select one:

a.
Equity

b.
Operating activity

c.
Revenue

d.
Expenses and losses

A

1.Income statement: summarizes revenue and expenses during a specified time period

2.Balance sheet: summarizes assets, liabilities and equity during a specified time period. This is also referred to as the financial position statement.

3.Cash flow statement: summarizes cash inflow and outflow during a specified time period.

With regards to this question:

Equity is a Balance Sheet component that reports the company’s assets, also known as the “book value” of the company.

Expenses and losses are a component of the Income Statement and includes expenses from primary activities, secondary activities and any losses.

Operating activity is a component of the Cash Flow Statement and deals with converting items on the income statement to cash.

Revenue (often referred to as Revenues and Gains) is a component of the Income Statement and includes revenues from primary activities (operating revenues), secondary activities (non-operating revenues) and gains (proceeds from a sale).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The Open Systems Interconnection model (OSI) is a conceptual model that characterizes and standardizes the internal functions of a communication system by partitioning it into layers. Secure Sockets Layer (SSL) is implemented in which OSI layer?
Select one:

a.
Presentation

b.
Session

c.
Network

d.
Transport

A

strictly speaking is in the session layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

There are several techniques for assessing patient preferences or utilities for health outcomes. A technique that involves choosing between an intermediate health state with certainty or a chance for a better or worse health outcome is:
Select one:

a.
Standard Gamble

b.
Quality Adjusted Life Year (QALY)

c.
Time Tradeoff

d.
Visual Analogue Scale

A

standard gamble is a technique in which respondents are asked to choose between a certain state of health with certainty versus a chance or gamble for the possibility of better or worse states

Time-Trade-Off is a technique used to measure the quality of life that a person or group is experiencing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In strategic planning, an organization’s “mission” is best described as
Select one:

a.
the purpose of an organization.

b.
the goals and policies of the organization.

c.
what an organization wants to become.

d.
the set of beliefs that are shared among the stakeholders.

A

Goals and policies constitute an organization’s strategy.
purpose of an organization is the mission.

The set of beliefs shared among stakeholders constitute an organization’s values. Vision is what an organization wants to become

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which one of the following leadership qualities would be most important for a Chief Medical Information Officer (CMIO) to display when implementing new systems and applications?
Select one:

a.
Charismatic

b.
Transformational

c.
Task-oriented

d.
Supportive

A

b.
Transformational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following Lean Six Sigma terms correctly identifies the problem-solving process that bring together stakeholders to generate rapid process improvement?
Select one:

a.
Muda

b.
Fishbone diagram

c.
Daily huddle

d.
Kaizen

A

Kaizen events bring together relevant stakeholders to understand a problem and generate solutions in a short time frame.

Muda is the Lean Six sigma term for “waste.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A job description that identifies a position as having “exempt status” indicates that the incumbent is
Select one:

a.
Part of the executive management team

b.
Not mandated to join a union

c.
Not eligible for overtime pay

d.
A clinician, such as a nurse or physician

A

“Exempt” is a federal wage and hour term meaning not eligible for overtime pay over 40 hours of work per week.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When process mapping, what symbol does the process start and end with?
Select one:

a.
Square

b.
Diamond

c.
Triangle

d.
Oval

A

beginning and ending step of a process map is designated by using an oval shape.

Squares are used for middle steps in the process, and

diamonds are used at points where a decision needs to be made.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The first step in a user-centered design process for a new information system is:
Select one:

a.
Summative evaluation with usability assessment

b.
Design of a low-fidelity prototype for user feedback

c.
Formative evaluation with think aloud

d.
User and task analysis

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You are evaluating a scheduling process failure in an outpatient clinic where wait times have suddenly increased by 60%. In performing a cause and effect analysis, which tool would be the most appropriate for the first portion of the analysis?
Select one:

a.
Pareto chart

b.
Gantt chart

c.
Run chart

d.
Fishbone diagram

A

correct answer is a fishbone diagram. Fishbone diagrams are causal diagrams that show the causes of specific events. They may also be called cause and effect diagrams and are often used in Root Cause analyses.

Gantt charts are used to illustrate project schedules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

HIPAA vs Hitech

A

HIPAA –privacy and security provisions
HItech (ARRA)- Penalties for security breaches, ONC, promotion of HIT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Protected health information is to be sent from a secure system to one that is less secure. The most appropriate action to take is:

Select one:

a.
Transmit information only on secure networks

b.
Encrypt the information at rest

c.
De-identify and re-identify using assigned codes

d.
Encrypt the information in transport.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Protected health information is to be sent from a secure system to one that is less secure. The most appropriate action to take is:

Select one:

a.
Transmit information only on secure networks

b.
Encrypt the information at rest

c.
De-identify and re-identify using assigned codes

d.
Encrypt the information in transport.

A

A covered entity may assign a code or other means of record identification to allow information de-identified under this section to be re-identified by the covered entity, provided that:

(1) Derivation. The code or other means of record identification is not derived from or related to information about the individual and is not otherwise capable of being translated so as to identify the individual; and

(2) Security. The covered entity does not use or disclose the code or other means of record identification for any other purpose, and does not disclose the mechanism for re-identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Your CIO asks you to draft a plan for replacing several departmental clinical information technology (IT) systems currently in use with a single new system. Which of the following do you consult first? The

Select one:

a.
Department’s clinical and IT leaders

b.
IT department’s strategic plan

c.
Organization’s financial plan

d.
Organization’s strategic plan

A

Organization’s strategic plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A commonly employed method to assess a patient’s utility preferences is the visual analog scale. The visual analog scale:

Presents the respondents with a minimum of restraints (T/F)

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The critical path of a project schedule is the specific sequence of serial (dependent) activities, each of which must be completed on time, to ensure the entire project also remains on schedule. A delay in any one or more of the activities along a critical path will result in a delay in the overall project. It is also equivalent to the longest path.

A

It is also equivalent to the longest path.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Clinical Informatics is the domain of biomedical informatics that seeks to address clinical care issues. It involves the application of informatics and health information technology to health care delivery. Other domains of biomedical informatics include bioinformatics, imaging informatics, and public health informatics.

A

intersection of basic informational sciences with biomedical applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following is a transaction standard?

Select one:

a.
X12

b.
CDA

c.
HL7 2.X

d.
DICOM

A

Clinical Informatics Standards involve:

  1. Identifiers (for physicians, the NPI, National Provider Identity or a patient identifier-birthdate, name, social security number)
  2. Transactions ASC X12N transactions: Health claims and equivalent encounter information (837), Enrollment and disenrollment in a health plan (834), Eligibility for a health plan (request 270/response 271), Healthcare payment and remittance advice (835)
  3. Data exchange:HL7 2.x, HL7 3.0, FHIR, DICOM (Digital Imaging and Communications in Medicine), Devices-IEEE 1073/ISO 11073 + others, ePrescribing: NCPDP and SCRIPT. The HL7 Clinical Document (CDA) standard specifies the structure and semantics of clinical documents.
  4. Terminology-diagnoses (ICD-9, ICD-10), Diagnosis Related Groups (DRGs), Laboratory-LOINC, Unified Medical Language System (UMLS) etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Using a screening test on a population of patients reduces the risk of developing a disease from 10% to 5% providing a relative risk reduction of 50%. How many patients need to be screened to avoid one patient developing the disease?

Select one:

a.
10

b.
20

c.
50

d.
75

A

Number Needed to Treat = 1/Absolute Risk Reduction = 1/.05 = 20.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

ICER

A

ICER is (C1-C2)/(E1-E2) = 80/5 = $16 PER QALY.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

You are worried that you might have a rare disease. The test for this disease is accurate 99 percent of the time (regardless of whether the results come back positive or negative). This disease occurs in the general population in one of every 10,000 people. If the tests are positive, what are the chances that you actually have the disease?

Select one:

a.
0.001

b.
0.01

c.
0.1

d.
0.99

A

P(A|B)=P(A)P(B|A) / P(B)

In this case, event A is the event you have this disease, and event B is the event that you test positive. Here, P(B|A)=.99, P(A)=.0001, and P(B) may be derived by conditioning on whether event A does or does not occur: P(B)=P(B|A)P(A)+P(B|not A)P(not A) or .99.0001+.01.9999, which is less than 1 percent.

The correct answer is: 0.01

Bayes’ theorem helps us find the probability of event A given event B, written P(A|B), in terms of the probability of B given A, written P(B|A) and the probabilities of A and B:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following statements is an accurate description of an heuristic evaluation of user interfaces?

Select one:

a.
Determines usability through user surveys and focus groups

b.
Requires specialized eye-tracking and click-tracking software

c.
Reviews the user interface against a set of design guidelines

d.
Involves five to eight users performing a task completion test

A

correct answer is: Reviews the user interface against a set of design guidelines

Within the discipline of human computer interaction (HCI), heuristic evaluation (HE) is a type of usability evaluation that is performed by experts and does not typically involve system users. HE compares an application or system to a small set of well-tested design principles.

S

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

NPV
PPV
Sens
Spec

in doctor language

A

Negative predictive value: given a negative test, the patient does not have the disease in question

Positive predictive value: given a positive test, the patient has the disease under consideration

Sensitivity: the patient with the disease has a positive test

Specificity: a patient without the disease has a negative test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the best approach to avoid overfitting when developing machine learning algorithms?

A

b.
Penalize overly complex models and test for generalizability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following is an SQL keyword which can be used to eliminate duplicate rows from a query result?

Select one:

a.
DISTINCT

b.
DROP

c.
SELECT

d.
UNIQUE

A

DISTINCT keyword eliminates duplicate rows from the results of a SELECT statement

DROP is equivalent to DELETE

UNIQUE restricts a table, but is not a SQL keyword.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

a “technology-induced” error?

Select one:

a.
Hardware bugs

b.
System and user interaction

c.
Logical programming errors

d.
Data mapping errors

A

Technology-induced errors are a new type of error that result from the complex interaction of health information systems and end users, when systems are used in complex healthcare settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

specifications listed is a Standards Development Organization balloted standard?

A

Health Level 7 (HL7) Clinical Document Architecture

Only the CDA specifications went through a formal ballot process. The other specifications are produced by the government (NEISS), the World Health Organization (ICD-10) and the AMA (CPT).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Accuracy =

A

Accuracy =(True Positives + True Negatives)/Total).

Positive predictive value equals a/(a+b).

Prevalence equals (a+c)/(a+b+c+d).

Sensitivity or true positive rate equals a/(a/(a+c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

fully connected system requires (N*(N-1))/2 bidirectional interfaces to implement compared to N bidirectional interfaces using a common shared standard

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

To calculate the prevalence of a disease, one would calculate the:

Select one:

a.
Positive Likelihood ratio

b.
Post Test Probability

c.
Pretest Probability

d.
Negative Likelihood ratio

A

= prevalence=Pre-test pronb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Availability heuristic

A

belief bias is “an effect where someone’s evaluation of the logical strength of an argument is biased by the believability of the conclusion”.

The bandwagon effect refers to the tendency to make decisions based on others’ beliefs, which is not the case here.
Hindsight bias is the tendency to reframe past events as predictable, even if they were not at the time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Under the HIPAA Privacy Rule, a limited data set may be shared by a covered entity without authorization only when

Select one:

a.
Key protected health information (PHI) has been removed

b.
The recipient does not further disclose the data to a third party

c.
The data are to be used strictly for health care operations

d.
A data use agreement is established between entities

A

DUA

38
Q

select one:

a.
examination is taken (transmitting site)

b.
radiologist primarily practices

c.
examination is read (receiving site)

d.
examination is taken and read (transmitting and receiving sites)

A

radiologists to be licensed in the state in which the images are acquired (transmitting site).

39
Q

Distributed model of IT governance

A

steering committee for the EHR

40
Q

Median

A

median value can be determined by looking at the cumulative distribution and locating the observation that corresponds to the 50% cumulative frequency

least half of the observations are less than or equal to the value and at least half of the observations are greater than or equal to the value

41
Q

Situational business leadership style

A

b.
Autocratic

c.
Democratic

d.
Delegative

42
Q

CDS implementation metric

A

risk appropriate VTE prophylaxis

43
Q

most important consideration during the planning phase of CIS acquisition

A

alignment with org clinical strategy

44
Q

age then weight

A

CPOE druge dosage selection

45
Q

U.S. SNOMED CT Content Request System (USCRS)

A

tool from NLM that allows users to request basic changes to SNOMED CT.

46
Q

SNOMED CT

A

a systematically organized computer-processable collection of medical terms providing codes, terms, synonyms and definitions used in clinical documentation and reporting

a multilingual thesaurus with an ontological foundation.

concept code
Description- between concept codes
Relationships- between concept codes
Reference sets- used to group concepts or descriptions

47
Q

metathesaurus browser

A

access to UMS knowledge sources

48
Q

fuzz testing

A

giving incomplete or incorrect input to see how it will respond

49
Q

load testing

A

how app functions when over utilized

50
Q

deprecation of a term in exchange standard

A

no longer used, maintained to support legacy data

51
Q

Omitting the WHERE clause from a DELETE Structured Language Query (SQL) statement has which of the following effects

A

Remove all the records from the table

WHERE clause, that filters rows to delete

52
Q

The number needed to treat (NNT) is the:

Select one:

a.
Converse of the absolute risk reduction

b.
Inverse of the relative risk reduction

c.
Inverse of the absolute risk reduction

d.
Converse of the relative risk reduction

A

number needed to treat (NNT) is the number of patients who must receive an intervention of therapy during a specific time period to produce one positive outcome or prevent one adverse outcome

inverse of the absolute risk reduction (AAR)
1/(CER – EER)

53
Q

Loop

A

A loop is a programming technique where a set of statements are executed until a particular condition is met (e.g., repeat until work queue is empty).

54
Q

subroutine

A

set of statements which are distant from the current statement and usually return control to the calling statement when complete

55
Q

branch in programming

A

control is transferred to another part of the program

56
Q

Flowchart
.
Rectangular box

b.
Diamond box

c.
Oval box

d.
As-is

A

Diamond- decision

Rectangle- Task being performed

Oval/circle- start/end

57
Q

Most adverse drug events (ADEs) result from errors at the ordering stage (CPOE

A

correct

58
Q

Maintiaining clinical productivity

A

Most important factor in successful CIS implementation

59
Q

Enterprise Master Patient Index

A

most effective and accepted method to preserve patient identity across multiple healthcare organizations

60
Q

single requirement that applies to all clinical documents that comply with Health Level 7 version 3 Clinical Document Architecture?

A

Health Level 7 version 3 Clinical Document Architecture is a document markup standard that specifies the structure and semantics of clinical documents.

61
Q

FHIR

A

FHIR (Fast Healthcare Interoperability Resources) is a standard that uses modern APIs to support information exchange between healthcare information systems.

connects legacy systems and a variety of devices.

62
Q

radiology data-exchange standard

A

DICOM

63
Q

data exchange standard for CPG

A

GELLO

64
Q

laboratory data-exchange standard

A

LOINC

65
Q

Using clinical decision support –example of what of the 6 pillars of IOM quality report

A

Patient-centeredness

safety;
effectiveness;
efficiency;
patient-centeredness;
timeliness and equity.

66
Q

Barriers to effective negotiations

A

-Die hard bargainers

  • Lack of trust
  • Informational vacuums and negotiator’s dilemma
  • Structural impediments
  • Spoilers
  • Cultural and gender differences
  • Communication problems
67
Q

According to the Bayes’ theorem, P(A | B) =

a.
P(A) / P(B)

b.
P(B | A) x P(A) / P(B)

c.
P(A) x P(B)

d.
P(B | A) x P(B) / P(A)

A

P(B | A) x P(A) / P(B)

68
Q

Which one of the following Change Theories is concerned with compliance, identification, internalization, conformity, obedience, and persuasion?

Select one:

a.
Bridges Transition Theory

b.
Complex Adaptive Systems

c.
Diffusion of Innovations

d.
Social Influence Theory

A

Social Influence Theory

69
Q

A highly specified Internet search identifies 10,000 potentially relevant web sites. Human review of 100 randomly selected sites from this first list identifies 10 sites that are not relevant.

A loosely specified search returns 100,000 sites, including all sites from the first list. Human review of 100 randomly selected sites from the second list identifies 27 relevant sites.

The recall of the first search probably is closest to

Select one:

a.
10%

b.
33%

c.
67%

d.
90%

A

The correct answer is 33%

0% (10/100). The precision of the second search is about 27% (27/100). The precision of the first search is about 90% ((100-10)/100)

70
Q

There are three levels of health information technology interoperability as defined by HIMSS:
1) Foundational;
2) Structural; and
3) Semantic.

4) syntactic

A

1) Foundational; data exchange from, no interpret the data.
2) Structural; uniform movement of healthcare data from one system to another such that the clinical or operational purpose and meaning of the data is preserved and unaltered
3) Semantic- interoperability at the highest level, which is the ability of two or more systems or elements to exchange information and to use the information that has been exchanged.

4) syntactic–two or more systems are capable of communicating with each other using specified data formats and communication protocols. XML or SQL standards are among the tools of syntactic interoperability.

71
Q

Health Level 7, Clinical Document Architecture (HL7 CDA) standard would be used for which of the following settings?

Creating and sharing a continuity of care record (CCR) across different EHRs

Incorrect.

b.
Provide a registry of which patient records are in an EHR repository for document retrieval

c.
Sharing a discharge summary between an inpatient EHR and a disparate outpatient EHR

d.
Sending images and reference information between Picture Archiving and Communications Systems (PACS)

A

c

CDA is an XML-based, electronic standard used for clinical document exchange can be read by the human eye or processed by a machine

72
Q

most difficult parameter to assess is the negative predictive value since the false negative rate cannot be measured directly

A
73
Q

According to Kotter, which of the following is the most essential factor in successful change implementation?

A

Vision

74
Q

Ethernet packets are which Open Source Interconnection (OSI) layer

A

Network (3)

75
Q

height is documented in centimeters, but the database requires that height be recorded in inches.. an example of a failure to adhere to which database integrity requirement?

A

Domain integrity mandates a specific list of values that are acceptable for a particular column.

76
Q

Task Load Index (TLX)

A

a subjective assessment tool that measures perceived workload of a task, or series of tasks, across six dimensions- mental demand, physical demand, temporal demand, performance, effort, and frustration.

77
Q

Which of the following terms is most likely to come up during the course of your team’s internal planning session(s)?
negotiation session

A

BATNA stands for the Best Alternative To a Negotiated Agreement and is defined as the highest value alternative that a negotiating party has available to them if they are not able to reach an agreement

78
Q

tool for identifying roles and responsibilities of various stakeholders in a project

A

RACI (Responsible, Accountable, Consulted, Informed)

79
Q

six sigma vs lean

A

Six Sigma emphasizes quantitative approaches to process control
utilizes more statistical analysis tools as compared to Lean

80
Q

Transport layer protocols (tcp/udp)

A

responsible for establishing a communication channel between two nodes in a network

81
Q

link (or data link) layer

A

low-level details like hardware addresses and physical connections between devices

82
Q

internet (or network) layer

A

sits just above the link layer and deals with routing individual packets of data between nodes in a network.

83
Q

application layer

A

client software built around a protocol, it’s in the application layer.

84
Q

Rootkit

A

Rootkit are programs grant total control of your system to a malicious party.

85
Q

Worm

A

a self-replicating program that can spread from one computer to another

86
Q

Your hospital’s medical staff database has a table named members. Which of the following statements written in standard SQL would produce a list of the contents of that table?

Select one:

a.
SELECT all FROM members;

b.
EXTRACT * FROM members;

c.
GET all FROM members;

d.
SELECT * FROM members;

A

SELECT * FROM members

87
Q

compatibility vs regression testing

A

before/after

88
Q

Interoperability

A

Foundational interoperability describes the ability to transmit data from one system to another

Structural interoperability describes the syntax of that data

Semantic interoperability describes the ability of the receiving system to use the information in the data.

89
Q

LOINC, RxNorm, and SNOMED-CT support

A

semantic interoperability.

90
Q

DICOM

A

structural interoperability