Week 7 - Computing fundamentals and networking concepts Flashcards
DIKW pyramid
Data
Information
Knowledge
Wisdom
what is data
product of observation and have no meaning or use on their own
what is information
data that includes answers to the question who, what, where, when, and/or how many
what is knowledge
knowing the significance of information
wisdom
knowing what to do with the information through knowledge, experience and judgement
Managing Data: structured vs unstructured
-what type better for computational thingking
example: drop down menus vs dictated notes
- better to have structured data for computational thinking
Computational thinking
techniques and tools to manage DIKW
Good for complex, difficult, ambiguous and or open ended problems
helps work twds a common goal/solution
- abstraction
- automation
- counting
- sorting
- searching
abstraction
a way of simplifying a process or problem
- a single problem can include several layers of abstraction
- abstractions are used to build algorithms
algorithms
process for carrying out a complex task broken down into simple decision and action steps
-algorithms are used to build automation
automation
use of technology or machines and/or devices that are linked to/controlled by a computer
counting
- small/simple sets
- complex/large sets (2)
simple/small sets: count one-by-one
algorithms and automation for large/complex sets
- estimate using random samples
- recursion (sets of smaller counts
kroll counting
Rx work in progress and Rx coutns
sorting and searching
algotithms an automation can be used
sorting
way of ranking different elements
-can be done by computer algorithms
searching
used to find an eleement wtih certain properties in a larger set
- linear search (start to finish)
- Binary search (back and forth)
Kroll sorting and searching
universal search field
narcotics report –> sort by
- can sort by date, brand/date, patient/date
Computer fundamentals (4)
Hardware
software
networks
security
hardware
monitor case motherboard (CPU, RAM) storage Optical drive input/output devices Network card power supply
Major component of a desktop computer
input devices
-mouse, keyboard, touch pad, pen, bar code, reader, scanner, camera, joystick, touch screen
output devices
-printer, screen, speakers, robot
storage devices
-hard disk, optical disk (ex. CD-ROM, DVD, or CD-RW), memory stick
software: basic input/output system (BIOS)
low level system that allows the various hardware components to talk
software: operating system
windows, mac OS, android, iOS etc
executes application programs
manages resources
- for sharing internal memory and processor(s)
- handles I/O devices
- manages space on external storage devices
software: other software that runs on top of the OS
developmental; application; communications
microsoft powerpoint, iTunes etc
look at the brainrot on slide 17
asdfkjsafdsadfadfsj;fsdj;
Networking kroll scenario
RPh on PMS sends info to network that sends info to insurance server when filling out pateitn insurance info
networking 101: telecommunications link
how devices communicate
ex. modems, ethernet cables, fiber optic cables, radio for satelites
networking 101: modems
allow you to connect to the internet through your ISP
-A modem connects home network (LAN) to you ISP’s network (WAN) to get the internet
networking 101: routers
create networks by allowing greater than or equal to 2 computers and the modem to connect
ex. it takes the signal from your modem and routes it to your devices
think wireless routers
ex. your computer connects to your wireless printer using a router
networking 101: hosts
computers connected to networks
-smartphones, laptoms, iPads, etc
networking 101: clients
computers or programs that connect to a network and retrieve data
networking 101: servers
provide services for clients
ex. email servers, database servers, game servers
networking 101: nodes
any device that is attached to a network and transmits, receives, or forwards info
- nodes can be clients and servers
- includes hosts linked by modems, routers, etc
LAN
- what is
- what are 2 types of connection
- what require
- what may include to connect to other networks
local area network
- connects computers within a small building
- may be wired (via network cables, often running ethernet protocol) or wireless
- requires network interface card
- may include a router to connect to other networks
WAN
Wide area network
- connects computers far away
- requires host computers for network and communications management
TCP/IP
transmission control protocol/internet protocol
- standard procedures for adressing and transmitting messages
- messages broken into data packets at source
- analogy: cut letter into pieves and put ea frament in its own envelope
- packets are routed independentyl
- packets are re-assembled into message at end
IP addresses: what are they
-unique ID for every computer (host) on a network (WAN, LAN, internet)
IP addresses: how allocate
-hierarchical allocation of addresses
IP addresses: DNS
server for Domain Name System (DNS) consults registry to translate host names to corresponding IP adresses
HTTP
- what is
- how used
- client/server model
hyper text transfer protocol
- communication protocol between clients and servers
- utilized TCP to transfer information between computers
client
- browser that requests, receives, displays
server
-receives requests and responds to them
Networking and security: firewalls
barriers between trusted networks (your home) and untrusted networks (the internet)
- built into routers
- can be added as antivirus software
Even with firewalls what is most important thing for security
not connect with untrusted sources
Networking and security: VPN
virtual private network
-allows remote users on the WAN to access a LAN
- essentially a secure tunnel
- how access the virtual lab computer off campus or patient records from home
-need to act act at home as you would in the hospital when you are on a VPN
+ do not leave screens open, do not show ppl records, do not talk about the records in a public space
Authentication 101: something you know
password, PIN, pattern
Authentication 101: something you have
smartwatch to open smartphone, FOB
Authentication 101: something you are
fingerprint, iris
Authentication 101: what type authentication HC use
HC typically prefers multifactor authentication (greater than or equal to 2 options)
ex. FOB + password
ex. smartwatch + fingerprint
encryption 101
- what is
- role of sender and receiver
- VPN
encryption is process of mathematically converting info to render it unintelligible without a key to decode it
- sender uses algorithm to encode info and receiver uses same algorithm to decode
- how VPN creates a secure tunnel
examples of encryptions
caeser cipher
german enigma machine
HTTPS
HTTPS = HTTP + Security
provides data encryption and server authentication
slide 30 photo on how client requests https session
al;ksdjfl;aksdjfl;askjdfl;askdjf worthless course asdkhjfalksjdfh eeeeeakjsdf
HL7
- what is
- stds for what
- how message
international standard to allow the exchange integration sharing and retrieval of electronic health information
provide messaging standard of certain common communication
-medication dispense, medication request
HL7 message can be transferred through HTTPS to provide communication between different systems (ex. EMR/EHR/PMS)