Information Technology > EXAM > WGU C468 Information Management and Application of Technology/ Latest 2022:2023/ Questions & Answers (All)
System security involves protection against A) poor system design B) noncompliant users C) deliberate attacks, errors, omissions, disasters, and viruses D) vendor breech of support contract (ANS ... - C) deliberate attacks, errors, omissions, disasters, and viruses Which of the following is a mechanism that logs a user off the system after a specified period of inactivity on the terminal or computer? A) automatic sign-off B) remote access C) automatic access D) automatic password protection (ANS- A) automatic sign-off The sharing of private information in a situation in which a relationship has been established for the purpose of treatment, or delivery of services, with the understanding that this information will remain protected is _____________? A) information privacy B) privacy C) confidentiality D) information system security (ANS- C) confidentiality ____________ is a combination of hardware and software that forms a barrier between systems, or different parts of a single system to protect those systems from unauthorized access. A) Antivirus software B) Firewall C) Physical security D) Application security (ANS- B) Firewall The ability to use a health enterprise's information system from outside locations such as a physician's office is known as ___________. A) remote access B) automatic access C) system connectivity D) auto connectivity (ANS- A) remote access What are the driving forces behind the Health Information Exchange (HIE) movement? A) provider demands for cost containment B) international demands C) healthcare insurance reform D) federal legislation, and demands for safer, more efficient healthcare (ANS- D) federal legislation, and demands for safer, more efficient healthcare How do Health Information Exchanges (HIEs) impact healthcare delivery? A) HIEs have the capacity to improve the quality of care delivered by decreasing access to records B) HIEs have limited impact at this time C) HIEs increase the efficiency and potentially the quality of the healthcare delivery system D) HIEs have not been shown to impact the safety of care delivered (ANS- C) HIEs increase the efficiency and potentially the quality of the healthcare delivery system Information and data privacy A) provide protection for healthcare information only B) includes the right to choose the conditions and extent to which information is shared C) are best maintained through paper backups D) only applies when a HIPAA release form is signed (ANS- B) includes the right to choose the conditions and extent to which information is shared The Health Information Technology for Economic and Clinical Health Act (HITECH) is known for all of the following except: A) Including a privacy rule establishing national standards for protecting health information B) Funded workforce training, and new technology research and development in HIT C) Ensured the collection of aggregate data that could be used to improve policy decisions relative to allocation of services and population health D) Provided funds and incentives to increase the adoption of EHRs by providers (ANS- A) Including a privacy rule establishing national standards for protecting health information The SWOT analysis is conducted in what phase of information system life cycle? A) evaluation phase B) monitoring and control phase C) implementation phase D) strategic planning phase (ANS- D) strategic planning phase Training documents are developed and user training occurs in which phase of the project management life cycle (PMLC)? A) evaluation phase B) design/plan phase C) implementation phase D) monitoring and control phase (ANS- C) implementation phase Maintenance of an information system includes all of the following except ____________. A) problem solving and debugging B) training end users C) performing file-backup procedures D) updating security protections (ANS- B) training end users Who determines the project implementation strategy? A) the system analyst B) the vendor C) the implementation committee D) the board of directors and CEO (ANS- C) the implementation committee The first task of the project implementation committee is to ____________. A) gather data B) develop a timeline C) recruit key stakeholders D) establish subcommittees (ANS- B) develop a timeline An advantage to using super users for system training is that ___________. A) super users leave after the initial training is complete B) super users have extensive preparation in learning theory C) super users have a specialized knowledge of both the system and clinical areas D) super users have in-depth knowledge of system code (ANS- C) super users have a specialized knowledge of both the system and clinical areas [Show More]
Last updated: 3 years ago
Preview 1 out of 70 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
WGU C468 Information Management and Application of Technology: WGU C468 OA informatics Practice assessment:WGU C468 - OA Information Management and the Application of Technology Study Guide
By Ace-It 3 years ago
$15
6
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
May 10, 2022
Number of pages
70
Written in
All
This document has been written for:
Uploaded
May 10, 2022
Downloads
0
Views
176
Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·