Health Informatics Final Exam - 2021

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Computer ergonomics addresses ways to optimize computer workstation to reduce:

  • carpal tunnel syndrome (correct)
  • skin injuries
  • auditory problem
  • impaired attention span

Which of the following statements about radio-frequency identification (RFID) is true?

  • Has a limited use in management of supplies and equipment.
  • The reader is implanted in an object
  • Can be used to better monitor the flow of patients (correct)
  • The chip and reader have to touch.

Which of the following is an advantage of e-learning?

  • Does not require teacher or instructor
  • Does not require the preparation of learning
  • Can be used to train dependent learners
  • Facilitate access to learners from distant areas (correct)

Which of the following is recommended during prolonged use of mouse?

<p>Take break every 20 minutes (B)</p> Signup and view all the answers

Which of the following is among the recommended tips for using the keyboard?

<p>Keep your elbows at a 90° angle (D)</p> Signup and view all the answers

The goals of information system security include which of the following?

<p>Restricting information availability to the authorized ones (A), Protection of client confidentiality (C)</p> Signup and view all the answers

Which of the following is considered a breach of confidentiality?

<p>A receptionist views lab results of Hepatitis C out of curiosity. (A)</p> Signup and view all the answers

An uncomfortable office chair at the work station can be considered as an ergonomic concerns

<p>True (A)</p> Signup and view all the answers

A nurse is responsible for data entry in an intensive care unit. Which of the following can result in repetitive stress injuries to her?

<p>Poor use of devices over extended periods (D)</p> Signup and view all the answers

It is imperative for nurses to see the telehealth technology as a:

<p>medium for providing care (B)</p> Signup and view all the answers

E-Learning provides consistent training. It means that:

<p>no variation in the delivery of lessons though the variation of teachers. (C)</p> Signup and view all the answers

E-Learning is flexible; this means that:

<p>e-learning can take place anytime and anywhere since necessary equipment is accessible. (D)</p> Signup and view all the answers

A differential backup is independent backup of data.

<p>False (B)</p> Signup and view all the answers

______ allows subjects in a data base to be tracked over time while at the same time remaining nameless.

<p>Pseudonymity</p> Signup and view all the answers

In [blank] the instructors are there and learners are NOT there at the same time.

<p>asynchronous learning (C)</p> Signup and view all the answers

For chair setup at the computer work station, chair height should be adjusted where:

<p>thighs are parallel to the floor and legs are perpendicular to the floor (B)</p> Signup and view all the answers

The use of central monitoring stations

<p>decrease risk of knowledge-based errors. (D)</p> Signup and view all the answers

For a strong password you should use:

<p>at least 8 characters, upper and lowercase letter, numbers. (D)</p> Signup and view all the answers

The nurse is caring for a patient who needs arterial sampling. The nurse started to explain the purpose of the procedure after obtaining the blood sample. This situation is an example of:

<p>slip (C)</p> Signup and view all the answers

Which of the following descriptions is true about the human error?

<p>An unintentional action (C)</p> Signup and view all the answers

Periodical creation of medical data backup is a security threats.

<p>False (B)</p> Signup and view all the answers

[blank] is engaging the user for the opportunity of input.

<p>Interactivity (C)</p> Signup and view all the answers

Which of the following is an example of non clinical telehealth?

<p>Healthcare management (B)</p> Signup and view all the answers

Which of the following is true about real-time applications?

<p>Capture and transmission of the information occurs simultaneously (A)</p> Signup and view all the answers

Which of the following statements about the Smart IV pumps needs correction?

<p>It is smart and do not need update (B)</p> Signup and view all the answers

To reduce the risk of computer eye strain. It is recommended to

<p>keep the top of the screen at the eye level (A)</p> Signup and view all the answers

There is a chance for engaging the user and opportunity of learners input in:

<p>blended learning (B)</p> Signup and view all the answers

Which of the following recommendations is true for the password?

<p>Use password easy for you to remember, but difficult to guess (D)</p> Signup and view all the answers

______ is a destructive program masked as a game, utility, or application. It can delete files or format the hard disk.

<p>Spyware</p> Signup and view all the answers

Developers should be aware of social impacts of software systems before marketing.

<p>True (A)</p> Signup and view all the answers

[blank] is transmission of high-resolution radiological patient images for interpretation by a radiologist at a distant location.

<p>Tele-radiology (D)</p> Signup and view all the answers

[blank] is a small program that monitors every keystroke you enter on your keyboard and its purpose is to steal private information.

<p>Key logger (D)</p> Signup and view all the answers

[blank] is a type of learning in which there is a mixture of face-to-face and online teaching.

<p>Blended learning (B)</p> Signup and view all the answers

Which of the following is NOT a purpose for making a "test" for the learner during the e-learning process?

<p>Maximize students motivation to share their learn experience. (A)</p> Signup and view all the answers

E-Learning at the university is self-directed and self-paced. This means that learners

<p>control the amount of time they spend on particular topic. (A)</p> Signup and view all the answers

[blank] is a device or means to capture, process, and store content whether sound only, electronic or digital images, tracings, alpha-numeric data.

<p>Multimedia (D)</p> Signup and view all the answers

A special identification code printed as a set of vertical bars of differing widths is:

<p>barcode (B)</p> Signup and view all the answers

A new emergency nurse took inappropriate corrective action. This situation is an example of:

<p>commission (D)</p> Signup and view all the answers

Virus is a program that propagates across computers without being activated by the user.

<p>True (A)</p> Signup and view all the answers

[blank] is the detection of a disease by using data received from monitoring a patient at a distant site.

<p>Tele-diagnosis (B)</p> Signup and view all the answers

Tele-health expands patients access to expert specialist

<p>True (A)</p> Signup and view all the answers

Which of the following can be considered as a major workplace ergonomic risk factor?

<p>High task repetition on a daily base (A)</p> Signup and view all the answers

Maximizing the safety gaps reduce the probability of errors

<p>False (B)</p> Signup and view all the answers

Which of the following can be considered threatening to the information and it should be protected against?

<p>malicious and unintentional manipulation. (A)</p> Signup and view all the answers

What specifically E-learning good for?

<p>Enhancing learning activities (D)</p> Signup and view all the answers

[blank] is the right to choose the condition and extent to which information and beliefs are shared.

<p>Data privacy (D)</p> Signup and view all the answers

Tele-health and telemedicine have the same meaning

<p>False (B)</p> Signup and view all the answers

Which of the following is true about telemedicine?

<p>It refers specifically to remote clinical services (A)</p> Signup and view all the answers

Which of the following is a safety issue associates telehealth?

<p>Malfunctioning equipment (A)</p> Signup and view all the answers

Flashcards

Computer Ergonomics

Designing computer workstations to minimize risks of injuries and promote comfort.

RFID (Radio-frequency Identification)

A technology that uses radio waves to identify and track objects using electronic tags.

E-learning

Learning that happens online, typically using digital resources and tools.

Information System Security

A set of practices and policies to protect and secure information systems and data.

Signup and view all the flashcards

Breach of Confidentiality

Unauthorized access to or disclosure of confidential information.

Signup and view all the flashcards

Ergonomic Concerns

A physical or organizational aspect of the workplace that can cause discomfort or harm, potentially due to overuse or poor positioning.

Signup and view all the flashcards

Repetitive Stress Injuries (RSIs)

Injuries resulting from repetitive motions or sustained awkward postures, often affecting nurses who use computers extensively.

Signup and view all the flashcards

Telehealth

A technology that allows healthcare providers to provide care to patients remotely using various digital tools.

Signup and view all the flashcards

Synchronous Learning

A type of online learning where all participants are present at the same time, like a live online meeting.

Signup and view all the flashcards

Asynchronous Learning

A type of online learning where participants can access content and learn at their own pace, anytime, anywhere.

Signup and view all the flashcards

Blended Learning

A type of learning that combines both online and face-to-face instruction.

Signup and view all the flashcards

Pseudonymity

A method of protecting confidential information by masking the real identity of individuals in a dataset.

Signup and view all the flashcards

Data Privacy

The principles and practices of ensuring the security and privacy of personal information.

Signup and view all the flashcards

Information Disclosure

The act of making information available to others.

Signup and view all the flashcards

Strong Password

A strong password should include a combination of upper and lowercase letters, numbers, and symbols.

Signup and view all the flashcards

Slip

An unintentional mistake made during a task, often due to carelessness or distraction.

Signup and view all the flashcards

Knowledge-Based Error

A mistake made due to lack of knowledge or incorrect understanding of the task.

Signup and view all the flashcards

Human Error

An unintentional action that results in an undesired outcome.

Signup and view all the flashcards

Worm

A type of malware that spreads through networks and replicates itself without requiring user interaction.

Signup and view all the flashcards

Key Logger

A small program that secretly records every keystroke you make on your keyboard, often used to steal personal information.

Signup and view all the flashcards

Trojan Horse

Malware disguised as a legitimate program, which can harm your device and steal your data.

Signup and view all the flashcards

Trojan Horse

A type of malware disguised as a legitimate program, which can harm your device and steal your data.

Signup and view all the flashcards

Tele-radiology

The transmission of high-resolution radiological images for interpretation by a radiologist at a distant location.

Signup and view all the flashcards

Blended Learning

A type of learning that combines both online and face-to-face instruction.

Signup and view all the flashcards

Data Privacy

The right of a person to decide how much and what information about them is shared with others.

Signup and view all the flashcards

Telehealth

The use of technology to provide healthcare services remotely, including clinical and non-clinical services.

Signup and view all the flashcards

Telemedicine

The use of technology to deliver clinical healthcare services remotely. It is a subset of Telehealth.

Signup and view all the flashcards

Repetitive Stress Injuries (RSIs)

The repeated use of the same motions or sustained awkward postures, often affecting nurses who use computers extensively.

Signup and view all the flashcards

RFID (Radio-frequency identification)

The use of technology to identify and track objects using electronic tags.

Signup and view all the flashcards

Study Notes

Health Informatics Final Exam - 2021

  • Ergonomics: Computer ergonomics aims to optimize workstations to reduce problems like carpal tunnel syndrome, not auditory problems, skin injuries, or impaired attention spans.

  • RFID (Radio-Frequency Identification): RFID is used to track supplies and equipment, and monitor patient flow. RFID readers don't need to touch the RFID chip.

  • E-learning Advantages: E-learning facilitates access for distant learners and is adaptable for diverse learners. It also doesn't require in-person attendance, like traditional class, although it does require a teacher or instructor.

  • Prolonged Mouse Use: Take breaks every 20 minutes or apply the 20-20-20 rule during prolonged mouse use.

  • Keyboard Use: Keep elbows bent at 90 degrees and use wrist rests while typing.

  • Information System Security Goals: Information system security aims to protect client confidentiality and restrict data access to authorized personnel. It does not involve disclosing information indiscriminately or allowing unauthorized access.

  • Breach of Confidentiality: Revealing lab results without consent, or viewing another person's medical records without their permission, is a breach of confidentiality. Discussing a mutual patient in a physician's office is generally acceptable but depends on the nature of the discussion.

  • Ergonomic Concerns: Uncomfortable office chairs can pose ergonomic concerns.

  • Repetitive Stress Injuries: Poor device use, over extended periods, is a risk factor for repetitive stress injuries, including if it involves using multiple input devices. correct use helps, but doesn't eliminate the problem.

  • Telehealth Technology: Telehealth is a valuable tool for delivering care remotely and it should not be seen as a replacement for high-quality care.

  • E-learning Flexibility: E-learning is flexible because it can take place anytime and anywhere necessary equipment is available.

  • Data Backup: Differential backups frequently supplement other backup methods, with backups not being considered a threat when performed accordingly.

  • Pseudonymity: Pseudonymity in data management allows tracking subjects over time while maintaining anonymity

  • Learning types: Asynchronous learning allows for independent study while synchronous learning requires simultaneous participation.

  • Chair Height: Adjust chair height so thighs are parallel to the floor, and legs are perpendicular to the floor.

  • Password Security: Strong passwords should be at least 8 characters, including upper and lower case letters, and numbers. Easy passwords are not secure.

  • Human Error: Human error is often unintentional, not intentional.

  • Medical Data Backup: Regularly backing up medical data is crucial for security and protection from loss or theft.

  • Interactivity: Interactivity in digital systems allows users to actively participate and engage with the content instead of passively consuming it.

  • Non-clinical Telehealth: Non-clinical telehealth includes caregiver support and healthcare management services.

  • Real-Time Applications: Real-time applications transmit data synchronously, simultaneously and without delay.

  • Smart IV Pumps: Smart IV pumps should be updated and may have programming issues, have alerts (e.g., soft-stops or hard-stops).

  • Eye Strain: Position the computer screen at or slightly below eye level to diminish eye strain.

  • Clinical Telehealth: Clinical telehealth includes patient advice, remote monitoring, and other clinical consultations.

  • Password Recommendations: Good passwords are difficult to guess, not easy to remember, and should not be reused across systems.

  • Malware: Trojan horses are a type of malware that hides within seemingly harmless programs or files

  • Social Impact of Software: Developers should consider the social implications of their software before release.

  • Tele-radiology: Tele-radiology involves transmitting high-resolution radiological images for remote interpretation.

  • Keylogger: Keyloggers are programs that secretly record every keystroke.

  • Type of Learning: Blended learning combines in-person and online instruction methods.

  • Purpose of Tests: E-learning tests ensure learners understand the material and measure their knowledge.

  • E-learning Self-Directedness: E-learning allows students to control how they go through course material.

  • Content Delivery Systems: Throughput devices capture, process, and store data/content of various types, whether images, sound, or other data.

  • Barcode: Barcodes are unique identifiers that use printed vertical lines to track products and items.

  • Error Types: Nurses can make slips, commissions, or knowledge-based errors, and this should be observed and prevented.

  • Virus Nature: Viruses are programs that spread across computers without any user interaction involved.

  • Telediagnosis: Telediagnosis is the use of remote diagnostics for medical condition determination.

  • Expert Specialists: Tele-health enhances access to expert specialists, especially when a remote consultation is involved

  • Workplace Ergonomics: Workplace ergonomics are important to prevent injury. Incorrect postures should be avoided.

  • Information Security: Data security means protecting data from unauthorized access or modification and unintentional misuse.

  • E-learning Benefits: E-learning benefits include flexibility, accessibility, and interactive tools.

  • Telehealth vs Telemedicine: Telehealth is a broader term including non-clinical services, telemedicine is specifically about clinical, or patient-oriented, remote services.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser