Health Informatics Final Exam 2021 - PDF

Summary

This is a health informatics past paper from 2021.  The paper contains multiple-choice questions covering topics such as computer ergonomics, radio-frequency identification (RFID), e-learning, and information system security. The exam is likely aimed at undergraduate-level students.

Full Transcript

# Health informatics Final #439 - 2021 ## Question 1 1.2 Computer ergonomics addresses ways to optimize computer workstation to reduce: - auditory problem - carpal tunnel syndrome - impaired attention span - skin injuries ## Question 2 1.2 Which of the following statements about radio-frequency...

# Health informatics Final #439 - 2021 ## Question 1 1.2 Computer ergonomics addresses ways to optimize computer workstation to reduce: - auditory problem - carpal tunnel syndrome - impaired attention span - skin injuries ## Question 2 1.2 Which of the following statements about radio-frequency identification (RFID) is true? - Has a limited use in management of supplies and equipment. - The chip and reader have to touch. - Can be used to better monitor the flow of patients - The reader is implanted in an object ## Question 3 1.1 Which of the following is an advantage of e-learning? - Does not require the preparation of learning - Can be used to train dependent learners - Facilitate access to learners from distant areas - Does not require teacher or instructor ## Question 4 2.1 Which of the following is recommended during prolonged use of mouse? - Take break every 60 minutes - Apply the rule of 20-20-20 - Take break every 20 minutes - Take break every 40 minutes ## Question 5 2.1 Which of the following is among the recommended tips for using the keyboard? - Use wrist rests while typing - Keep your wrists bent up while typing - Keep your wrists bent down while typing - Keep your elbows at a 90° angle ## Question 6 3.1 The goals of information system security include which of the following? - Disclosure of information when it is needed - Protection of client confidentiality - Allowing an access to data modifications when needed - Restricting information availability to the authorized ones ## Question 7 3.1 Which of the following is considered a breach of confidentiality? - A worker reviews the medical record of their parent after her consent. - A receptionist views lab results of Hepatitis C out of curiosity. - One nurse is giving oral report to next shift nurse for the same patient - Two physicians discuss a mutual patient in the physician office. ## Question 8 2.1 An uncomfortable office chair at the work station can be considered as an ergonomic concerns - True - False ## Question 9 3.1 A nurse is responsible for data entry in an intensive care unit. Which of the following can result in repetitive stress injuries to her? - Correct use of devices over extended periods - Poor use of devices over extended periods - Applying the rule of 20-20-20 during data entry - Using multiple data input devices ## Question 10 1.2 It is imperative for nurses to see the telehealth technology as a: - tool to replace high-quality nursing practice - tool to increase the number of patient trips - medium for providing care - responsibility minimizer ## Question 11 2.1 E-Learning provides consistent training. It means that: - students can learn with the minimal effort and without being bothered. - no variation in the delivery of lessons though the variation of teachers. - all teachers will have the same style in delivering different lessons. - all learners can participate simultaneously and receive the same information. ## Question 12 1.1 E-Learning is flexible; this means that: - e-learning can take place anytime and anywhere since necessary equipment is accessible. - e-learning can be accessed from any access site without any rules. - students can learn without being bothered deadline for submissions. - e-learning can be accessed in any place at a specific time frame since equipment is available. ## Question 13 1.2 differential backup is independent backup of data. - True - False ## Question 14 3.1 _allows subjects in a data base to be tracked over time while at the same time remaining nameless. - Pseudonymity - Data privacy - Information disclosure - Anonymity ## Question 15 1.2 In _the instructors are there and learners are NOT there at the same time. - asynchronous learning - synchronous learning - blended learning - unstructured learning ## Question 16 2.1 For chair setup at the computer work station, chair height should be adjusted where: - upper arms are stretched forward or angled backward - thighs are parallel to the floor and legs are perpendicular to the floor - forearms, wrists and hands form a 45-degree angle with upper arms - forearms, wrists and hands form a 60-degree angle with upper arms ## Question 17 1.2 The use of central monitoring stations - increase risk of careless omissions. - decrease risk of knowledge-based errors. - increase risk of knowledge-based errors. - increase risk of inattentiveness. ## Question 18 3.1 For a strong password you should use: - at least 8 characters, upper and lowercase letter, numbers. - an easy and generic password so you can remember it better. - only the upper or the capital letters. - only lower-case letters or characters. ## Question 19 2.1 The nurse is caring for a patient who needs arterial sampling. The nurse started to explain the purpose of the procedure after obtaining the blood sample. This situation is an example of: - rule-based error - commission - slip - knowledge-based error ## Question 20 3.1 Which of the following descriptions is true about the human error? - Intentional decision - Intentionally doing the wrong thing - Intentional failure - An unintentional action ## Question 21 2.1 Periodical creation of medical data backup is a security threats. - True - False ## Question 22 _is engaging the user for the opportunity of input. - Aesthetics - Loading - Interactivity - Use of media ## Question 23 1.2 Which of the following is an example of non clinical telehealth? - Triage and advice - Remote monitoring - Healthcare management - Caregiver support ## Question 24 1.2 Which of the following is true about real-time applications? - Real-time applications is identical to store and forward applications - Capture and store the data to be forwarded at a later time - Help to track patient's health data without appointments - Capture and transmission of the information occurs simultaneously ## Question 25 1.2 Which of the following statements about the Smart IV pumps needs correction? - It is smart and do not need update - May be subject to programming errors - Issues soft-stop or hard-stop alerts - Houses a library of medications ## Question 26 2.1 To reduce the risk of computer eye strain. It is recommended to - keep the top of the screen at the eye level - strain neck, shoulders, and back to view the screen - face computer screen indirectly - place the monitor at distance equal to 10 inches ## Question 27 1.2 Which of the following is an example of clinical telehealth? - Caregiver support - Distant education - Research - Conferences ## Question 28 2.1 There is a chance for engaging the user and opportunity of learners input in: - blended learning - synchronous learning - asynchronous learning - flipped learning ## Question 29 3.1 Which of the following recommendations is true for the password? - Reuse the same password for different systems. - Use password easy for you to remember, but difficult to guess - Use sequential or repeating combination. - Use words found in the dictionary. ## Question 30 3.1 _is a destructive program masked as a game, utility, or application. It can delete files or format the hard disk. - Spyware - Worms - Key logger - Trojan Horses ## Question 31 3.1 Developers should be aware of social impacts of software systems before marketing. - True - False ## Question 32 1.2 _is transmission of high-resolution radiological patient images for interpretation by a radiologist at a distant location. - Tele-pathology - Tele-radiology - Tele-diagnosis - Tele-consultation ## Question 33 3.1 _is a small program that monitors every keystroke you enter on your keyboard and its purpose is to steal private information. - Worms - Spyware - Key logger - Trojan Horses ## Question 34 1.2 _is a type of learning in which there is a mixture of face-to-face and online teaching. - Distance learning - Synchronous learning - Blended learning - Asynchronous learning ## Question 35 1.1 Which of the following is NOT a purpose for making a "test" for the learner during the e-learning process? - Maximize students motivation to share their learn experience. - Compare and measure achievement of learning outcomes. - Make sure that the students have taken the course material. - Ensure that the students know the material covered. ## Question 36 1.2 E-Learning at the university is self-directed and self-paced. This means that learners - select all the study topics they need in all courses. - can learn with the minimal effort and without being bothered - control the amount of time they spend on particular topic. - can learn without being bothered deadline for submissions ## Question 37 1.2 _is a device or means to capture, process, and store content whether sound only, electronic or digital images, tracings, alpha-numeric data. - Output - Multimedia - Input - Throughput ## Question 38 1.2 A special identification code printed as a set of vertical bars of differing widths is: - biometric scan - barcode - password - smart cards ## Question 39 2.1 A new emergency nurse took inappropriate corrective action. This situation is an example of: - slip - commission - rule-based error - knowledge-based error ## Question 40 3.1 Virus is a program that propagates across computers without being activated by the user. - True - False ## Question 41 1.2 _is the detection of a disease by using data received from monitoring a patient at a distant site. - Tele-consultation - Tele-diagnosis - Tele-pathology - Tele-radiology ## Question 42 1.2 Tele-health expands patients access to expert specialist - True - False ## Question 43 3.1 Which of the following can be considered as a major workplace ergonomic risk factor? - High task repetition on a daily base - Elbows at a 90° angle during keyboard use - Using wrist rests during the break time - Using elbow to move the mouse ## Question 44 1.2 Maximizing the safety gaps reduce the probability of errors - True - False ## Question 45 3.1 Which of the following can be considered threatening to the information and it should be protected against? - consented data disclosure to the authorized ones. - malicious and unintentional manipulation. - authorized access by health care providers. - authorized intentional manipulation. ## Question 46 1.1 What specifically E-learning good for? - Enhancing learning activities - Managing interactive self study and tutorials - Reducing learning time - Increasing the consultation time ## Question 47 3.1 _is the right to choose the condition and extent to which information and beliefs are shared. - Data privacy - Information disclosure - Information security - Anonymity ## Question 48 1.2 Tele-health and telemedicine have the same meaning - True - False ## Question 49 1.2 Which of the following is true about telemedicine? - It is not different from telehealth - It has broader scope services than that in telehealth - It refers specifically to remote clinical services - It is concerned with remote clinical and non-clinical services ## Question 50 3.1 Which of the following is a safety issue associates telehealth? - Patient engagement - Malfunctioning equipment - Prolonged waiting time - Patient empowerment

Use Quizgecko on...
Browser
Browser