Deck 4: HIS Application Systems and Technology

ملء الشاشة (f)
exit full mode
سؤال
Large instances of data are normally stored in a:

A) Programming language.
B) Database.
C) Application.
D) Network.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Traditionally, healthcare organizations have purchased vendor applications, such as commercial off-the-shelf (COTS) or "best of breed" products.
سؤال
The software development life cycle (SDLC) methodology phase that comprises developing the preliminary and detailed designs, including how the system will meet functional requirements is called:

A) Operations and Maintenance.
B) Planning and Requirements Definition.
C) Implementation.
D) Design.
سؤال
Using interfaces allows a healthcare organization to avoid building applications in silos, and enables the sharing of common data elements, thus bringing greater efficiency than application integration.
سؤال
A clinical information systems (CIS) application that supports chemistry, pathology, blood bank, instrumentation, calculations, calibrations, and results management areas is called a:

A) Picture archive communications system (PACS).
B) Electronic data interchange (EDI).
C) Laboratory information system (LIS).
D) Radiology information system (RIS).
سؤال
Despite the 2012 Robert Wood Johnson Foundation's annual report findings that hospitals are increasing adopting electronic health record systems, many healthcare organizations are still facing challenges with generating comprehensive reporting, and addressing data silos and data integrity issues.
سؤال
Which Open Systems Interconnection model (OSI) layer is responsible for routing and ensuring the message arrives to the destination address?

A) Transport Layer
B) Physical Layer
C) Application Layer
D) Network Layer
سؤال
Extranets are networks that typically provide web-based content and access to applications and databases for users who are outside of the organization's internal network.
سؤال
Local area networks (LANs) are the primary networks used by desktops, servers, and network and other devices, and are used for:

A) Information sharing.
B) Resource sharing.
C) Both A and b
D) None of the above.
سؤال
A multiprotocol label switching (MPLS) circuit is an example of a distributed antennae system (DAS) network
سؤال
Dedicated back-end computer systems designed to efficiently and cost-effectively store and transfer a healthcare organization's server data are called:

A) Wireless wide area networks (WWANs).
B) Storage area networks (SANs).
C) Hard drive networks (HDNs).
D) Desktop area networks (DANs).
سؤال
A redundant array of independent drives (RAID) 10 hard drive configuration is a combination of RAID 2 and RAID 5, giving it the fastest performance and lowest cost, with the only drawback being limited availability.
سؤال
Voice over wireless local area network (VoWLAN) technology offers which of the following benefits?

A) Improves packet segmentation ratios by delivering ubiquitous, robust coverage.
B) Enhances voice mail features and functionality through the use of real time location tracking systems (RTLS).
C) Increases roam time and client connectivity issues.
D) Provides advance quality of service (QoS), extended talk-time, and call security.
سؤال
Digital signage and wayfinding, and IP television (IPTV) are considered part of the unified communications (UC) family of services.
سؤال
One of the first decisions facing healthcare organizations is whether they will maintain their own data center facilities, lease one or more commercially owned colocation data center facilities, or outsource (remote host) both their data center facility and computing equipment to a third party.
سؤال
Electrical power in data centers can be remotely measured and tracked by using a:

A) Branch circuit monitoring system (BCMS).
B) Uninterruptable power supply (UPS).
C) Data center management system (DCMS).
D) Continuous power source (CPS).
سؤال
Very early smoke detection apparatus (VESDA) systems are used in data centers to provide ambient or room cooling, heating, ventilating, and air-conditioning.
سؤال
Which type of secondary data center facility is the least expensive to set up and maintain, but has the limitation of taking the longest to bring an organization's critical systems back online?

A) Hot site
B) Warm site
C) Tepid site
D) Cold site
سؤال
Virtual tape libraries (VTLs) are backup systems that use disk-based arrays to emulate tape libraries and allow organizations to continue to use existing tape backup software.
سؤال
Virtual machines (VMs) can run on which type of operating systems (OSs)?

A) Windows
B) Linux
C) UNIX
D) All of the above
سؤال
Zero-client computers are similar to thin-client computers, but offer the additional advantage of having no local hard drive or OS to secure or maintain.
سؤال
Which of the choice below is not an advantage of using nonpersistent virtual desktop infrastructure (VDI)?

A) Reduces help desk calls with desktop freezing or crashing, as the user can log off and log in to create a new or "fresh" desktop.
B) Improves IT standardization since each user receives the same desktop image.
C) Dedicated server storage for each VDI desktop and the user's VDI desktop is not needed.
D) Simplifies desktop upgrades because desktop upgrades are performed on the servers and not each desktop.
سؤال
Single sign-on (SSO) and tap 'n go technologies have the benefit of eliminating the need for users to remember their username and passwords.
سؤال
What mobile management strategy encompasses managing mobility at the mobile device level, and includes secure email, calendaring, contacts, web browsing, and application store management?

A) Mobile application management (MAM)
B) Mobile device management (MDM)
C) Mobile integration management (MIM)
D) Mobile content management (MCM)
سؤال
A comprehensive mobile computing policy, including corresponding set of procedures and an end-user acceptance agreement is needed for healthcare organizations to successfully define and implement at bring your own device (BYOD) strategy
سؤال
Which technical area should not be considered when developing a mobile computing strategy?

A) What the virtual private network (VPN) platform will be.
B) Whether enterprise directory integration will be needed.
C) Which devices and native applications will be supported.
D) Which telecommunications management capabilities and restrictions will be applied.
سؤال
Encryption-at-rest is an important control that ensures the security of all data traffic containing confidential or ePHI information, such as network traffic, web activity, email messaging, file transfers, text messaging, and instant messaging.
سؤال
A critical technology that is designed to automate and intelligently analyze system logs for anomalies and inappropriate activity is called:

A) Asset discovery.
B) An intrusion detection system (IDS).
C) Security information event management (SIEM).
D) A vulnerability assessment.
سؤال
Managed security services are cost-effective information security services that have the benefit of reducing the number of information security personnel needed by the healthcare organization.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/29
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 4: HIS Application Systems and Technology
1
Large instances of data are normally stored in a:

A) Programming language.
B) Database.
C) Application.
D) Network.
B
2
Traditionally, healthcare organizations have purchased vendor applications, such as commercial off-the-shelf (COTS) or "best of breed" products.
True
3
The software development life cycle (SDLC) methodology phase that comprises developing the preliminary and detailed designs, including how the system will meet functional requirements is called:

A) Operations and Maintenance.
B) Planning and Requirements Definition.
C) Implementation.
D) Design.
D
4
Using interfaces allows a healthcare organization to avoid building applications in silos, and enables the sharing of common data elements, thus bringing greater efficiency than application integration.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
5
A clinical information systems (CIS) application that supports chemistry, pathology, blood bank, instrumentation, calculations, calibrations, and results management areas is called a:

A) Picture archive communications system (PACS).
B) Electronic data interchange (EDI).
C) Laboratory information system (LIS).
D) Radiology information system (RIS).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
6
Despite the 2012 Robert Wood Johnson Foundation's annual report findings that hospitals are increasing adopting electronic health record systems, many healthcare organizations are still facing challenges with generating comprehensive reporting, and addressing data silos and data integrity issues.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which Open Systems Interconnection model (OSI) layer is responsible for routing and ensuring the message arrives to the destination address?

A) Transport Layer
B) Physical Layer
C) Application Layer
D) Network Layer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
8
Extranets are networks that typically provide web-based content and access to applications and databases for users who are outside of the organization's internal network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
9
Local area networks (LANs) are the primary networks used by desktops, servers, and network and other devices, and are used for:

A) Information sharing.
B) Resource sharing.
C) Both A and b
D) None of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
10
A multiprotocol label switching (MPLS) circuit is an example of a distributed antennae system (DAS) network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
11
Dedicated back-end computer systems designed to efficiently and cost-effectively store and transfer a healthcare organization's server data are called:

A) Wireless wide area networks (WWANs).
B) Storage area networks (SANs).
C) Hard drive networks (HDNs).
D) Desktop area networks (DANs).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
12
A redundant array of independent drives (RAID) 10 hard drive configuration is a combination of RAID 2 and RAID 5, giving it the fastest performance and lowest cost, with the only drawback being limited availability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
13
Voice over wireless local area network (VoWLAN) technology offers which of the following benefits?

A) Improves packet segmentation ratios by delivering ubiquitous, robust coverage.
B) Enhances voice mail features and functionality through the use of real time location tracking systems (RTLS).
C) Increases roam time and client connectivity issues.
D) Provides advance quality of service (QoS), extended talk-time, and call security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
14
Digital signage and wayfinding, and IP television (IPTV) are considered part of the unified communications (UC) family of services.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
15
One of the first decisions facing healthcare organizations is whether they will maintain their own data center facilities, lease one or more commercially owned colocation data center facilities, or outsource (remote host) both their data center facility and computing equipment to a third party.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
16
Electrical power in data centers can be remotely measured and tracked by using a:

A) Branch circuit monitoring system (BCMS).
B) Uninterruptable power supply (UPS).
C) Data center management system (DCMS).
D) Continuous power source (CPS).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
17
Very early smoke detection apparatus (VESDA) systems are used in data centers to provide ambient or room cooling, heating, ventilating, and air-conditioning.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which type of secondary data center facility is the least expensive to set up and maintain, but has the limitation of taking the longest to bring an organization's critical systems back online?

A) Hot site
B) Warm site
C) Tepid site
D) Cold site
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
19
Virtual tape libraries (VTLs) are backup systems that use disk-based arrays to emulate tape libraries and allow organizations to continue to use existing tape backup software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
20
Virtual machines (VMs) can run on which type of operating systems (OSs)?

A) Windows
B) Linux
C) UNIX
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
21
Zero-client computers are similar to thin-client computers, but offer the additional advantage of having no local hard drive or OS to secure or maintain.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which of the choice below is not an advantage of using nonpersistent virtual desktop infrastructure (VDI)?

A) Reduces help desk calls with desktop freezing or crashing, as the user can log off and log in to create a new or "fresh" desktop.
B) Improves IT standardization since each user receives the same desktop image.
C) Dedicated server storage for each VDI desktop and the user's VDI desktop is not needed.
D) Simplifies desktop upgrades because desktop upgrades are performed on the servers and not each desktop.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
23
Single sign-on (SSO) and tap 'n go technologies have the benefit of eliminating the need for users to remember their username and passwords.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
24
What mobile management strategy encompasses managing mobility at the mobile device level, and includes secure email, calendaring, contacts, web browsing, and application store management?

A) Mobile application management (MAM)
B) Mobile device management (MDM)
C) Mobile integration management (MIM)
D) Mobile content management (MCM)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
25
A comprehensive mobile computing policy, including corresponding set of procedures and an end-user acceptance agreement is needed for healthcare organizations to successfully define and implement at bring your own device (BYOD) strategy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which technical area should not be considered when developing a mobile computing strategy?

A) What the virtual private network (VPN) platform will be.
B) Whether enterprise directory integration will be needed.
C) Which devices and native applications will be supported.
D) Which telecommunications management capabilities and restrictions will be applied.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
27
Encryption-at-rest is an important control that ensures the security of all data traffic containing confidential or ePHI information, such as network traffic, web activity, email messaging, file transfers, text messaging, and instant messaging.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
28
A critical technology that is designed to automate and intelligently analyze system logs for anomalies and inappropriate activity is called:

A) Asset discovery.
B) An intrusion detection system (IDS).
C) Security information event management (SIEM).
D) A vulnerability assessment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
29
Managed security services are cost-effective information security services that have the benefit of reducing the number of information security personnel needed by the healthcare organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.