false 3 The implementation team should include all of the same people that were

False 3 the implementation team should include all of

This preview shows page 108 - 111 out of 176 pages.

false 3. The implementation team should include all of the same people that were involved in selecting the system during the system acquisition process. false 3. What are the fundamental activities that should occur during any system implementation? all the above 3. Which standards are specifically related to the electronic transfer of digital diagnostic images between devices manufactured by diferent vendors? DICOM 3. Which type of database is specifically designed for decision support and allows data to be extracted along such dimensions as time, location or diagnosis? data warehouse 4. After reviewing vendor RFPs and evaluating their product demonstrations, the steering committee should prepare a summary report that includes their final recommendation. false
Image of page 108
4. Broadband is the term used to describe media that is capable of carrying multiple transmissions simultaneously: true 4. It is reasonable to expect that the hardware, software, and network will likely need to be replaced in how many years as advances are made in technology? 3 to 10 years 4. Managing contracts with vendors, and developing and monitoring the IT budget are all tasks that are likely be performed by: IT administration 4. One of the key components of applying administrative safeguards to protect an organization's health care information is: Risk Analysis 4. Password and PIN systems are the most common forms of entity authentication and provide the strongest form of security false 4. Studies among health care organizations that have implemented clinical applications have shown that classroom training is just as efective as one-on-one coaching particularly among physicians. false 4. The standard for the electronic exchange of patient summary information or "transportable" patient care information is known as: CCD 4. What is NOT a component of the WAN network? routers 5. A type of architecture that wraps a common browser user interface around a set of diverse applications allowing the user to use one set of screens to access data from several applications is know as: visual integration 5. Computer viruses are among the most common and virulent forms of intentional computer tampering.
Image of page 109
true 5. CPOE is one of the most complex and challenging clinical information systems to implement. true 5. Ensuring sufficient staf are on hand and setting up mechanisms for reporting and correcting problems are all activities associated with which phase of the implementation plan? all activities associated with which phase of the implementation plan? preparation for go klive date 5. The most stringent type of access control is: context based 5. Which is NOT a specific code set for diagnoses and procedures mandated by HIPPA to be used in any transaction by a covered entity?
Image of page 110
Image of page 111

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture