1. System security involves protection against - ✔✔deliberate attacks, errors, omissions, disasters and viruses 2. Which of the following is a mechanism that logs the user off a system after a s... pecified period of inactivity on the terminal or computer? - ✔✔automatic sign off 3. The sharing of private information in a situation in which a relationship has been established for the purpose of treatment with the understanding this information will remain protected is - ✔✔Confidentiality 4. ____ is a combo of hardware and software that forms a barrier between systems or different parts of a single system to protect those systems from unauthorized access - ✔✔Firewall 5. The ability to use a health enterprise's information system from outside locations such as a physician's office is known as ___________. - ✔✔Remote access 6. What are forces behind the Health Information Exchange - ✔✔Federal legislation and demands for safer more efficient healthcare 7. How do Health Information Exchanges (HIEs) impact healthcare delivery? - ✔✔HIEs increase the efficiency and potentially the quality of the healthcare delivery system 8. Information & Data privacy - ✔✔includes the right to choose the condition and extent to which information is shared 9. The Health Information Technology for Economic & Clinical Health Act (HITECH) is - ✔✔Included a privacy rule establishing national standards for protecting health information.10. The SWOT analysis is conducted in which phase of the information system Strengths Weakness Opportunities Threats - ✔✔Strategic planning stage 11. Training documents are developed and user training occurs in which phase of the project - ✔✔Implementation phase 12. Maintenance of an information system includes all of the following - ✔✔problem solving/debugging updating security protections performing file back up procedures 13. Who determines the project implementation strategy? - ✔✔The implementation committee 14. The first task of the project implementation team is to ________. - ✔✔develop a timeline 15. An advantage to using superusers for system training is that [Show More]
Last updated: 1 year ago
Preview 1 out of 5 pages
Connected school, study & course
About the document
Uploaded On
May 11, 2022
Number of pages
5
Written in
This document has been written for:
Uploaded
May 11, 2022
Downloads
0
Views
256
In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Browsegrades · High quality services·