MA112 row 1 chapter 24 finished

pdf

School

Ivy Tech Community College, Indianapolis *

*We aren’t endorsed by this school

Course

112

Subject

Computer Science

Date

Dec 6, 2023

Type

pdf

Pages

2

Uploaded by ccroussore0319

Report
MA112 ROW 1 Chapter 24 - Technology Name___________________________________ Date____________________________ MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1 . Wh a t makes a password strong? A) Use a person ʹ s name. B) Use - eight or more characters. C) Use a random combination of upper and lowercase letters, numbers, and symbols D) Use the same password for eveything 2 . Which is the computer memory used for loading and running programs? A) ROM B) RAM C) cache D) hard drive 3 . What is one kilobyte equivalent to? A) 1024 bytes B) 1024 MB C) 1024 GB D) 1024 TB 4 . Which software protects computer against viruses? A) Database software B) resentation software C) Anti - malware woftware D) Spreadsheet software 5 . What is a physical safeguard that is ised over monitors to prevent other from seeing information? A) Firewalls B) Screen savers C) Authentication D) Privacy filters 6 . Which is a type of software that allows the user to enter demographic information, schedule appointments, maintain lists of insurance payers, perform billing tasks, and generate reports? A) electronic health record (EHR) B) electronic medical records (EMR) C) practice management D) MalwareMicrosoft Business Suite 7 . What is an electronic version of a patient ʹ s paper record? A) electronic health record (EHR) B) electronic medical record (EMR) C) practie management D) both EHR and EMR 8 . What are records of computer activity used to monitor users ʹ actions within software, including additions, deletions, and viewing of electronic records? A) Automatic log - off B) Authentication C) Firewalls D) Audit trails 9) What is malicious software designed to damange or disrupt a system (e.g., a virus)? A) Decryption B) Ethernet C) Hacker D) Malware 10) What means potential threats to the computer system security are identified, the likelihood of such occurrence is determined, and additional safeguards are implemented? A) Firewalls B) Security risk analysis C) Authentication D) Privacy Filters MA112 Module 3 - Clinic Page 1 82022.20
SHORT ANSWER. Write the word or phrase that best completes each statement or answers the question. 11) What is a patient portal? 12) ___________________________ is the field of stud y that involves reducing strain and injuries by improving workstation design. 13) What can a patient do on a patient portal? 14) Describe the concept of ʺ point - of - care ʺ . 15) What is computerized provider/physician order entry (CPOE) and who is allowed to use CPOE? 16) If a person is sitting or standing at a computer for long peroids of time, what should the person do every 30 minutes? 17) Based on what you learned about software used in the ambulatory care faciltiy, describe 4 different types of electronic technology used in professional communication. MA112 Module 3 - Clinic Page 2 82022.20
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help