Untitled document - 2023-12-30T003733.776
pdf
keyboard_arrow_up
School
University of South Alabama *
*We aren’t endorsed by this school
Course
176
Subject
Information Systems
Date
Nov 24, 2024
Type
Pages
7
Uploaded by MegaSparrowMaster587
CCA Exam Prep - Information Technology
This system will require the author to sign onto the system using a user ID and
password to complete the entries made.
a. Digital dictation
b. Electronic signature authentication
c. Single sign on technology
d. Clinical data repository -
CORRECT ANS b. Electronic signature
authentication
The protection measures and tools for safeguarding information and information
systems is a definition of ________.
a. Confidentiality
b. Data security
c. Informational privacy
d. Informational access control -
CORRECT ANS b. Data security
In hospitals, automated systems for registering patients and tracking their
encounters are commonly known as ________ systems.
a. MIS
b. CDS
c. R-ADT
d. ABC -
CORRECT ANS c. R-ADT
The ________ uses expert or artificial intelligence software to automatically
assign code numbers.
a. Functional EHR
b. NHIN
c. NLP encoding system
d. Grouper -
CORRECT ANS c. NLP encoding system
The technology commonly used for automated claims processing (sending bills
directly to thirdparty payers) is ________.
a. Optical character recognition
b. Bar coding
c. Neural networks
d. Electronic data interchange -
CORRECT ANS d. Electronic data interchange
The communication and network technologies connections, known as ________,
are used by providers to submit orders for medications and lab tests.
a. Computerized order entry system (CPOE)
b. Bar code medication administration record (BC-MAR)
c. Electronic Health Record (EHR)
d. Personal health record (PHR) -
CORRECT ANS a. Computerized order entry
system (CPOE)
Electronic systems used by nurses and physicians to document assessments
and findings are called:
a. Computerized provider order entry
b. Electronic document management systems
c. Electronic medication administration records
d. Electronic patient care charting -
CORRECT ANS d. Electronic patient care
charting
A transition technology used by many hospitals to increase access to medical
record content is ________.
a. EHR (electronic health record)
b. EDMS (electronic document management system)
c. ESA (electronic signature authentication)
d. PACS (picture archiving and communication system) -
CORRECT ANS b.
EDMS (electronic document management system)
Data definition refers to:
a. Meaning of data
b. Completeness of data
c. Consistency of data
d. Detail of data -
CORRECT ANS a. Meaning of data
A hospital is planning on allowing coding professionals to work at home. The
hospital is in the process of identifying strategies to minimize the security risks
associated with this practice. Which of the following would be best to ensure that
data breaches are minimized when the home computer is unattended?
a. User name and password
b. Automatic session terminations
c. Cable locks
d. Encryption -
CORRECT ANS b. Automatic session terminations
The final state that demonstrates effective adoption for systems operations along
with understanding and appropriate use is:
a. Implementation
b. Meaningful use
c. Optimization
d. Adoption -
CORRECT ANS c. Optimization
The ________ hospital system captures demographic and insurance data,
supplies the data to other applications and tracks patients:
a. Patient financial system (PFSC)
b. Registration-admission-discharge-transfer (R-ADT)
c. Revenue Cycle management (RCM)
d. Clinical Data Repository (CDR) -
CORRECT ANS b.
Registration-admission-discharge-transfer (R-ADT)
Which of the following would be the best technique to ensure that registration
clerks consistently use the correct notation for assigning admission date in an
electronic health record (EHR)?
a. Make admission date a required field
b. Provide an input mask for entering data in the field
c. Make admission date a numeric field
d. Provide sufficient space for input of data -
CORRECT ANS b. Provide an
input mask for entering data in the field
What does an audit trail check for?
a. Unauthorized access to a system
b. Loss of data
c. Presence of a virus
d. Successful completion of a backup -
CORRECT ANS a. Unauthorized
access to a system
A coding analyst consistently enters the wrong code for patient gender in the
electronic billing system. What data quality or data integrity measures should be
in place to ensure that only allowable code numbers are entered?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
a. Access controls
b. Audit trail
c. Edit checks
d. Password controls -
CORRECT ANS c. Edit checks
In what form of health information exchange are data centrally located but
physically separated?
a. Consolidated
b. Consolidated federated
c. Centralized
d. Federated -
CORRECT ANS b. Consolidated federated
An encoder that is built using expert system techniques such as rule-based
systems is a(n):
a. Encoder interface
b. Logic-based encoder
c. Automated code book encoder
d. Grouper -
CORRECT ANS b. Logic-based encoder
A system that provides alerts and reminders to clinicians is a(n) ________.
a. Clinical decision support system
b. Electronic data interchange
c. Point of care charting system
d. Knowledge database -
CORRECT ANS a. Clinical decision support system
Which of the following provides organizations with the ability to access data from
multiple databases and to combine the results into a single
questions-and-reporting interface?
a. Client-server computer
b. Data warehouse
c. Local area network
d. Internet -
CORRECT ANS b. Data warehouse
A hospital HIM department wants to purchase an electronic system that records
the location of health records removed from the filing system and documents the
date of their return to the HIM department. Which of the following electronic
systems would fulfill this purpose?
a. Chart deficiency system
b. Chart tracking system
c. Chart abstracting system
d. Chart encoder -
CORRECT ANS b. Chart tracking system
Coders will assign codes that have been selected into a computer program called
a(n) ________ to assign the patient's case to the correct group based on
ICD-10-CM/PCS and/or CPT/HCPCS codes.
a. Encoder
b. Computer-assisted coding
c. Natural-language processor
d. Grouper -
CORRECT ANS d. Grouper
An individual designated as an inpatient coder may have access to an electronic
medical record to code the record. Under what access security mechanism is the
coder allowed access to the system?
a. Role-based
b. User-based
c. Context-based
d. Situation-based -
CORRECT ANS a. Role-based
Computer software programs that assist in the assignment of codes used with
diagnostic and procedural classifications are called ________.
a. Natural-language processing systems
b. Monitoring/audit programs
c. Encoders
d. Concept, description, and relationship tables -
CORRECT ANS c. Encoders
One form of ________ computer-assisted coding may use, which means that
digital text from online documents stored in the information system is read
directly by the software, which then suggests codes to match the documentation.
a. Encoded vocabulary
b. Natural-language processing
c. Data exchange standards
d. Structured reports -
CORRECT ANS b. Natural-language processing
The ________ was issued by the Office of the National Coordinator (ONC) for
health information technology to be a resource to the nation as a vision and
reference:
a. Health Information Technology for Economic and Clinical Health (HITECH)
b. American Recovery and Reinvestment Act (ARRA)
c. Meaningful Use (MU) Program
d. Federal Health Information Technology Strategic Plan 2015-2020 -
CORRECT ANS d. Federal Health Information Technology Strategic Plan
2015-2020
One form of ________ uses software to aid the physician in selecting the correct
code with processes such as drop-down boxes or the use of touch-screen
terminals.
a. Integrated workflow processes
b. Computer-assisted coding
c. Electronic document management system
d. Speech recognition system -
CORRECT ANS b. Computer-assisted coding
Which of the following is not an element of data quality?
a. Accessibility
b. Data backup
c. Precision
d. Relevancy -
CORRECT ANS b. Data backup
What software will prompt the user through a variety of questions and choices
based on the clinical terminology entered to assist the coder in selecting the most
appropriate code?
a. Logic-based encoder
b. Automated code book
c. Speech recognition
d. Natural-language processing -
CORRECT ANS a. Logic-based encoder
Which of the following make data entry easier but may harm data quality?
a. Use of templates
b. Copy and paste
c. Drop-down boxes
d. Structured data -
CORRECT ANS b. Copy and paste
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
A(n) ________ is computer software that assists in determining coding accuracy
and reliability.
a. Encoder
b. Interface
c. Diagnosis-related group
d. Record locator service -
CORRECT ANS a. Encoder
A special webpage that offers secure access to data is called a(n) ________.
a. Access control
b. Home page
c. Intranet
d. Portal -
CORRECT ANS d. Portal
Good encoding software should include ________ to ensure data quality.
a. Edit checks
b. Voice recognition
c. Reimbursement technology
d. Passwords -
CORRECT ANS a. Edit checks