1. In a healthcare setting, there is resistance towards using a new EHR. The staff insists the prior system was much faster than navigating this new EHR. Which method should be used to motivate staff to adopt this EHR?

a. Complete a time study in the time it takes to document common tasks

b. Encourage staff to attend quarterly training on the new EHR

c. Supply the staff with scholarly journal articles on the benefits of the new EHR

d. Involve staff in the implementation process

2. Which tool highlights the areas in which information technology can improve efficiency and support an interdisciplinary healthcare team?

a. A SWOT analysis

b. A project management chart

c. A Gantt chart

d. A workflow analysis

3. Which statement defines electronic protected health information (ePHI)?

a. It is information used to aggregate individuals’ information

b. It is information shared across family members

c. It is information used to specifically identify an individual

d. It is information used to identify healthcare inequity

4. An informatics nurse is developing a web-based application for patient care. Which statement accurately describes the internet?

a. A network controlled by a high-level government agency

b. A physical cable connecting all associated computers

c. A secure way of processing data

d. An unregulated network of networks

5. What is role-based access an example of?

a. Privacy

b. Integrity

c. Confidentiality

d. Authenticity

6. Which term refers to ensuring confidentiality when sharing a patients electronic personal health information?

a. Privacy

b. Security

c. Authenticity

d. Integrity

7. What advice should be taken to avoid a security breach of protected health information?

a. Never open emails from unknow people or organizations, create passwords that are easy to remember, and use computers only from the organization to access ePHI

b. Open emails that contain ePHI only from an unencrypted computer, user the same password for logging in to the EHR as email, and store ePHI off-site of the local network

c. Open emails only from trusted sources, change passwords as stipulated by the organization, and do no leave ePHI visible in an unsecure area

d. Never open personal emails at work, use the same password previously used but add a number or special character, and use computer software that is no longer supported by the software vendor

8. What is the first thing patients should do to access their health records?

a. Pay their bill, as patients cannot obtain records if there is a bill due

b. Use the patient portal email from the healthcare organization to create an account

c. Ask the physician for a copy of their record and sign a release form

d. Contact the medical records department to ask questions about their record

9. What represents privacy and security risks for telehealth technology?

a. Patients access their healthcare via video conferencing in the telehealth apps

b. Healthcare providers view images sent through the telehealth apps

c. Users consent to using the telehealth apps

d. Patients have the option to use speakerphone in the telehealth apps

10. What are 3 common reasons for HIPPA violation citations?

a. Lost or stolen un4ncrypted devices

b. Social media postings

c. Facilitating an electronic visit between a patient and family

d. Providing laboratory test information to the patient

e. Discussing results over the phone with a provider

f. Taking a patient photo with a personal phone

11. What is a physical safeguard of ePHI?

a. A lock on the USB port on computers

b. Security measures that protect data, policies, procedures, and conduct of personnel in protecting data

c. An encrypted network to transmit communication of healthcare providers

d. An encrypted lock on stored data

12. An informatics nurse is on a task force planning committee to ensure data storage measures are safe and accessible. Besides the provider and the client, which group’s needs are important to consider?

a. Third-party payers

b. The joint commission

c. The information technology employees

d. The healthcare system

13. A restaurant committee has been assembled to oversee the need and proper usage of restraints. It has asked a report to be constructed to allow better tracking of restraint usage and documentation compliance throughout the organization. Which data element would this committee find least useful in this report?

a. How patients tolerated the restraints

b. The reason for placement in restraints and type of restraint

c. The date restraints were applied and discontinued date

d. Patient allergy history

14. What us a structured method used to analyze serious adverse events?

a. A define, measure, analyze, improve, control (DMAIC)

b. A failure mode effect analysis (FMEA)

c. A root cause analysis (RCA)

d. A quality and safety education for nurses (QSEN)

15. Which form allows stored information in an EHR to be instantly searched, retrieved, combined, and reported in different ways?

a. Continuous data

b. Text data

c. Discrete data

d. Clinical data

16. What are 3 purposes of using bar code medication administration (BCMA)?

a. It alerts the nurse to drug-drug-interactions

b. It saves administration time for the nurse

c. It reduces errors of administration

d. It saves costs for the facility by charging medications upon dispensing

e. It supports the 5 rights of medication administration

f. It increases the likelihood that the patients will refuse to take their medications

17. Why was BCMA adopted by healthcare facilities?

a. To reduce nursing positions

b. To prevent medication administration errors

c. To increase the speed on medication administration

d. To improve patient satisfaction

18. What describes the role of decision support within the EHR?

a. It is designed to eliminate errors

b. It is designed to assist with timely clinical decision making

c. It is a computer program that replaces human reasoning

d. It is installed on all computers to help IT monitor patients

19. Healthcare staff members become overwhelmed when using EHR, and they begin to ignore clinical decision support messages. Why is it important to control the number of warnings in an EHR?

a. Care coordination

b. Medication refusals

c. Alert fatigue

d. Care delays

20. Which merit-based incentive payment system (MIPS) performance category replaces meaningful use for physicians?

a. Cost of services

b. Advancing care information

c. Quality of care

d. Improvement activities

21. What do the goals of meaningful use and merit-based incentive programs have in common?

a. Advancing care information

b. Improving the usage rate of EHR

c. Increasing the number of tests ordered

d. Improving quality of care

22. Which government organization oversees the meaningful use program?

a. The office of national coordinator for health information technology (ONC)

b. The social security administration (SSA)

c. The U.S. department of labor occupational safety and health administration (OSHA)

d. The centers for Medicare and Medicaid services (CMS)

23. What were 2 objectives of meaningful use as defined by the American reinvestment and recovery act (ARRA)?

a. Document patient collected data directly into the EHR

b. Submit electronic data to health information exchanges (HIEs)

c. Exchange drug formulary data across organizations

d. Include clinical lab test results in the electronic patient portal

24. A healthcare provider had a hospital laptop stolen from its vehicle. What should be on the laptop to protect it from a data breach?

a. Two-minute signoff

b. File-sharing applications

c. Two-factor authentication

d. A hot spot device

25. What should healthcare staff who use mobile devices to access electronic protected information (ePHI) do to protect devices before they are lost or stolen?

a. Auto connect to the hot spot

b. Create a backup of the device

c. Install a serial number tracker

d. Turn off file sharing

26. What is the name of the process that begins with conception and continues through implementation?

a. Systems development life cycle (SDLC)

b. SWOT plan

c. Return on investment (ROI)

d. Needs analysis

27. During which phase of the systems development life cycle should a system be activated to effectively be used by end users?

a. Implementation

b. Testing

c. Development

d. Planning

28. What 3 tasks in the design phase during the systems development life cycle (SDLC)?

a. Plan the project, define the scope, and conduct the SWOT analysis

b. Install system upgrades, aggregate data, and obtain research funding

c. Configure screen layouts, create dashboards, and customize views

d. Develop short-term training plans, transmit data, and analyze help desk tickets

29. The initiating phase involves analyzing the project goals and needs. What is the term to describe unanticipated growth of a project?

a. Regression testing

b. Workflow analysis

c. System of life

d. Scope creep

30. A healthcare facility is changing to a new health information system. Information from the old system needs to be input into the new system. What will the IT department do to complete this task?

a. Extract the data

b. Mine the data

c. Migrate the data

d. Map the data