Name: 
 

CS-115 Intro. to Healthcare Information Technology



True/False 1 pt each
Indicate whether the statement is true or false.
 

 1. 

The United States spent over $7400 per person for health care in 2007, an amount that was an increase over the previous year.
 

 2. 

The Security Rule of HIPAA has a broader focus than the Privacy Rule.
 

 3. 

Organizational structure defines the authority, responsibilities, lines of communication, rights, and duties of a group.
 

 4. 

Computers on a TCP/IP network use a physical address called a MAC address.
 

 5. 

Some governmental organizations report an EMR adoption rate that approaches 50 percent, but it is also reported that their current functionality is not satisfactory.
 

 6. 

Security lighting is always effective regardless of positioning.
 

 7. 

Temperatures and relative humidity levels that are too low or high, or that change abruptly, may result in unreliable components or even system failures.
 

 8. 

In a computer access control list, unless granted special permissions, owners can only read the objects they create.
 

 9. 

Because Voice over IP (VoIP) is digital communications transmitted over a network, it can be encrypted using standard LAN encryption technologies.
 

 10. 

A hospital must retain a patient’s records in an accessible manner in the hospital.
 

 11. 

Scanning is the process of converting data printed on paper-based (or other flat) media into electronic format by using a device called a scanner.
 

 12. 

As part of the problem escalation process, appropriate personnel such as in-house support groups are usually contacted first.
 

 13. 

In the United States, the lack of regulations at the federal, state, and local level make healthcare one of the least heavily regulated industries.
 

 14. 

One of the characteristics of cloud computing is that the consumer can automatically increase or decrease computing resources without requiring any human interaction from the service provider.
 

 15. 

For a monitor that does not function properly, there are several repairable components for a healthcare IT technician to inspect or replace.
 

Multiple Choice 2 pts each
Identify the choice that best completes the statement or answers the question.
 

 1. 

The ____ reports to the President.
a.
National Institute of Standards and Technology
b.
Centers for Medicare and Medicaid Services
c.
Office of the National Coordinator for Health Information Technology
d.
Department of Health and Human Services
 

 2. 

The ____ is responsible for protecting the public from diseases and other preventable conditions.
a.
Centers for Disease Control and Prevention
b.
Health Resources and Services Administration
c.
Agency for Healthcare Research and Quality
d.
Administration on Aging
 

 3. 

The ____ is an electronic record of patient care, usually in a stand-alone situation such as a doctor’s office.
a.
electronic health record
c.
personal health record
b.
electronic medical record
d.
Medicare health record
 

 4. 

The ____ Act is composed of four distinct Standards or Rules. These include Privacy, Security, Identifiers, and Transactions and Code Sets.
a.
National Coordinator for Health Information Technology
b.
Health and Human Services
c.
Health Insurance Portability and Accountability
d.
National Institute of Standards and Technology
 

 5. 

The purpose of a computer network can be summarized in a single word: ____.
a.
server
c.
security
b.
technology
d.
sharing
 

 6. 

What is the most common type of computer networking?
a.
mainframe
c.
client-server
b.
dumb terminal
d.
cloud
 

 7. 

The most common protocol suite used today for local area networks (LANs) as well as the Internet is the ____.
a.
Electronically Stored Information Protocol (ESIP)
b.
Dynamic Host Configuration Protocol (DHCP)
c.
Transmission Control Protocol/Internet Protocol (TCP/IP)
d.
Remote Desktop Protocol (RDP)
 

 8. 

A ____ is used to encrypt cleartext data using an algorithm.
a.
key
c.
cipher
b.
password
d.
steganographic image
 

 9. 

The ____ file format has medium quality and small file size.
a.
GIF
c.
PDF
b.
JPG
d.
TIFF
 

 10. 

A database stores ____ data.
a.
unstructured
c.
structured
b.
image
d.
optical
 

 11. 

____ locks are combination locks that use buttons that must be pushed in the proper sequence to open the door.
a.
Pushbutton
c.
Key
b.
Cipher
d.
Combination
 

 12. 

____ are the most common type of standard biometric device.
a.
ID badges
c.
RFID scanners
b.
Fingerprint scanners
d.
iris scanners
 

 13. 

A username serves to ____ the user.
a.
authenticate
c.
confirm
b.
secure
d.
identify
 

 14. 

The Windows permissions setting, ____, permits a user to read, write, change, or delete a file.
a.
modify
c.
read and execute
b.
full control
d.
all access
 

 15. 

Cryptography can protect the ____ of information by ensuring that only authorized parties can view it.
a.
integrity
c.
availability
b.
confidentiality
d.
authenticity
 

 16. 

____ is a programming language used to view and manipulate data that is stored in a database.
a.
Structured Query Language (SQL)
c.
Hypertext Markup Language (HTML)
b.
PHP
d.
Extensible Markup Language (XML)
 

 17. 

The ____ is a type of output hardware.
a.
CPU
c.
mouse
b.
keyboard
d.
monitor
 

 18. 

Common ____ include Microsoft Windows, Apple Mac OS, and Linux.
a.
desktop operating systems
c.
programming languages
b.
utility programs
d.
application programs
 

 19. 

What is one of the most important obstacles to the healthcare industry embracing information technology?
a.
Laws preventing the use of electronic records for privacy reasons
b.
The shortage of trained healthcare technology professionals needed to implement the new technologies
c.
The need for tools to convert existing manual systems to electronic systems
d.
The lack of compartmentalization of the healthcare system
 

 20. 

In 2007, the US spent approximately ____ percent of gross domestic product on healthcare.
a.
5.2
c.
17
b.
11
d.
24.5
 

Completion2 pts each
Complete each statement.
 

 1. 

A(n) ____________________ is something that constrains or controls.
 

 

 2. 

____________________ access means that an individual can access the device or data without being physically present.
 

 

 3. 

____________________ software serves as the “intermediary” between the user and the computer hardware.
 

 

 4. 

Changing the original text into a secret message using cryptography is known as ____________________.
 

 

 5. 

The ____________________ format was created by Adobe Systems for representing documents that can be used with almost any type of software, hardware, or operating systems.
 

 

 6. 

____________________ ensures that data is accessible to authorized users.
 

 

 7. 

Monitoring activity with a video camera, called video ____________________, can provide a degree of security.
 

 

 8. 

One of the most common types of physical tokens is an ID ____________________.
 

 

 9. 

Cleartext data that is to be encrypted is called ____________________.
 

 

 10. 

The sole function of a(n) ____________________ is to service the requests received from the network clients.
 

 

Short Answer 5 pts each
 

 1. 

What are the benefits of using an electronic medical record for patient care?
 

 2. 

What are the advantages of electronic medical records over paper records?
 

 3. 

What is a disadvantage of cloud computing for managing electronic health records and electronic medical records?
 

 4. 

What are some guidelines for creating strong passwords?
 

 5. 

What is phishing?
 



 
Check Your Work     Start Over