ANCC Infomatics Practice Test 1 Flashcards
(150 cards)
“Which one of the following is the first phase of the
traditional project life cycle?
a. Development
b. Initiation
c. Implementation
d. Concept
D: Concept
Every project has a life cycle, or a series of phases during which specific types of work are carried out. Although organizations may define their own life cycles, the traditional project life cycle comprises four phases: concept, development, implementation, and closeout. Concept and development represent project feasibility and focus on planning, while the latter two phases, implementation and closeout, represent project acquisition and are when the actual work of the project is carried out. One phase should be completed before moving on to the next phase.”
The teaching model in which learning takes place outside of a formal classroom with materials provided or recommended by the instructor is:
A. Guided focus
B. Independent study
C. Cognitive apprenticeship
D. Cooperative
A. Guided focus
In the guided focus teaching model, learning takes place outside of a formal classroom with materials provided or recommended by the instructor. In an independent study model, the study is geared toward the needs of the individual and can be self-paced. Materials may be web-based or paper-based and may include audio-visual materials. In a cognitive apprenticeship model, instructors model and learners analyze and apply processes. In a cooperative model, small teams work together through a variety of activities to master a subject, with each member responsible for self-learning and the learning of others in the team.
- The first step in strategic planning is usually to:
a. Conduct an environmental assessment.
b. Revise the previous strategic plan.
c. Review and revise the mission and vision statements.
d. Develop a values statement.”
a. Conduct an environmental assessment
A: Strategic planning usually begins by conducting an
environmental assessment. This may include using a strengths, weaknesses, opportunities, threats (SWOT) analysis to assess internal and external factors that may influence outcomes. The assessment reviews changes, both positive and negative, that have occurred, such as a decrease in second-party reimbursement or an increase in patient population. The information gleaned from the environmental
assessment is then used to develop or revise the mission, vision, and values statements.
According to the HL7 group, the three different types
of interoperability are:
a. Functional, ergonomic, and cognitive
b. Technical, semantic, and process/social
c. Technical, interactive, and non-interactive
d. Functional, technical, and ergonomic
B. Technical, semantic, and process/social
According to the HL7 group, the three different types of interoperability are:
Technical: Systems are able to connect with one other and
exchange data without error.
Semantic: Data is shared among the different systems and interpreted
and understood in the exact same manner in each system.
Process/Social: The system is able to integrate into the workflow
and promote the quality of care by providing usability through
carefully-designed interfaces and allowing users to access and input
information efficiently.
- The father of information theory and the digital age is
considered to be:
a. Albert Bandura
b. Alan Turing
c. Claude Shannon
d. Kurt Lewin”
c. Claude Shannon
- C: In 1948, Claude Shannon, a mathematician, wrote a paper that laid out the basis for modern information theory: “A Mathematical Theory of Communication.” Shannon showed how all forms of information (including text, telephone signals, video, audio, and telephone) could be encoded through a binary system of 0s and 1s and transmitted error free; he also showed how the amount of information carried over a system of communication could be calculated mathematically. Shannon demonstrated that switching circuits could be endowed with decision-making ability (applicable to artificial intelligence).
- If the nurse informatics specialist finds that nursing leaders lack essential knowledge about informatics, the first step should be to:
a. Identify informatics education needs of leaders.
b. Develop a mentoring program for leaders.
c. Complain to the board of directors.
d. Request additional training funds.
a. Identify informatics education needs of leaders.
- A: If the nurse informatics specialist finds that nursing leaders lack essential knowledge about informatics, the first step should be to identify informatics education needs of leaders. Because nurse leaders serve a critical role in motivating other staff and acting as role models, the nurse informatics specialist needs a knowledgeable leadership. Assessment may include surveys, questionnaires, and interviews. Assessment must be completed before requesting funds or establishing a mentoring program because needs may vary widely.
- A primary concern related to bring-your-own-device (BYOD) policies is:
a. Device damage
b. Insurance costs
c. Unequal access
d. Proprietary data misuse
d. Proprietary data misuse
D: Bring your own device (BYOD) is increasingly common in healthcare because the smart phone and tablet are ubiquitous and healthcare providers often use these devices to access and share information. When used for work purposes, these devices can expose proprietary data. Organizations need to have a BYOD policy that outlines acceptable use, provides security awareness training, requires device enrollment, and ensures that all stored and transmitted data are encrypted and that access is secure. Additionally, security audits should be done routinely, and the organization should have the ability to remotely wipe devices of sensitive data.
- Considering computer ergonomics, when a person is using the computer, the top of the monitor should be approximately:
a. 4 inches above eye level
b. 4 inches below eye level 8 inches below eye level
c. 8 inches below eye level
d. At eye level
d. At eye level
- D: Considering computer ergonomics, when a person is using the computer, the top of the computer should be approximately at eye level. While there is some variation in height, most differences relate to lengths of the lower extremities rather than the trunk, so desk placement does not usually pose a problem. However, wall-mounted computer screens (such as at point of care) should be adjustable to provide for ease of use and good visualization.
- Which one of the following is protected by copyright?
a. Domain names
b. Systems
c. Ideas
d. Photographs
- D: Intellectual property protection is provided through copyright, which covers the following:
Artistic works: graphic designs, paintings, photographs, sculptures, maps, and posters Literary works: articles, novels, poems, plays, blogs, and some types of software Musical works: compositions and lyrics
Dramatic works: scripts, screenplays, and plays
Audiovisual works: movies, television programs, and online videos
Architectural designs
Sound recordings: music, sounds, and speeches
Choreographic works: dance moves
Copyright does not cover domain names, systems, or ideas (although the wording of ideas may be copyrighted).
- Regression testing is usually done:
A. After decommission of computer equipment
B. Before decommission of computer equipment
C. After introduction of new software or other changes
D. Before introduction of new software or other changes
C. After introduction of new software or other changes
Regression testing is usually done after introduction of new software or other changes to determine if “regressions” or errors occur. Sometimes a change in one aspect of software may have adverse effects on other aspects. Non-regression testing,
- In which area of the hospital is adding auditory display to visual display likely to be most effective?
A. Emergency department
B. ICU
C. Operating rooms
D. Pediatrics
C. Operating rooms
Auditory visual displays, which use sound to indicate changes in conditions, such as increased pulse or decreased blood pressure, can be distracting in areas that already have a fairly high volume of noise and/or alarms associated with displays, so the area of the hospital in which an auditory display is likely to be most effective is operating rooms. Operating rooms are usually reasonably quiet, and the auditory feedback may be especially useful to anesthesiologists.
- When applying the Complex Adaptive Theory to the system design life cycle, the informatics nurse would expect:
A. Reciprocal changes to occur between user and system
B. Users to bring about changes in systems
C. Systems to bring about changes in users
D. Systems to be too complex to effectively change
A. Reciprocal changes to occur between user and system
When applying the Complex Adaptive Theory to the system design life cycle, the informatics nurse would expect reciprocal changes to occur between the user and the system. Thus, the user changes elements of the system depending on the type of use, and the system in turn changes the behavior of the user. Adaptive systems tend to be dynamic rather than static and are able to adjust to changes to avoid chaos. Adaptive systems generally value effectiveness over efficiency.
Which of the following processes is most useful in determining the steps required to move from a current state of performance to a new one, including the need for action and resources.
A. Cost-benefit analysis
B. Gap analysis
C. Outcomes analysis
D. Return on investment (ROI) analysis
B. Gap analysis
Gap analysis is used to determine the steps required to move from a current state of actual performance or situation to a new potential performance or situation, and the “gap” between the two that requires action or resources. Steps to gap analysis include:
Assessing the current situation and listing important factors, such as performance levels, costs, staffing, and satisfac-tion, and all processes
Identifying the current outcomes of processes dentitying the rarget outcomes for projected processe
Outlining the process required to achieve target outcomes
Identifying the gaps that are present
Identifying resources and methods to close the gaps
- Which of the following types of data/information is primarily subjective?
A. Relevant
B. Timely
C. Flexible
D. Verifiable
A. Relevant
Relevant data/information is primarily subjective because the user must judge whether or not the data/information is relevant for the user’s purposes. Objective data/information is factual and unbiased, and therefore can be proven. Flexible data/in-formation can be used by a variety of users for a number of different purposes. Verifiable data/information can be proven through research to be accurate. Timely data/information is available when needed. Complete data/information contains all the information needed. Reliable data/information is clean data from a trusted source, such as a juried journal.
- Which of the following applies to protection of patient data on terminal displays in publicly accessible areas?
A. No information should be displayed
B. Terminals should have privacy filters
C. Terminals should have a manual locking feature
D. All data are de-identified
B. Terminals should have privacy filters
To ensure protection on patient data on terminal displays in publicly accessible areas, the terminals should have privacy filters that limit indirect viewing and should be facing away from the public areas when possible. If patients’ names are displayed on computer terminals in public areas, such as a waiting room, the name must be partially masked (such as using initials only). Terminals should have automatic locking figures so that the terminal shuts down if no activity occurs for a specific period of time, such as 3 minutes.
- When discussing information, utility refers to the:
A. Ability to produce the same information at another time
B. Ability of users to apply intellectual reasoning to reach a goal while the tools that produced the information disappear
C. Level of difficulty in accessing information for a particular purpose
D. Ability to provide the correct information to the correct user at the correct time for the correct purpose
D. Ability to provide the correct information to the correct user at the correct time for the correct purpose
Utility refers to the ability to provide the correct information to the correct user at the correct time for the correct pur-pose. Transparency refers to the ability of users to apply intellectual reasoning to reach a goal while the tools that produced the information disappear. Usability refers to the level of difficulty in accessing information for a particular purpose. Reproducibility refers to the ability to produce the same information at another time.
- The field of science that attempts to create intelligent technologies and then apply these technologies to the field of informatics is:
A. Cognitive science
B. Cognitive informatics
С. Artificial intelligence
D. Information science
С. Artificial intelligence
The field of science that applies intelligent technologies to the field of informatics is artificial intelligence. Researchers in artificial intelligence must engineer general intelligence and reasoning skills into the artificial intelligence programs as well as the ability to develop and learn from experiences and errors and to process natural language. One example of an artificial intelligence program is Siri, which responds to verbal queries and is found on Apple devices, such as the iPhone and iPad.
- Various models are available to guide healthcare organizations in applying evidence-based research to practice. If using the Iowa Model of Evidence-Based Practice to Promote Quality Care (Titler, 2001), the first step is to:
A Identify problem- and knowledge-focused triggers (practice questions).
B. Determine the resources available for instituting evidence-based practice.
C. Develop consensus among key players regarding evidence-based practice.
D. Establish a time frame for research, analysis, and implementation.
A Identify problem- and knowledge-focused triggers (practice questions).
The Iowa Model of Evidence-Based Practice to Promote Quality Care (Titler, 2001) begins with identifying problem- and knowledge-focused triggers (practice questions) and then assessing whether they are priorities. If not, other triggers should be considered. Researchers form a team to assess the research base, assemble research, analyze and synthesize the research, determine the efficacy of change, and pilot a change program with a follow-up evaluation of outcomes to determine whether the change should be adopted.
- When applying Lewin’s theory of change to implementation of an EHR, during the “unfreeze” stage, the informatics nurse should expect to:
A. Deal with resistance and provide reassurance.
B. Answer questions and dispel rumors.
C. Envolve many staff members in the change process.
D. Establish systems for feedback.
A. Deal with resistance and provide reassurance.
When applying Lewin’s theory of change to implementation of an EHR, during the “unfreeze” stage, the informatics nurse should expect to deal with resistance and provide reassurance as well as determine the needs for change, promote the need for change, and ensure managerial support. During the change stage, communicating, answering questions, and dispelling rumors as well as encouraging involvement is important. The refreeze (last) phase requires developing methods to sustain change and provide feedback and adaptation to the changes.
- The focus of the Administrative Simplification Compliance Act (2000) (ASCA) is the:
A. Transition to electronic Medicare claims submissions
B. Elimination of all paper Medicare claims submissions
C. Reduction of costs of Medicare claims submissions
D. Elimination of Medicare under- and overpayments
A. Transition to electronic Medicare claims submissions
The Administrative Simplification Compliance Act (2000) (ASCA) focuses on the transition to electronic Medicare claims submissions. ASCA has established penalties for failure to comply; however, the law allows exceptions for providers with fewer than 25 full-time employees, those with no internet access, and those with less than $5 million in annual income. CMS is responsible for enforcing the provisions of ASCA. Although compliance with ASCA should result in cost savings, this is not the focus.
- In response to a sentinel event, the informatics nurse should advise an initial response that includes completing a:
A. Plan to avoid recurrence
B. List of potential causes
C. Root cause analysis
D. List of staff involved
C. Root cause analysis
In response to a sentinel event, the informatics nurse should advise an initial response that includes completing a root cause analysis. The informatics nurse may assist in obtaining necessary information from the electronic health record as automated searches are often much faster and more efficient than manual searches. Root cause analysis must be reviewed objec-tively, taking into consideration that environmental factors and indirect causes (such as decreased staff) may contribute to the direct cause (staff error) of an event.
- If the informatics nurse has found a new application that may enhance the existing EHR with CPOE CDS system, the first concern before recommending the application is:
A. Cost
B. Compatibility
C. Usability
D. Safety
B. Compatibility
While all of these are important issues, if the informatics nurse has found a new application that may enhance the existing EHR with CPOE CDS system, the first concern before recommending the application is compatibility. If the application will not work within the existing system or it requires extensive workaround, then it is not a good choice. The informatics nurse should consult with the vendor as well as IT personnel and programmers to determine whether there are compatibility issues.
- If using the SMART goal-setting system, the goals must be:
A. Authentic
B. Astute
C. Ambitious
D. Achievable
D. Achievable
The SMART goal-setting system helps the individual develop goals that are structured and can be tracked and measured.
The SMART goal-setting system consists of the following:
- The structure of data supported by a hierarchical database is:
A. Many-to-many
B. One-to-many
C. Many-to-one
D. One-to-many and many-to-one
B. One-to-many
The structure of data supported by a hierarchical database is one-to-many (tree or parent-child) but not many-to-one because data connects only in descending order. Hierarchical databases are used for simple structures, such as telephone number listings, but are not adequate for the current demands of information storage; so, hierarchical databases have generally been replaced with relational databases, which are built on a table structure and allow both one-to-many and many-to-one relationships.