ANCC Informatics Practice Test 2 Flashcards
(150 cards)
- The classification system presently used for mortality statistics is:
A. ICD-9
B. ICD-10
C. ICD-10-CM
D. ICD-10-CM/PCS
B. ICD-10
The classification system used for mortality statistics is ICD-10 (International Classification of Diseases, tenth revision).
Both the underlying (primary) cause of death and non-underlying causes (other causes) are coded. ICD-9 was used between 1979 and 1998 for reporting of mortality statistics. ICD-9-CM (Clinical Modification) is usually just referred to as ICD-9 and is used for classification of diseases and procedures associated with hospitalization. ICD-9-CM was replaced with ICD-10-CM on October 1, 2015. ICD-10-CM/PCS is a transitional system.
- When an input device is connected to a system and the information of the device is present in the database and configured to the operating system, the state of the device is classified as:
A. Undefined
B. Defined
C. Available
D. Not available/stopped
C: Available
Devices can be in four different states when connected to a system:
Undefined: The system does not recognize the device.
Defined: Information about a specific device is present in the database but not available to the system.
Available: Information about a device is present in the database and configured to the operating system.
Not available/Stopped: Information about the device is present in its driver but the device is not available.
- With encryption of data, stickiness refers to:
A. A high level of encryption
B. The degree to which encryption persists when encrypted data are moved
C. The ability of encryption software to encrypt different types of data
D. Utilization of the same key to both encrypt and decrypt
B. The degree to which encryption persists when encrypted data are moved
With encryption of data, stickiness refers to the degree to which encryption persists when encrypted data are moved from one site to another, such as from one disk to another. Many types of encryption are only valid when the data are “at rest” or stored in one location or within one network. For example, a file that is encrypted in a network may lose encryption if it is sent as an email attachment, so the stickiness of encryption is an important consideration when data must be transmitted outside
- To ensure network security, the best current Wi-Fi encryption is:
A. WPA and AES
B. WPA2 and AES
C. WPA3
D. WPA2 and TKIP
C. WPA3
To ensure network security, the best current Wi-Fi encryption is WPA3. Wireless Equivalent Privacy (WEP) is the oldest security algorithm but has many security flaws and was retired in 2004; however, it may be present in older systems. Wi-Fi Protected Access (WPA) was adopted in 2003 and contained Temporal Key Integrity Protocol (TKIP), which provided better security than WEP, but again had security flaws. Wi-Fi Protected Access 2 (WPA2) was adopted in 2006 and contained the Advanced Encryption Standard (AES) and Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP) to replace TKIP. WPA3, the most recently adopted security algorithm in 2018, is considered the gold standard for Wi-Fi encryption and is recommended as the most protective security setting.
- Data should be transferred to an offsite data storage area at least:
A. Every 8 hours
B. Every 24 hours
C. Weekly
D. Monthly
C. Weekly
Data should be encrypted, backed up, and transferred to an offsite data storage area at least weekly.
6 One of the essential components of an EHR is the administrative process. An example of an administrative process
A. The storage of patient demographic information
B. Electronic scheduling of outpatient visits
C. The ability to input medication orders
D. Emailing and wed messaging
B. Electronic scheduling of outpatient visits
An example of an administrative process is electronic scheduling for outpatient and inpatient visits. Other administrative processes include billing and claims management. The essential components of an EHR include health information/data (de-mographics, diagnoses, medication lists, allergies), results management (radiology and laboratory reports), order entry management (physician’s orders), decision support (alerts, reminders), electronic communication/connectivity (emailing and web messaging), patient support (education, home telemonitoring), administrative purposes, and reporting/population health management (tools to support mandatory reporting).
- How frequently should hard drives with solid-state technology be defragmented?
A. Weekly
B. Monthly
C. Annually
D. Defragmentation is not recommended.
D. Defragmentation is not recommended.
Hard drives with solid-state technology do not require defragmentation, and it is not recommended, although it will not harm the drive. Defragmentation is required for traditional hard disk drives to rearrange large files in order to speed up pro-cessing. Defragmentation should be done for these drives when processing slows and on a regularly scheduled basis, such as monthly. However, solid-state drives access files rapidly, so there is no benefit to defragmentation, which may actually slow processing.
- When an EHR system is in place, the percentage of verbal or paper orders should be below:
A. 2%
B. 5%
C.10%
D. 15%
C.10%
When an EHR system is in place, the percentage of verbal or paper orders should be below 10%. While it is not possible to completely eliminate verbal or paper orders, the potential for error is always increased if orders are entered into the system by ancillary personnel. Physicians should be encouraged to use the COE CDS system for orders whenever possible, but the efficiency of the CPOE CDS system may vary, and problems can arise if the system is insufficient.
- A system with fine granularity generally has:
A. Decreased fields
B. Decreased costs of computing
C. Decreased overhead
D. Increased overhead
D. Increased overhead
A system with fine granularity generally has increased overhead, which refers to a greater investment of time, effort, and/or resources to carry out a process, such as retrieving data. Granularity is based on the metaphor of sand, so a system with coarse granularity has data in larger entities (components) while a system with fine granularity has the same entities subdivid-ed. For example, with coarse granularity, all identifying information (name, birthdate, ID number) may be contained in one field, but with fine granularity each item is contained in a separate field.
- An article that the informatics nurse wants to distribute has a Creative Commons license, Attribution-NonCom-mercial-NoDerivs. This means that the informatics nurse can:
A. Download and share noncommercially but credit the author.
B. Use the article in any way because it is in the public domain.
C. Download and share, commercially or noncommercially, but credit the author.
D. Use and share no more than 10% of the article.
A. Download and share noncommercially but credit the author.
Creative Commons licenses allow free distribution of copyrighted works under specific conditions, depending on the type of Creative Commons license. The Attribution-NonCommercial-NoDerivs license allows users to download and share a work, but the work cannot be used commercially nor can it be changed, and the author must be credited. With a Public Domain Dedication and License, the author waives all copyright and places the work in the public domain.
- A common benefit derived from the use of the EHR is:
A. Decreased costs
B. Increased staff satisfaction
C. Reduced medication errors.
D. Decreased rates of infection
C. Reduced medication errors.
A common benefit derived from the use of the EHR is reduced medication errors. Other benefits include increased use of guideline-based care because the guidelines are embedded in the EHR. The EHR also facilitates surveillance and monitoring because the databases can be more easily searched for information than when manual searches are required. An additional benefit is decreased utilization of care. Research does not clearly indicate that there are cost savings because the initial outlay to convert to an EHR and to perform maintenance may be very costly.
- The first step in the data validation process is:
A. Planning
B. Analysis
C. Assessment
D. Evaluation
C. Assessment
Data validation is the process that ensures that data is correct and meets all requirements. Date validation may be intrinsic (within the system itself), internal (in clinical use), or external (via outside auditing).
Steps to data validation include the fol-lowing:
Assessment of the tools, resources, content, and sources.
Planning, including methodology and approach.
Implementation includes looking for problems, defects, and patterns in a workflow.
Analysis includes categorizing problems, tracking issues, and communicating regarding findings.
Evaluation aims to improve validation, develop solutions for problems, and facilitate standardization.
- When utilizing FMEA (failure modes and effect analysis) to determine how a CPOE may fail, the interdisciplinary team should include at least personnel from:
A. Informatics, IT, and nursing staff from each unit
B. IT and informatics
C. IT, informatics, nursing, pharmacy, administration, and medical staff
D. IT, administration, informatics, and nursing, and experts in the field of computer information system
C. IT, informatics, nursing, pharmacy, administration, and medical staff
When utilizing FMEA (failure modes and effect analysis) to determine how a CPOE may fail, the interdisciplinary team should include at least personnel from IT, informatics, nursing, pharmacy, administration, and medical staff because all of these departments have a role in ensuring that orders are correctly entered and carried out. The process to be examined should be narrowed as much as possible because interdepartmental processes that involve many departments and personnel may be difficult to adequately assess.
- According to Gerbner’s General Model of Communication, a received message is not understood in the same way that the sent message intended. This exemplifies the:
A. Control dimension
B. Means dimension
C. Distortion of reality
D. Perceptual dimension
D. Perceptual dimension
According to Gerbner’s General Model of Communication, a received message is not understood in the same way that the sent message intended. This exemplifies the perceptual dimension. For example, if the informatics nurse transmits a message to staff members (receivers), the receiver cannot understand or receive all of the elements that went into the message— the negotiations, the research, the meetings, the thought processes-so the receivers, in fact, only receive part of the message, so they may interpret it differently.
- If the informatics nurse does not understand the recommended practice or worksheet on a SAFER guide, the next step is to:
A. Leave a message in “Assessment” notes.
B. Assign a score of “Not applicable.”
C. Refer to “Potentially Useful Practices.”
D. Refer to “Suggested Sources of Input.”
D. Refer to “Suggested Sources of Input.”
If the informatics nurse does not understand the recommended practice or worksheet on a SAFER guide, the next step is to refer to “Suggested Sources of Input.” For example, in the “High Priority Practices” SAFER guide, phase 1 is “Safe Health IT” and the first recommended practice is related to backing up data and application configurations. A rationale is given as well as a list of useful practices. Suggested sources of input include a list of those who may be able to provide useful information, such as clinicians, support staff, and health IT staff.
- The primary purpose of performance appraisal should be to:
A. Determine compensation.
B. Identify areas of weakness.
C. Promote staff development.
D. Establish a basis for promotion/demotion.
C. Promote staff development.
The primary purpose of performance appraisal should be to promote staff development by communicating the appraiser’s perception of the staff member’s strengths as an employee and helping the person to identify areas that need further devel-opment. The focus should remain positive rather than negative. The performance appraisal may be utilized to determine compensation and to establish a basis for promotion or demotion as well because these actions, especially demotion or firing, require a paper trail that shows interventions.
- If a new EHR system requires three additional steps to document a medication, resulting in increased errors, the first step to reducing errors should be to:
A. Provide more training for staff.
B. Place printed lists of steps on each computer.
C. Revert to the previous EHR system.
D. Determine if steps can be reduced.
D. Determine if steps can be reduced.
If a new EHR system requires three additional steps to document a medication, resulting in increased errors, the first step to reducing errors should be to determine if steps can be reduced because the greater the number of steps needed to carry out a process, the greater the chance of error. The number of steps as well as the number of different screens and hard stops should be carefully assessed. The system may also need to be modified in such a way as to more accurately predict and prevent errors.
- Which of the following is an appropriate CDS function or feature?
A. Identifying system errors
B. Signaling need for training
C. Predicting outcomes
D. Reverse allergy checking
D. Reverse allergy checking
An appropriate CDS function or feature is reverse allergy checking; that is, when a new patient allergy is entered into the system, it should check existing orders for the new allergy. Other CDS functions and features include checking for drug-drug interactions as well as food-drug interactions, abnormal laboratory results alerts, alerts for inappropriate drug-conditions (such as drugs contraindicated with pregnancy), inappropriate drug-age interactions (such as medications contraindicated for older adults), and maximal doses.
- During the orientation phase of the group process:
A. Members make group decisions.
B. Members are able to express their opinions and feelings.
C. Tasks are identified, and members explore their roles.
D. Members are able to work collaboratively.
C. Tasks are identified, and members explore their roles.
Group process phases:
• Orientation: Tasks are identified and members explore roles, depending on the leader at first and then exploring personal roles in the group.
• Organization: Members make group decisions regarding rules, limits, criteria, and jobs. Some resistance may occur.
• Flow of information: Members are able to express opinions and feelings, and interpersonal conflicts lessen.
Problem solving: Members are able to work collaboratively and think that goals can be met, while some may resist change.
- The primary threat to the security of a network is:
A. Technical errors
B. Social engineering
C. Spyware
D. A malicious insider
D. A malicious insider
The primary threat to the security of a network is a malicious insider, such as an unhappy employee or an employee who has been fired. Once a person is no longer employed, the person’s access to the computer system must be terminated immediately and the ID and password deactivated. Any ID badges issued by the organization should also be obtained so that the person is unable to gain access to secure areas of the organization.
- The informatics nurse is to lead an interdepartmental work group. The initial action in setting up the meetings is to:
A. Prepare a detailed agenda
B. Review members’ qualifications and areas of expertise
C. Contact members regarding their preferences
D. Review work schedules and venues
D. Review work schedules and venues
When setting up meetings for an interdepartmental work group, practical matters need to be dealt with first. This includes reviewing work schedules to determine a meeting time that is convenient for the majority of the group. Additionally, the leader needs to review meeting rooms or venues to determine which one will meet the needs of the group and allow members to sit around a table or in a circle to encourage communication. The leader must also determine what types of equipment or supplies are needed for meetings and whether the venue can provide for those.
- Which one of the following is essential to process excellence?
A. Cost-cutting measures
B. Continuous improvement mindset
C. Rapid implementation of changes
D. Focus on short-term gains
B. Continuous improvement mindset
Process excellence requires a continuous improvement mindset to improve processes, reduce waste and costs, and improve efficiency. Process excellence may involve the use of a methodology, such as total quality management (TQM). Key factors in process excellence include a focus on the needs of the customer, making decisions based on data, using standardized procedures, empowering employees, and adapting to market changes. Although cost cutting is important, it can lead to short-
- The business concept of “planned obsolescence” is utilized in the field of technology primarily to:
A. Ensure organizations modernize.
B. Prevent loss of functionality.
C. Comply with regulatory requirements.
D. Ensure market demand continues.
D. Ensure market demand continues.
The business concept of “planned obsolescence” is utilized in the field of technology primarily to ensure market demand for products continues. Thus, after a period of time (usually a few years), products may be sunsetted, or phased out, so that they are no longer supported by the vendor. Because of this, healthcare organizations are almost constantly in a planning phase for acquiring new technology-hardware and/or software—in order to maintain functionality.
- During the phase of technical development, a constructive assessment of the cognitive aspects could evaluate the response to:
A. The effort needed to document in the EHR while interviewing a patient
B. The number of screens the user must access to transfer a patient
C. The number of mouse clicks needed to complete an activity
D. The eye strain from looking at a screen for prolonged periods
A. The effort needed to document in the EHR while interviewing a patient
During the phase of technical development, a constructive assessment of the cognitive aspects could evaluate the response to the effort needed to document in the EHR while interviewing a patient because the user’s attention must be focused in two different areas-the patient and the computer terminal. Ergonomic aspects include direct dialog with the sys-tem, the number of screens that must be accessed in order to carry out an activity, and the number