Chaler 12 Flashcards
(27 cards)
A ____ program is software that scans the computer to detect and disable malicious virus programs that can harm your data
virus protection
Many offices with electronic health records use digital cameras to take pictures of their patients to download into the patient’s record. (true or false)
True
Medical practice management programs often have several tiers of security, allowing one system administrator (the person in charge of the computer program) to limit access for patient records to those who need to see them (true or false)
True
A medical assistant who wanted to type a letter to a patient would likely use a _______ program
word processing
Which of the following social media sites has the benefit of employment networking ?
When choosing a password, using the names of children or significant others is a good idea because they are easily remembered (true or false)
False
Which of the following would be a drawback to using social media in the medical office
Personal information posted by employees reflecting negatively on the facility
Computers are considered a fundamental piece of operating equipment to perform and enhance quality patient care through data collection, eliminate duplication of work and decrease _____
errors
By using _______ in the handling of all medical records, the successful medical assistant conveys to the patient that confidentiality is of the utmost importance to the practice, thus reassuring the patient
discretion
_______means to code or scramble data to be unreadable unless you have the decoding key
Encrypt
______safeguards are the controls a medical office has in place to prevent unauthorized people from physically accessing patient data
Physical
Which type of backup allows the system to be restored exactly as it existed on the original computer ?
System imaging
Database management applications are electronic ________
filing systems
If you must write your password down, keep it in a(n) _______ place and do NOT identify it as a system password
secure
_________ involves copying all files from the computer to an external medium, such as an external hard drive or optical disc
Backup
Which of the following is an example of a HIPPA Security Rule technical safeguard ?
Constructing firewalls to prevent intrusion
Operating systems perform special functions such as spreadsheets, word processing, or data management (true or false)
False
A medical assistant who wanted to type a letter to a patient would likely use a _______ program
word processing
The same legal standards of confidentiality and compliance required by the Health Insurance Portability And Accountability Act (HIPAA) apply to all patient records, whether on paper or on the computer ( true or false)
True
_______ applications provide the user the ability to create, edit, store, and print things such as letters, manuscripts, transmittals, and many other professional documents
Word processor
______software allows users to create things such as spreadsheets, documents, or presentations
Application
The ____ is a small oblong device that the operator rolls over a hard flat surface to control the movement of the cursor on the monitor
mouse
A portable _____ drive, also known as a jump drive, thumb drive, or flash drive, is a small portable storage device that can hold many gigabytes of data
USB
A(n) ______ also known as an electronic medical record (EMR), is a computerized version of a patients medical history
electronic health record (EHR)