Overall Flashcards

(427 cards)

1
Q

What are some areas where clinical scientists may work with medical IT?

A

Access patient records, patient calculations, patient reports, system management, R&D, software development, data acquisition and analysis, computer modelling, procurement, corporate user (emails etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The role of the clinical scientist is in every part of the life cycle of a system, what are the stages of the lifecycle?

A

Planning, specification, procurement, installation, acceptance, commissioning, QA, maintenance, clinical user, decommissioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Instead of a comprehensive electronic health/patient record that includes all information, what typically happens?

A

Subset of a patients record focussed on a particular discipline (eg radiology system) that communicate data with each other, could all look like one system from the outside

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do we ensure that the system knows patient A in one system is the same as patient B in a different system?

A

Master patient index (MPI), links a unique identifier (eg NHS number) and the real patient (links patient data across various sources)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a patient administration system (PAS)?

A

Central admin system that knows about the patients new into the organisation and their appointments. Might include basic info of test results and their doctors. (could include master patient index but not always)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the main radiology systems?

A

Radiology Information System (RIS) and Picture Archive and Communications System (PACS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purposes of a Radiology Information System (RIS)?

A

Scheduling of imaging, resource management, inventory tracking, reporting of imaging, presentation of reports, report sign-off, billing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purposes of a Picture Archive and Communications System (PACS)?

A

Storage of images and other data, visualisation of images and data transfer between systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Instead of having a PACS workstation to access the PACS server and a RIS workstation to access the RIS server, what do we usually have instead?

A

Have a web server that collects information from the PACS and RIS servers, then a workstation accesses this central point to show the end user both together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a modality in medical IT?

A

Any computer controlled clinical equipment (eg scanners, workstations, potentially software packages)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does it mean that most imaging equipment (eg scanners) are standalone equipment?

A

Not reliant on other components so they can work in isolation and perform their basic function (eg could scan without workstation working)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Is a server (could be one or multiple machines) a virtual central point that everything is going through?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is connected to a server (eg for PACS or OMS) in medical IT?

A

A database, storage, client applications and modalities (client = using data, modality = adding to data, could be the same thing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does a database tend to store?

A

Basic text data and numbers (eg records, file names of images)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does ‘storage’ from a server tend to store?

A

Images (binary type data) - larger files than database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the main radiotherapy systems?

A

Treatment Planning System (TPS), dose checking system, Record and Verify (RV or VR) System (at linac) and Oncology Management System (OMS) (equivalent to EHR, RIS, PACS and PAS together)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does networking allow?

A
  1. A complex system to be made up of connected individual components
  2. One clinical system to communicate with another
  3. Multiple systems to be used in the care of a patient
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the two ways that a network can be represented diagramatically?

A

Logical diagram (how systems link to each other and focuses on flow of data) and physical diagram (physical connections between components)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are different types of architecture of network applications?

A

Client/server, standalone, hybrid and peer to peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the client-server architecture of network applications?

A

Separates tasks between the providers of a resource or service called servers and service requester called clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the peer to peer architecture of network applications?

A

One system sends direct to another without going through some sort of intermediary (like a server)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Why should we be sceptical of client-server architectures?

A

It can be confusing as to where the client is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is an extreme form of the client/server architecture?

A

Application servers (applications presented via a web browser and all processing performed on server)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does the acronyms in the ISO OSI model of networking stand for?

A

ISO = International Standards Organisation
OSI = Open Systems Interconnection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Why is a model of networking like the ISO OSI model required in order to transfer data instead of sending data directly?
It wouldn't work because there's different operating systems, different suppliers and different protocols
26
What is the ISO OSI model of networking for?
Standardised model of transferring information by breaking the data down until you can physically transfer the data (eg cable, microwave transfer etc) before rebuilding the data until it can be interpreted on the other side
27
What are the 7 stages on each side of the ISO OSI model of networking?
Application layer, presentation layer, session layer, transport layer, network layer, data link layer and physical layer
28
What model has replaced the ISO OSI model of networking and the one we typically use for hospital networks?
TCP/ IP model (Transmission Control Protocol/ Internet Protocol)
29
How many layers are in the TCP/ IP model?
5
30
What are the layers of the TCP/ IP model?
Application layer, transport layer, internet layer, data link layer and physical layer
31
Which layer does the Transmission Control Protocol (TCP) operate in the TCP/ IP model?
Transport Layer
32
What layer does the Internet Protocol (IP) operate in the TCP/ IP model?
Internet Layer
33
What could be counted as the Application Layer of TCP/ IP model?
What we interact with on the computer (PACS or email client for example)
34
The Internet Protocol (IP) in the TCP/ IP model is implicitly referring to what version?
4
35
What other version is sometimes used in the Internet Protocol (IP) in the TCP/ IP model?
6
36
Why was version 6 of the Internet Protocol introduced?
There was a concern that we would run out of addresses with version 4
37
What is the Internet Protocol (IP) in the TCP/ IP model for?
It is a way of uniquely identifying a device's interface on a network to facilitate data transfer to that interface
38
An IP version 4 address is how many bits and represented by how many bytes?
32 bit number represented by a series of 4 bytes. (4 lots of 3 numbers)
39
A byte in an IP v4 address is a number in what range?
0 to 255 (2^8=256 values)
40
How is an IP v4 address usually represented?
aaa.bbb.ccc.ddd
41
How many possible address are there for the IP v4 format?
2^32 (4 billion)
42
What restrictions must an IP address have?
It must be unique on a network, each byte between 0-255 and other devices know how to reach each
43
Two computers on a network will both have what?
Each have a network card with an IP address on
44
There's a rule with the Internet Protocol that network devices are only allowed to accept what information?
Information that has been intended for that network device (so information may get sent along a network connection but get rejected at the device)
45
What are methods of transferring data between devices in a network with IP address?
Direct connection, connection via hub, connection via switch, connection via gateway
46
What is the connection via hub method of transferring data to different connected devices with IP addresses?
The hub passes data to all connected devices, which gets rejected by all except the one that it is intended for (don't often see hubs today)
47
Why did switches replace hubs for transferred data between devices?
It is inefficient to send large volumes of data to every device so the network can easily be paralysed
48
What is the connection via switch method of transferring data to different connected devices with IP addresses?
The switch passes data on to the intended device in the network
49
What is the benefits of using a connection via switch to transfer data to different connected devices with IP addresses?
More secure and efficient
50
Do switches have an IP address itself and why?
Yes because bigger networks have multiple switches for each subnet that send data between them before going to a different device
51
What number do switch IP addresses use as the final number?
1 by convention (not always)
52
With multiple switches in a bigger network, how do they communicate with each other to transfer data to a connected device?
Via the 'gateway' of the first switch (or router) before going to the next switch
53
When is a gateway required when transferring data with IP addresses?
When you need to transfer data outside of your network
54
What is a router?
A special class of a switch and its job is to connect lots of networks together so connected to lots of other routers or switches
55
What is the group name for these devices: hub, switch, gateway, router?
Infrastructure components or network devices
56
What is a subnet?
It is a sub-network that is part of a larger network
57
What two pieces of information defines a subnet?
Subnet address (any address in the range but usually the first one) and a netmask
58
What do the numbers in the netmask represent?
Which numbers are allowed to change or not
59
What is the purpose of a network?
It allows us to work out what's on the same network
60
Do you ever have a zero in the middle of a net mask?
No
61
If a netmask is 255.255.255.0, what does this mean?
The first three sets of numbers of an IP address aren't allowed to change in order to be in the same network but the fourth number is
62
In technical documentation, a representation of an IP address will have a / sign then the number of bits, how is this calculated?
In the netmask, each 255 is 8 bits and 128 is 1 bit (240 is 4 bits) so add them up
63
What are private subnets?
Private IP address ranges which can be allocated at will but must not appear on the internet
64
How many private subnets are there?
3 (technically 4)
65
Why are private subnets used? (could be at home or internally within organisations)
Convenient as can allocate at will and secure as they do not appear on the internet
66
What are the 3 IP addresses that are private subnets?
10.0.0.0 (class A) 172.16.0.0 (class B) 192.168.0.0 (class C)
67
What is the netmask for the private subnet 10.0.0.0 (class A) and how many bits are in it?
255.0.0.0 and 8
68
What is the address range for the private subnet 10.0.0.0 (class A)?
10.0.0.0 - 10.255.255.255
69
What is the netmask for the private subnet 172.16.0.0 (class B) and how many bits are in it?
255.240.0.0 and 12
70
What is the address range for the private subnet 172.16.0.0 (class B)?
172.16.0.0 - 172.31.255.255
71
What is the netmask for the private subnet 192.168.0.0 (class C) and how many bits are in it?
255.255.0.0 and 16
72
What is the address range for the private subnet 192.168.0.0 (class C)?
192.168.0.0 - 192.168.255.255
73
What is Network Address Translation (NAT)?
A mechanism by which traffic from a host on a private subnet can be directed to the Internet and it allows ranges of addresses to be reused
74
What handles Network Address Translation (NAT)?
Switches and other network infrastructure components
75
How do you get replies when using a private subnet and network address translation?
The traffic from your address is tagged in transit so replies are routed back to your private address
76
What is the 4th type of private subnet called?
Loopback address
77
What is the IP address for the loopback address?
127.0.0.1
78
What is the purpose of the loopback address?
It directs traffic back to the local computer without it reaching any 'real' network interface so it allows network services to operate without a network being present
79
What is the address range for the loopback address 127.0.0.1?
Any address in 127.0.0.0/8 (so any address starting with 127)
80
How many bits is an IP version 6 address?
128
81
Why are IPv6 sometimes not used in a healthcare environment?
Compatibility issues
82
In an IP version 6 address, how many sections are there that are bounded by a colon?
8 (8 lots of 4 characters)
83
What is the Transmission Control Protocol (TCP)?
It manages data transfer as a series of bundles of information called packets, which each have a series of bytes, instead of all the data and these are sent across a network then reassembled
84
What is the structure of a TCP packet from top to bottom?
TCP header, length, source port, destination port, sequence number, checksum, other information and data
85
What does the TCP header in the TCP packet do?
It identified it as a TCP packet (useful for a switch)
86
What do the sequence number in the TCP packet do?
It allows assembly of the data block by describing what order the packets should be place in
87
What is the checksum in the TCP packet?
It is a number generated from a calculation of the data and if it is repeated with a different result, we will know corruption has occurred
88
Behind every IP address, there could be multiple applications communicating on that device, what are these called?
Ports or internet sockets
89
What is the form of a port number?
Any 16 bit integer (0 - 65,535)
90
How is the port number identified for a certain IP address?
It is following a colon after the IP address
91
Below what port number is reserved for specific applications?
1024
92
Other than TCP packets, what other type of packet could there be?
Universal Datagram Protocol (UDP)
93
For TCP packets, are packets acknowledged as they are received?
Yes
94
What is the structure of UDP packets?
UDP header, source port, destination port, checksum, and data
95
Are UDP or TCP packets more simple?
UDP
96
When are UDP packets used?
Streaming information when data integrity is not as important but it is quicker
97
For UDP packets, are packets acknowledged as they are received?
No
98
Who allocates the standard reserved ports?
Internet Assigned Numbers Authority (IANA)
99
What is the Media Access Control (MAC) Address and what is its format?
Physical address of a physical device eg the hardware (IP address is a virtual address on a network). 6 lots of 2 separated by colons
100
What layer of the IP/TCP model does the Media Access Control (MAC) address operate?
Data Link Layer
101
How is the Media Access Control (MAC) Address represented?
By 6 bytes with a unique prefix for the manufacturer
102
Typically, does every network interface have a globally unique MAC address or can they be reused?
Globally unique
103
What terms are used to describe the scale of a network?
Local Area Network (LAN), Wide Area Network (WAN) and Metropolitan Area Network (MAN)
104
What does a Local Area Network (LAN) refer to?
Small geographical area (could be a hospital or a room, difficult to define exactly)
105
What is a Metropolitan Area Network (MAN)?
Special case of a WAN (Wide Area Network) distributed over a city
106
What is the Health and Social Care Network (HSCN)? (used to be N3)
Private network linking NHS and special care organisations (can include private suppliers)
107
What does the Directory Name Service (DNS) do?
They link hostnames (eg website address) to IP address
108
What do Virtual Private Networks (VPN) do?
Allow secure connections to networks from external locations
109
How do VPNs work in hospitals?
It creates an encrypted tunnel from the network device (eg home PC) back to the hospital server
110
What is the ethernet?
A family of wired computer networking technologies used in LANs, WANs, MANs.
111
What is network bandwidth sometimes referred to as?
Maximum throughput
112
What is the network bandwidth?
The rate at which data can be transferred in one direction
113
What is the units for network bandwidth?
Data volume per unit time, eg Megabits per second (Mbps)
114
What factors could affect the network bandwidth?
Data transport process speed (eg a packet must be acknowledged every time it is received for TCP), connection may be half or full duplex
115
What does it mean for a network connection to be half or full duplex?
Half duplex is when only one party can communicate at a time whereas full duplex, both parties can communicate simultaneously
116
How many bytes are in one kilobyte?
2^10 bytes = 1024 bytes
117
How many bytes are in one megabyte?
2^10 x 2^10 bytes
118
How many bytes are in one gigabyte?
2^10 megabytes
119
What is the definition of network latency and its units?
The time taken for a packet to travel from the sender to receiver. Units of time, usually milliseconds
120
What are some of the purposes of a ping?
It verifies a route between source and destination exist, measures network latency, for example
121
What are the main two data exchange standards that we are concerned with?
DICOM and HL7
122
Why are data exchange standards required?
Standardised language is important so that different components (with different manufacturers) can communicate with each other
123
What is an open standard?
A standard that is available to everyone (may be free or not) that anybody who wants to implement that standard is able to follow the rules
124
Are DICOM and HL7 open standards?
Yes
125
Are TCP/IP and UDP open standards?
Yes
126
What are the different levels of sources of standards and an example of each?
International Standards Organisations (eg ISO), National Standards Organisations (eg BSI), Professional Standards (eg IPEM, NEMA) and Corporate/Organisational Standards (eg NHS DAPB)
127
Is adherence to standards voluntary or mandatory?
Generally voluntary but it may be written in law eg Health and Social Care Act (depends on the country whereas the standard is the same regardless of where its implemented)
128
What does DICOM stand for?
Digital Imaging and COmmunications in Medicine
129
What does DICOM cover?
Digital images and associated data (eg date and time, name of operator, respiratory motion)
130
What body coordinates DICOM?
NEMA
131
Who is DICOM mainly for?
Mostly manufacturers but also users
132
What version of DICOM are we on?
3.0 (different years after but always 3.0)
133
What is the scope of DICOM?
Standard data types and services, transfer of data across a network, storage onto media, compatibility between systems (conformance with standards), data compression, security, image display and output
134
What is a data element according to DICOM?
Unit of information with defined data type and structure. Standard elements are uniquely indexed by a tag and name (eg patients name, slice position)
135
What is an information object according to DICOM?
Set of elements which together describe a physical entity (eg CT slice, digital radiograph). Subcategory of this is an instance
136
What is a service class/ group according to DICOM?
Action that can be performed on information objects (eg transferring data, archiving, printing)
137
What is a Service Object Pair (SOP) in DICOM?
A defined action which can be performed on a particular object (eg storage of a CT slice)
138
What is the name and its acronym for the group of service classes in DICOM?
DICOM Message Service Element (DIMSE)
139
What are the most common DIMSE service classes under DICOM?
Verification, storage, query, retrieve, printing
140
What three pieces of information is needed to uniquely identify a system in a DICOM environment?
IP address or hostname, port for receiving data, Application Entity Title (AET)
141
Under DICOM, service classes can by implemented by application software by who?
Service Class User (SCU) or Service Class Provider (SCP)
142
What could be an example of Query/Retrieve under DICOM?
A user querying a piece of information from PACS and then PACS sending it back
143
What are Unique Identifiers (UIDs) that are used in DICOM (not only DICOM uses this)?
String of up to 64 characters (0-9 and full stops) in length that are assigned to SOP (Service Object Pair) classes and assigned to instances of objects. Globally unique
144
What does each part for the Unique Identified (UID) under DICOM represent?
DICOM. country, root owner (eg manufacturer) and any numbers to make it unique
145
A DICOM file has what prefix to show it is a DICOM file?
DICM
146
What is an example form of a tag in a DICOM file that is unique to the data type?
Example (0010, 0010)
147
What is the Endian in DICOM?
Transfer syntax - the way in which bytes are numerically stored
148
What are the different types of Endian?
Implicit VR Little Endian, Explicit VR Little Endian and Explicit VR Big Endian
149
What form of Endian must every system be able to speak?
Implicit VR Little Endian
150
What is DICOM conformance?
How a system has been designed to implement a standard
151
What is a DICOM conformance statement?
It specifies supported information objects, service classes, SOPs. communication protocols and storage protocols (says what it does, not what it doesn't do)
152
What are the benefits of DICOM?
Widely accepted standard format (improve compatibility and well defined standard objects/ services), robust, reliable format
153
What are the limitations of DICOM?
Conformance does not guarantee compatibility, complex standard and very broad scope, may require complex local configuration
154
What could be some issues with DICOM?
Incompatibility between systems, configuration problem, unexpected results, proposed development of service
155
What does HL7 stand for?
Health Level 7
156
Whereas DICOM is more in the realm of clinical scientists, who manages HL7 in a healthcare organisation?
IT and informatics departments
157
Who manages HL7?
HL7 Consortium
158
What type of data is HL7 concerned with?
Communication of message between clinical information systems (text or numerical data, not image) eg patient demographics, scheduling infor, lab results, radiology results
159
If PACS looks at DICOM mostly (not strictly), what standard does RIS use typically?
HL7
160
What is the name of how to convert an appointment list in HL7 to DICOM?
DICOM worklist format from PACS
161
What is the HL7 message format?
A message is a series of segments which themselves contain a series of composites (fields)
162
What versions of HL7 do we typically use?
Version 2.x (2.6 most commonly used) or Version 3 (mostly NHS)
163
What is the form of HL7 version 2.x messages?
Binary or ASCII
164
What is the form of HL7 version 3 messages?
XML
165
What are Integration Engines (also called Trust Integration Engines/ TIEs in the NHS)?
Convert one HL7 feed into multiple feeds by data mapping between input feed and outputs (eg change NHS number to hospital number for a particular system)
166
When is the only time physicists are involved with HL7?
If it affects a physics managed system (eg radiotherapy OMS)
167
What does the organisation with the acronym IHE stand for?
Integrating the Healthcare Enterprise
168
What do IHE do?
They work with manufacturers to improve compatibility between systems
169
What are IHE Profiles?
Standard ways of communicating between systems, typically using DICOM and HL7, for particular real-world applications
170
What are the 'Integration Statements' that manufacturers release?
Which IHE Profiles they meet with a particular product
171
What is information governance?
Rules to keep data safe
172
What could happen if we do not have information governance?
Lack of trust from patients leads to them withholding vital information for their care and reseacrh
173
What does the IAO role stand for and who is usually in this role in an NHS Trust?
Information Asset Owner and department heads
174
What does the SIRO role stand for and who is usually in this role in an NHS Trust?
Senior Information Risk Owner and board level member
175
What does the IAA role stand for and who is usually in this role in an NHS Trust?
Information Asset Administrator and operational staff responsible for set information assets
176
What UK laws matches with the EU General Data Protection Regulation (GDPR) 2016?
Data Protection Act 2018 and UK GDPR
177
Who administers both the Data Protection Act (DPA), GDPR and Freedom Of Information Act (FOIA)?
Information Commissioner's Office (ICO)
178
Does the Freedom Of Information Act (FOIA) 2000 allow people to access their own personal data or information about an organisation and what it is doing?
General and specific information about the organisation and what it is doing. Not about personal data to people
179
Does DPA and GDPR refer to general information about an organisation or personal information about a specific individual?
Personal information about a specific individual
180
What does Personal Data refer to under GDPR?
Information than can identify a person either directly or indirectly
181
Under GDPR, what is the difference between the Data Controller and the Data Processor?
The data controller determines the purposes and means of the processing of personal data, whereas the data processor processes the data on behalf of the controller
182
What are the 7 +1 principles for processing personal data in Article 5 of GDPR?
(a) Lawfulness, fairness and transparency. (b) Purpose limitation. (c) Data minimisation. (d) Accuracy. (e) Storage Limitation. (includes disposal) (f) Integrity and confidentiality. (g) Security. (+1) (a) Accountability
183
What is Article 6 of GDPR concerned with?
Lawful bases
184
What is Article 7 of GDPR concerned with?
The prohibiting of processing special categories of personal data (eg racial, political etc), and permissions of when this is allowed
185
Data can be stored via Retention Policies and sometimes can be transferred to a PoD, what is this?
Place of Deposit, which is a secure location where data can be kept forever
186
What is a Data Protection Impact Assessment under GDPR?
A process to identify and minimises data protection risks
187
What is the DPO role under GDPR?
Data Protection Officer
188
When is a Data Protection Impact Assessment required and who may be involved?
Any new processing that is likely to result in a high risk to individuals. DPO should be consulted and topic experts
189
What should be included in a Data Protection Impact Assessment (DPIA)?
Nature, scope and context of processing. Assess necessity. Identify risks (likelihood and severity). Identify measures for mitigation
190
What is the right of access under GDPR?
Individuals have the right to obtain a copy of their personal data, also called subject access
191
What is the right of erasure under GDPR?
Individuals have the right to have personal data erased. Request can be declined but have to have a reason
192
What is a personal data breach under GDPR and DPA?
Breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data
193
Who should be notified when there has been a personal data breach that is likely to be a risk, as identified by an assessment?
ICO
194
What is the difference between the Caldicott principles and GDPR? (they are quite similar)
Caldicott is only for the best interest of the patient, not legal
195
What are the Caldicott principles for?
Ensure people's information is kept confidential and used appropriately. Refers to patient-identifiable information.
196
What are the 7 Caldicott principles?
Justified purpose. Only when necessary. Only use minimum. Access restricted (need-to-know). Understand your responsibility. Comply with law. Duty to share can be as important as duty to protect patient confidentiality
197
Should the Caldicott be different or the same person as the SIRO?
Different
198
Do all NHS Trusts need a Caldicott Guardian?
Yes
199
What is the Computer Misuse Act?
Criminalises unauthorised access to data
200
What is the aim of the Freedom of Information Act?
Drive transparency in the affairs of public authorities with publication schemes and gives people access to information
201
Whereas as GDPR request can be by any means, how do Freedom of Information Act request have to be?
In writing (including email) with a clear description of the information required
202
What are absolute exemptions to Freedom of Information Act requests?
Personal information, accessible by other means, security, court records
203
What is the only criminal offence under the Freedom of Information Act?
Alter, deface, block, erase or conceal any record with the intention of preventing disclosure
204
In GDPR, under the article 5 principle about storage limitation (e), what does it say about identification?
Data should be kept in a form that permits identification of data subjects for no longer than is necessary for the intended purpose
205
Where are the retention guidelines for data storage limitation?
NHS Code of Practice
206
What is anonymisation?
Process of de-identifying data so that the data subject cannot be identified (can't go back - extreme de-identification)
207
Does GDPR apply to anonymised data?
No, it is no longer personal data but still under other rules
208
What is de-identification?
Identity of an individual removed from a dataset (doesn't need full de-identification, can be partial)
209
What is functional anonymisation?
De-identification performed such that the risk of re-identification is deemed acceptable (as it is impossible to prove no risk)
210
What is pseudonymisation?
Dataset de-identified with a link maintained back to the individual (can look anonymous superficially)
211
What is the risk appetite?
Level of risk that is acceptable
212
What is the risk assessment process for data-related tasks?
Consider the data situation, risk appetite and sensitivity. Do risk assessment using this information, decide if risk is acceptable and mitigate risks if not. Perform task and verify original requirements are met. Record it all
213
According to the ICO, is consent required for the process of deidentification?
No, if there is no likelihood that anonymisation will causes unwarranted damage or distress
214
What does it mean when patient data is 'de-identified to the point of publication'?
Data does not contain direct or indirect identifiers and no reasonable prospect of the patient being identifiable
215
What is the difference between pseudonymisation and anonymisation?
Whether there is other data (like a mapping table) that links patient to pseudonym or is some way recoverable (eg decryption or finite number of codes). Pseudonymisation is reversible or some way able to link back but anonymisation is not
216
Is pseudonymised data covered by GDPR?
No
217
What is data reduction?
Data processed to extract only what is required for subsequent study (eg radiomics - method that extracts features from medical images)
218
Why is it important to have at least 3-5 people in a category of de-identified data and what is a good way of doing this?
A small cohort makes it easier to identify a person. Use ranges for characteristics (eg age or height in a range)
219
What are the three key principles of information assurance?
CIA triad: Confidentiality, integrity and availability. (article 5 (f) GDPR)
220
What is an information assurance audit?
Regularly reviewing performance against standards, codes of practice and/or best practice
221
What practical element for clinical systems may lead to having to compromise on it being a robust IT system?
It also needs to fulfil a clinical function effectively, so needs to balance both
222
What toolkits are there for top management to use for information security management?
Information Governance Toolkit and Data Security and Protection Toolkit
223
What does NCSC stand for?
National Cyber Security Centre
224
There are data security standards from the National Data Guardian. They are split into groups called what and what are do each of these groups address?
Leadership obligations is the name of the groupings. People, process and technology issues.
225
What is the Digital Technology Assessment Criteria (DTAC) and what is it used for?
Brings together legislation and best practice during procurement of digital technology (health IT systems) and can be used by the NHS or manufacturers
226
Are you allowed to use equipment if it doesn't pass the DTAC?
Yes but have to accept the risk
227
What is a medical image?
Representation of the human body that depends on the physics of the imaging process
228
Is data lost in a processed image (including image fusion)?
Yes
229
What is ImageJ used for?
Mainly direct image processing applications and troubleshooting
230
What is IQWorks used for?
Evaluation of image quality
231
What does MHRA stand for, which is an agency of the UKs Department of Health and Social Care?
Medicines and Healthcare products Regulatory Agency
232
Who manages the public access register of medical devices on the UK market?
MHRA
233
What does IEC stand for? (similar to ISO)
International Electrotechnical Commission
234
What is the EU regulation name for medical device regulation?
Medical Device Regulations (MDR)
235
What is the UK regulation name for medical device regulation?
Medical Device Directive (MDD)
236
What is the UK's version of the EU CE mark?
UKCA
237
What is in the scope of the Medical Device Directive (MDD)?
Any apparatus, appliance, or software, whether used alone or in combination, intended by the manufacturer to be used by human beings for a medical purpose (includes in vitro diagnostic devices)
238
What is out of scope of the Medical Device Directive?
Research use only and in-house manufacture
239
What do the MDR add to what is considered a medical device?
They are intended to be used for prediction, prognosis and products for cleaning/disinfecting medical devices
240
What agency advises the UK as to whether software is a medical device (SaMD)?
MHRA
241
What counts as 'software', when considering Software as a Medical Device (SaMD)?
Computer programmes or functional documents (eg pdf with treatment decision flow chart, spreadsheets for calculations, docs with macros)
242
What determines whether a device has a medical purpose?
It is determined by what the manufacturer states in the device's labelling, instructions for use and any promotional materials
243
Why would a manufacturer not want a product to not be classed as a medical device?
Cost (eg accreditation) and bounded by law
244
How do manufacturers of Software as Medical Devices (SaMD) meet regulation?
Ensure it is safe and effective with these stages: design, evidence collection (clinical evaluation), Conformity assessment, registration (with MHRA), labelling, place on the market or put into service, post market surveillance
245
What are the classes for medical devices for a UKCA mark?
Class I (low risk), IIa, IIb, III (high risk)
245
When are clinical calculators likely to be considered a medical device?
When the calculation/result cannot be easily verified
245
Is software likely to be a medical device if it is an accessory to a specific medicine/device, intended to influence actual treatment or results in a diagnosis or prognosis?
Yes
246
Are general fitness/wellbeing monitors likely to be considered to be for a medical purpose?
Not typically
247
If the regulations are the 'what', standards are the ...?
How
248
What is the risk management international standard for medical devices?
ISO 14971 Medical Devices - Application of Risk Management To Medical Devices
249
What are the clinical risk management standards for the NHS?
DCB0129 and DCB0160
250
Why do we do software development?
Enhance or add functionality, research and development, automate processes, implement control systems, and manage instruments
251
When is a Quality Management System required for software development?
When developing a medical device, but good practice otherwise
252
What stages are in the 'prerequisite' section of software development?
Software planning, requirements analysis, architectural and detailed design
253
What stages are in the 'Construction/programming/coding' section of software development?
Unit implementation and verification, integration and integration testing, and system testing
254
What stages are in the 'maintenance and governance' section of software development?
System testing, software release, maintenance plan, risk management, change control
255
What is the Unified Modelling Language (UML)?
It is a standardised graphical language with its own syntax and semantics
256
What is the purpose of Unified Modelling Language (UML)?
Representing design entities and relationships, like a system's architectural blueprint diagram. Useful for software development
257
Why is it important that the Unified Modelling Language (UML) is standardised?
It supports common understanding in communicating design ideas
258
What are the 6 stages of the software development lifecycle (SDLC)?
Plan, design, implement (code), test, deploy, maintain
259
What are SDLC (software development lifecycle) models for?
It presents the lifecycle in an organised fashion to help organisations implement it
260
What are some SDLC (software development life cycle) models?
Waterfall model, V-model and agile model
261
What is the waterfall model for SDLC?
It is a linear and sequential model, where the next development phase cannot begin until the previous phase is completed with no overlap
262
What is the V-model for SDLC also called?
Verification and validation model
263
What is the V-model for SDLC?
It is sequential with an associated testing phase with each development phase at the same time. Where one side of the V is design and the other side is testing and the bottom is implementation (coding)
264
What is the difference between validation and verification?
Validation is whether it matches the users requirements and verification is whether it matches the design and it works as planned
265
What is the agile model for SDLC?
Quick development cycle with incremental improvements (iterations) with regular testing and lots of iterations as only small and few changes each time
266
What are the main types of software development testing?
Verification and validation
267
What are sub-categories of verification testing?
Unit tests (restricted to a block of code), integration testing (modules working together), system testing
268
What are sub-categories of validation testing?
User acceptance testing (meets specification) and clinical validation testing (does it benefit as expected)
269
What other types of software development testing are there? (other than verification and validation)
Usability, compatibility, security, compliance, accessibility, and performance and stress testing
270
What is continuous integration in software development?
A set of tests automatically running at each build
271
What is test driven development for software?
Developers start by writing a test which verifies that the intended functionality outcome is achieved and then work to make sure the software passes the test
272
What is behaviour driven development for software?
It focusses on behaviour of an application from the end users perspective. It creates a specification and acceptance criteria first
273
What organisational requirement documentation is needed for software development?
Software development policy, style guide and training records
274
What project specific documentation is needed for software development?
Justification document, medical device assessment, risk assessments/ hazard log, software requirements spec, software-specific design documentation, verification/ validation evidence, version tracking, user manual, clinical safety report
275
What is pseudocode?
Informal language a human could speak for describing how an algorithm or a program will work
276
What is the name for the specific approach to using pseudocode to streamline the creation of code within routines?
Pseudocodes Programming Process (PPP)
277
What are some of the rules that should be followed with pseudocode?
Natural language, avoid programming language, write at the level of intent (meaning rather than how it will be implemented), low level with more detail, pseudocode should be comments of code
278
What should the layout of code be?
Self-documenting (eg appropriate names of variables and procedures), process flow should e clearly identified and written in files that can easily navigated
279
What is debugging?
The process of identifying the root cause of an error and correcting it
280
What are the steps of the debugging process?
Error identification (either in testing or using the software), error analysis, and fix and validation
281
What is a relational database?
A type of database that stores and provides access to data points that are related to one another in the form of tables
282
What is a database?
An organised collection of data or a type pf data store based on the use of a database management system (DBMS)
283
What are the two types of traditional data processing systems of databases?
On-Line Transaction Processing (OLTP) and On-Line Analytical Processing (OLAP)
284
What does ACID stand for (about databases)?
Atomicity, Consistency, Isolation, Durability
285
If a database transaction is compliant with the properties of ACID, what does it guarantee?
Data validity and integrity despite errors, power failures and other mishaps with transactions
286
What is a transaction in terms of databases?
A sequence of database operations (single logical operation) that satisfies the ACID properties
287
When is online transaction processing (OLTP) used?
Transactional processing and real-time updates. Handles a large number of small transactions. 'Line of business' applications
288
What type of database does online transaction processing (OLTP) use?
Relational databases
289
Is online transaction processing (OLTP) and online analytical processing (OLAP) ACID compliant?
OLTP is but OLAP is not necessarily
290
What is online analytical processing (OLAP) used for?
Data warehousing. It is used for analysing and extracting insights from large volumes of data
291
What type of data processing system is typically used for PACS and RIS systems (and other clinical systems)?
OLTP
292
Are OLAP and OLTP databases normalised on denormalised?
OLTP = normalised OLAP = de-normalised
293
What does it mean that OLTP databases are normalised?
Each piece of information is only stored once to minimise redundancy by reducing duplication that takes up storage
294
What are the benefits of normalised databases and is it good for querying?
Quick to work on and updating all parts at the same time. Not good for querying
295
The Kimball Star Schema model is what type of database?
OLAP database
296
What are facts and dimensions in the Kimball Star Schema OLAP model?
Facts = events that have taken place and/or something we can measure and dimensions = information related to facts
297
What is a Enterprise Bus Matrix? (made by Kimball)
A data warehouse planning tool, where the relationship between facts and dimensions are the matrix rows and columns
298
What is the Extract, Transform and Load (ETL) process?
The process of combining data from multiple sources (extract), standardising it (transform - maybe deidentifying or reconciling) and putting it into a data warehouse (load)
299
What sort of document do data warehouses tend to look like?
Excel spreadsheet
300
What does granularity mean in relation to data warehousing?
How subdivided the information should be recorded. More granular = more detail. Should record in smallest grain possible
301
What is the structured data type?
Anything standardised (eg numbers, results of calculations, codified text)
302
What is the unstructured data type?
Not standardised (eg free text, hand written/ dictated document, images, tumour/OAR outlines)
303
What type of database is suited for structured data types?
Regular data warehouse (OLAP)
304
What can be done with unstructured data types?
More processing to make it structured to put in a data warehouse or put in NoSQL database
305
What is the Structured Query Language (SQL)?
A standard programming language designed for accessing, modifying and extracting information from relational databases
306
What are some database analysis tools?
Straight SQL queries (eg access, excel, matlab), business reporting tools, data exploration tools, 'big data' tools and data mining
307
What is an alternative to data warehousing?
Data virtualisation
308
What is data virtualisation?
For a query request from a client application, translating the query to a virtual database to pass on to retrieve information from a particular system, without requiring technical details about the data
309
What is artificial intelligence?
Computers and machines to mimic the problem-solving and decision-making capabilities of the human mind
310
What is machine learning?
A branch of artificial intelligence that focuses on the use of data and algorithms to imitate the way that humans learn, gradually improving its accuracy
311
What are applications of AI in medical imaging?
Automating laborious or time-intensive tasks (eg automatic image segmentation, identifying images for further review, auto-contouring), accelerate MRI, patient scheduling
312
What are general classes of AI models?
Image or data classification, regression (predict output based on input), object detection, generative AI
313
What is the Turing test?
Measures the maturity of AI by seeing if a computer's output is distinguishable from that of a human, then it passes the test
314
What are reverse Turing tests being made for?
To distinguish between AI and humans
315
What does the feedback loop do after an algorithm performs processing? (assuming it has a feedback loop)
Changes the outputs, whereas without a feedback loop, the model should always produce the same outputs for the same inputs
316
Why can outputs be degraded when an AI model has a feedback loop?
The bias of the person submitting the inputs
317
When training an AI model, what is each complete learning cycle called?
An epoch (internal feedback loop)
318
When training an AI model, what do more epochs do?
Make the model more accurate but its longer to train
319
What should the training inputs of an AI model be?
A broad range of data
320
After an AI model has been trained, what type of parameters are saved?
Hyperparameters
321
What different types of datasets are used for AI models?
Dataset for model development split into a training set, tuning set, and internal validation data set (unseen data) and dataset for model validation, which is an external validation set (unseen data)
322
What is a confusion matrix as applied to AI models?
It is a matrix with the actual value (positive/negative) on one side and the output predicted value based on the model. Each square is then true/false positive and true/false negative
323
What is the Receiver Operator Characteristic (ROC) curve and what would be ideal?
A graph of true positive against false positive, where ideally the area would be 1 (ie only true positives)
324
What does each point on the Receiver Operating Characteristic (ROC) represent?
The true positive vs false positive rate at one decision threshold
325
What are clinical scientist roles in AI?
User of AI, specifying applications for AI, training models, implementing and testing models, developing QA programme
326
Why is bias an issue in AI models compared to humans?
Humans are adept at recognising situations not previously encountered and adapting accordingly, whereas models are not
327
How do we reduce bias in AI models?
Sufficient breadth of training data. Maybe have different models for different groups. Test pre-trained models using data representative of local population. Ability to re-train model using local data
328
What are some challenges with adopting AI?
Who can access the data, who is responsible for decision making, how to preserve transparency and inform patients accurately (GDPR article 5)
329
What does GDPR article 22 say about the data subject's rights in related to AI?
They have the right not to be subject to a decision based solely on automated processing, unless there is explicit consent
330
Under IRMER, does the operator have to be a person or can it be AI?
Has to be a person
331
What is a real-time system?
Any information processing system which must respond to externally generated input stimuli within a finite and specified period
332
In a real-time system, is the failure to respond in time better or worse than a wrong response?
Equally bad
333
What is an embedded system?
A combination of computer hardware and software designed for a specific function (embedded computer system - can include real-time components like a real-time computer)
334
What are the levels of criticality in the classification of real-time systems?
Hard = imperative responses occur within deadline Soft = deadlines are important but will still function if occasionally missed Firm = soft but no benefit from late delivery of service
335
What are examples of hard, soft and firm real-time systems?
Hard = flight control system or defibrillator Soft = data acquisition system Firm = on demand streaming of a videa
336
What is the different roles of time in the classification of real-time systems?
Time-aware = system operation references absolute time values (eg starts when it turns on or certain wall clock time) Reactive = system produces output within deadline as measured from input and references relative time values (eg control systems)
337
What are the different structures of real-time systems?
Time-triggered (eg computation triggered by set time or periodic activity). Event-triggered (computation triggered by an external or internal event)
338
For event-triggered real-time systems, what is the difference between sporadic and aperiodic tasks?
Sporadic tasks have a known minimum inter-arrival time, whereas aperiodic can arrive at any time
339
Why is guaranteed response times an important feature of real-time systems?
Need to know the worse case response times, as predictability is essenetial
340
What are some characteristics of a real-time system?
Guaranteed response times, interacts with special purpose hardware, numerical computation, large and complex, extreme reliability and safety
341
Do typical embedded configurations for real-time systems have an operating system?
No, the programme includes the operating system components
342
What is the operating system for in real-time systems?
It acts as a translation layer between the user programme and the hardware
343
Is an operating system (OS) configuration better or worse than an embedded configuration for real-time operation?
Worse, embedded is more simplified for real-time systems
344
What are some real-time programming languages?
Java is commonly used, C, Ada
345
What are the key concepts with reliability of a real-time system?
Faults, errors and failures, failure modes, fault prevention and fault tolerance, and redundancy
346
What is the difference between safety and reliability with systems?
Safety is about avoiding harm and is the probability that conditions that can lead to mishaps do not occur. Reliability is a measure of how well the system performs to its specification. Linked but different
347
What is the link between failure, errors and faults of a system?
When a system deviates from its specified behaviour, this is a failure, and these are a result of errors (unexpected problems internal to the system) and their mechanical or algorithmic cause are called faults
348
What are the different types of faults in a system?
Transient fault, permanent faults, intermittent fault (transient faults that occur from time to time)
349
What are the two types of real-time system bugs?
Bohrbugs = reproducible and identifiable. Heisenbugs = only active under rare conditions
350
Does software deteriorate over time?
No it is either correct or incorrect but faults can remain dormant for long periods
351
What is a bug?
A design defect in an engineered system that causes an undesired result.
352
What are two approaches to faults?
Fault prevention (aims to eliminate possibility of faults before it goes operational) and fault tolerance (enables system to function in the presence of faults)
353
What are the two stages of fault prevention?
Fault avoidance and fault removal
354
What is failure modes and effects analysis (FMEA)?
A structured method to identify potential failure modes in a system and their causes and effects during the early design stages
355
What are failure modes?
The ways, or modes, in which something might fail.
356
What categories of failure modes are there and example of each?
Value domain (eg constraint or value error), timing domain (early, late, omission - fail silent, fail stop) and arbitrary (fail uncontrolled)
357
How does fault avoidance attempt to limit the introduction of faults during system construction?
Reliable hardware components, refined techniques for interconnection of components, rigorous specification, proven design methodologies (software and hardware)
358
What are examples of procedures for fault removal (finding and removing the causes of errors)?
Design reviews program verification, code inspections and system testing
359
Why is system testing never able to be exhaustive and remove all potential faults?
Tests should the presence of faults, not absence. Realistic testing conditions difficult. Accuracy of simulation mode.
360
What are the levels of fault tolerance?
Full fault tolerance, graceful degradation, fail safe, catastrophic failure (unacceptable)
361
What is full fault tolerance?
System operates with faults with not significant loss of functionality of performance)
362
What is gradual degradation? (level of fault tolerance)
Fail soft, system continues to operate in the presence of errors with partial degradation of functionality or performance during recovery or repair
363
What is fail safe? (level of fault tolerance)
The system maintains its integrity whilst accepting a temporary halt in its operation
364
What level of fault tolerance do most safety critical systems ideally have and what do many have in practice?
Ideally full fault tolerance but many settle for graceful degradation
365
What is redundancy as a fault-tolerant technique?
Extra elements in a system to detect and recover from faults that are redundant as they are not required in a perfect system (called protective redundancy)
366
Why is it difficult to know how much redundancy to include in systems for fault tolerance?
They are restrained by cost and size of the system, and also lead to more complexity, which can make it less reliable
367
What is exception handling with errors in systems and software development?
An error recovery mechanism that happens when an anomalous event (exception) occurs in a programme. It avoids the system crashing and stops the disruption of the normal operation.
368
What is the Directory Name Service (DNS)?
Phonebook of the internet, which translates domain names to IP addresses
369
What is a domain name?
Human readable name thats associated with a physical IP address on the internet
370
On a domain name, is the left or right hand sections (between full stops) a bigger group that controls the other side?
Right
371
What does the Internet Assigned Numbers Authority (IANA) do?
Manage root DNS, coordinate allocation of IP addresses, protocol assignments
372
What does https stand for?
Hypertext transfer protocol secure
373
What is HTML?
The standard markup language that is used to structure a web page and its content.
374
What does a web browser do?
Interprets HTML to render web page and calls HTTP methods against web server
375
What is HTTP (hypertext transfer protocol)?
It is an application layer in the IP suite model (TCP/IP) for data communication on the world wide web and is used to load webpages using hypertext links
376
What does HTML stand for?
HyperText Markup Language
377
How is HTML written?
In the form of HTML elements, which include tags written between angled brackets. These tags are usually paired with the content located between a start and end tag
378
Is HTML traditionally a programming language?
No, it is a markup language
379
What number HTML is the current version?
5
380
What tag indicates a document is HTML 5?
381
What symbol is used at the start of an end tag in HTML?
\
382
What is scripting?
It is a type of coding that makes websites interactive and automates tasks a human would normally complete
383
What are the two types of scripting?
Client-side scripting = processed entirely by browser on the client device Server-side scripting = processed at the server level and resultant HTML passed back to browser
384
What is the difference between a web browser and web server?
A web browser is a software program used to access the world wide web (internet) and displaying pages, whereas a web server is the software that provides its users with the documents they request via their web browsers
385
What is connected to a web server?
Database and storage on on side and web browswer on the other
386
In client-side scripting, the web browser requests a page with embedded client-side script to the web server, what happens next?
Web server delivers requested web page with embedded script. Browser processes script and displays
387
What are some client-side scripting languages?
JavaScript (can be used for both scripting types), HTML, CSS
388
What are the advantages of client-side scripting?
Speed, simplicity, versatile, reduced server load
389
What are the disadvantages of client-side scripting?
Less secure, difficulty in maintaining compatibility as a variety of client browsers
390
In serve-side scripting, the client requests page with embedded client-side script to the web server, what happens next?
Web server processes script and delivers resulting page
391
What are some server-side scripting languages?
Javascript, PHP, python
392
What are the pre-requisites to server-side scripting?
Web server has appropriate scripting engine installed and web page name must have the correct file extension
393
What are the advantages of server-side scripting?
Better to work with databases, no issues with client browser compatibility, can be run independently of client PC settings, more security for the data
394
What are the disadvantages of server-side scripting?
Requires scripting software to be installed on the server and can be slower if server is busy
395
What does XML stand for?
eXtensible Markup Language
396
What is XML?
A markup language that is used for storing data as structured information and defines a set of rules to describe the content and structure of data in a document
397
Does XML use tags (like HTML)?
Yes but the author invents these (in HTML, these are pre-defined)
398
What is data encryption?
A security method that translate data into a code that can only be read by people with access to a secret key or password
399
What types of data need to be encrypted?
Any sensitive information that could be: Data at rest, data in transit and data in use
400
Does data encryption prevent interception of data in transit?
No, it denies the message content to the interceptor by making it unreadable
401
What are the two main types of data encryption?
Symmetric and asymmetric
402
What is symmetric encryption?
The same key is used for encryption and decryption. The key changes the content in some way
403
What standard is currently being used as a symmetric encryption algorithm?
Advanced Encryption Standard
404
What is the disadvantage of symmetric encryption?
Key must be kept secret, which can be difficult if exchanging over the internet or large network. Less secure than asymmetric
405
What is a key used in cryptography?
A long, random and unpredictable string of letters and numbers used to encrypt or decrypt data
406
What is asymmetric encryption?
A pair of mathematically linked keys (key pair) is used to encrypt and decrypt the data. One is a public key freely available to anyone and the private key is kept secret
407
What are the different keys in asymmetric encryption used for?
The public key is used for encryption and the private key is used for decryption
408
What are the disadvantages of asymmetric encryption?
Slower than symmetric encryption (more processing power). Concern of loss of private key
409
What is a public key certificate?
An electronic document from the certificate authority to prove the validity of a public key and verifies the identity of its owner
410
What is meant by a 'good quality' medical image?
Appropriate for the clinical application, optimised (image quality vs dose) and not necessarily the highest quality image possible
411
What is undersampling/aliasing and how can it be avoided?
Not sampling data frequently enough, leading to an inability to resolve small details and artefacts. Solution = use a sampling frequency twice the frequency of the signal
412
What does the 'A' in ACID mean?
Atomicity = each transaction is a single unit that either succeeds or fails - all or nothing process
413
What does the 'C' in ACID mean?
Consistency = only data that follows database rules can be added
414
What does the 'I' in ACID mean?
Isolation = multiple transactions at once don't affect each other
415
What does the 'D' in ACID mean?
Durability = Stable through system failure (eg power outage), ie once a transaction has been committed to a database, it will remain so
416
What are the different categories of medical devices? (not classes)
Non-invasive, invasive (inserted into body's orifices), surgically invasive, active (requires external power source) and implantable
417
When is software as a medical device classified as class IIa?
When intended to provide info to make decisions for diagnosis or therapeutic purposes and if it is intended to monitor physiological processes (unless vital and lead to patients in danger for both instances = IIb)
418
What are keys for in relational databases?
They maintain the relationship between the tables and also uniquely identifies the data from a table
419
What is a primary key in relational databases?
It is a field (column) used to uniquely identify every record in the database
420
What is a foreign key in relational databases?
A foreign key is a column or columns in a table that references the primary key of another table
421
How many primary keys are allowed in a relational database table?
Only one
422
In relational databases, is the primary key in one table a foreign or primary key in another table?
Foreign key
423
In relational database tables, what is a typical primary key?
An identifier, like a patient ID or a car licence plate
424
What is a data warehouse?
A type of database that stores highly structured information from various sources, and it contains both current and historical data to analyse large amounts of data
425
What are data exchange standards?
They define a common format and give shared rules for data exchange