Week 7 - Computing fundamentals and networking concepts Flashcards

1
Q

DIKW pyramid

A

Data

Information

Knowledge

Wisdom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is data

A

product of observation and have no meaning or use on their own

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is information

A

data that includes answers to the question who, what, where, when, and/or how many

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is knowledge

A

knowing the significance of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

wisdom

A

knowing what to do with the information through knowledge, experience and judgement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Managing Data: structured vs unstructured

-what type better for computational thingking

A

example: drop down menus vs dictated notes

- better to have structured data for computational thinking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Computational thinking

A

techniques and tools to manage DIKW

Good for complex, difficult, ambiguous and or open ended problems

helps work twds a common goal/solution

  • abstraction
  • automation
  • counting
  • sorting
  • searching
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

abstraction

A

a way of simplifying a process or problem

  • a single problem can include several layers of abstraction
  • abstractions are used to build algorithms
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

algorithms

A

process for carrying out a complex task broken down into simple decision and action steps
-algorithms are used to build automation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

automation

A

use of technology or machines and/or devices that are linked to/controlled by a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

counting

  • small/simple sets
  • complex/large sets (2)
A

simple/small sets: count one-by-one

algorithms and automation for large/complex sets

  • estimate using random samples
  • recursion (sets of smaller counts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

kroll counting

A

Rx work in progress and Rx coutns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

sorting and searching

A

algotithms an automation can be used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

sorting

A

way of ranking different elements

-can be done by computer algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

searching

A

used to find an eleement wtih certain properties in a larger set

  • linear search (start to finish)
  • Binary search (back and forth)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Kroll sorting and searching

A

universal search field

narcotics report –> sort by
- can sort by date, brand/date, patient/date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Computer fundamentals (4)

A

Hardware

software

networks

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

hardware

A
monitor
case
motherboard (CPU, RAM)
storage
Optical drive
input/output devices
Network card 
power supply
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Major component of a desktop computer

A

input devices
-mouse, keyboard, touch pad, pen, bar code, reader, scanner, camera, joystick, touch screen

output devices
-printer, screen, speakers, robot

storage devices
-hard disk, optical disk (ex. CD-ROM, DVD, or CD-RW), memory stick

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

software: basic input/output system (BIOS)

A

low level system that allows the various hardware components to talk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

software: operating system

A

windows, mac OS, android, iOS etc

executes application programs

manages resources

  • for sharing internal memory and processor(s)
  • handles I/O devices
  • manages space on external storage devices
22
Q

software: other software that runs on top of the OS

A

developmental; application; communications

microsoft powerpoint, iTunes etc

23
Q

look at the brainrot on slide 17

A

asdfkjsafdsadfadfsj;fsdj;

24
Q

Networking kroll scenario

A

RPh on PMS sends info to network that sends info to insurance server when filling out pateitn insurance info

25
networking 101: telecommunications link
how devices communicate | ex. modems, ethernet cables, fiber optic cables, radio for satelites
26
networking 101: modems
allow you to connect to the internet through your ISP | -A modem connects home network (LAN) to you ISP's network (WAN) to get the internet
27
networking 101: routers
create networks by allowing greater than or equal to 2 computers and the modem to connect ex. it takes the signal from your modem and routes it to your devices think wireless routers ex. your computer connects to your wireless printer using a router
28
networking 101: hosts
computers connected to networks | -smartphones, laptoms, iPads, etc
29
networking 101: clients
computers or programs that connect to a network and retrieve data
30
networking 101: servers
provide services for clients | ex. email servers, database servers, game servers
31
networking 101: nodes
any device that is attached to a network and transmits, receives, or forwards info - nodes can be clients and servers - includes hosts linked by modems, routers, etc
32
LAN - what is - what are 2 types of connection - what require - what may include to connect to other networks
local area network - connects computers within a small building - may be wired (via network cables, often running ethernet protocol) or wireless - requires network interface card - may include a router to connect to other networks
33
WAN
Wide area network - connects computers far away - requires host computers for network and communications management
34
TCP/IP
transmission control protocol/internet protocol - standard procedures for adressing and transmitting messages - messages broken into data packets at source - analogy: cut letter into pieves and put ea frament in its own envelope - packets are routed independentyl - packets are re-assembled into message at end
35
IP addresses: what are they
-unique ID for every computer (host) on a network (WAN, LAN, internet)
36
IP addresses: how allocate
-hierarchical allocation of addresses
37
IP addresses: DNS
server for Domain Name System (DNS) consults registry to translate host names to corresponding IP adresses
38
HTTP - what is - how used - client/server model
hyper text transfer protocol - communication protocol between clients and servers - utilized TCP to transfer information between computers client - browser that requests, receives, displays server -receives requests and responds to them
39
Networking and security: firewalls
barriers between trusted networks (your home) and untrusted networks (the internet) - built into routers - can be added as antivirus software
40
Even with firewalls what is most important thing for security
not connect with untrusted sources
41
Networking and security: VPN
virtual private network -allows remote users on the WAN to access a LAN - essentially a secure tunnel - how access the virtual lab computer off campus or patient records from home -need to act act at home as you would in the hospital when you are on a VPN + do not leave screens open, do not show ppl records, do not talk about the records in a public space
42
Authentication 101: something you know
password, PIN, pattern
43
Authentication 101: something you have
smartwatch to open smartphone, FOB
44
Authentication 101: something you are
fingerprint, iris
45
Authentication 101: what type authentication HC use
HC typically prefers multifactor authentication (greater than or equal to 2 options) ex. FOB + password ex. smartwatch + fingerprint
46
encryption 101 - what is - role of sender and receiver - VPN
encryption is process of mathematically converting info to render it unintelligible without a key to decode it - sender uses algorithm to encode info and receiver uses same algorithm to decode - how VPN creates a secure tunnel
47
examples of encryptions
caeser cipher german enigma machine
48
HTTPS
HTTPS = HTTP + Security provides data encryption and server authentication
49
slide 30 photo on how client requests https session
al;ksdjfl;aksdjfl;askjdfl;askdjf worthless course asdkhjfalksjdfh eeeeeakjsdf
50
HL7 - what is - stds for what - how message
international standard to allow the exchange integration sharing and retrieval of electronic health information provide messaging standard of certain common communication -medication dispense, medication request HL7 message can be transferred through HTTPS to provide communication between different systems (ex. EMR/EHR/PMS)