INFO 320 Quiz 2

INFO 320 Quiz 2 Liberty University

  1. E-mailing fraudulent claims from an office in Houston, Texas, to a Medicare facility in Washington, D.C., for medical care not actually performed would constitute what?
  2. John T. James’s recent study, published in 2013, found how many premature deaths associated with preventable harm to patients in the United States every year?
  3. It is important to monitor and track unintended consequences of health IT implementation because:
  4. Powers granted to both the federal and state governments are known as what?
  5. Several United States (US) governmental processes and structures help regulate health information technology. Which federal agency regulates development of new health IT devices and is responsible for enforcement of competition in the healthcare market?
  6. Which definition most accurately describes privacy?
  7. The HITECH portion of ARRA was meant to do all of the following EXCEPT:
  8. Which example constitutes an internal security event?
  9. Which of the following is not part of the criteria to determine Meaningful Use?
  10. Which definition most accurately describes data integrity?
  11. What is the difference between the safe harbor and expert determination methods of de-identifying data?
  12. Monitoring the data and health information processes are a subset of standards for this accreditation organization in the United States which requires sharing outline accreditation measures to meet the Medicare Conditions for Participation.
  13. The Informatics Capability Maturity Model:
  14. A healthcare provider forgets to update a patient’s medications. Which fair information principle is being violated?
  15. In which year will (or did) MU incentives for providers transform to merit-based reimbursement under MACRA?
  16. A vendor provided all advanced practice registered nurses with free mobile devices to stimulate referrals. Which regulation is being violated?
  17. The Health IT Standards Committee and what body are responsible for recommending standards, such as the necessary infrastructure for health information exchanges?
  18. By what legal code or precedent are powers not granted to the federal government reserved by the states?
  19. Several mechanisms exist to provide the healthcare industry and business associates the direction for implementing and maintaining HIT infrastructure appropriately. The execution of rules about using health information systems and exchanges is directed by:
  20. The Center to Champion Nursing in America envisions a healthcare system where:
  21. According to the Informatics Capability Maturity Model, the degree to which IT is innovatively leveraged to enable leaner processes and seamless information flows represents which dimension?
  22. Why is it difficult to establish effective health IT governance?
  23. Which organization works on an international level to improve information privacy?
  24. Which of the statements best describes current federal and state laws regulating privacy and security practices and procedures?
  25. The component of information security that converts data into a form, called a ciphertext, which cannot be easily understood by unauthorized people is an example of:
  26. When establishing health information technology (IT) governance, this step assists in understanding five dimensions:
  27. Which is true of guidance documents?
  28. One of the biggest challenges to establish effective health IT governance is:
  29. The main objective behind the health IT incentives provided by the American Recovery and Reinvestment Act is:
  30. Which is true of both HITECH and MACRA?
  31. Which of the following would be regulated by the FDA?
  32. A Shared Nationwide Interoperability Roadmap has been distributed by the Office of National Coordinators and is part of the HHS 2014-2018 initiatives. Select the statement that best describes interoperability.
  33. The technical hurdle of successfully sharing a patient’s data between a hospital in Spokane, Washington, and a specialist in Portland, Oregon, requires:
  34. The EHR incentive Meaningful Use criteria are adapted from work done by:
  35. The trend in healthcare IT is shifting from what to what?
  36. The Office of Inspector General and the U.S. Department of Health and Human Services have the authority to accept safe harbors that protect against criminal and civil prosecution for Stark and Anti-Kickback violations in certain situations. To qualify for safe harbor protection, identify the criteria that does not meet safe harbor requirements under the Anti-Kickback statute.
  37. Which Meaningful stage requires that more than 50% of all patients of the eligible provider, emergency department, or inpatient hospital or critical access hospital who request an electronic copy receive their clinical summary(ies) within three business days?
  38. What is a negative impact of the increased use of mobile devices in transmitting health data?
  39. EHRs are designed to make documentation easier but can lead to fraud and abuse claims by the Federal government that may include hefty fines and jail time if violations are proven. Which are examples of physical safeguards to prevent fraud and abuse claims?
  40. What is the difference between personal privacy and information privacy?
$3.99
Buy Answer Key