What are the three hardware elements enabling mobile health (mHealth)? | Battery Life, Physical Device Size, and
Wireless Network Access |
A 4G service can accommodate 100
megabits per second for low mobility
communication
true or false | False |
True or false: RFID Tags contain an integrated circuit
for storing and processing information. | True |
Social media presents several types of
legal and regulatory concerns
including | Professionalism and Privacy |
All of the following are protocols for
Internet user-interface services and
support services EXCEPT | Network Access Protocol (NAP) |
Which of the following is TRUE about
cloud computing? | The ability of mobile devices to access
large number of computers connected
through a communication network. |
Which best describes the purpose of
network standards? | Allows access to networks in a
standardized way |
What are the two major trends in
Advanced Hardware?* | More powerful processing, and more
power distributed across many
computers |
What are the two protocols covering
wireless devices? | Wireless Application Environment
(WAE) and Wireless Application
Protocol (WAP) |
Wi-Fi, Bluetooth and RFID security
concerns are addressed by an
organization named | National Institute of Standards and
Technology |
True or False: Bluetooth is a wireless technology that
controls the communication between
devices | True |
Which of the following wireless
technology uses radio-frequency
electromagnetic fields to transfer data,
using tags that contain electronically
stored information. It is also used for
equipment tracking and inventory
control. | RFID |
It refers to a technology that replicates
and shares data among disks, making
it possible to store larger chunks of
information than a single storage
device can handle. | Redundant arrays of independent
disks |
The HL7 standards support the
following EXCEPT | Manipulation of health services and
clinical practice |
Which best explains the purpose of
Wi-Fi? | Technology that allows an electronic
device to exchange data wirelessly |
Wi-Fi is based on the ________
standards. | IEEE 802.11 |
Which of the following devices collect
physiological measures and wirelessly
send that data to smartphones or
cloud-services via the Internet. This
device can be worn on your body. | Wearable devices |
Which best describes wireless
communication?* | Mobile computing device that connects
with networks in multiple ways |
True or False: An organization is responsible for
securing and verifying security.* | True |
The networking model and
communications protocols used for the
Internet are commonly known as ___ | Transmission Control Protocol /
Internet Protocol (TCP/IP |
What best highlights the legal
implications of mHealth technology?* | Clinical significance is central
consideration for ownership of patient
data |
What is the purpose of
machine-to-machine technology
(m2m)? | So that patients can check their blood
pressure, oxygen levels, and other
vital signs at home with results
wirelessly transmitted to their
health-care providers. |
What are the most common mHealth
platforms? | Cellular Networks, Wireless Networks,
and Mobile Devices |
True or False: To maintain privacy and security,
mHealth must comply with all Health
Assurance Portability and
Accountability Act mandates. | False |
Which system is used for remote
monitoring of a patient’s health?* | Wireless Medical Telemetry System |
Historically, there has been a
reluctance to accept any data other
than the information collected within
the physical boundaries of the hospital.
What do you think is the reason? | Because of the receiving provider's
inability to verify the accuracy of the
data. |
Which best represents the future of
mHealth inside Healthcare Facilities? | Path toward consolidated, coordinated
and value-based care |
What best highlights mobile
technology in healthcare?*
Timely access to clinical information
Use of Personal health records
Access to Patient portals | All of the above |
What concept can be used for tracking
down medical equipment and showing
the status of the equipment to the
nurse? | Real-time location services |
Which features does Security software
provide? Choose two.* | Encryption
Firewall |
What are the three categories of
software? | System, Utility, and Application |
Error, flaw, or fault in a computer
program or system that causes it to
produce an incorrect or unexpected
result, or to behave in unintended
ways is called a | bug |
What is the purpose of the Operating
System? | Overall controller of all computer work |
How important is an Operating System
in a Computer?* | Without them, there could be no home
computers to use |
What are the levels/tasks that the
System Software controls?* | Basic Input/Output System, Operating
System, and Management of Storage |
Which is NOT a task of Disk
Management Utilities? | To provide entertainment while PC is
inactive |
What is the first level of System
Software?* | Operating System |
Which of the following refers to a set of
very specific rules about words,
punctuation, word usage, and word
order in a particular computer
language? | Syntax |
Name at least four of the six major
tasks that the Utility Software controls? | Security Software, Disk Management
Utility, Data Backup Utility, and
Archival Software |
What is the first part of the computer to
function when the system is turned
on? | The software on the BIOS chip |
Which of the following refers to a utility
software that is capable of data
compression | Archival Software |
The connection between the CPU and
a peripheral or a user is called | Interface |
What do you call the process of
correcting program errors?* | Debbuging |
Which of the following refers to very
small network in which all parts of the
systems are directly connected via
wired or wireless | Point to Point |
All of the following are examples of
programming languages except | Microsoft Outlook |
Which of the following is an application
that provide the nurse a quick way to
order common output from certain (or
all) screens, or may provide some kind
of alert that a task is due to be
performed? | Dashboard |
Which of the following is NOT TRUE
about Software Ownership Rights ? | Purchaser of the software will have a
full rights to the software |
As a purchaser of software, what do
we normally purchase from the
software vendor? | The license to use the software |
Which of the following describe
fifth-generation languages? | In these types of program, the user
tells the machine what to do in the
user’s own natural language |
What programming language provides
portability and security needed for use
on huge, public network like the
internet ? | Java |
The most common packages sold with
computers is a standard office
package that includes all of the
following EXCEPT | Browser program |
What is multiprocessing ? | A solution to run multiple parts of a
program at the same time is need to
accommodate multiple users at the
same time |
It refers to a network setup where each
of the computer and network devices
are connected to a single cable | Bus topology |
Which of the following is concern with
technologies, strategies, and
methodologies for getting the right
information to people when it is
needed without people getting
overwhelmed with irrelevant and
unwanted information? | Information Science |
True or False: A fourth-generation language written
specifically for use in healthcare
setting was MUMPS (Massachusetts
General Hospital Utility
Multi-Programming System) | False |
Which key themes in information
Science refers to achieving an
optimum value for some desired
outcome? | Optimality |
True or False: Hospital Information System include
most of the business applications like
Billing, Payroll and Inventory control. | True |
It refers to a network setup where each
of the computer and network devices
are connected to a central hub. | Star topology |
Which of the following are component
nurses use in HIS
? Choose two.
Medication administration record
software | Admission -discharge- transfer system |
Describe and/or define what is a computer system | It is a system of interrelated components that function together |
What are the major tasks of the application Software? | Computer programs written to make the computer function for users |