Term
Significant healthcare security breaches are published where |
|
Definition
|
|
Term
E-mail was initially limited to |
|
Definition
Access to systems remote from a user |
|
|
Term
____ describes a common user interface |
|
Definition
|
|
Term
___________ is a “rules” syntax specification that allows rules to be individually published independently of a computer system and subsequently imported into computer systems for healthcare use. It was named after the house in which the meetings took place to create the specification |
|
Definition
|
|
Term
__________ describes the services used in SOA |
|
Definition
WSDL -- Web Service Definition Language (WSDL) |
|
|
Term
___________ are becoming prevalent in developed countries and their objectives are appropriate testing, patient safety, higher quality of care and reducing cost |
|
Definition
|
|
Term
______________ is commonly used for interfacing with SOA services. It defines format tags that identify characteristics of data |
|
Definition
|
|
Term
_______ was created by HL7 to create an interoperability framework for enterprise architecture. |
|
Definition
SAEAF- Services-Aware Enterprise Architecture Framework (SAEAF) |
|
|
Term
_____ permits virtual access to health care services |
|
Definition
|
|
Term
_________ was developed at Yale Center for Medical Informatics and is a hierarchical data structure to organize the heterogeneous information contained in practice guidelines |
|
Definition
gem-Guideline Elements Model (GEM): XML- based guideline document model that can store and organize the heterogeneous information |
|
|
Term
Your own medical information may be stored using a |
|
Definition
A model that allows a physical system that permits a single physical system to appear to contain multiple systems |
|
|
Term
In enterprise architecture _____________ defines data elements and characteristics. |
|
Definition
Model driven architecture |
|
|
Term
Virtual computing requires a |
|
Definition
hypervisor-- also called virtual machine manager (VMM), is one of many hardware virtualization techniques allowing multiple operating systems, termed guests, to run concurrently on a host computer. |
|
|
Term
____ is the process of taking data applying a cipher to create ciphertext |
|
Definition
|
|
Term
______ is who or what is allowed access to a particular resource and what level of access they are allowed. |
|
Definition
|
|
Term
__________ means that the data on a system is the same as the data from the original source. It has not been altered |
|
Definition
|
|
Term
Is service guaranteed 24/7?” and “Is it up 99.999% of the time?” are questions that are asked as part of the _________ in a service contract |
|
Definition
|
|
Term
_______ is an effort to create common “service interface specifications” with health IT. |
|
Definition
HSSP-- Healthcare Services Specification Project |
|
|
Term
An ________ is a list that is associated with a file, directory or object that lists who has access to it and what access they have |
|
Definition
|
|
Term
|
Definition
A model for enabling convenient, on-demand network access to a shared pool of configurable computing resources. |
|
|
Term
_______ use Internet technology to transmit data between sites. Data is encrypted as it travels from site to site |
|
Definition
|
|
Term
____________ is making sure that only authorized individuals have access to information |
|
Definition
|
|
Term
Disks are formatted into _____, which make up tracks |
|
Definition
|
|
Term
The motherboard is made up of circuitry and thousands of copper wires known as ____. |
|
Definition
|
|
Term
____ permissions are set so that users have the ability to access files and folders over a network. |
|
Definition
|
|
Term
|
Definition
"please do not take sausage pizza, away" Application, Presentation, Session, Transport, Network, Data Link, Physical. |
|
|
Term
A _____ operates at Layer 1 of the OSI model |
|
Definition
|
|
Term
A(n) _____ protects a device from spikes in power usually originating with the power company |
|
Definition
|
|
Term
Macro viruses usually infect Microsoft Office files and _____ |
|
Definition
install themselves when users click files |
|
|
Term
|
Definition
A nuclear medicine imaging device that produces a 3-D image (Positron Emission Tomography) |
|
|
Term
Count” is which of the following? |
|
Definition
|
|
Term
Physical security of assets means that objects cannot access data without _____ |
|
Definition
|
|
Term
Another student informs you that you can purchase software online and avoid paying the full retail price. This is an example of ____. |
|
Definition
pirating intellectual property |
|
|
Term
A _____ IP address can change when you reboot your ISP device. |
|
Definition
|
|
Term
A virus is a _____ that can harm a computer and make it inoperable |
|
Definition
|
|
Term
The __________ is a centralized resource staffed by IT professionals who provide user support. |
|
Definition
|
|
Term
____ is software designed to infiltrate a computer system without the owner's informed consent |
|
Definition
|
|
Term
According to HIPAA rules, who can view your medical information without a signed release? |
|
Definition
|
|
Term
A neighbor becomes aware of a medical condition you have been privately battling for the past six months. The neighbor says that if you do not pay her $5,000, she will use a pay phone to disclose this information to your father. This is an example of _____. |
|
Definition
|
|
Term
List the correct order of the OSI model layers, from top (7) to bottom (1). |
|
Definition
Application, Presentation, Session, Transport, Network, Data Link, Physical. |
|
|
Term
The motherboard contains ____ slots, into which device expansion cards are inserted. |
|
Definition
|
|