Shared Flashcard Set

Details

HITPRO Chapter 4
Introduction to Information and Computer Science
41
Other
Professional
05/05/2012

Additional Other Flashcards

 


 

Cards

Term
Significant healthcare security breaches are published where
Definition
on a government web site
Term
E-mail was initially limited to
Definition
Access to systems remote from a user
Term
____ describes a common user interface
Definition
KVM
Term
___________ is a “rules” syntax specification that allows rules to be individually published independently of a computer system and subsequently imported into computer systems for healthcare use. It was named after the house in which the meetings took place to create the specification
Definition
Arden
Term
__________ describes the services used in SOA
Definition
WSDL -- Web Service Definition Language (WSDL)
Term
___________ are becoming prevalent in developed countries and their objectives are appropriate testing, patient safety, higher quality of care and reducing cost
Definition
CPOE
Term
______________ is commonly used for interfacing with SOA services. It defines format tags that identify characteristics of data
Definition
xml
Term
_______ was created by HL7 to create an interoperability framework for enterprise architecture.
Definition
SAEAF- Services-Aware Enterprise
Architecture Framework (SAEAF)
Term
_____ permits virtual access to health care services
Definition
Telemedicine
Term
_________ was developed at Yale Center for Medical Informatics and is a hierarchical data structure to organize the heterogeneous information contained in practice guidelines
Definition
gem-Guideline Elements Model (GEM): XML- based guideline document model that can store and organize the heterogeneous information
Term
Your own medical information may be stored using a
Definition
A model that allows a physical system that permits a single physical system to appear to contain multiple systems
Term
In enterprise architecture _____________ defines data elements and characteristics.
Definition
Model driven architecture
Term
Virtual computing requires a
Definition
hypervisor-- also called virtual machine manager (VMM), is one of many hardware virtualization techniques allowing multiple operating systems, termed guests, to run concurrently on a host computer.
Term
____ is the process of taking data applying a cipher to create ciphertext
Definition
encryption
Term
______ is who or what is allowed access to a particular resource and what level of access they are allowed.
Definition
access control
Term
__________ means that the data on a system is the same as the data from the original source. It has not been altered
Definition
integrity
Term
Is service guaranteed 24/7?” and “Is it up 99.999% of the time?” are questions that are asked as part of the _________ in a service contract
Definition
Quality of service
Term
_______ is an effort to create common “service interface specifications” with health IT.
Definition
HSSP-- Healthcare Services Specification Project
Term
An ________ is a list that is associated with a file, directory or object that lists who has access to it and what access they have
Definition
Access Control List
Term
define cloud computing
Definition
A model for enabling convenient, on-demand network access to a shared pool of configurable computing resources.
Term
_______ use Internet technology to transmit data between sites. Data is encrypted as it travels from site to site
Definition
VPNs
Term
____________ is making sure that only authorized individuals have access to information
Definition
Confidentiality
Term
Disks are formatted into _____, which make up tracks
Definition
sectors
Term
The motherboard is made up of circuitry and thousands of copper wires known as ____.
Definition
buses
Term
____ permissions are set so that users have the ability to access files and folders over a network.
Definition
sharing
Term
OSI model
Definition
"please do not take sausage pizza, away"
Application, Presentation, Session, Transport, Network, Data Link, Physical.
Term
A _____ operates at Layer 1 of the OSI model
Definition
Network cable
Term
A(n) _____ protects a device from spikes in power usually originating with the power company
Definition
surge protector
Term
Macro viruses usually infect Microsoft Office files and _____
Definition
install themselves when users click files
Term
What is a PET scan?
Definition
A nuclear medicine imaging device that produces a 3-D image (Positron Emission Tomography)
Term
Count” is which of the following?
Definition
function
Term
Physical security of assets means that objects cannot access data without _____
Definition
authentication
Term
Another student informs you that you can purchase software online and avoid paying the full retail price. This is an example of ____.
Definition
pirating intellectual property
Term
A _____ IP address can change when you reboot your ISP device.
Definition
dynamic
Term
A virus is a _____ that can harm a computer and make it inoperable
Definition
computer program
Term
The __________ is a centralized resource staffed by IT professionals who provide user support.
Definition
help desk
Term
____ is software designed to infiltrate a computer system without the owner's informed consent
Definition
malware
Term
According to HIPAA rules, who can view your medical information without a signed release?
Definition
Primary care physician
Term
A neighbor becomes aware of a medical condition you have been privately battling for the past six months. The neighbor says that if you do not pay her $5,000, she will use a pay phone to disclose this information to your father. This is an example of _____.
Definition
blackmail
Term
List the correct order of the OSI model layers, from top (7) to bottom (1).
Definition
Application, Presentation, Session, Transport, Network, Data Link, Physical.
Term
The motherboard contains ____ slots, into which device expansion cards are inserted.
Definition
pci
Supporting users have an ad free experience!