0% found this document useful (0 votes)
1K views18 pages

Wgu d220 Information Technology in Nursing Practice Questions & Correct Answers (Verified Answers) Wgu d220 Latest Exam

Uploaded by

robyzmagic12
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views18 pages

Wgu d220 Information Technology in Nursing Practice Questions & Correct Answers (Verified Answers) Wgu d220 Latest Exam

Uploaded by

robyzmagic12
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

WGU D220 Information Technology in Nursing

Practice QUESTIONS & CORRECT ANSWERS


(VERIFIED ANSWERS) WGU D220 LATEST EXAM

1. Define healthcare data: any data relating to the health of an individual patient or
collective population
2. Describe the purpose of healthcare data related to nursing: The information
given
can create a thorough plan that helps patient outcomes, decrease cost and develop a better
plan of care
3. What are three examples of ways healthcare data has influenced the patient
care
provided by nurses: 1.) notice trends in V/S, collaborate & treat accordingly

2.) help predict analytics, ID patients at risk for certain disease processes

3.) evaluate
EBP protocols
4. Define data framework: Data information, knowledge
wisdom(DIKW) framework refers to the way data becomes a product that can be used to
positively affect patient care
5. What are the components of the DIKW framework: Data, Information,
Knowledge, Wisdom
6. How does each component depend on the previous component: D to I to K to
W: Data describes the patients disease state, health environment,

information is
data with meaning,

knowledge is information that is processed and organized so that


it relates and inter-actions are identified,

1 / 18
wisdom is the application of knowledge to solve problems
7. Define Informatics: the science and art of turning data into information
8. What fields does health informatics include: Bioinformatics, clinical research
informatics, public health informatics
9. Define foundational skills: the min req/skills needed for an information driven
culture
10. Define Informatics Culture: A broad term related to the application of new
information technology that impact human culture
11. Define ethical use of data and information using the AHIMA Code of Ethics:
Consistent with professional standards of practice and essential to safe

2 / 18
efficient
healthcare delivery.
12. What is the nurse's primary role in the ethical use of data and information?-
: Maintaining privacy r/t PHI from public or individuals not providing direct patient care.
13. Define learning healthcare system: health system in which
internal data and experience systematically integrated with external evidence, and
knowledge is put into practice
14. What is essential to a learning healthcare system?: strong leadership, effec- tive
use of data in the clinical setting, and both a culture and workforce committed to
continuous learning and improvement.
15. Define knowledge worker: Previous knowledge and experience are applied to take
action or intervene in some way
16. What changes in the healthcare system increased the demand for knowl-
edge
workers?: Demands for safe accessible quality care
17. Define standardized languages and terminologies: Structured and controlled
languages developed according to terminology
development guidelines and approved by an authoritative body.

Ensures that a concept had the same meaning in all settings


18. What are the benefits of the use of data standardization: facilitate collecting
sorting retrieval selection and aggregation of data
19. What are the consequences if data standardization is not used?: A lack of data
standardization jeopardizes opportunities for learning because important data may not be
available for analysis
20. Define Evidence-based practice: Using current best evidence for patient care
decisions in order to improve patient outcomes
21. How can you identify reliable sources of data?: If information has .gov, .edu,
or .org
22. Define Big Data: A collection of large data which cannot be analyzed without the
use of information technology
23. How does big data relate to Meaningful Use?: Provides insights into areas
where quality can be improved
24. How does Big Data differ from Business intelligence: Big data refers to large data
sets that exist typically within organizations where business intelligence refers to the
utilization of this data for analytical purposes from which actionable information can be
derived to make more informed business decisions.

3 / 18
25. Define data analytics: The science of analyzing raw data to make
conclusions about information
26. How does data analytics support bedside care: Helps organizations evaluate and
detect anomalies in scans and predict outbreaks in illness
27. What are the differences between the concept of information management and
knowledge management: Information management focused on data and
IT( collecting, storing and accessing information, while knowledge management is
focused on people and processes (is creating, sharing, using, and managing knowledge)
28. Define correlates: either two things so related that one directly implies or is
complementary to the other, EX: husband and wife/ brain size as it correlates with
intelligence
29. Give three examples of health correlates: poor nutrition(obesity) , lack of
physical
activity (diabetes)and smoking (increases risk for cancer)
30. Define Conditions: A restricting, limiting, or modifying circumstance
31. Explain the two ways that health conditions are measured: physical mea-
surements and metric measurements
32. Define Care: watchful or protective attention, caution, concern, prudence, or
regard usually towards an action of situation. How healthcare is delivered to the
community
33. Define Cost: measures the economic and societal costs of healthcare and poor health
34. Give an example of value-based care: a form of
reimbursement that ties payments for care delivery to the quality of care provided and
rewards providers for both efficiency and effectiveness
35. Define insider threat: a threat to an
organization that comes from negligent or malicious insiders, such as employees, former
employees, contractors, third-party vendors, or business partners, who have inside
information about cybersecurity practices, sensitive data, and computer sys- tems
36. What security measures can prevent insider threat: Train employees, build a
threat hunting team, coordinate IT security, include procedures in your security policy to
prevent and detect misuse
37. Define the beginning nurse: an individual who has recently graduated from a
nursing program and is
starting their professional nursing career

4 / 18
38. Give an example of beginning nurses using HIT: Record patient vitals, doc-
ument nursing interventions, CPOE, view lab results
39. What types of informatics skills would a beginning nurse have?: Basic
computer
skills, use of EHR, How to use digital to monitor patient vitals, Telehealth technology,
Data analysis/management, digital communication skills, and under- stand the importance
of information security
40. Define an experienced nurse: A professional who has gained substantial
knowledge and skills in the field of nursing through years of practice.

Not just number of years practiced, but the quality of experiences, and ability to apply
knowledge into practical situations
41. Who can an experienced nurse collaborate with?: Physicians, Pharmacists,
PT/OT, Social workers, Dietitians, SLP, Resp Therapist and other Nurses
42. Define informatics specialist: a professional who applies their knowledge of
information science to solve problems related to information processing.

They work in various fields such as healthcare, business, and technology,


where they manage, analyze, and interpret data.
43. How is the nurse specialist different from the informatics specialist?: is a
registered nurse who has received advanced training in a specific area of nursing.
They provide
direct patient care and expert consultations in their area of specialization.

An Informatics Specialist, is a professional who uses their knowledge of information


technology and healthcare to improve patient care
outcomes.
They are often involved in the design, implementation, and optimization of
clinical systems like Electronic Health Records (EHRs).
44. Define informatics innovator: a professional who applies their knowledge of
information technology and systems to create new innovative
solutions to complex problems. They are often involved in the design, development, and
implementation of new information systems and technologies
45. How can healthcare organizations use clinical data to increase quality
while
reducing costs?: Value based care, reimburses for outcome instead of source.
46. Define Business Intelligence related to healthcare: The use of business
intelligence technology uses tools and techniques to gather store

5 / 18
processing and analyzing data, to make educated decisions r/t clinical practices and patient
care.
47. What areas of healthcare can be improved when using BI as a foundation for
evidence-based clinical decision-making.: Patient care, operational efficiency financial
risk management
48. Identify and provide examples of the top 3 high-level barriers to using and
exchanging healthcare data: 1.) Inter-operational issues

2.) privacy
and security concerns

3.) lack of standardization


49. Give an example of a high-level barrier to using and exchanging healthcare
data in clinical setting: Medical terminology standardization like, KNA
vs KNDA weight in lbs vs KG 1Gr vs 1000mg. All could cause documentation errors
that could cause pt harm.
50. Define data integrity: The ability to collect, store, retrieve correct
complete and current data available to authorized users as needed
51. Define input errors: A typo error, transcription error, misinterpretation of info,
omission errors
52. How does a system check promote data integrity: Ensures validity & accu- racy
of data set.
53. Provide examples of types of data that are tracked for quality improve- ment:
Process data, outcome data, balancing measures, patient experience data and structural
data
54. How does the use of audit trails improve data integrity?: Audit trails prevent the
wild goose chases often involved in tracing changes or errors in improperly docu- mented
data.

An audit trail is an invaluable resource when a problem with


data is discovered, because the problem can be traced back throughout the file history to
help determine when the error was made
55. Define health literacy: the degree to which individuals have the
capacity to obtain, process, and. understands basic health information and services needed
to make appropriate health decisions
56. How can informatics use health literacy to improve patient outcomes?: - Digital
health literacy, individual has the skills to successfully navigate EHR patient portals to
understand their plan of care and health history.

6 / 18
Knowledge is key to improve
patient outcomes
57. Define data management: The process of controlling the collection storage and use
of data
58. Identify levels of personnel and the importance in data management: Data entry
employees and client's system analysis programmers
59. Provide examples of the differences between databases and data ware-
houses: Database- oversee activities related to maintaining optimal use

Data warehouse- store data from different databases


60. Define active and latent errors: Active errors: occur at the level of the frontline
operator and have immediate effects
EX: a doctor prescribing the wrong medication

Latent errors: Are hidden in the system and may exist unnoticed for a
long time

EX: hospitals management decision to cut staffing levels


61. What steps can be used to prevent errors in healthcare?: The five rights of
medication administration prior to giving patient something will help decrease medication
errors.

Right patient,
Right drug, Right
time, Right dose,
Right route.
62. Define consumer health information (CHI): Consumer health information (CHI) is
information on health and medical topics available to the general public at the lay person
level
63. Give examples of the informaticist's role in the design, adoption, and use of
consumer health informatics applications: Informaticists are involved in the de- sign
process of consumer health information applications by ensuring apps are user friendly,
intuitive and meet the needs of consumers.

They also ensure that the


applications are compliant with health standards and regulations.

7 / 18
64. Define healthcare information system (HIS): Any system that manages
healthcare data
65. What are the financial drawbacks and benefits of a healthcare information
system (HIS): Drawback= Costly (expensive)

Benefit= Improved quality of care provided and a decrease in medication errors.


66. Define Administrative information system: Supports client care by manage- ment
of finances
and demographic info and providing reporting capabilities. EX :
financial coding,
payroll, Human Resources, Scheduling, quality assurances applications, patient
registration, contract management.

A Quality assurance system is a form of an AIS!


67. What are two components of Administrative Information Systems: Hard- ware
and Software
68. How does the AIS combine with CIS to improve the patient experience-
: Proper MD/Nurse documentation of continued care helps assure extent of care provided
by staff is reported, along with having more knowledge about patient health history
allowing better care for the patient and improved outcomes
69. Define clinical information systems (CIS): Large computerized database
management systems supporting activities such as
-MD order entry,
-Results,
-Documentation thru
locations,
-Radiology,
-Nurse info/notes,
-Monitoring continuously, --Pharmacy systems.
70. Identify the components in the clinical information system (CIS) and how are
they used: MD order entry-allows medical staff to see
new/current orders.

Results-view labs,

Radiology-see all Xray results,

Pharmacy- to obtain medications,

8 / 18
Nurse notes-to see views of patient care,

Documentation
amongst assorted locations and Assorted decision support tools in software.
71. How does the CIS support the EHR?: Proper MD/Nurse notes allow accuracy to
electronic health records thus provides an increased opportunity for superb care to patients.
72. Define computerized provider order entry (CPOE): Process of providers
entering/sending treatment instructions via computer
73. Identify the benefits and drawbacks of computerized provider order entry
(CPOE): Benefits: Improved accuracy and
completeness of physician orders.

Drawbacks: Failure of computer systems and/or malfunctions in


computer system.
74. How has the use of computerized provider order entry (CPOE) affected
EBP?: -It has improved decision making,
-Decreased incidents of medication errors,
-Increased efficiency and help facilitate data collection and research
75. Define electronic documentation: Allows nurse to enter patient data via com- puter
76. Define Controlled Terminologies: A set of code lists and valid values used with data
items within CDISC- defined datasets( (Clinical Data Interchange Standards Consortium.
77. What are the strengths and challenges of electronic documentation?: -
Strengths:
Patient access to medical records, saves time versus paper charting, billing more
accurately related to the type of care provided by staff, and financial incentives for
physicians who use electronic charting.

Challenges:
Possibility of breaching
HIPAA, HER's can prove expensive, and can be a challenge if physician does not have
access to a computer system( living in a rural no internet connection location)
78. Why are controlled terminologies important?: It provides an organized infor-
mation system and a standard way of representing information.

9 / 18
79. Define clinical decision support systems (CDSS): Health information tech-
nology to help
workers/patients, person specific information to assist with patient care
80. What are the results of a clinical decision support systems (CDSS) and
what role does EBP practice play in the
support?: CDSS has decreased medication errors, and decreased the risk of misdiagnosis,
it's a toll that improves compliance with EBP
81. Define risk management system: The process of ID, assessing and controlling
financial and legal entities. Helps an organization ID and mitigate risk in financial
transactions and other activities.
82. What role does Healthcare Informatics have in the risk management sys-
tem?: It improves patient safety, enhancing the quality of care, ensures regulatory
compliance and aids in risk ID/mitigation
83. How is patient care impacted by the risk management system?: Patient
safety is closely related to the acknowledgement of risk and how to avoid taking them.
84. Define firewall related to Healthcare Informatics: A defense from cyber-at- tacks
like email phishing attacks and a security system that protects PHI
85. How are the different types of data used in QA?
Test Data-?
Defect Data-?
Metric Data-?
Feedback Data-?
Historical Data-?: Test Data- Used to check the function and performance of
software

Defect Data- When a bug is found in the system

Metric Data- Measures the quality of the system

Feedback Data- Improve user experience

Historical Data- To predict future trends and ID risk to data


86. Define smart technology: ability to communicate and work with other net-
worked technologies, and through this ability to allow automated or
adaptive functionality as well as remote accessibility or operation from anywhere
87. What is the disadvantage of using smart technology in patient care?: Cost, data
security and privacy, dependent on technology (power outages) and complexity of usage
from staff and patients

10 / 18
88. Define HITECH Act: An act that creates incentives related to healthcare
information technology & incentives given for use of HER by providers
89. How has the HITECH Act affected nursing?: It incentivized healthcare
providers to switch from paper charting to electronic charting
90. How can hospitals and healthcare professionals receive incentive pay-
ments?: When they meet all program requirements enlisted by Medicare and Med- icaid
91. Define Meaningful use: It's an incentive program to assure EHRs are used
according to standards that achieve quality safety and efficiency
92. What are the core requirements of Meaningful Use related to EHRS?: -
Record patient demographic info,

clinical decision support, active med list,

drug-to-drug
allergy interactions,

Record/Retrieve Vital signs, record smoking status for individual over


13yrs old,

Protect EHRs,

Exchange electronically pt information,

Supply pts
with electronic copy of health info and dc instructions, Report to

CMS,

Maintain patient diagnosis


93. Define meaningful use Stage 1

What does stage 1 emphasize as it relates to data?: Data Capture and sharing EHR

Captures health information in


standard form engaging patient and families in plan of care

11 / 18
94. Define Meaningful Use Stage 2

What are the Stage 2 requirements for patients' access to online health
information?: Advanced clinical Processes-requires e-
prescribe for lab results and more patient controlled data

View/download and transmit. Physicians must ensure that more than


50% of all patients are provided timely access to view online, download and transmit their
health information
95. Define Meaningful Use Stage 3: Improved Outcomes
96. Define electronic health record system (EHRS): Add's to the decision support and
flag abnormal values
97. Describe the challenges of using an electronic health record system
(EHRS): Documentation errors, Users may not
be computer savvy, Duplicate documentation, navigation through software, Breaching
HIPAA while using internet and may cause issues amongst integrated team members r/t
exchange of info via tablet
98. Define Work-Arounds: Variations in procedures and processes created to ac-
complish work when systems or workflows are inefficient
99. Give an example of an EHRS Work-Arounds: Double documenting d/t unsure
where to input information in EHR
100. What are some common process Workarounds?: Ignoring or disabling EHR
function
101. What ways can workarounds be identified and monitored?: Using qualita- tive
data
collection, like interviews, observations and document analysis
102. Define standardization: Clinical terms used in patient records to
facilitate interoperability as it ensures common understanding of terms
103. What are the benefits of using standardized languages?: Makes it possible to
generalize research and compare patient outcomes and showcase nursing contri- butions to
healthcare
104. How does the adoption of EHRSs increase the need for standardized
terminology?: all individuals providing care adopt terms known by all individuals
working
with the patient.
105. What steps are put in place to maintain data integrity?: Security measures, audit
trials, and developing detailed procedures and policies

12 / 18
106. Define system failure: System crashing may result in loss of data
107. What role does the Nurse Informaticist have in downtime procedures?: -
Informatics Nurse develops downtime procedures
108. What are downtime procedures?: Outlines roles and responsibilities policies and
procedures to continue business while system is down.
109. define policy: Action adopted or proposed by government, business or individ- ual
110. define leguislation: Prep & enactment of laws by legislative body via lawmak- ing
process
111. define regulation: A rule or directive made and maintained by an authority
112. what is PSQIA-(Patient Safety & Quality improvement Act 2005): Est a
voluntary reporting
system to enhance data available to assess and resolve patient safety issues.
113. what is MIPPA (Medicare Improvements for Patients and Providers Act of
2008): helps Medicare
beneficiaries with low income and assets to learn about programs that may help save
money on cost
114. what is ARRA (American Recovery and Reinvestment Act (2009): Est
incentive payments for
hospital and professionals to promote adoption of meaningful use of certified elec- tronic
health record technology
115. what is HITECH Act (Health Information Technology for Economic and
Clinical Health of 2009): To promote the adoption and meaningful use of health
information technology
116. what is ACA (Affordable Care Act of 2010): Helps to make insurance afford- able
to more people.
117. what is MACRA of 2015 (Medicare Access and CHIP Reauthorization Act of
2015): New framework for reimbursing clinicians who show value over volume
118. what is the joint commission (TJC): Independent, not-for-profit organization that
accredits
and certifies healthcare organizations.
119. what is Healthcare Facilities
Accreditation Program (HFAP): Not for profit organization meant to help health- care
organizations maintain their standards in patient care and comply with regulations in
health environment

13 / 18
120. what is the Accreditation Commission for Healthcare (ACHC): Not for profit
organization that provides accreditation for professionals in healthcare fields, home health,
hospice, dialysis, medical equipment, prosthetics, and home infusion therapies
121. what is the American Nurses Credentialing Center Magnet Program
(ANCC): Roadmap for nurse excellence education development through career stages,
leading to improved autonomy at
the bedside
122. Describe the primary goal of Meaningful use: To promote the adoption and
standardized use of EHRs to improve healthcare quality safety and efficiency as well as
decrease health disparities
123. List the 5 Objectives of the Meaningful Use Program: -Improve quality
safety and efficiency while decreasing health disparities

-Engage patients & family members

-Improve coordination of care

-Improve public health,

-Ensure privacy for personal health information


124. Identify the tenets of the Four Component Model of Ethics: - Moral Sensi-
tivity (recognition): Ability to recognize moral issues and how our actions can affect
others

-Moral Judgement, once a moral issue occurs an individual must decide the right course of
action,
using reasoning and ethical principles

-Moral Motivation(Intent) Relates to the commitment and responsibility to ethical actions,


prioritizing moral values over other
personal values

-Moral Character, having the courage to act on ethical decisions, face


adversity and overcome distractions/obstacles, while following through with ethical
behaviors
125. Describe the Purpose of the Four Component Model of ethics: Provides a
deliberate thought process
consisting of an ethical situation and implementing a justifiable action

14 / 18
126. Define Ethical Dilemma: Problem or issue that arises when available choices and
obligations
in a specific situation do not allow for an ethical outcome
127. List the 4 Principles of Information Ethics as identified by Severson in
1997: Respect intellectual property rights

Respect privacy

Respect Accuracy & truthfulness

Respect
system security
128. define Privacy: The state or condition of being free from being observed/dis- turbed
by other people(No news listed on patient charts)
129. define Confidentiality: Keeping or being kept secret or private ( not giving pt info
to family
members not listed on patient chart)
130. define Information-and-data privacy: Keep data private( Lock screen on
computer)
131. define information security: Process and tools designed and deployed to protect
sensitive
info( Lock screen on MAR)
132. define information consent: MD to educate about risk and benefits & alter-
natives of treatment (Before Surgical procedure)
133. define Information-system security: McAffee App ( keeps viruses out of
computer)
134. How can an organization protect itself against downtime, breaches in
confidentiality, loss of consumer confidence, cybercrime, liability, and lost
productivity?: Implement firewalls,
antivirus software and encryption to protect sensitive data
135. Identify threats to information security: Malware attack, social engineering
attacks, password attacks
136. explain internet of things devices: Digitally connected universe of smart
devices
embedded with internet sensors and other hardware that allow communication via web
137. define vulnerability: Inability to resist a hazard or to respond when a disaster has
occurred

15 / 18
138. Characteristics of viruses: Require normal computer operations to
spread May or may not disrupt operations or
damage data
139. Characteristics of worms: self-replicate and execute malicious payload on
computer systems, exist as its own
independent program, unlike virus which needs a host
140. Characteristics of trojan horses: Spread via hacker technique does not infect other
software, they install other malware on your system
141. Characteristics of logic bombs: Set of instructions secretly incorporated into a
program so a particular condition is satisfied
usually with harmful effects
142. Characteristics of rootkits: Most dangerous form of malware, collection of
applications that takes control of computer
on low level, allowing creator of rootkit to do
anything they like to the computer system and its
data
143. Characteristics of malware: Malicious + software, covers any type of
program written to harm you, your computer
of 3rd party entity via computer
144. Characteristics of bacteria: Malware that reduces taking up all the
processors capacity, memory, or disk space,
denying the user access to those resources
145. List several ways to avoid malicious software: Keep computer and software
updated, use an
anti-virus program to scan, download for malware before opening it, use non-admin
account
when possible
146. characteristics of
Cybercrime: Cybercrime commonly refers to the ability to
steal personal information, such as Social Security numbers stored on computers
147. characteristics of opportunists: people who see a chance to gain some
advantage from a situation, often at the
expense of ethics or morals. An opportunist seizes
every opportunity to improve things for himself
148. characteristics of computer or information specialists: Patient and sympa- thetic,
help frustrated individuals use software or hardware, good listening skills
149. characteristics of hackers: Impulsivity, thrill-seeking and lack of empathy

16 / 18
150. characteristics of unauthorized users: They know they are not to be access- ing
information, thus they still do
151. characteristics of overprivileged users: They have access to local files or
devices and have network admin credentials and rights
152. Define sabotage: Deliberately destroy damage or obstruct something esp. for
political or military advantage
153. Differentiate between physical and logical security: Physical-motion sen- sors,
cameras & Logical antivirus, software, password
154. List 3 examples of physical security measures used in your place of
employment: Bed alarms, cameras, and wander guard ( door system)
155. List 3 examples of logical security measures used in your place of em-
ployment: Point click care password log-in, clock in number, hand demographic clock
in
156. Describe the benefits of biometric identification: Security assurance, each
individual has unique non-transferable print, convenient and fast, recognition based on
one's physiological
traits
157. Define Public Key Infrastructure (PKI): Enables entities, users/servers to
securely exchange information
158. Define firewall: Type of gateway designed to protect private network resources from
outside hackers, network damage, and theft or misuse of information
159. types of firewall techniques

service control-?
Direction control-?
user control-?
behavior control-?: Service Control- regulates types of internet services that can be
accessed in/outbound via funneling traffic on basis of an IP address protocol

Direction Control-Regulates the direction in which service request may be initialized and
flow via
firewall

User Control- Applied to access inside a perimeter, but also can be applied to incoming
external traffic

Behavior Control- manages how specific services are used such as filtering
emails

17 / 18
160. Describe a ransomware attack: A malware + software designed to deny access
to files on computers via encryption and demanding ransom payment for encryption key
to regain
access to their files
161. Define audit trails: A computer-generated electronic record that allows one to
review the
course of events r/t the creation, modification, and deletion of an electronic record.
162. List the 6 tasks required for good system security management.: Risk
assessment- ID/eval
potential threats

Policy development- create security policy outlining roles and procedures Security

training & awareness- train users on security policy & potential risk Access control-

control access to system based on user roles

Security monitoring- monitor system to detect breaches

Incident response and recovery- respond and recover from security breaches
163. What is the purpose of encrypting e-mails?: To prevent all kinds of inadver- tent
release of
sensitive data
164. Why is PHI more valuable on the black market than credit card informa-
tion?: Because there are a number of ways health info can be used to illegally make a
profit, like extortion.

18 / 18

You might also like