click below
click below
Normal Size Small Size show me how
COMPUTER TECHNOLOGY
Introductio to Health Occupations
Question | Answer |
---|---|
COMPUTER TECHNOLOGY: A computer is an electronic device for: | storing data and processing data. Data means information. |
Computer processing means: | initiating (starting) a program. |
A computer program is a: | collection of instructions to perform a specific task (assignment). |
Computer programs are aka: | software. |
An understanding of how a computer works and an understanding of computer applications (apps) in your profession is called: | computer literacy. |
Applications (apps) are: | computer programs. |
An organized collection of computer data (information) is called a: | database. |
The largest medical database in the world is the NLM which stands for: | National Library of Medicine. |
Computers in healthcare are used for: | 1. HIS which stands for health information system(s) |
Health Information Systems (HIS) are also known as MIS which stands for: | medical information systems. |
HIS (MIS) are used to manage: | a. Statements of estimated income and expenses or the amount of money available for some purpose called budgets. |
Health Information systems (HIS) aka medical information systems (MIS) are used to manage: | b. Records of goods in stock called inventories. |
Health Information systems (HIS) aka medical information systems (MIS) are used to manage: | c. Personal information and diagnostic reports regarding clients. |
Health Information systems (HIS) aka medical information systems (MIS) are used to manage: | d. Timetables aka schedules. |
Computers in healthcare are used for: | 2. Provide assistance (help) with education abbreviated CAI which stands for computer assisted instruction. |
Computers in healthcare are used to: | 3. Investigate called research. |
A computer is an electronic device for: | storing data (information) and processing data (information) |
Computers in healthcare are used to: | 4. Identify diseases by performing diagnostic testing. |
Diagnostic testing includes tissue analysis (examination) such as: | a. CBC which stans for complete blood coutn. |
Diagnostic testing includes tissue analysis (examination) such as: | b. UA which stands for urinalysis. |
Diagnostic testing includes tissue analysis (examination) such as: | c. BMP which stands forbasic metabolic panel |
Diagnostic testing includes tissue analysis (examination) such as: | d. CMP which stands for complete metabolic panel. |
Diagnostic testing includes tissue analysis (examination) such as: | e. Bx which stands for biopsy. |
Diagnostic testing is used to: | identify disease. |
Diagnostic testing includes: | f. ECG which stands for electrocardiography. |
Diagnostic testing includes: | g. EEG which stands for electroencephalography. |
Diagnostic testing includes diagnostic imaging (DI) such as: | h. CXR which stands for chest x-ray. |
Diagnostic testing includes diagnostic imaging (DI) such as: | I. CT which stands for computerized tomography. |
Diagnostic testing includes diagnostic imaging (DI) such as: | j. MRI which stands for magnetic resonance imaging. |
Diagnostic testing includes diagnostic imaging (DI) such as: | k. PET which stands for positron emission tomography. |
Diagnostic testing includes diagnostic imaging (DI) such as: | l. US which stands for ultrasonography. |
Diagnostic testing includes diagnostic imaging (DI) such as: | m. Endoscopy which means process of using a lighted instrument to view within. |
COMPUTER TYPES: Types of computers include: | 1. A personal computer such as a laptop or desktop. |
Types of computers include: | 2. A microcomputer such as a smartphone |
A computer is an electronic device for: | storing data (information) and processing data (information). |
Types of computers include: | 3. A computer serving hundreds of users called a mainframe. |
The collection of physical parts of a computer is called: | hardware. |
COMPUTER HARDWARE: Computer hardware consists of (contains) the: | physical parts. |
Computer hardware consists of (contains) : | 1. A CPU which stands for central processing unit. |
Computer hardware consists of (contains): | 2. A device for visual output of data (information) called a display screen. |
Output means: | processed information (data). |
The second (2nd) most common computer output device is a: | printer. |
Computer hardware consists of (contains). | 3. An output typing device called a keyboard. |
Input means: | information (data) entered into a computer. |
Computer input devices include: | a. A display allowing input by palpation called a touch screen monitor. |
Computer input devices include: | b. A device that recognizes visual data (information) called an optical scanner. |
Computer input devices include: | c. A device to move the cursor on a computer screen called a mouse. |
Computer input devices include: | d. A device that captures the handwriting or brush strokes of a user called digital pen. |
Computer processing means: | initiating (starting) a program. |
A computer program is a collection of instructions to perform a: | specific task (assignment). |
Computer programs are aka: | software |
An understanding of how a computer works and an understanding of computer applications (apps) in your profession is called: | computer literacy. |
Applications (apps) are: | computer programs. |
Data can be stored on a: | 1. CD which stands for compact disc. |
Data means: | information. |
Data (information) can be stored on a: | 2. DVD which stand for digital versatile (video) disc. |
Data (information) can be stored on a: | 3. USB flash drive which stands for universal serial bus. |
The permanent program built into the computer system by the manufacturer is abbreviated ROM which stands for: | read only memory. |
A computer program is a collection of instruction to perform a: | specific task (assignment). |
A computer program allowing data (information) to be stored and/or retrieved and/or changed is abbreviated RAM which stands for: | random access memory. |
Production, storage and manipulation of text on a computer is called: | word processing. |
Linking computers together is called a: | network. |
A worldwide network is called: | the internet. |
An electronic device that sends data (information) between computer networks is called a: | router. |
An electronic device that sends and receives computer data over a telephone line or cable is called a: | modem. |
The process of creating and sending text messages from one computer to another is called: | electronic mail (e-mail) |
Text means: | written or printed. |
Those who provide connection to the Internet are called ISP which stands for: | internet service providers. |
Internet service providers (IS) include: | 1. Comcast. 2. AT&T 3. Time Warner Cable. |
Internet service providers (IS) include: | 4. Century Link 5. Verizon. |
Computer software to search for data (information) on the Internet is called a: | web browser. |
Web browsers include: | 1. Google Chrome. 2. Internet explorer |
Web browsers include: | 3. Apple Safari. 4. Mozilla Firefox. |
Web browsers refer to computer software to search for data on the: | Internet (worldwide network). |
Programs used by the web browser are called: | search engines. |
Search engines include: | 1. Google (www.googl.com) 2. Bing (www.bing.com).Search engines include: |
Search engines include: | 3. Yahoo (www.yahoo.com) 4. Ask (www.ask.com) |
Search engines include: | 5. Aol (www.aol.com). 6. WOW (www.wow.com). |
The use of the internet as a source for health information is called: | e-health. |
Remote consultation by clients with their physician is called: | telemedicine aka cybermedicine. |
Consultation means: | discussion. |
Delivery of prescriptions (medications) through the use of telecommunications is called: | telepharmacy. |
Telecommunications means: | exchanging information (data) over a distance. |
The use of uniform electronic network protocols to transfer business information between organizations is abbreviated EDI which stands for: | electronic data interchange. |
A computer can be protected from electronic surges and power outages with UPS which stands for: | uninterrupted power supply. |
Computer programs that alter (change) the operation of computer programs by erasing data and/or scrambling data and /or allowing access to data are called: | computer viruses. |
A computer program (software) is a collection of instructions to: | perform a specific task (assignment). |
All healthcare computers mush have: | antivirus software (programs). |
Computer viruses are programs that alter (change) the operation of computer programs by: | erasing data and/or scrambling data and/or allowing access to data. |
Viruses can enter a computer by downloading information from the: | Internet or opening e-mail or data (information) storage devices. |
Computers that contain databases should be networked only within the: | healthcare facility. |
A database is an: | organized collection of computer information. |
Networked means: | computers linked together. |
Data (information) to be transferred to an outside source should be saved and sent on a: | dedicated computer. |
Dedicated means: | a single computer in a network. |
Hardware and/or software designed to prevent unauthorized access to electronic data (information) is called a: | firewall |
The process of scrambling data (information) before sending it electronically is called: | encryption. |
A written document detailing a healthcare provider's privacy practices is abbreviated NPP which stands for: | notice of privacy practices. |
Data (information) that contains client identifiers is abbreviated PHI which stands for: | protected health information. |
Client identifiers include: | 1. Name. |
Client identifiers include: | 2. Address. |
Client identifiers include: | 3. Telephone number(s). |
Client identifiers include: | 4. Social Security (SS) numbers. |
Client identifiers include: | 5. Date of birth (DOB). |
CONFIDENTIALITY AND TECHNOLOGY: Confidentiality means: | private information not intended for public knowledge. |
Confidential information is aka: | privileged information. |
Confidentiality includes using a password for computer access that is not obvious such as: | birth dates or anniversary dates or addresses or telephone numbers. |
Good passwords include: | a. Digits (numbers) letters and punctuation characters. |
Good passwords include: | b. Upper and lower case letters. |
Good passwords include: | c. Passwords that can be typed quickly in case someone is looking over your shoulder. |
Good passwords include: | d. Passwords that are the length of eight (8) characters. |
Good passwords include: | e. Passwords that are periodically changed. |
Good passwords include: | f. Passwords that are only known by you. |
Good passwords include: | g. Passwords that are easy to remember. |
Confidentiality and technology includes: | 1. Not leaving the computer unattended. |
Confidentiality and technology includes: | 2. Using encryption technology when healthcare information (data) is transferred electronically. |
Confidentiality and technology includes: | 3. Verifying telephone numbers before faxing medical records. |
Confidentiality and technology includes: | 4. Not leaving medical records unattended on a fax machine or copier. |
Confidentiality and technology includes: | 5. Setting the computer to block access when not in use. |
ABUSE: Abuse means: | unnecessary pain and/or unnecessary physical harm and/or unnecessary mental anguish. |
Anguish means: | suffering. |
Physical abuse and/or emotional abuse and/or economic abuse and/or sexual abuse within a relationship is abbreviated DV which stands for: | domestic violence. |
Domestic violence (DV) is also known as IPV which stands for: | intimate partner violence. |
Domestic violence (DV) in the US usually involves: | female victims and male abusers. |
Domestic violence (DV) in the US is the single most cause of injury to: | women. |
A woman is battered in the US every: | nine (9) seconds. |
The greatest risk of abuse occurs with: | low socio-economic women. |
When income rises, abuse decreases but: | does not cease (stop). |
The most frequent initial area of abusive injury is the: | face. |
Initial means: | beginning. |
A practiced batterer may hit areas that are not easily visible to others such as the portion of the head: | covered by hair and/or the breasts and/or abdomen and/or back and /or buttocks. |
Victims of physical abuse may hide the injuries or use excuses such as: | "I fell." or "I ran into." |
Victims of sexual abuse may contract sexually transmitted diseases (STDs) from having sex forced upon them by: | non-monogamous sexual partners. |
Monogamous means: | mutually exclusive. |
Therapeutic communication techniques for victims of domestic violence (DV) include: | 1. You do not deserve to be treated this way. |
Therapeutic communication techniques for victims of domestic violence (DV) include: | 2. You are not to blame. |
Therapeutic communication techniques for victims of domestic violence (DV) include: | 3. You are not alone. |
Therapeutic communication techniques for victims of domestic violence (DV) include: | 4. Help is available. |
CHILD ABUSE: The average number of children in the US that die every day from abuse or neglect is: | five (5). |
1 of every 3 girls and 1 of every 5 boys in the US will be sexually abused before age: | 18. |
3 out of 4 sexually abused children: | don't tell. |
Physical indicators (signs) of child abuse include unexplainable: | 1. Lacerations (cuts) and/or abrasions (scrapes) and/or welts (red swollen mark) and/or hematomas (bruises) and or thermal injuries (burns). |
Physical indicators (signs) of child abuse include unexplainable: | 2. Head injuries and/or internal injuries and/or broken bones such as a spiral (torsion) fracture. |
Physical indicators (signs) of child abuse include: | 3. Wounds (injuries) in the shape of objects. |
Indicators are: | signs. |
Behavioral indicators (signs) of child abuse include: | 1. A child who is overly passive and compliant. |
Behavioral indicators (signs) of child abuse include: | 2. A child who is overtly aggressive and rageful. |
Behavioral indicators (signs) of child abuse include: | 3. An explanation that sounds scripted (rehearsed). |
Behavioral indicators (signs) of child abuse include: | 4. A child who is afraid of going home. |
Behavioral indicators (signs) of child abuse include: | 5. A child who returns to earlier developmental stage such as thumb-sucking and/or bed-wetting and/or fear of the dark (nightmares). |
Behavioral indicators (signs) of child abuse include: | 6. A child who exhibits (shows) changes in eating patterns and/or sleeping patterns. |
Behavioral indicators (signs) of child abuse include: | 7. A child who exhibits changes in school performance and/or attendance. |
Behavioral indicators (signs) of child abuse include: | 8. A child who exhibits (shows) a lack of personal care and/or hygiene (cleanliness). |
Behavioral indicators (signs) of child abuse include: | 9. A child who exhibits inappropriate sexual behaviors. |
Abused children commonly exhibit: | 1. Psychiatric disorders. |
Abused children commonly exhibit: | 2. Delinquent behaviors. |
Abused children commonly exhibit: | 3. Learning disabilities. |
Abused children commonly exhibit: | 4. Disciplinary problems. |
Abused children commonly exhibit: | More physical illnesses. |
Children who witness domestic violence (DV) is the single best predictor of: | juvenile delinquency and adult criminality. |
Abused children in the US are less likely to practice safer sex techniques which puts them at greater risk for: | sexually transmitted diseases (STDs). |
Abused children in the US are 25% more likely to experience: | teenage pregnancy. |
30-50% of abused children will: | become abusers. |
Phrases a child should never hear from their caregivers include: | "You are stupid!" |
Phrases a child should never hear from their caregivers include: | "You are ugly !" |
Phrases a child should never hear from their caregivers include: | "You are worthless!" |
Phrases a child should never hear from their caregivers include: | "You are fat" |
ELDER ABUSE: Elder relative abuse is most commonly inflicted by their: | adult children. |
Types of elder relative abuse include: | 1. Passive neglect which means unintentional failure to care for. |
Abuse means: | unnecessary pain and/or unnecessary physical harm and/or unnecessary mental anguish (suffering). |
Types of elder relative abuse include: | 2. Active neglect which means intentional failure to care for. |
Types of elder relative abuse include: | 3. Emotional attacks aka psychological abuse. |
Types of elder relative abuse include: | 4. Stealing money aka financial abuse. |
Types of elder relative abuse include: | 5. Battering aka physical abuse. |
Three (3) phases of domestic violence (DV) include: | 1. Slow building emotional tension. |
Three (3) phases of domestic violence (DV) include: | 2. Explosion (rage) where acute (sudden) battering occurs. |
Three (3) phases of domestic violence (DV) include: | 3. Aftermath aka calmness. |
During the aftermath (calmness) phase of domestic violence the abuser may: | 1. Exhibit (display) behavior that is kind and loving. |
During the aftermath (calmness) phase of domestic violence the abuser may: | 2. Beg for forgiveness. |
During the aftermath (calmness) phase of domestic violence the abuser may: | 3. Promise it will never happen again. |
The aftermath (calmness) phase does not always take place and abuse may occur (happen) with: | little time between abusive episodes. |
Victims of abuse have a strong motivation (desire) to: | stay in the relationship and promote (maintain) the status quo. |
Status quo means: | current situation. |
Reasons for staying in an abusive relationship include: | 1. A belief that abuse is normal. |
Reasons for staying in an abusive relationship include: | |
Reasons for staying in an abusive relationship include: | 3. A belief the abuser will change. |
Reasons for staying in an abusive relationship include: | 4. Marriage vows stating "for better and for worse." |
Typical (common) fears of abuse victims include: | 1. The unknown. |
Typical (common) fears of abuse victims include: | 2. Being alone. |
Typical (common) fears of abuse victims include: | 3. Being considered a failure. |
Typical (common) fears of abuse victims include: | 4. Being unable to provide for self and children. |
Typical (common) fears of abuse victims include: | 5. Retaliation (revenge) from the abuser. |
Women who leave batterers are at 75% greater risk of being: | killed by their batterer. |
The average number of women in the US that are murdered every day by a current or former partner is: | three (3). |
Risk factors for homicide (murder) in domestic violence include: | 1. Control of partner's daily routine. |
Risk factors for homicide (murder) in domestic violence include: | 2. Destruction of property. |
Risk factors for homicide (murder) in domestic violence include: | 3. Lack of respect for the law. |
Risk factors for homicide (murder) in domestic violence include: | 4. Unemployment. |
Risk factors for homicide (murder) in domestic violence include: | 5. Substance abuse. |
Risk factors for homicide (murder) in domestic violence include: | 6. Extreme jealousy. |
Risk factors for homicide (murder) in domestic violence include: | 7. Threats of using a weapon. |
Risk factors for homicide (murder) in domestic violence include: | 8. Access or presence of a gun. |
Risk factors for homicide (murder) in domestic violence include: | 9. Stalking. |
Risk factors for homicide (murder) in domestic violence include: | 10. Strangulation during assault. |
Risk factors for homicide (murder) in domestic violence include: | 11. Escalation (increase) of violence. |
Risk factors for homicide (murder) in domestic violence include: | 12. Violence outside of home. |
Risk factors for homicide (murder) in domestic violence include: | 13. Battering during pregnancy. |
Risk factors for homicide (murder) in domestic violence include: | 14. Sexual abuse. |
Risk factors for homicide (murder) in domestic violence include: | 15. Abuse of the children. |
Risk factors for homicide (murder) in domestic violence include: | 16. Pet abuse. |
Risk factors for homicide (murder) in domestic violence include: | 17. Threats or attempts of suicide. |
SAFE PLAN: A safe plan is a personalized practical plan to remain safe when: | leaving an abusive relationship. |
A safe plan must be covert which means: | secret. |
A safe plan should include gathering evidence (proof) that includes: | 1. A journal which means written details of the abuse. |
A safe plan should include gathering evidence (proof) that includes: | 2. Pictures of your images and damage to your home. |
A safe plan should include gathering evidence (proof) that includes: | 3. Torn or bloody clothing. |
A safe plan should include gathering evidence (proof) that includes: | 4. Medical records that document the abuse. |
A safe plan should include preparing pre-packed suitcase(s) with clothes for: | self and children. |
A safe plan should include gathering important documents such as: | 1. Bank account number(s). |
A safe plan should include gathering important documents such as: | 2. Credit card numbers. |
A safe plan should include gathering important documents such as: | 3. Birth certificates. |
A safe plan should include gathering important documents such as: | 4. Driver's license. |
A safe plan should include gathering important documents such as: | 5. Marriage license. |
A safe plan should include gathering important documents such as: | 6. Social Security (SS) numbers. |
A safe plan should include gathering important documents such as: | 7. Property ownership titles. |
A safe plan should include gathering important documents such as: | 8. School records. |
A safe plan should include gathering important documents such as: | 9. Immunization records. |
A safe plan should include: | Arrangements made on a secure telephone and/or computer. |
A safe plan should include: | Consulting (seeking advice) from a lawyer. |
A safe plan should include: | Stashing (secretly storing) money. |
A safe plan should include: | Duplicating keys. |
A safe plan should include: | Arranging a means (way) of transportation. |
A safe plan should include: | Creating an action word or phrase to alert an ally (supporter) that you are leaving. |
A safe plan should include: | Keeping your ally's identity covert (secret). |
A safe plan should include: | Leaving when the abuser will least expect it. |
A safe plan should include: | A quick exit because this is a dangerous time. |
A safe plan should include gathering the abuser's information such as: | 1. Pay stubs. |
A safe plan should include gathering the abuser's information such as: | 2. Social Security (SS) number. |
A safe plan should include gathering the abuser's information such as: | 3. Bank account numbers. |
A safe plan should include gathering the abuser's information such as: | 4. Driver's license number. |
A safe plan should include gathering the abuser's information such as: | 5. Addresses of family and friends. |
A safe plan should include gathering the abuser's information such as: | 6. A recent photograph. |
A safe plan should include gathering the abuser's information such as: | 7. Credit card information. |
A safe plan should include gathering the abuser's information such as: | 8. Criminal history. |
A safe plan should include gathering the abuser's information such as: | 9. Full description of their vehicle. |
A safe plan should include gathering the abuser's information such as: | 10. License plate number. |
A safe plan should include gathering the abuser's information such as: | 11. Work address and phone number. |
CHARACTERISTICS OF THE ABUSER: Most people the abuser socializes with are not going to tell them they have a: | problem. |
The abuser has a strong denial system and consistently blames; | others for this problem. |
The abuser will not voluntarily seek treatment or be motivated to: | change. |
The abuser needs to be in: | control. |
The abuser needs to dominate other people to feel: | powerful and important. |
The abuser has low self-esteem and is threatened by: | achievement of others. |
The abuser feels: | insecure and inadequate. |
The abuser will constantly need to: | prove themselves. |
The abuser will blame others for their: | shortcomings and problems. |
The abuser will threaten, throw temper tantrums and use: | intimidating behavior. |
The majority of abusers are not alcoholics but alcohol may facilitate: | aggressive behavior. |
TREATMENT FOR THE ABUSER: Treatment (Tx) for the abuser may be difficult but not: | impossible. |
Family members, friends, clergy and professionals can try to convince the abuser that they need help by performing reality therapy aka: | an intervention. |
Effective treatment includes: | psychiatric counselling and/or group therapy. |
To be effective, the treatment frequently must be mandatory and contain penalties (incarceration) for: | failure to attend treatment sessions. |
REPORTING ABUSE: Battering is assault and must be: | reported to the authorities (police) |
Assault means: | attempt or threat to inflict bodily harm. |
Health care providers (HCPs) must report abuse that is: | suspected. |
The client must be informed that suspected abuse will be: | reported to the authorities (police). |
Failure to report abuse or suspected abuse is a: | crime. |
Penalties for failure to report abuse or suspected abuse include: | 1. Loss of certification.l |
Penalties for failure to report abuse or suspected abuse include: | 2. Fines up to $5,000. |
Penalties for failure to report abuse or suspected abuse include: | 3. Imprisonment up to five (5 years). |
Penalties for failure to report abuse or suspected abuse include: | 4. Civil liability aka a lawsuit. |
If you report suspected abuse or neglect and it is unwarranted (wrong), you cannot be charged with: | civil liability aka a lawsuit. |
DOMESTIC VIOLENCE RESOURCES: National Domestic Violence Hotline: | 1-800-799-SAFE (7233) or 1-800-799-0657 |
National Resource Center on Domestic Violence | 1-800-537-2238 |
Florida Coalition Against Domestic Violence | 1-850-671-3998 |
Sunrise of Pasco County 24-hour hotline | (352) 521-3120 |
Hernando County Shelter & Domestic Violence Hotline | (352) 799-0657 |
Hernando County Dawn Center Hotline | (352) 686-8430 |
Rape, Abuse & Incest National Network | 1-800-656-HOPE (4673 |
National Resource Center on Domestic Violence | 1-800-537-2238 |
Health Resource Center on Domestic Violence | 1-800-313-1310 |
Battered Women's Justice Project | 1-800-903-0111 Ext. 1 |
National Battered Women's Law Project | 1-212-741-9480 |