Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

COMPUTER TECHNOLOGY

Introductio to Health Occupations

QuestionAnswer
COMPUTER TECHNOLOGY: A computer is an electronic device for: storing data and processing data. Data means information.
Computer processing means: initiating (starting) a program.
A computer program is a: collection of instructions to perform a specific task (assignment).
Computer programs are aka: software.
An understanding of how a computer works and an understanding of computer applications (apps) in your profession is called: computer literacy.
Applications (apps) are: computer programs.
An organized collection of computer data (information) is called a: database.
The largest medical database in the world is the NLM which stands for: National Library of Medicine.
Computers in healthcare are used for: 1. HIS which stands for health information system(s)
Health Information Systems (HIS) are also known as MIS which stands for: medical information systems.
HIS (MIS) are used to manage: a. Statements of estimated income and expenses or the amount of money available for some purpose called budgets.
Health Information systems (HIS) aka medical information systems (MIS) are used to manage: b. Records of goods in stock called inventories.
Health Information systems (HIS) aka medical information systems (MIS) are used to manage: c. Personal information and diagnostic reports regarding clients.
Health Information systems (HIS) aka medical information systems (MIS) are used to manage: d. Timetables aka schedules.
Computers in healthcare are used for: 2. Provide assistance (help) with education abbreviated CAI which stands for computer assisted instruction.
Computers in healthcare are used to: 3. Investigate called research.
A computer is an electronic device for: storing data (information) and processing data (information)
Computers in healthcare are used to: 4. Identify diseases by performing diagnostic testing.
Diagnostic testing includes tissue analysis (examination) such as: a. CBC which stans for complete blood coutn.
Diagnostic testing includes tissue analysis (examination) such as: b. UA which stands for urinalysis.
Diagnostic testing includes tissue analysis (examination) such as: c. BMP which stands forbasic metabolic panel
Diagnostic testing includes tissue analysis (examination) such as: d. CMP which stands for complete metabolic panel.
Diagnostic testing includes tissue analysis (examination) such as: e. Bx which stands for biopsy.
Diagnostic testing is used to: identify disease.
Diagnostic testing includes: f. ECG which stands for electrocardiography.
Diagnostic testing includes: g. EEG which stands for electroencephalography.
Diagnostic testing includes diagnostic imaging (DI) such as: h. CXR which stands for chest x-ray.
Diagnostic testing includes diagnostic imaging (DI) such as: I. CT which stands for computerized tomography.
Diagnostic testing includes diagnostic imaging (DI) such as: j. MRI which stands for magnetic resonance imaging.
Diagnostic testing includes diagnostic imaging (DI) such as: k. PET which stands for positron emission tomography.
Diagnostic testing includes diagnostic imaging (DI) such as: l. US which stands for ultrasonography.
Diagnostic testing includes diagnostic imaging (DI) such as: m. Endoscopy which means process of using a lighted instrument to view within.
COMPUTER TYPES: Types of computers include: 1. A personal computer such as a laptop or desktop.
Types of computers include: 2. A microcomputer such as a smartphone
A computer is an electronic device for: storing data (information) and processing data (information).
Types of computers include: 3. A computer serving hundreds of users called a mainframe.
The collection of physical parts of a computer is called: hardware.
COMPUTER HARDWARE: Computer hardware consists of (contains) the: physical parts.
Computer hardware consists of (contains) : 1. A CPU which stands for central processing unit.
Computer hardware consists of (contains): 2. A device for visual output of data (information) called a display screen.
Output means: processed information (data).
The second (2nd) most common computer output device is a: printer.
Computer hardware consists of (contains). 3. An output typing device called a keyboard.
Input means: information (data) entered into a computer.
Computer input devices include: a. A display allowing input by palpation called a touch screen monitor.
Computer input devices include: b. A device that recognizes visual data (information) called an optical scanner.
Computer input devices include: c. A device to move the cursor on a computer screen called a mouse.
Computer input devices include: d. A device that captures the handwriting or brush strokes of a user called digital pen.
Computer processing means: initiating (starting) a program.
A computer program is a collection of instructions to perform a: specific task (assignment).
Computer programs are aka: software
An understanding of how a computer works and an understanding of computer applications (apps) in your profession is called: computer literacy.
Applications (apps) are: computer programs.
Data can be stored on a: 1. CD which stands for compact disc.
Data means: information.
Data (information) can be stored on a: 2. DVD which stand for digital versatile (video) disc.
Data (information) can be stored on a: 3. USB flash drive which stands for universal serial bus.
The permanent program built into the computer system by the manufacturer is abbreviated ROM which stands for: read only memory.
A computer program is a collection of instruction to perform a: specific task (assignment).
A computer program allowing data (information) to be stored and/or retrieved and/or changed is abbreviated RAM which stands for: random access memory.
Production, storage and manipulation of text on a computer is called: word processing.
Linking computers together is called a: network.
A worldwide network is called: the internet.
An electronic device that sends data (information) between computer networks is called a: router.
An electronic device that sends and receives computer data over a telephone line or cable is called a: modem.
The process of creating and sending text messages from one computer to another is called: electronic mail (e-mail)
Text means: written or printed.
Those who provide connection to the Internet are called ISP which stands for: internet service providers.
Internet service providers (IS) include: 1. Comcast. 2. AT&T 3. Time Warner Cable.
Internet service providers (IS) include: 4. Century Link 5. Verizon.
Computer software to search for data (information) on the Internet is called a: web browser.
Web browsers include: 1. Google Chrome. 2. Internet explorer
Web browsers include: 3. Apple Safari. 4. Mozilla Firefox.
Web browsers refer to computer software to search for data on the: Internet (worldwide network).
Programs used by the web browser are called: search engines.
Search engines include: 1. Google (www.googl.com) 2. Bing (www.bing.com).Search engines include:
Search engines include: 3. Yahoo (www.yahoo.com) 4. Ask (www.ask.com)
Search engines include: 5. Aol (www.aol.com). 6. WOW (www.wow.com).
The use of the internet as a source for health information is called: e-health.
Remote consultation by clients with their physician is called: telemedicine aka cybermedicine.
Consultation means: discussion.
Delivery of prescriptions (medications) through the use of telecommunications is called: telepharmacy.
Telecommunications means: exchanging information (data) over a distance.
The use of uniform electronic network protocols to transfer business information between organizations is abbreviated EDI which stands for: electronic data interchange.
A computer can be protected from electronic surges and power outages with UPS which stands for: uninterrupted power supply.
Computer programs that alter (change) the operation of computer programs by erasing data and/or scrambling data and /or allowing access to data are called: computer viruses.
A computer program (software) is a collection of instructions to: perform a specific task (assignment).
All healthcare computers mush have: antivirus software (programs).
Computer viruses are programs that alter (change) the operation of computer programs by: erasing data and/or scrambling data and/or allowing access to data.
Viruses can enter a computer by downloading information from the: Internet or opening e-mail or data (information) storage devices.
Computers that contain databases should be networked only within the: healthcare facility.
A database is an: organized collection of computer information.
Networked means: computers linked together.
Data (information) to be transferred to an outside source should be saved and sent on a: dedicated computer.
Dedicated means: a single computer in a network.
Hardware and/or software designed to prevent unauthorized access to electronic data (information) is called a: firewall
The process of scrambling data (information) before sending it electronically is called: encryption.
A written document detailing a healthcare provider's privacy practices is abbreviated NPP which stands for: notice of privacy practices.
Data (information) that contains client identifiers is abbreviated PHI which stands for: protected health information.
Client identifiers include: 1. Name.
Client identifiers include: 2. Address.
Client identifiers include: 3. Telephone number(s).
Client identifiers include: 4. Social Security (SS) numbers.
Client identifiers include: 5. Date of birth (DOB).
CONFIDENTIALITY AND TECHNOLOGY: Confidentiality means: private information not intended for public knowledge.
Confidential information is aka: privileged information.
Confidentiality includes using a password for computer access that is not obvious such as: birth dates or anniversary dates or addresses or telephone numbers.
Good passwords include: a. Digits (numbers) letters and punctuation characters.
Good passwords include: b. Upper and lower case letters.
Good passwords include: c. Passwords that can be typed quickly in case someone is looking over your shoulder.
Good passwords include: d. Passwords that are the length of eight (8) characters.
Good passwords include: e. Passwords that are periodically changed.
Good passwords include: f. Passwords that are only known by you.
Good passwords include: g. Passwords that are easy to remember.
Confidentiality and technology includes: 1. Not leaving the computer unattended.
Confidentiality and technology includes: 2. Using encryption technology when healthcare information (data) is transferred electronically.
Confidentiality and technology includes: 3. Verifying telephone numbers before faxing medical records.
Confidentiality and technology includes: 4. Not leaving medical records unattended on a fax machine or copier.
Confidentiality and technology includes: 5. Setting the computer to block access when not in use.
ABUSE: Abuse means: unnecessary pain and/or unnecessary physical harm and/or unnecessary mental anguish.
Anguish means: suffering.
Physical abuse and/or emotional abuse and/or economic abuse and/or sexual abuse within a relationship is abbreviated DV which stands for: domestic violence.
Domestic violence (DV) is also known as IPV which stands for: intimate partner violence.
Domestic violence (DV) in the US usually involves: female victims and male abusers.
Domestic violence (DV) in the US is the single most cause of injury to: women.
A woman is battered in the US every: nine (9) seconds.
The greatest risk of abuse occurs with: low socio-economic women.
When income rises, abuse decreases but: does not cease (stop).
The most frequent initial area of abusive injury is the: face.
Initial means: beginning.
A practiced batterer may hit areas that are not easily visible to others such as the portion of the head: covered by hair and/or the breasts and/or abdomen and/or back and /or buttocks.
Victims of physical abuse may hide the injuries or use excuses such as: "I fell." or "I ran into."
Victims of sexual abuse may contract sexually transmitted diseases (STDs) from having sex forced upon them by: non-monogamous sexual partners.
Monogamous means: mutually exclusive.
Therapeutic communication techniques for victims of domestic violence (DV) include: 1. You do not deserve to be treated this way.
Therapeutic communication techniques for victims of domestic violence (DV) include: 2. You are not to blame.
Therapeutic communication techniques for victims of domestic violence (DV) include: 3. You are not alone.
Therapeutic communication techniques for victims of domestic violence (DV) include: 4. Help is available.
CHILD ABUSE: The average number of children in the US that die every day from abuse or neglect is: five (5).
1 of every 3 girls and 1 of every 5 boys in the US will be sexually abused before age: 18.
3 out of 4 sexually abused children: don't tell.
Physical indicators (signs) of child abuse include unexplainable: 1. Lacerations (cuts) and/or abrasions (scrapes) and/or welts (red swollen mark) and/or hematomas (bruises) and or thermal injuries (burns).
Physical indicators (signs) of child abuse include unexplainable: 2. Head injuries and/or internal injuries and/or broken bones such as a spiral (torsion) fracture.
Physical indicators (signs) of child abuse include: 3. Wounds (injuries) in the shape of objects.
Indicators are: signs.
Behavioral indicators (signs) of child abuse include: 1. A child who is overly passive and compliant.
Behavioral indicators (signs) of child abuse include: 2. A child who is overtly aggressive and rageful.
Behavioral indicators (signs) of child abuse include: 3. An explanation that sounds scripted (rehearsed).
Behavioral indicators (signs) of child abuse include: 4. A child who is afraid of going home.
Behavioral indicators (signs) of child abuse include: 5. A child who returns to earlier developmental stage such as thumb-sucking and/or bed-wetting and/or fear of the dark (nightmares).
Behavioral indicators (signs) of child abuse include: 6. A child who exhibits (shows) changes in eating patterns and/or sleeping patterns.
Behavioral indicators (signs) of child abuse include: 7. A child who exhibits changes in school performance and/or attendance.
Behavioral indicators (signs) of child abuse include: 8. A child who exhibits (shows) a lack of personal care and/or hygiene (cleanliness).
Behavioral indicators (signs) of child abuse include: 9. A child who exhibits inappropriate sexual behaviors.
Abused children commonly exhibit: 1. Psychiatric disorders.
Abused children commonly exhibit: 2. Delinquent behaviors.
Abused children commonly exhibit: 3. Learning disabilities.
Abused children commonly exhibit: 4. Disciplinary problems.
Abused children commonly exhibit: More physical illnesses.
Children who witness domestic violence (DV) is the single best predictor of: juvenile delinquency and adult criminality.
Abused children in the US are less likely to practice safer sex techniques which puts them at greater risk for: sexually transmitted diseases (STDs).
Abused children in the US are 25% more likely to experience: teenage pregnancy.
30-50% of abused children will: become abusers.
Phrases a child should never hear from their caregivers include: "You are stupid!"
Phrases a child should never hear from their caregivers include: "You are ugly !"
Phrases a child should never hear from their caregivers include: "You are worthless!"
Phrases a child should never hear from their caregivers include: "You are fat"
ELDER ABUSE: Elder relative abuse is most commonly inflicted by their: adult children.
Types of elder relative abuse include: 1. Passive neglect which means unintentional failure to care for.
Abuse means: unnecessary pain and/or unnecessary physical harm and/or unnecessary mental anguish (suffering).
Types of elder relative abuse include: 2. Active neglect which means intentional failure to care for.
Types of elder relative abuse include: 3. Emotional attacks aka psychological abuse.
Types of elder relative abuse include: 4. Stealing money aka financial abuse.
Types of elder relative abuse include: 5. Battering aka physical abuse.
Three (3) phases of domestic violence (DV) include: 1. Slow building emotional tension.
Three (3) phases of domestic violence (DV) include: 2. Explosion (rage) where acute (sudden) battering occurs.
Three (3) phases of domestic violence (DV) include: 3. Aftermath aka calmness.
During the aftermath (calmness) phase of domestic violence the abuser may: 1. Exhibit (display) behavior that is kind and loving.
During the aftermath (calmness) phase of domestic violence the abuser may: 2. Beg for forgiveness.
During the aftermath (calmness) phase of domestic violence the abuser may: 3. Promise it will never happen again.
The aftermath (calmness) phase does not always take place and abuse may occur (happen) with: little time between abusive episodes.
Victims of abuse have a strong motivation (desire) to: stay in the relationship and promote (maintain) the status quo.
Status quo means: current situation.
Reasons for staying in an abusive relationship include: 1. A belief that abuse is normal.
Reasons for staying in an abusive relationship include:
Reasons for staying in an abusive relationship include: 3. A belief the abuser will change.
Reasons for staying in an abusive relationship include: 4. Marriage vows stating "for better and for worse."
Typical (common) fears of abuse victims include: 1. The unknown.
Typical (common) fears of abuse victims include: 2. Being alone.
Typical (common) fears of abuse victims include: 3. Being considered a failure.
Typical (common) fears of abuse victims include: 4. Being unable to provide for self and children.
Typical (common) fears of abuse victims include: 5. Retaliation (revenge) from the abuser.
Women who leave batterers are at 75% greater risk of being: killed by their batterer.
The average number of women in the US that are murdered every day by a current or former partner is: three (3).
Risk factors for homicide (murder) in domestic violence include: 1. Control of partner's daily routine.
Risk factors for homicide (murder) in domestic violence include: 2. Destruction of property.
Risk factors for homicide (murder) in domestic violence include: 3. Lack of respect for the law.
Risk factors for homicide (murder) in domestic violence include: 4. Unemployment.
Risk factors for homicide (murder) in domestic violence include: 5. Substance abuse.
Risk factors for homicide (murder) in domestic violence include: 6. Extreme jealousy.
Risk factors for homicide (murder) in domestic violence include: 7. Threats of using a weapon.
Risk factors for homicide (murder) in domestic violence include: 8. Access or presence of a gun.
Risk factors for homicide (murder) in domestic violence include: 9. Stalking.
Risk factors for homicide (murder) in domestic violence include: 10. Strangulation during assault.
Risk factors for homicide (murder) in domestic violence include: 11. Escalation (increase) of violence.
Risk factors for homicide (murder) in domestic violence include: 12. Violence outside of home.
Risk factors for homicide (murder) in domestic violence include: 13. Battering during pregnancy.
Risk factors for homicide (murder) in domestic violence include: 14. Sexual abuse.
Risk factors for homicide (murder) in domestic violence include: 15. Abuse of the children.
Risk factors for homicide (murder) in domestic violence include: 16. Pet abuse.
Risk factors for homicide (murder) in domestic violence include: 17. Threats or attempts of suicide.
SAFE PLAN: A safe plan is a personalized practical plan to remain safe when: leaving an abusive relationship.
A safe plan must be covert which means: secret.
A safe plan should include gathering evidence (proof) that includes: 1. A journal which means written details of the abuse.
A safe plan should include gathering evidence (proof) that includes: 2. Pictures of your images and damage to your home.
A safe plan should include gathering evidence (proof) that includes: 3. Torn or bloody clothing.
A safe plan should include gathering evidence (proof) that includes: 4. Medical records that document the abuse.
A safe plan should include preparing pre-packed suitcase(s) with clothes for: self and children.
A safe plan should include gathering important documents such as: 1. Bank account number(s).
A safe plan should include gathering important documents such as: 2. Credit card numbers.
A safe plan should include gathering important documents such as: 3. Birth certificates.
A safe plan should include gathering important documents such as: 4. Driver's license.
A safe plan should include gathering important documents such as: 5. Marriage license.
A safe plan should include gathering important documents such as: 6. Social Security (SS) numbers.
A safe plan should include gathering important documents such as: 7. Property ownership titles.
A safe plan should include gathering important documents such as: 8. School records.
A safe plan should include gathering important documents such as: 9. Immunization records.
A safe plan should include: Arrangements made on a secure telephone and/or computer.
A safe plan should include: Consulting (seeking advice) from a lawyer.
A safe plan should include: Stashing (secretly storing) money.
A safe plan should include: Duplicating keys.
A safe plan should include: Arranging a means (way) of transportation.
A safe plan should include: Creating an action word or phrase to alert an ally (supporter) that you are leaving.
A safe plan should include: Keeping your ally's identity covert (secret).
A safe plan should include: Leaving when the abuser will least expect it.
A safe plan should include: A quick exit because this is a dangerous time.
A safe plan should include gathering the abuser's information such as: 1. Pay stubs.
A safe plan should include gathering the abuser's information such as: 2. Social Security (SS) number.
A safe plan should include gathering the abuser's information such as: 3. Bank account numbers.
A safe plan should include gathering the abuser's information such as: 4. Driver's license number.
A safe plan should include gathering the abuser's information such as: 5. Addresses of family and friends.
A safe plan should include gathering the abuser's information such as: 6. A recent photograph.
A safe plan should include gathering the abuser's information such as: 7. Credit card information.
A safe plan should include gathering the abuser's information such as: 8. Criminal history.
A safe plan should include gathering the abuser's information such as: 9. Full description of their vehicle.
A safe plan should include gathering the abuser's information such as: 10. License plate number.
A safe plan should include gathering the abuser's information such as: 11. Work address and phone number.
CHARACTERISTICS OF THE ABUSER: Most people the abuser socializes with are not going to tell them they have a: problem.
The abuser has a strong denial system and consistently blames; others for this problem.
The abuser will not voluntarily seek treatment or be motivated to: change.
The abuser needs to be in: control.
The abuser needs to dominate other people to feel: powerful and important.
The abuser has low self-esteem and is threatened by: achievement of others.
The abuser feels: insecure and inadequate.
The abuser will constantly need to: prove themselves.
The abuser will blame others for their: shortcomings and problems.
The abuser will threaten, throw temper tantrums and use: intimidating behavior.
The majority of abusers are not alcoholics but alcohol may facilitate: aggressive behavior.
TREATMENT FOR THE ABUSER: Treatment (Tx) for the abuser may be difficult but not: impossible.
Family members, friends, clergy and professionals can try to convince the abuser that they need help by performing reality therapy aka: an intervention.
Effective treatment includes: psychiatric counselling and/or group therapy.
To be effective, the treatment frequently must be mandatory and contain penalties (incarceration) for: failure to attend treatment sessions.
REPORTING ABUSE: Battering is assault and must be: reported to the authorities (police)
Assault means: attempt or threat to inflict bodily harm.
Health care providers (HCPs) must report abuse that is: suspected.
The client must be informed that suspected abuse will be: reported to the authorities (police).
Failure to report abuse or suspected abuse is a: crime.
Penalties for failure to report abuse or suspected abuse include: 1. Loss of certification.l
Penalties for failure to report abuse or suspected abuse include: 2. Fines up to $5,000.
Penalties for failure to report abuse or suspected abuse include: 3. Imprisonment up to five (5 years).
Penalties for failure to report abuse or suspected abuse include: 4. Civil liability aka a lawsuit.
If you report suspected abuse or neglect and it is unwarranted (wrong), you cannot be charged with: civil liability aka a lawsuit.
DOMESTIC VIOLENCE RESOURCES: National Domestic Violence Hotline: 1-800-799-SAFE (7233) or 1-800-799-0657
National Resource Center on Domestic Violence 1-800-537-2238
Florida Coalition Against Domestic Violence 1-850-671-3998
Sunrise of Pasco County 24-hour hotline (352) 521-3120
Hernando County Shelter & Domestic Violence Hotline (352) 799-0657
Hernando County Dawn Center Hotline (352) 686-8430
Rape, Abuse & Incest National Network 1-800-656-HOPE (4673
National Resource Center on Domestic Violence 1-800-537-2238
Health Resource Center on Domestic Violence 1-800-313-1310
Battered Women's Justice Project 1-800-903-0111 Ext. 1
National Battered Women's Law Project 1-212-741-9480
Created by: bterrelonge
Popular Medical sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards