Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

RHIA exam study questions

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
show Zero Based Budgets apply to organizations for which each budget cycle poses the opportunity to continue or discontinue services based on the availability of resources.  
🗑
What is a statement made by one party to induce another party to enter into a contract. ?   show
🗑
show Telecommuting - An opportunity for employees who cannot travel from home for reasons such as physical or personal limitations to become employed and helps resolve the problem of shortages of qualified employees in critical job functions.  
🗑
what can organizations use to offer flexibility in hours, location, and job responsibilities as a method to attract and retain employees.   show
🗑
show Quantitative standards specify the level of measurable work, or productivity, expected for a specific function. Qualitative standards specify the level of service quality expected from a function. diagnostic and procedure codes for in  
🗑
what is a Indemnification clause?   show
🗑
When the operating budget has been developed and approved. who has the responsibility of making sure budget goals are met and that all variances are explained?   show
🗑
show A review by peers with potential disciplinary action  
🗑
show The ease with which assets can be turned into cash. This is important because payroll, loan payments, and other financial obligations are typically paid in cash.  
🗑
When the project manager records a document with project objectives, scope, deliverables, expected time line, and anticipated cost this document is called..   show
🗑
what is considered "alternative work scheduling techniques"   show
🗑
the time required to recoup the cost of an investment is called the:   show
🗑
why does a leader use a Strategic Planning process?   show
🗑
show Serial work division  
🗑
Which financial statement reflects the extent to which a healthcare entities revenues exceed expenses?   show
🗑
Why is a strategy map a useful tool?   show
🗑
show Comprise 34% of the organization. Although usually not leaders, the individuals in this group represent the backbone of the organization, are deliberate in thinking and acceptance of an idea, and serve as a natural bridge between early and late adopters.  
🗑
show A project office is responsible for defining project procedures, conducting risk analysis on projects, and mentoring project managers.  
🗑
What is a component of the five functions of management.   show
🗑
What are the five functions of management   show
🗑
What is an important part of change management.   show
🗑
What are process measures?   show
🗑
What is the difference between leaders and managers.   show
🗑
show (volume x amount of time ) + any additional volumes and times / total volume required. (200*3) +(100*5) + (50*8) + (50*10) add each answer of problem in parentheses together 600+500+400+500=2,000 divide by total number of records 2,000/400=5  
🗑
What is the icon used to indicate that a formal procedure is to be carried out the same way every time in a flow chart?   show
🗑
show The balance sheet  
🗑
An action that can revoke your RHIA and RHIT credential:   show
🗑
What is a needs assessment?   show
🗑
show The range of a set of data is the difference between the highest and lowest values in the set. To find the range, first order the data from least to greatest. Then subtract the smallest value from the largest value in the set.  
🗑
show multiply the # of shelves selected by the linear inches of shelf space (usually 33) .Multiply the anticipated discharges by the # of projected years . Multiply the average thickness of the records by the #of records. divide inches needed by linear inches  
🗑
show (PMR) is the measure of mortality due to a specific cause during a specific time Period. the number of deaths due to a specific disease in a specific period in time /the total number of deaths for all cases for the same time period x 100  
🗑
How do you calculate case mix index?   show
🗑
show number of volume of work/maximum expectation per work hour. sum all answers in each category and divided by hours in each shift.  
🗑
show Total number of hospital-acquired infections for a given period/ total number of discharges including deaths for the same period x 100  
🗑
show Interrater reliability method by  
🗑
show Secure data transport  
🗑
show Bus topology is the simplest Network topology connecting one device to another along a backbone.  
🗑
show use case is a set of scenarios that describe an interaction between a user and a system  
🗑
What is the relationship between a use case and an actor   show
🗑
show Clinical data Repository  
🗑
What is the key to an effective retention and retrieval system of health records   show
🗑
What type of health information exchange architectural model is a Federated - inconsistent database   show
🗑
When an individual is allowed to accesse ePHI if he or she has a proper login and password, belongs to a specific group, and his or her workstation is located in a specific place within the facility what kind of Access Control is this   show
🗑
show Ms-drg triples, pairs, and singles  
🗑
When a patient is assigned a health record number on the first visit that is kept for all subsequent visits this is called?   show
🗑
A system that gathers data from a variety of sources and assist in providing structure and visual Tools in order to facilitate and improve outcomes and decision-making tasks is called   show
🗑
show Aggregate data is used to develop information about groups of patients  
🗑
show Data analytics  
🗑
show (OCR) optical character recognition  
🗑
show Systematic random sample  
🗑
show Person identification  
🗑
show Site visits, corporate visits, reference checks, credit checks on owners of vendor company.  
🗑
When virtually all applications are provided by a single vendor this frequently makes it easier to add new applications from that vendor but potentially even more difficult to add products from other vendors   show
🗑
show The application of e-commerce to the healthcare industry. The links to healthcare Equipment and supply vendors, providers, and health plans and the transactions for exchanging data in healthcare eligibility comma referrals, claims,  
🗑
show A bar graph  
🗑
What transmission medium is used to carry information between devices on the network   show
🗑
In interoperability standard that define specific standards needed to assist patients in making decisions regarding care and Healthy Lifestyles specifically to enable the exchange of data between patients and their caregivers than networks   show
🗑
The Daily Report used to track the many reasons that accounts may not be ready for billing   show
🗑
show One benefit of the unit filing system is that all records for both specific patient, both inpatient and outpatient, or file together  
🗑
show Relatively easy to calculate, based on the whole distribution not just a portion of it, it is not influenced by extreme values or unusual outliers in the frequency distribution  
🗑
show Enterprise Master patient indexes  
🗑
Why would abstractor be the best data conversion strategy for a physician practice that has a high rate   show
🗑
show Mainframe computers use a single large computer with many terminals directly connected to it and sharing the resources of the single computer  
🗑
show EHR extension model  
🗑
show Bar charts are used for nominal or ordinal variables  
🗑
Which graph would you use to display time trends   show
🗑
show  
🗑
What is a tool commonly used in performance Improvement to assess the level of satisfaction with a process by its customers   show
🗑
A network made accessible to trusted individuals outside of the facility is called an   show
🗑
Isn't it charge to provide clinical decision support it requires two things what are they   show
🗑
show An organization has acquired the best products from various vendors  
🗑
Implementation of all aspects of the EHR component in all organizational units virtually simultaneously   show
🗑
What is the alternative hypothesis   show
🗑
show Normalized normalization is breaking the data mitt elements into the level of detail desired by the facility for example last name and first name should be separate fields  
🗑
show Data Repository  
🗑
One of the controls for accuracy of the MPI   show
🗑
What diagram is used to plot the points of to continuous variables that may be related to each other in some way   show
🗑
show Defining the null and alternative hypothesis  
🗑
show Hospital repair reports on 94 measures of Hospital Quality Care of heart attack heart failure and pneumonia and prevention of surgical infection hospitals that report all measures receive full payment updates for Medicare  
🗑
show Star topology  
🗑
show During the implementation phase of the sdlc, a comprehensive plan for implementing the new system is developed the plan would include all plans for training managers technical staff and other end users  
🗑
show The basic terminal digit filing system contains 10000 divisions, made up of 100 sections ranging from 00 to 99 divisions within each section ranging from 00 to 99 in a terminal digit filing system that shelving units are equally divided into 100 sections  
🗑
show Mini Healthcare statistics are reported in the form of a ratio proportion or rate  
🗑
show in strategic planning discussions, they should ensure that information Services leadership is also engaged in these discussions and examine the organization's view of the role that information service technology will play in the organization future  
🗑
show Number of autopsies / the total number of deaths x 100  
🗑
show Client /server  
🗑
show Check sheet  
🗑
show Covered entities must respond to requests to access protected health information within 30 days there can be a further 30-day extension however but the first response must be within 30 days  
🗑
show Housekeeping staff  
🗑
show As important as firewalls are to the overall security of Health Information Systems, they cannot protect the system from all types of attacks many viruses for example, can hide within documents that will not be stopped buy a firewall  
🗑
What are addressable security rule implementation specifications   show
🗑
show Facility access control standard requires covered entities take control and validate a person's access to the facility including visitor control an example of this would be a visitor sign-in sheet  
🗑
show A physician who are a separate covered entities are dictating information on their private patients it would be necessary for Physicians to obtain a business associate agreement with the facility.  
🗑
show It does not identify the Carson, it does not relate to the person's past present or future physical or mental health condition, is not held by a covered entity or its business associate  
🗑
What is the business record exception   show
🗑
show Covered entities must identify and respond to suspected or known security incidents, meditate to extant practice Apple, harmful events of security incidents that are known to the covered entity and document security incidents and their outcomes  
🗑
show Facilities, programs, and Workforce members when using disclosing or requesting protected health information must make reasonable efforts to limit Phi to the minimum amount necessary to accomplish the intended purpose of the use disclosure or request  
🗑
What is a two-factor authentication system   show
🗑
How long must covered entities maintain and retain policies and procedures implemented to comply with the security rule   show
🗑
Why were the federal Rules of Evidence recently amended   show
🗑
show Facility access controls includes establishing safeguards to prohibit the physical hardware and computer system itself from unauthorized access while ensuring that proper authorized access is allowed  
🗑
show Expert determination and safe harbor are office of civil rights sanctions HIPAA Privacy Rule the identification methods  
🗑
What are the two ways to Deidentify information   show
🗑
show A fine of not more than $250,000, not more than 10 years in jail or both may be imposed  
🗑
What is the access control standard   show
🗑
What are the two required into addressable implementation specifications included in the access control standard   show
🗑
show No, if a covered entity does not maintain the entire designated record set electronically there is not a requirement that the covered entity scanned paper documents so the documents can be delivered electronically  
🗑
show They must consider their own characteristics and environment and Implement reasonable and appropriate measures to process against reasonably anticipated threats and Hazards to the security of phi  
🗑
show It is a process that provide covered entities and business associates with the structural framework upon which to build their security plan  
🗑
show Administrative safeguards comprise over half of the safeguards included in the security rule administrative safeguards are administrative actions such as policies and procedures and documentation retention  
🗑
show They are meant to manage the selection, development, implementation, and maintenance of security measures to protect ephi and manage the conduct of the covered entities or business associates Workforce  
🗑
What is the emergency medical treatment and active Labor Act   show
🗑
What is the time frame for accounting of disclosures per hitech   show
🗑
What is the administrative simplification portion of the title II of HIPAA   show
🗑
show Distinction of psychotherapy notes is important due to the HIPAA requirements that these notes may not be released unless specifically identified in an authorization  
🗑
What type of network uses a private tunnel through the internet as a transport medium that will allow the transmission of e-phi to occur between the coder and the facility's security   show
🗑
Why is the clinic practice of calling out a patient's full name not a violation of the hit of HIPAA Privacy Rule   show
🗑
show The HIPAA Privacy Rule permits reasonable cost base charges for labor Postage and supplies involved in photocopying health information for the patient and his or her personal representative  
🗑
show in healthcare related context privacy is the right of the patient to control disclosure of personal health information  
🗑
show Covered into the response to the patient by describing measures it has taken but does not guarantee that information is protected against incidental or accidental disclosure  
🗑
For research purposes what is required for authorization   show
🗑
show  
🗑
show Fundraising May Target a department of service or treating physician however if a fundraising activity targets individuals based on diagnosis prior authorization is required HITECH has strengthened fundraising requirements  
🗑
show identify the person or provide a reasonable basis to believe the person could be identified from the information given. relate to one's past, present, or future physical or mental health condition.held or transmitted by a covered entity or its business as  
🗑
show Health care providers for treatment, individual or his or her personal representative, pursuant to individuals authorization to the Secretary of HHS investigations, compliance review or enforcement, as required by law or privacy Rule compliance  
🗑
show The Stark law or federal physician self-referral statute prohibits Physicians ordering services for Medicare patients from entities which with the physician or an immediate family member has a Financial relationship  
🗑
If fundraising activities are going to benefit the covered entity   show
🗑
Who is required to receive training in PHI policies and procedures   show
🗑
show Ensuring the confidentiality integrity and availability of all eph are they create receive maintain or transmit identify hand protect against reasonably anticipated threats to security or Integrity of the information protect against reasonably anticipated  
🗑
What are the five accreditation decision categories of The Joint Commission   show
🗑
What is episode of care   show
🗑
show Long-term care hospitals must meet State requirements for acute care hospitals and must have a provider agreement with Medicare in order to receive medicare payments  
🗑
show Fiscal intermediary verify that long-term care hospitals meet the required average length of stay of greater than 25 days  
🗑
What is a charge description master   show
🗑
Why is achieving legitimate optimization important   show
🗑
show The formulary is composed of medications used for commonly occurring conditions or diagnosis treated in the healthcare organizations organizations accredited by The Joint Commission must document medications continued safety and efficacy annually  
🗑
show A program created through the Medicare monitor ization Act of 2003 to identify and recover improper Medicare payments paid to Health Care Providers on their fee for service Medicare plans  
🗑
Why is a program for evaluation payment patterns electric reports also known as pepper important to hospitals when it comes to recovery audit contractors   show
🗑
The explanation of benefits, Medicare summary notice, and remittance advice documents only part of which revenue cycle area   show
🗑
What is it called when accrediting bodies such as the Joint Commission or American osteopathic Association can survey facilities for compliance with the Medicare conditions of participation of hospitals instead of the government?   show
🗑
What is an integrated delivery system   show
🗑
Why should coding assigned by coders be compared to coating that appears on the claim   show
🗑
What should be included in a query to a physician   show
🗑
show Every state has a certain licensure regulations that Healthcare facilities must meet in order to remain in operation license regulations may include very specific requirements for the content format retention and use of patient records  
🗑
Which revenue cycle area uses an internal auditing system or scrubber to ensure they were freed claims are submitted to third-party payers   show
🗑
What is the purpose of a recovery audit contractor   show
🗑
show The Medicare summary notices or the MSN details amount billed by the provider, amounts approved by Medicare, how much Medicare reimbursed the provider, and what the patient must pay to the provider by way of deductible copayment  
🗑
show Failure to document medical necessity appropriately and insufficient or missing documentation  
🗑
What is resource-based relative value scale(RBRVS)   show
🗑
show Each resource-based relative value scale comprises of three elements physician work, physician practice expense, and malpractice, Each of which is a national average in the Federal Register  
🗑
show If the decision is not effectively communicated the result could be duplicate building that in turn could result in over payment to the facility  
🗑
show He or she is paid 95% of the Medicare fee schedule an example, the Medicare fee schedule amount is $200 the participating provider receives 160 which is 80% of 200 but that non-participating provider receives only $152 which is 95% of the $160  
🗑
According to the Medicare fee schedule if a participating provider accept an assignment how much will he or she be paid   show
🗑
show This would be called a focused inpatient review  
🗑
what is a physician champion   show
🗑
When must a history and physical be completed   show
🗑
When do facilities begin counting days in accounts receivable   show
🗑
show The Federal Trade Commission has oversight responsibility for identity theft regulations and requires financial institutions and creditors to develop and Implement written identity theft prevention programs  
🗑
show Reviewing new technology for FDA approval, outpatient prospective payment system pass through assignment, to have a coding professional check the codes from the manufacturer for accuracy  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: Leameana
Popular Health & Social Care sets