Deck 25: Secondary Analyses
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/5
العب
ملء الشاشة (f)
Deck 25: Secondary Analyses
1
Investigators who make their data available to the public expect to be coauthors on papers written by independent analysts.
False
2
A request for access to a private data set is most likely to be granted when the new researcher has some existing connection to the original researcher.
True
3
Which of the following applies advanced techniques from information science and computer science to the compilation and analysis of health data?
A) Health informatics
B) Bioinformatics
C) Clinical informatics
D) Public health informatics
A) Health informatics
B) Bioinformatics
C) Clinical informatics
D) Public health informatics
A
4
What type of projects might use data mining and computational linguistics to explore social media events?
A) Health informatics
B) Bioinformatics
C) Clinical informatics
D) Public health informatics
A) Health informatics
B) Bioinformatics
C) Clinical informatics
D) Public health informatics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 5 في هذه المجموعة.
فتح الحزمة
k this deck
5
What is the major limitation when using existing clinical records?
A) Data are difficult to extract.
B) Data are protected by the Health Insurance Portability and Accountability Act.
C) Records are often incomplete
D) Records require signed release from the patient.
A) Data are difficult to extract.
B) Data are protected by the Health Insurance Portability and Accountability Act.
C) Records are often incomplete
D) Records require signed release from the patient.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 5 في هذه المجموعة.
فتح الحزمة
k this deck

