Deck 25: Secondary Analyses
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/5
Play
Full screen (f)
Deck 25: Secondary Analyses
1
Investigators who make their data available to the public expect to be coauthors on papers written by independent analysts.
False
2
A request for access to a private data set is most likely to be granted when the new researcher has some existing connection to the original researcher.
True
3
Which of the following applies advanced techniques from information science and computer science to the compilation and analysis of health data?
A) Health informatics
B) Bioinformatics
C) Clinical informatics
D) Public health informatics
A) Health informatics
B) Bioinformatics
C) Clinical informatics
D) Public health informatics
A
4
What type of projects might use data mining and computational linguistics to explore social media events?
A) Health informatics
B) Bioinformatics
C) Clinical informatics
D) Public health informatics
A) Health informatics
B) Bioinformatics
C) Clinical informatics
D) Public health informatics
Unlock Deck
Unlock for access to all 5 flashcards in this deck.
Unlock Deck
k this deck
5
What is the major limitation when using existing clinical records?
A) Data are difficult to extract.
B) Data are protected by the Health Insurance Portability and Accountability Act.
C) Records are often incomplete
D) Records require signed release from the patient.
A) Data are difficult to extract.
B) Data are protected by the Health Insurance Portability and Accountability Act.
C) Records are often incomplete
D) Records require signed release from the patient.
Unlock Deck
Unlock for access to all 5 flashcards in this deck.
Unlock Deck
k this deck