Deck 7: Electronic Communication and Computers in Health Care

Full screen (f)
exit full mode
Question
When sending a fax that contains confidential information you should:

A)wait until after hours when there are fewer people at work who could read the information.
B)include a cover page that states the message is confidential.
C)call ahead and let the recipient know to be ready to receive the fax.
D)send the fax and trust that other people will maintain confidentiality.
E)All of the above
Use Space or
up arrow
down arrow
to flip the card.
Question
Blind carbon copies of e-mail messages allow a recipient to read the message and see the other e-mail addresses to which the message was sent.
Question
Which of the following are appropriate words and phrases to use when communicating with patients via telephone?

A)What's your name?
B)What do you want?
C)I'm sorry;I didn't understand.
D)What did you say?
E)All of the above
Question
Which part of a computer processes information?

A)Web browser
B)CPU
C)External hard-disk drive
D)Emoticon
E)Domain
Question
Which of the following are devices for inputting on a computer?

A)Keyboards
B)Touch screens and touch pads
C)CD-ROMs
D)USB flash drives
E)All of the above
Question
Which of the following are potential mistakes when communicating electronically?

A)Sending a text message with less than 140 characters
B)Forwarding an e-mail message to the wrong person
C)Forgetting to use an emoticon in an e-mail message
D)Attaching a file to an e-mail message
E)None of the above
Question
Some health care employers require workers to use the Internet to find information online but most do not because the majority of workers lack basic computer skills.
Question
Why do health care facilities have restrictions on the use of personal cell phones in the workplace?

A)Cell phones can cause interference with medical equipment,including ventilators and pacemakers.
B)Because not everyone can afford a cell phone,it isn't fair for some employees to use them at work while others cannot.
C)Health care employers are slow to adopt new technology including cell phones.
D)All of the above
E)None of the above
Question
When placing a caller on hold you should:

A)ask the caller if he or she can hold,and wait for the response.
B)check every thirty seconds to see if the caller wants to continue to hold.
C)ask if you may take a message.
D)transfer the call as soon as possible.
E)All of the above
Question
Texting is sending real-time,short text messages between cell phones or other handheld devices using sites such as Facebook and Twitter.
Question
When sending a business e-mail you should:

A)include short,simple,and straight-forward information.
B)proof the content for spelling and grammar mistakes.
C)use please and thank you with requests to ensure a polite tone.
D)avoid the use of all capital letters.
E)All of the above
Question
It is a good idea to download confidential patient information on a flash drive and take it home with you in case your computer at work goes down.
Question
Having become a common form of language,texting abbreviations may now be used in your e-mail and written communication at work.
Question
Which of the following promotes customer service when speaking on the telephone?

A)Answer the telephone on the first ring,if possible.
B)Use a pleasant,caring,and sincere tone of voice.
C)Identify yourself and give your title and place of employment.
D)Allow the caller to hang up first to ensure that the caller has said everything he or she wanted to say.
E)All of the above
Question
Avoid using sarcasm and humor in a business e-mail because they may lead to miscommunication or misunderstandings.
Question
When computers stop functioning properly they are said to be down and contingency plans must be activated to maintain workflow.
Question
Which of the following are examples of how computers are used in therapeutic services?

A)A computer assists paralyzed patients to walk.
B)An electrocardiogram computer prints out the electrical activity of the heart.
C)The magnetic resonance imaging (MRI) computer scans the body,producing a cross-sectional body image.
D)CT scanners visualize organs to help find tumors without surgery.
E)All of the above
Question
Which of the following are examples of how computers are used in diagnostic services?

A)Pharmacy drugs are inventoried using a computer.
B)The positron emission tomography (PET) computer produces a 3-D image that shows an organ or bone from all sides.
C)Respiratory therapy computers keep critically ill patients in homeostasis.
D)Computers in intensive care units monitor patients and warn caregivers about potentially dangerous conditions.
E)All of the above
Question
When taking a telephone message you should memorize the information so you don't have to write it down and then keep track of your notes.
Question
Which of the following are ways to protect the security of computers at work?

A)Don't change your passwords unless you are required to do so.
B)Choose a password that is easy to remember and use it to access all of your computer systems.
C)Share your password with a coworker in case he or she needs to access your computer files when you aren't at work.
D)All of the above
E)None of the above
Question
Information gathered from multiple sources that is analyzed to identify similarities and differences is called:

A)comparative data.
B)transparent data.
C)data mining.
D)a facsimile.
E)None of the above
Question
A Web browser is a:

A)group of pages on the Internet developed by a person or organization about a topic.
B)software application that allows users to locate and access Internet web pages.
C)small,mobile,hand-held computerized device.
D)worldwide computer network with information on many subjects.
E)device that sends and receives printed pages or images as electronic signals over telephone lines.
Question
An increase in the amount of time spent at the computer over the years has led to an increase in repetitive strain injuries which include carpal tunnel syndrome,bursitis,appendicitis,and tendonitis.
Question
HEDIS is a/an:

A)app for a smartphone.
B)method of maintaining homeostasis.
C)domain name.
D)organization that provides quality care guidelines.
E)early version of electronic health records.
Question
Hackers are computer experts who enjoy computer programming,and push the limits of what they can accomplish;hackers may have malicious intent.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Electronic Communication and Computers in Health Care
1
When sending a fax that contains confidential information you should:

A)wait until after hours when there are fewer people at work who could read the information.
B)include a cover page that states the message is confidential.
C)call ahead and let the recipient know to be ready to receive the fax.
D)send the fax and trust that other people will maintain confidentiality.
E)All of the above
call ahead and let the recipient know to be ready to receive the fax.
2
Blind carbon copies of e-mail messages allow a recipient to read the message and see the other e-mail addresses to which the message was sent.
False
3
Which of the following are appropriate words and phrases to use when communicating with patients via telephone?

A)What's your name?
B)What do you want?
C)I'm sorry;I didn't understand.
D)What did you say?
E)All of the above
I'm sorry;I didn't understand.
4
Which part of a computer processes information?

A)Web browser
B)CPU
C)External hard-disk drive
D)Emoticon
E)Domain
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following are devices for inputting on a computer?

A)Keyboards
B)Touch screens and touch pads
C)CD-ROMs
D)USB flash drives
E)All of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following are potential mistakes when communicating electronically?

A)Sending a text message with less than 140 characters
B)Forwarding an e-mail message to the wrong person
C)Forgetting to use an emoticon in an e-mail message
D)Attaching a file to an e-mail message
E)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
7
Some health care employers require workers to use the Internet to find information online but most do not because the majority of workers lack basic computer skills.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
8
Why do health care facilities have restrictions on the use of personal cell phones in the workplace?

A)Cell phones can cause interference with medical equipment,including ventilators and pacemakers.
B)Because not everyone can afford a cell phone,it isn't fair for some employees to use them at work while others cannot.
C)Health care employers are slow to adopt new technology including cell phones.
D)All of the above
E)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
9
When placing a caller on hold you should:

A)ask the caller if he or she can hold,and wait for the response.
B)check every thirty seconds to see if the caller wants to continue to hold.
C)ask if you may take a message.
D)transfer the call as soon as possible.
E)All of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
10
Texting is sending real-time,short text messages between cell phones or other handheld devices using sites such as Facebook and Twitter.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
11
When sending a business e-mail you should:

A)include short,simple,and straight-forward information.
B)proof the content for spelling and grammar mistakes.
C)use please and thank you with requests to ensure a polite tone.
D)avoid the use of all capital letters.
E)All of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
12
It is a good idea to download confidential patient information on a flash drive and take it home with you in case your computer at work goes down.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
13
Having become a common form of language,texting abbreviations may now be used in your e-mail and written communication at work.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following promotes customer service when speaking on the telephone?

A)Answer the telephone on the first ring,if possible.
B)Use a pleasant,caring,and sincere tone of voice.
C)Identify yourself and give your title and place of employment.
D)Allow the caller to hang up first to ensure that the caller has said everything he or she wanted to say.
E)All of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
15
Avoid using sarcasm and humor in a business e-mail because they may lead to miscommunication or misunderstandings.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
16
When computers stop functioning properly they are said to be down and contingency plans must be activated to maintain workflow.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following are examples of how computers are used in therapeutic services?

A)A computer assists paralyzed patients to walk.
B)An electrocardiogram computer prints out the electrical activity of the heart.
C)The magnetic resonance imaging (MRI) computer scans the body,producing a cross-sectional body image.
D)CT scanners visualize organs to help find tumors without surgery.
E)All of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following are examples of how computers are used in diagnostic services?

A)Pharmacy drugs are inventoried using a computer.
B)The positron emission tomography (PET) computer produces a 3-D image that shows an organ or bone from all sides.
C)Respiratory therapy computers keep critically ill patients in homeostasis.
D)Computers in intensive care units monitor patients and warn caregivers about potentially dangerous conditions.
E)All of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
19
When taking a telephone message you should memorize the information so you don't have to write it down and then keep track of your notes.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following are ways to protect the security of computers at work?

A)Don't change your passwords unless you are required to do so.
B)Choose a password that is easy to remember and use it to access all of your computer systems.
C)Share your password with a coworker in case he or she needs to access your computer files when you aren't at work.
D)All of the above
E)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
21
Information gathered from multiple sources that is analyzed to identify similarities and differences is called:

A)comparative data.
B)transparent data.
C)data mining.
D)a facsimile.
E)None of the above
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
22
A Web browser is a:

A)group of pages on the Internet developed by a person or organization about a topic.
B)software application that allows users to locate and access Internet web pages.
C)small,mobile,hand-held computerized device.
D)worldwide computer network with information on many subjects.
E)device that sends and receives printed pages or images as electronic signals over telephone lines.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
23
An increase in the amount of time spent at the computer over the years has led to an increase in repetitive strain injuries which include carpal tunnel syndrome,bursitis,appendicitis,and tendonitis.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
24
HEDIS is a/an:

A)app for a smartphone.
B)method of maintaining homeostasis.
C)domain name.
D)organization that provides quality care guidelines.
E)early version of electronic health records.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
25
Hackers are computer experts who enjoy computer programming,and push the limits of what they can accomplish;hackers may have malicious intent.
Unlock Deck
Unlock for access to all 25 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 25 flashcards in this deck.