Introduction to Computer Systems for health information technology
M P I
Master patient index
They were limited to eight monitor and keyboard, and the bare minimum of bare minimum of hardware were needed to connect to the network using the servers PC to perform oral functions.
It is the brain and performs all functions
R A M
Random access memory
R O M
Read only memory
C P U
Central processing unit
Prospective payment system
Diagnosis related groups
Specialty software used to facilitate the assessment of diagnostic and procedural codes according to the coding system
Computer software program that assigns appropriate DRG's according to the information provided for each episode of care.
R O I
Release of information
H I P P A
Health Information Portability and Accountability Act
Remain unchanged until the 1980s, when software developers created programs that allowed much of the required data to be preloaded from other program screens into the HIM programs.
Change description master
Centers for Medicare and Medicaid
hyertext markup language
fiscal intermediaries (FI's)
Are those agencies contracted by cms to process the claims for that particular area or state.
O P P S
Outpatient prospective payment system
Inpatient rehabilitation facilities
C I N A H L
Commission on Accreditation for Health Informatics and Information Management Education
The first computers in healthcare were basically processors that used
Patients use this tool to read about health issues and gain more medical knowledge on their health.
World wide web
DRG's were implemented in what year?
What is considered the brain of the standard PC?
The CPU operates with speed that is measured in
Computers speed is measured in_____and long-term memory is measured in______?
All of the following are hardware Except: Monitor, mouse, printer, database
What device would a stylus be used in conjunction with? Digital camera, microphone, PDA, scanner
The use of barcoding falls under the category of what type of input device? Docking station, printer, scanner, touch screen
The weight of a laptop computer is most attributed to the____?
The port that uses infrared waves that are directed between two devices that communicate is known as?
If you were to purchase a digital camera, which of the following would have the best resolution in pixels on this camera?
Monitor resolution is measured in____?
G H z
Typically used for an entire facility, such as applications involving E mail, network, security issues, and the Internet.
A bit is?
A basic unit of storage within a computer.
Apple, Gateway, Hewlett Packard, and Dell are examples of what within the computer world?
What computer language is more commonly used for programming on the Internet?
The computers instruction set that governs the entire functions of all processes are known as:
What would a utility program best perform within a computer?
Sometimes called a hierarchical network. The main computer is the root or the first level; the next level of computers that are connected is the second level. In the second level of the hierarchy, computers are connected from the second computer in the series. There can be other levels within this network but no other computers can be connected above the central computer or node in the hierarchy. A tree network must have three levels or else it would be a star network.
Is basically any combination of networks combined.
daisy chain network
Connecting each computer to the next in series.
The most common network set up or a LAN network. All of the cables that connect computers at any point connect to the hub or center.
Computers that are networked together are lined up on a single cable.
Token ring network
Similar to a ring or circle of cable of computers in the network.
Hundreds of networks with thousands of computers linked together to share data and information.
A private network of computers
A system that allows selected external users limited access to the private network.
The linking of components within a geographically contained area is called?
Advantages to using a CPR or E HR include all of the following except:
Application programs can be shared
Peripheral hardware can be shared.
Databases can be shared.
System Security is easier to control.
System security was easier to control
The network topography that will allow users to access portions of the network when one section is down is the