Regardless of whether your office has EHR software or not, you must employ best practices for safe computer use. There are a number of considerations for security. Which of the following is not considered best practice for computer security?
A) ?placing printers, fax, copier, etc. in high-traffic and visual sight areas
B) using passwords for each computer and software application, and set applications to log off automatically if inactive for a specified period of time
C) backing up data to ensure integrity from loss, disaster, human error, hard-drive error, virus, or equipment damage
D) using encryption
A
You might also like to view...
You are transporting a child with a small laceration to his leg, sustained after cutting himself of a piece of broken glass. During transport, you observe a pulse oximeter reading of 87% on the frantic, crying, and actively moving child. The child is alert and oriented with a normal pulse and respiratory rate with pink skin that is warm to touch. Your immediate action would be to:
A) start positive pressure ventilation with supplemental oxygen. B) attempt to calm the child and obtain another SpO2 reading. C) apply high-concentration oxygen via nonrebreather. D) check the laceration for uncontrolled bleeding.
In 2005, much like the Madrid bombings, ____'s public subway system was the location for a series of coordinated attacks.
A. London B. New York C. Tokyo D. Moscow
Otitis externa, also known as ________ ear, is an inflammation of the outer ear.
A. cauliflower B. sailor's C. swimmer's D. corn
____________________ attacks the immune system, leading to susceptibility to opportunistic infection
Fill in the blank(s) with correct word