Which of the following is considered a threat to information quality?
1. An unauthorized user hacks into the system to review the clients' records
2. Not verifying information as correct prior to entry
3. An earthquake interrupts the power supply and causes data loss
4. A wireless transmission is intercepted to review a new client's records.
2
Rationale: Hackers are a threat to confidentiality. The correct response is a failure to enter data correctly which is a very serious threat to the quality of information.
You might also like to view...
Which forms of nursing documentation use the nursing process through problem-oriented charting?
a. charting by exception and critical pathways b. computerized documentation and point-of-care charting c. narrative and source-oriented charting d. SOAP (-IE, -IER) and PIE charting
A small rural hospital has been designated as a critical access hospital. It has 40 beds and an average occupancy of 34 beds. To prepare the staffing, the chief nursing officer computes the occupancy as being:
a. 90%. b. 85%. c. 75%. d. 60%.
Which statement best describes the timing of death?
1) "Death occurs after a long battle with cancer." 2) "Death can occur as a result of accident or injury." 3) "Death can occur anytime during the life cycle." 4) "Death is not grieved when it occurs after a long life."
A teacher sends a student to the school nurse because the student does not seem to be thinking clearly. The nurse notes that the student is having palpitations, as well as elevated pulse, blood pressure, temperature
Which of the following would most likely cause these symptoms? a. Alcohol b. Ecstasy (MDMA) c. Heroin d. Marijuana