Professional Documents
Culture Documents
Comp14 Unit5 Self Assess
Comp14 Unit5 Self Assess
Self-assessment
4. Which type of EHR hardware platform requires that most of its business logic
take place on a desktop PC?
a. Thick client
b. Thin client
c. Web based
d. Citrix
This material (Comp14_Unit5) was developed by Columbia University, funded by the Department of Health and Human Services,
Office of the National Coordinator for Health Information Technology under Award Number 1U24OC000003.
5. Which type of EHR hardware platform may use online document processors
as opposed to the traditional software?
a. Thick client
b. Thin client
c. Web based
d. Citrix
8. For items i-vi, match the type of database with its component using either
response a or b.
a. Relational database
b. Hierarchical database
i. SQL Server:
ii. PureXML
iii. Structured as formally-described tables:
iv. Structured tree-like with branching:
v. Oracle:
Health IT Workforce Curriculum Special Topics in Vendor-Specific Systems
Version 3.0 / Spring 2012 System and Database Architectures Used in Commercial EHRs
This material (Comp14_Unit5) was developed by Columbia University, funded by the Department of Health and Human Services,
Office of the National Coordinator for Health Information Technology under Award Number 1U24OC000003.
vi. Intersystems-Cache:
9. Based upon the EHR system reviews in unit 5, which EHR system uses
software that is centered around the MUMPS/Cache database?
a. Epic
b. Eclipsys
c. Quadramed
d. NextGen
e. eClinicalWorks
10. Based upon the EHR system reviews in unit 5, which EHR system uses
software that is centered around SQL Server database?
a. Epic
b. Eclipsys
c. Quadramed
d. NextGen
e. eClinicalWorks
11. Identify FOUR (4) recommended EHR security measures according to the
AHIMA e-HIM work group on Security of Personal Health Information.
12. Which of the following is/are benefit(s) of audit logs of an EHR system?
a. Allows the client to know when the system is used most.
b. Allows the client to know who uses the system and how often.
c. Allows the client to access audit logs to enhance information security.
d. a and b only
e. All of the above
This material (Comp14_Unit5) was developed by Columbia University, funded by the Department of Health and Human Services,
Office of the National Coordinator for Health Information Technology under Award Number 1U24OC000003.