This work is funded by the National Science Foundation Advanced Technological Education Grant 1003223 The CAHIMS Exam Preparation Course and the CAHIMS exam are the result of collaboration between the Life Science Informatics Center at Bellevue College and the Healthcare Information and Management Systems Society (HIMSS). Significant content found in the CAHIMS Exam Preparation Course stems from the Office of the National Coordinator for Health Information Technology. Creation of the CAHIMS Exam Preparation Course and the CAHIMS exam was made possible through support from the National Science Foundation (NSF). Curriculum Team: Margaret Schulte, DBA Michèle Royer, PhD Nathan Savage, MLIS This work is funded by the National Science Foundation Advanced Technological Education Grant 1003223 Section 2 - Technology Environment Lesson 2.5 - Systems Architecture and Components Assessment Questions Answer Key Lectures 1, 2 & 3 1. The motherboard is made up of circuitry and thousands of copper wires known as __________. a. binary code b. RAM *c. buses d. chips Answer: c. Lecture(s)/Slide(s): 1/6 2. The CPU improves its performance through the implementation of one or more __________, which is made up of one or more __________. a. CPUs, fetches *b. processes, threads c. cores, execute operations d. states, tasks Answer: b. Lecture(s)/Slide(s): 3/15 3. A(n) __________ jack is used to connect a network cable to a network interface card. a. RJ-11 b. 802.11N *c. RJ-45 d. Either A or C Answer: c. Lecture(s)/Slide(s): 2/8 This work is funded by the National Science Foundation Advanced Technological Education Grant 1003223 Page 1 4. Hard disk storage is known as __________ storage. *a. secondary b. volatile c. RAM d. primary Answer: a. Lecture(s)/Slide(s): 2/13 5. The operating system is stored __________. a. in RAM when the computer is running b. on the hard disk *c. Either A or B d. None of the above Answer: c. Lecture(s)/Slide(s): 2/12, 13 6. What is a CT scan? a. A nuclear medicine imaging device that produces a 3-D image. b. A device that creates an image based on sound waves. *c. An x-ray, using specialized equipment, that takes cross-sectional pictures of the body. d. Magnetic imaging equipment that uses a radio frequency pulse to create an image. Answer: c. Lecture(s)/Slide(s): 1/17 7. What is an MRI? a. A nuclear medicine imaging device that produces a 3-D image. b. A device that creates an image based on sound waves. c. An x-ray, using specialized equipment, that takes cross-sectional pictures of the body. *d. Magnetic imaging equipment that uses a radio frequency pulse to create an image. Answer: d. This work is funded by the National Science Foundation Advanced Technological Education Grant 1003223 Page 2 Lecture(s)/Slide(s): 1/20 8. In the binary number “01011010”, the rightmost value of “0” is a placeholder for __________. *a. 20 b. 21 c. 22 d. 27 Answer: a. Lecture(s)/Slide(s): 2/20, 21 9. How does data differ from information? a. Data has limited meaning, depending its storage location. b. Information is the same as data. *c. Data has no meaning on its own merit. d. None of the above. Answer: c. Lecture(s)/Slide(s): 3/18 10. Roughly how much storage does a chest x-ray require? a. 35 megabits b. 20 megabits c. 30 megabytes *d. 20 megabytes Answer: d . Lecture(s)/Slide(s): 2/23 Lectures 4, 5 & 6 11. There are two types of software: application and __________ software. *a. System b. Multimedia c. Process d. Utility This work is funded by the National Science Foundation Advanced Technological Education Grant 1003223 Page 3 Answer: a. System software is the software that manages the hardware and its interactions with software. Application software is everything else—the software that users directly use. Lecture(s)/Slide(s): 4/3 12. Which of the following is NOT a form of software that is free? a. Public Domain b. Open Source *c. Packaged d. Freeware Answer: c. Packaged software is for purchase. Lecture(s)/Slide(s): 4/4 13. Which of the following is an example of business software? a. Video games b. Electronic medical records c. Recipe manager *d. Project management software Answer: d. Project management software is used by businesses. Lecture(s)/Slide(s): 4/5-9 14. Which of the following is NOT true about an operating system? a. It is a set of programs that coordinate all activities of hardware resources. b. It is the layer between the application software and the hardware. c. It is unique to each individual computer hardware system. *d. There is only one operating system available for all computers. Answer: d. There are multiple operating systems available—for example, Windows 7 and Mac OSX. Lecture(s)/Slide(s): 5/4 15. A __________ interface is one where the user types in all the commands. *a. Command line b. Graphical User c. BIOS d. Windows This work is funded by the National Science Foundation Advanced Technological Education Grant 1003223 Page 4 Answer: a. Command line interfaces use only the keyboard for interactive input; there are no mouse interactions. Lecture(s)/Slide(s): 5/7 16. Operating systems use __________ to provide the illusion of a large memory. a. Physical memory b. Permanent memory *c. Virtual memory d. RAM Answer: c. Virtual memory is larger than physical memory. Lecture(s)/Slide(s): 5/13 17. A(n) __________ is a way of organizing files and their data. a. Operating system b. File manager c. BIOS *d. File system Answer: d. File systems manage files and documents on a system. Lecture(s)/Slide(s): 6/3 18. When a hard disk drive is being accessed, the __________ spins and the __________ moves until the head is over the proper location on the disk. a. Spindle, arm *b. Platter, arm c. Head, arm d. Arm, head Answer: b. The platter is the disk that spins, the arm has the head where the disk is read. Lecture(s)/Slide(s): 6/17 This work is funded by the National Science Foundation Advanced Technological Education Grant 1003223 Page 5 19. __________ is an open source version of Unix. a. Windows XP b. Mac OS X *c. Linux d. Linus Answer: c. Linux is an open source version of Unix developed by Linus Torvalds. Lecture(s)/Slide(s): 5/23 20. Copying software from a friend is always okay. a. True *b. False Answer: b. False. Software that is copyrighted cannot be copied and shared. Lecture(s)/Slide(s): 4/29 21. The device driver for your printer will probably need to be updated when you do a major upgrade of your operating system. *a. True b. False Answer: a. True. Device drivers are unique to a computer architecture and to the operating system. A major upgrade of an operating system is enough of a change that a new device driver is needed. Lecture(s)/Slide(s): 5/9 22. Programming languages have __________, just like natural languages. a. Code *b. Syntax c. Meaning d. Greetings Answer: b. Programming languages have keywords, statements and rules, similar to natural languages. Lecture(s)/Slide(s): 4/3 This work is funded by the National Science Foundation Advanced Technological Education Grant 1003223 Page 6 Lectures 7, 8, 9, 10 & 11 23. __________ is an example of a third generation programming language. *a. FORTRAN b. SQL c. Machine code d. Assembly language Answer: a. FORTRAN is a high level language that is consider a 3rd generation language. Lecture(s)/Slide(s): 7/14, 17 24. Which of the following programming languages was developed specifically for healthcare applications? a. Java b. C++ *c. MUMPS d. Python Answer: c. MUMPS was developed in the 1960s for healthcare applications. Lecture(s)/Slide(s): 7/20 25. __________ are programming constructs that store data. a. Assignments *b. Variables c. Expressions d. Control structures Answer: b. Variables store data in programs. The value stored in the variable can change; hence, the name variable. Lecture(s)/Slide(s): 9/5 26. The __________ data type in Java is used for storing whole numbers. a. float b. char *c. int d. Boolean Answer: c. Integers (whole numbers) This work is funded by the National Science Foundation Advanced Technological Education Grant 1003223 Page 7 Lecture(s)/Slide(s): 9/7 27. __________ are control structures that allow code to repeat. *a. Loops b. If statements c. Assignments d. Objects Answer: a Loops are sections of code that repeat. If statements execute conditionally, but only once. Lecture(s)/Slide(s): 10/10 28. In Object Oriented Programming, __________ and __________ are stored together. a. integers, floating point numbers b. functions, procedures *c. data, methods d. objects and classes Answer: c. Objects are composed of instance variables (data) and methods. Lecture(s)/Slide(s): 11/4 29. __________ provides information hiding in Object Oriented Programming. *a. Encapsulation b. Inheritance c. Polymorphism d. Expressions Answer: a. Encapsulation allows data to be “private” and details of methods to be hidden. Lecture(s)/Slide(s): 11/11 30. MIIS is a language that was developed for healthcare applications. *a. True b. False Answer: a. MIIS is one of the languages created by Neil Pappalardo for healthcare applications. This work is funded by the National Science Foundation Advanced Technological Education Grant 1003223 Page 8 Lecture(s)/Slide(s): 7/20 31. Java uses a hybrid approach of compiling and interpreting. *a. True b. False Answer: a. Java compiles programs to byte code which are then interpreted by the Java Virtual Machine. Lecture(s)/Slide(s): 8/8 32. The equal sign is the assignment operator in Java. *a. True b. False Answer: a. The equal sign is used for assigning values to variables. Lecture(s)/Slide(s): 9/9 33. Classes and objects are exactly the same things. a. True *b. False Answer: b. Classes are the definition of a data type; objects are created of this data type when the program run Lecture(s)/Slide(s): 11/5 Lectures 12, 13 & 14 34. A wired network connection requires the use of: a. NIC, WAP, switch, router. b. Wireless NIC, WAP, router *c. NIC, copper cabling, switch, router. d. NIC, WAP, switch. Answer: c. Lecture(s)/Slide(s): 12/10 This work is funded by the National Science Foundation Advanced Technological Education Grant 1003223 Page 9 35. __________ is the highest number of bits that can be sent across the media at any one time. a. Mbps b. Throughput c. Goodput *d. Bandwidth Answer: d. Lecture(s)/Slide(s): 12/11 36. A __________ IP address can change when you reboot your ISP device. *a. dynamic b. static c. DNS d. public Answer: a. Lecture(s)/Slide(s): 12/18 37. The __________ is used by switches for intranet communications and has no meaning outside of that local network. a. IP address b. subnet mask c. HTTP protocol *d. MAC address Answer: d. Lecture(s)/Slide(s): 13/7 38. A domain name is an identification label that defines a realm of administrative autonomy, authority, or control on the Internet, based on the __________. *a. Domain Name System b. IEEE 802.3 standard c. Whitehouse d. ICANN Answer: a. Lecture(s)/Slide(s): 13/11 This work is funded by the National Science Foundation Advanced Technological Education Grant 1003223 Page 10 39. In Windows peer-to-peer networking, a workgroup is simply a __________. a. domain name b. server concept *c. name for the network d. protocol Answer: c. Lecture(s)/Slide(s): 14/5 40. Medical implants use __________ technology to relay information from inside a patient’s body to a receiver. a. WiMAX b. Ethernet *c. Bluetooth d. CAT 5e Answer: c. Lecture(s)/Slide(s): 14/25 This work is funded by the National Science Foundation Advanced Technological Education Grant 1003223 Page 11