Preview

Multiple Choice Questions about Medisoft

Good Essays
Open Document
Open Document
484 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Multiple Choice Questions about Medisoft
1 Which of these is a collection of related pieces of information? A) provider network B) disk C) file D) database

2 Transactions are entered in Medisoft via the A) File menu B) Reports menu C) Tools menu D) Activities menu

3 In Medisoft, what are the shortcuts for frequently used menu commands? A) tabs B) buttons C) clickers D) markers

4 Medisoft will ask for a confirmation before A) adding data B) editing data C) saving data D) deleting data

5 Most dates are entered in Medisoft using the ____ format. A) MMDDCCYY B) MMDDYY C) CCYYMMDD D) DDMMCCYY

6 How many different methods of changing the date in the program are available in Medisoft? A) zero B) one C) two D) three

7 Which of the following is not a type of help in Medisoft? A) built-in B) online C) physician contacts D) hints

8 The extra copy of data files made at a specific point in time is known as A) restored data B) backup data C) saved data D) packed data

9 Which of the following is a feature provided by Medisoft to assist in maintaining data files stored in a system? A) purge data B) recalculate balances C) rebuild indexes D) all of the above

10 The process of deleting files of patients who are no longer seen by a provider in a practice is called A) purging data B) rebuilding indexes C) recalculating balances D) packing data

11 What determines which areas of the program a particular user can access, and whether that user can only view data or has rights to enter or edit data? A) access rights B) employee level C) physician status D) all of the above
1 A database is a collection of related pieces of information. A) True B) False

2 In Medisoft, commands can be issued only by clicking options on the menus. A) True B) False

3 The toolbar contains a series of buttons with icons that represent the most common activities performed in Medisoft. A) True B) False

You May Also Find These Documents Helpful

  • Satisfactory Essays

    5. Defining will have to be documented whenever anyone needs a change. Levels of access can be done through the administrator for object level changes by setting different levels of permissions such as read-write-full access or no access.…

    • 257 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Hollis IS3230 Unit 3 Lab3

    • 766 Words
    • 4 Pages

    2. Describe one way to help prevent unauthorized users from logging onto another person’s user account and accessing his/her data.…

    • 766 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Which of the following is not a feature of the file system that might be used with a hard disk drive?…

    • 957 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Nt1210 Chapter 1 Review

    • 1315 Words
    • 6 Pages

    8. Which of the following is not a feature of a file system that might be used with a hard disk dirve?…

    • 1315 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    CHAPTER3 REVEIW

    • 527 Words
    • 3 Pages

    9. Which of the following are some of the important features supplied by files as defined by a computer OS (choose 3)…

    • 527 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tells the computer what to do 5. Produces a hard copy 8. Data is stored off site here…

    • 329 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    During operation, the system uses the access control rules to decide whether access requests consumers shall be approved or disapproved. Resources include individual files or items data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the…

    • 711 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Name two parameters that you can set to enhance the access control to the system.…

    • 668 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    D) Active Directory Rights Management Services can control what a user is allowed to do with data on a server. You can control printing, copying, transferring and so on.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Bsat 303 Final Study Guide 1

    • 4353 Words
    • 23 Pages

    o Data management component – stores and maintains the information that you want your DSS to…

    • 4353 Words
    • 23 Pages
    Powerful Essays
  • Good Essays

    Procedures for purging the computerized data base of archaic or inaccurate data should be established and the patient and physician should be notified before and after the data has been purged. There should be no mixing of a physician’s computerized patient records with those of other computer service bureau clients. In addition, procedures should be developed to protect against inadvertent mixing of individual reports or segments thereof.…

    • 690 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    3. There is a proper management of files because they are stored at the same place; files are easier to find.…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Digital Forensics

    • 672 Words
    • 3 Pages

    MSDN- The data is all linked together so it can all be managed from one header and all the files are managed by the range lock sector which is located separate of the header so it can see the changes made to the files to see if anyone is trying to tamper with digital…

    • 672 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Record Controls

    • 747 Words
    • 2 Pages

    Small, medium, and large facilities stated that the biggest issues for record management are that files are sometimes misfiled. Most of the smaller facility stated that there was not a problem with the circulation, and tracking of patient records, because they did not circulate the patient’s records. This would help the facilities in not losing information out of patient files, or losing the entire file. Small and medium facilities mainly kept files in the facility or in a locked storage area. Any filing systems rate of success or failure of the systems are determined by the employees and training on the systems in place. In order for the security systems that a facility has set, to be a success all of…

    • 747 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Fundamentals of Computer

    • 3949 Words
    • 16 Pages

    1. Multimedia applications are multimedia presentation, foreign language learning, multimedia Kiosk and …multimedia books, e books, digital library, video games, animation films & virtual shops……

    • 3949 Words
    • 16 Pages
    Powerful Essays

Related Topics