BAYELSA STATE COLLEGE OF HEALTH TECHNOLOGY, OTUODIGI, OGBIA-TOWN
SCHOOL OF ALLIED MEDICAL SCIENCES
DEPARTMENT OF HEALTH INFORMATION MANAGEMENT TECHNOLOGY
SECOND SEMESTER CONTINUOUS ASSESSMENT FOR 2024/2025 ACADEMIC SESSION
COURSE TITLE: DATA SHARING, DISSEMINATION AND USEe
COURSE CODE: HIM 424
OBJECTIVE QUESTIONS ONLY
(30 MARKS)
INSTRUCTION: No student is allowed for multiple attempts/ submissions of the test. Multiple submission is equivalent to outright failure.
Use capital letters to fill in your details in the appropriate fields and wait for further directives. To start the test students are to click the "START" button.
1.
Which of the following are benefits of data documentation?
2.
The term for the financial aspects and considerations involved in facilitating and supporting the sharing of data between entities is called
3.
Which of the following best describes a data sharing agreement?
4.
The process of retrieving data from various sources is called
6.
Which of the following is NOT a step in data extraction?
7.
Which step comes first in the data extraction process?
8.
. What is a major goal of data confidentiality?
9.
The protection of personal information and ensuring that individuals have control over their own data is refers to as
10.
The principle of data security that focuses on protecting sensitive information from unauthorized access and disclosure is refers to as
11.
Why is data security important?
12.
Which of the following are threats to data security?
13.
What is the primary purpose of a data sharing plan?
14.
Which of the following is NOT related to data sharing financing?
15.
The process of recording and maintaining detailed information about the data being collected, processed, and stored called?
16.
The practice of making data available to other individuals, organizations, or systems is called
17.
What is the full form of WWW?
18.
Ctrl + C is the shortcut for which of the following actions?
19.
The practices, technologies, and policies implemented to protect data from unauthorized access, alteration, disclosure, and destruction is refers to as
20.
What is the primary purpose of data encryption?
21.
Which of the following is a type of data extraction?
23.
The practices, technologies, and policies implemented to protect data from unauthorized access, alteration, disclosure, and destruction is refers to as
24.
One of the main benefits of data extraction?
27.
Which of the following is NOT a technique for data protection?
28.
Which of the following shortcuts is used to save a document?
29.
The technique that converts data into a coded format to prevent unauthorized access is called
30.
Which of the following is NOT a benefit of data sharing to caregivers?