BAYELSA STATE COLLEGE OF HEALTH TECHNOLOGY, OTUODIGI, OGBIA-TOWN
SCHOOL OF ALLIED MEDICAL SCIENCES
DEPARTMENT OF HEALTH INFORMATION MANAGEMENT TECHNOLOGY
SECOND SEMESTER CONTINUOUS ASSESSMENT FOR 2024/2025 ACADEMIC SESSION
COURSE TITLE: DATA SHARING, DISSEMINATION AND USEe
COURSE CODE: HIM 424
OBJECTIVE QUESTIONS ONLY
(30 MARKS)
INSTRUCTION: No student is allowed for multiple attempts/ submissions of the test. Multiple submission is equivalent to outright failure.
Use capital letters to fill in your details in the appropriate fields and wait for further directives. To start the test students are to click the "START" button.
1.
The practice of making data available to other individuals, organizations, or systems is called
2.
Why is data security important?
3.
Which of the following best describes a data sharing agreement?
4.
One of the main benefits of data extraction?
5.
Which of the following is NOT a technique for data protection?
6.
Which of the following shortcuts is used to save a document?
7.
The technique that converts data into a coded format to prevent unauthorized access is called
9.
Ctrl + C is the shortcut for which of the following actions?
10.
The practices, technologies, and policies implemented to protect data from unauthorized access, alteration, disclosure, and destruction is refers to as
11.
Which of the following is a type of data extraction?
12.
What is the full form of WWW?
13.
Which step comes first in the data extraction process?
14.
The principle of data security that focuses on protecting sensitive information from unauthorized access and disclosure is refers to as
15.
The protection of personal information and ensuring that individuals have control over their own data is refers to as
17.
Which of the following are benefits of data documentation?
18.
Which of the following is NOT related to data sharing financing?
20.
The term for the financial aspects and considerations involved in facilitating and supporting the sharing of data between entities is called
22.
What is the primary purpose of a data sharing plan?
23.
What is the primary purpose of data encryption?
24.
The process of recording and maintaining detailed information about the data being collected, processed, and stored called?
25.
The process of retrieving data from various sources is called
26.
The practices, technologies, and policies implemented to protect data from unauthorized access, alteration, disclosure, and destruction is refers to as
27.
Which of the following is NOT a step in data extraction?
28.
Which of the following is NOT a benefit of data sharing to caregivers?
29.
. What is a major goal of data confidentiality?
30.
Which of the following are threats to data security?