HL7-FHIR試験無料問題集「HL7 FHIR STU3 Proficiency 認定」

refers to an overnight stay in a health care facility, such as a hospital

____________ in the US first began as a hospital insurance plan to protect both patients and hospitals against financial instability

this woman was instrumental in transforming nursing into a recognized profession in great britain
-help establish nursing schools in the US
-having nurses led to increase efficacy in treatment and hygiene associated w/ care improved patient recovery

establishments that primarily engage in providing diagnostic and medical treatment to inpatients with a specific type of disease or medical condition (except services for psychiatric care or substance abuse)
-provide a NARROW range of services for specific med conditions
-ex. children's hospitals, rehab hospitals, orthopedic hospitals, cardiac hospitals, cancer (oncology) hospitals, and women's hospitals

these specify the patient's wishes regarding continuation or withdrawal of treatment when the patient lacks decision-making capacity; 3 types are commonly used

these were used to quarantine people who were sick w/ contagious diseases, such as smallpox and yellow fever, so the rest of the community would be protected

Flag that can be assigned by only implementers of HL7 FHIR standard
a) Constraints [Invariants]
b) IsSummary
c) Is-Modifier
d) MustSupport

this committee ensures that accurate documentation is maintained on the entire regimen of care given to each patient; oversees confidentiality issues

consists of influential business and community leaders of a hospital
-legally responsible for hospital operations
-responsible for evaluating, from a strategic standpoint, major decisions such as incurring capital expenditures for building and equipment, approving annual budgets, and monitoring performance against plans and budgets
-CEO and one or more physicians sit as voting members

Regarding authentication as it is documented in specification, two statements:
1. Other than testing systems, FHIR servers should authenticate the clients.
2. All systems shall protect authenticator mechanisms, and select the type of credential/strength of authenticator based on use-case and risk management.
a: 1&2 True
b: 1 is True and 2 is False
c: 1 is False and 2 is True
d: 1&2 False