ch 12

1234567891011121314151617181920212223242526272829303132333435363738
Across
  1. 2. design (CAD) originally used by engineers and designers, had also found a place in therapeutic treatment
  2. 3. (ECG) a computerized interpretation system that produces visual pictures on a computer monitor and a printout of the electrical activity of a patient’s heart
  3. 7. handheld tablet, smartphone, or personal digital assistant (PDA)
  4. 9. categories of information stored in a database
  5. 11. computer can sit on a desktop
  6. 14. an organized collection of information.
  7. 16. stress test used for patients who cannot exercise
  8. 18. stress test a small amount of a radioactive substance such as thallium is given intravenously
  9. 19. stress test used for patients who cannot exercise
  10. 21. uses special software to perform high-speed math calculations
  11. 24. emission tomography to perform a PET scan, a slightly radioactive substance is injected into the patient and detected by the PET scanner
  12. 26. programs that contain instructions to alter the operation of the computer programs, erase, or scramble data on the computer.
  13. 28. tomography (CT) introduced in 1972, this noninvasive, computerized X-ray permits physicians to see clear
  14. 29. power supply (UPS) to protect a computer from electrical surges and power outages
  15. 30. each collection of related information
  16. 32. surgery also called computer-assisted surgery, is another major technological advance
  17. 34. stress test an ECG run while the patient is exercising usually involves walking a treadmill or riding an exercise bike until a target heart rate is reached
  18. 36. involves the use of video, audio, and computer systems to provide medical or health care services
  19. 38. this is a non invasive scanning method that uses high-frequency sound waves that bounce back as an echo when they hit differently
Down
  1. 1. computer can control the launch of a rocket to outer space
  2. 4. or light beams that can be focused precisely, are one example.
  3. 5. information exchange (HIE) allows all health care agencies to readily transfer patient electronic health records
  4. 6. a system where computers can be linked together
  5. 8. instruction (CAI) is educational computer programming designed for individualized use
  6. 10. resonance imaging (MRI) this computerized, body-scanning method uses nuclear magnetic resonance instead of X-ray radiation.
  7. 12. literacy means a basic understanding of how a computer works and the applications used in your field or profession
  8. 13. therapy uses high energy particles to decrease the size of tumors and treat cancer.
  9. 15. when a group of related records is combined, this is called a file
  10. 17. allow for rapid dispensing of medications
  11. 20. surgery (IGS) is a surgical procedure in which a surgeon uses preoperative and intraoperative images to guide or direct the surgery
  12. 22. links millions of computers throughout the world
  13. 23. computer handheld tablet, smartphone, or personal digital assistant
  14. 25. learning is an online teaching and learning environment that uses computers and the internet to allow teachers to present information and activities and, at times, even engage and interact with students
  15. 27. applied science used to promote an individuals safety and well being by adapting to the environment and using techniques to prevent injuries. Proper lighting, correct positioning of the computer keyboard and monitor, a chair that provides good support and proper posture
  16. 31. portals or secure online websites are established by a physician, health care facility, or other health care provider
  17. 33. uses technology to direct ultrahigh-frequency sound waves through the chest wall and into the heart
  18. 34. mail or e-mail, is the process of sending messages from one computer to another.
  19. 35. health record (EHR) computerized version of a patient’s medical information that may include statistical data, name, address, telephone number, insurance information
  20. 37. protective programs that limit the ability of other computers to access a computer