When describing the various biometric methods for authentication, which of the following would the nurse identify as most secure?
A) Fingerprint
B) Voiceprint
C) Retinal scan
D) Iris scan
Question 2
A group involved in adopting healthcare information technology is developing a strategic plan. Which of the following would they include?
A) Plan that covers 2 to 3 years
B) Structured guide that does not change
C) Expenditures offset by patient outcomes benefits
D) Demonstration of a slight return on investment