Nursing Informatics CH 1-4

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Information is defined as which of the following? 1. The management and processing of facts 2. Interpreted data 3. A collection of numbers, characters, or facts that are needed for analysis and possible action 4. A synthesis of data derived from several sources to produce a single concept or idea

2

The Informatics Nurse Specialist is an integral member of the health care team with the expertise to: 1. Create a vision of what is possible in the specialty of informatics. 2. Create standardized nursing languages. 3. Create interactive web sites . 4. Create strategic plans for hardware improvement

2

Which of the following is not an e-mail organizational domain? 1. .edu 2. .ca 3. .govn 4. .org

3

Cookie/web cookies

A WWW phenomenon in which a visited site send a piece of data to the users computer and reads it the next time the use visits the site

Wide area network (WAN)

A computer network that encompasses a wide geographic area.

Computer freeze

A situation in which the computer decides to ignore any input from a user.

Intranet

Networks which are accessed using a web browser, but are only available to users within a specific organization.

Home page

(1) The document displayed when the computer named in the URL is accessed (the name of the computer is the letters between either the double forward slash or the www. and the first single forward slash)

A set of instructions that communicates with the computer and tells it what to do is called which of the following? 1. Software 2. Manual 3. Hardware 4. Input devices

1

Health care information plans include adding super users to the hospital staff. Which person is most appropriate for this role? 1. An experienced staff nurse who has been employed at the institution for three years 2. An informatics nurse specialist with a master's degree and informatics certification 3. A newly hired charge nurse who has practiced for ten years in an intensive care unit 4. A clinical nurse specialist for three departments, employed at the institution for six years

1

In which instance is using the technique of data mining most appropriate? 1. To document quality improvement when problems are identified and targeted on a medical-surgical unit 2. To find the appropriate treatment for a client with advanced lung cancer 3. To identify an appropriate diagnosis for a client with undetermined signs and symptoms 4. To assist in the determination of the correct dose of medication to give a client in congestive heart failure

1

In which way does medical informatics overlap with nursing informatics? 1. Medical and nursing informatics focus on the areas of information retrieval. 2. Medical and nursing informatics focus on patients' families. 3. Medical and nursing informatics focus on hospital complications. 4. Medical and nursing informatics focus on hospital complications.

1

No agreement exists among health care groups in the United States regarding a common electronic data interchange (EDI) standard. This statement is true because of which of the following? 1. Experts have not yet finished the discussion phase leading to an agreement. 2. There is an agreement among health care groups because there is no need for a common EDI. 3. Agreements are part of the national health care reform initiative. 4. Health groups have isolated databases while working toward unification.

1

The best teaching method to assure nurses are competent with laptops and handheld devices is which of the following? 1. A class based on relevant learning objectives with student demonstration of competence. 2. Point-of-care orientation 3. Online orientation 4. Written directions found in a central location

1

The nurse understands that nursing informatics is recognized as a specialty area of practice by which statement? 1. Research priorities for nursing informatics include the development of a standard nursing language and the development of databases for clinical information. 2. A formal educational program at the master's level must be completed before a nurse is eligible to sit for the credentialing examination. 3. As a differentiated practice, nursing informatics is focused upon the client, the environment, health, and the nurse. 4. There is a need for nursing informatics interests to gain representation by work groups and organizations within the United States.

1

There are many Internet websites available for searching health care related questions. Web portals are specialized websites that personalize features for individual users. Which best describes how a Web portal can individualize user information? 1. A website that requests the user to register and then sign in each time upon entering 2. A website that provides a home page with general information about the organization 3. A website that uses the HyperText Markup Language (HTML) to display its pages 4. A website that offers specialized search engines for searching out information

1

Which example best fits the description of a local area network (LAN)? 1. One server communicates with multiple PCs and printers 2. Office computers are connected through the use of the Internet 3. Client computers are interconnected with multiple servers 4. Internet technology is used to communicate with hospital suppliers

1

Which statement indicates the appropriate level of informatics competencies to the correct nurse? 1. A nurse informatics specialist extrapolates data to develop best practice model for indwelling catheter care. 2. The novice nurse using a spreadsheet to document medication reactions. 3. An experienced staff nurse creates databases employing SNOMED. 4. A beginning nurse utilizes the Internet to integrate multidisciplinary languages.

1

Which statement regarding pressures that drive the health care delivery system today is not accurate? 1. The current and projected nursing shortage may be eliminated by instituting technology enhancements in the acute care setting. 2. Evidence-based practice is supported with technology that enables the health care provider to utilize up-to-date research findings. 3. Medication errors and adverse events may be reduced with the implementation of computerized physician order entry (CPOE). 4. Managed care may utilize disease management to identify clients with chronic conditions, and treat them effectively to minimize complications and cost.

1

Which of the following examples demonstrate how nursing informatics helps to support nursing practice? Standard Text: Select all that apply. 1. Quick access to computer-archived patient data from previous encounters 2. Computer-generated client documentation including discharge instructions 3. Computer-generated nursing care plans and critical pathways 4. Tools to assist consumers in assuming greater responsibility for payment for services 5. Prompts that appear during documentation to ensure comprehensive charting

1,2,3,5

Nodes

1.) A computer that is connected to a network. 2.) A piece of hardware that sends wireless signals. Often used to repeat signals so the wireless network can be accessed in different areas.

A disadvantage to the utilization of the electronic medical record (EMR) includes which of the following? 1. Accessibility from several different locations simultaneously and by different levels of providers 2. The intensive training in the beginning needed to prepare staff members to use the EMR 3. Less time available for client care because more time is required for documentation activity 4. Inability to incorporate diagnostic images into the EMR because of space limitations

2

A nurse manager wishes to hire a new nurse who has just graduated from nursing school. At the beginning level of informatics competencies, the nurse should be able to do which of the following? 1. Attain informatics nurse certification within six months of beginning practice. 2. Input vital signs and intake and output data in the electronic medical record. 3. Utilize the Internet to review trends in health care information technology. 4. Use an electronic spreadsheet to create staffing rotations.

2

In which instance is using a wireless device an advantage for health care provider staff? 1. More memory is needed to input data for glucose monitoring and insulin coverage. 2. Error reduction is needed to input data, such as vital signs from a client's isolation room. 3. A larger screen is needed to track data, such as medication administration times with vital signs. 4. An increase in security is needed to prevent physician orders from being intercepted on the Intranet.

2

Many workstations house clinical information systems and provide Internet access in the acute care setting. Which type of software program is most likely to be used by the health care staff providing direct patient care? 1. A programming language such as Java to access the Internet 2. A virus checker to increase security for Internet connections 3. A programming language such as COBOL to create databases 4. A programming language such as Visual Basic to enter data

2

Mrs. Jones is admitted to the medical-surgical unit with acute shortness of breath and substernal chest pain that she has experienced for several days. The nurse asks her why she did not contact her primary care provider sooner and she responded, "The website that I checked said that I had an allergy." What is the best response to Mrs. Jones? 1. "You are right. The information on the Internet is fairly accurate." 2. "Mrs. Jones, not all websites are accurate and you should check to make sure they were created by a reputable source." 3. "The Internet has a great deal of accurate information." 4. "Why would you check the Internet first?"

2

Nurses need to become skilled at using patient-centered IT tools to access information that can expand their knowledge in a just-in-time, evidence-based approach. Which one of these answers best indicates the nurse is functioning as a knowledge worker? 1. The nurse assumes the role of knowledge user. 2. The nurse shifts from primarily using critical thinking to also using critical synthesis. 3. The nurse assumes the roles of data gatherer and information user. 4. The nurse utilizes computerized assessment and documentation forms, including prompts.

2

Technology has been useful in reducing errors by assisting the health care team to identify the patient before rendering care. The most common way for nurses to identify patients using technology is through which of the following? 1. Handheld devices 2. Use of barcodes 3. Use of computers on wheels 4. Reviewing patient monitors

2

The primary disadvantage to client/server technology is which of the following? 1. Cost 2. Vulnerability 3. Computer education 4. Staff resistance to change

2

The role of the informatics nurse does not include assessing the usability of devices for health care consumers. This statement is false because of which of the following reasons? 1. The informatics nurse approves the usability of devices. 2. The development of policy regarding usability is an important part of the informatics nurse's role. 3. The informatics nurse is concerned more with the actual device than the usability. 4. The informatics nurse's role is to work only with the nursing staff and not patients.

2

The American Nurses Credentialing Center (ANCC) incorporated the foundation provided by the American Nurses Association (ANA) in its definition of nursing informatics and scope and standards of practice. Applicants for the Informatics Nurse credentialing examination are required to meet which of the following minimum criteria? Standard Text: Select all that apply. 1. Advanced graduate education in nursing informatics (or related field) 2. Equivalent of two years of full-time professional practice 3. Professional clinical practice for at least 500 hours 4. Baccalaureate or higher degree in nursing (or relevant field baccalaureate) 5. Current, active license as a professional nurse

2,4,5

Data verification techniques are important to ensure data accuracy. For which of the following clients is data verification most difficult? 1. A client who is visually impaired can verbalize which data are correct and incorrect. 2. A client who is hard of hearing can read and confirm printouts of entered data. 3. A client who does not speak English can point to the screen to verify correct data. 4. A client who is unable to read can affirm verbally that the information is correct.

3

Which of the following is a result of the shift toward evidence-based practice in health care? 1. Quality of clinical data collected is not as important as the quantity of the data because AI can extract needed information. 2. Data mining has reduced the need for special analysis and statistics. 3. Dependence on information derived from examining patterns and relationships in data has increased. 4. The need for primary data storage has increased while the need for secondary data storage has decreased.

3

Which of the following is a true statement about protecting the confidentiality of client-related e-mail? 1. Encryption keys prevent viruses or Trojan horses from being attached to e-mail messages. 2. Digital credentials utilize biometric means, such as thumbprint, to verify the identity of the sender. 3. Public key infrastructure (PKI) uses unique codes to confirm the identity of those sending e-mails. 4. Viruses may be transmitted by e-mail messages, so each e-mail should be separately scanned prior to being read.

3

The Quality and Safety Education for Nursing (QSEN) project sets an agenda to improve the quality and safety of the health care delivery system. To achieve the goals set by QSEN, the Institute of Medicine (IOM) suggested the following competencies for nurses except for which of the following? 1. Patient centered care 2. Team work and collaboration 3. Informatics and evidence-based practice 4. Professional code of conduct

4

The nurse gathers much data when caring for clients. Which is an example of the higher-level "information" useful in caring for clients? 1. The vital signs are BP of 130/70, HR of 88, RR of 24, temperature of 98.8 degrees F., and oxygen saturation of 98%. 2. Lab work results include an electrolyte panel and complete blood count with differential. 3. The client is a widowed 64-year-old black male admitted with prostatitis. 4. After receiving Rocephin (ceftriaxone sodium) 1.0 gram IV yesterday, the client reported feeling better today.

4

The nurse wishes to compile information on congestive heart failure by tomorrow morning. When a comprehensive search is necessary and there is a limited time frame, which search tool is preferred? 1. A search index such as AltaVista 2. A search engine such as Lycos 3. A search engine such as Google 4. A search engine unifier such as OmniMedicalSearch

4

When is it more appropriate to use online storage as compared to offline storage? 1. Safety of backup materials is a must 2. Long-term data storage is required for old records 3. Old client records should be kept more safely 4. Immediate access to data may be needed

4

Which of the following best describes RAID technology? 1. The computer shuts down when a single disk fails. 2. Community clinics use a primary data storage drive. 3. RAID costs more than using one large disk drive. 4. Duplicate disks mirror copies of data.

4

Which role is only appropriate for the informatics nurse specialist (INS)? 1. Disseminating information for appropriate health care uses 2. Transforming data into information 3. Transforming information into knowledge 4. The design of nursing research protocols and databases

4

Case sensitive

A condition in which the compute evaluates not only the characters entered, but also whether a letter is upper or lower case. Passwords are usually case sensitive, as can be the addresses of websites after the first single foreward slash (\)

Network

A connection of computer hardware and software that allows communication between computers.

Flow chart

A graphical picture of a process with decision points and options. In more sophisticated versions it includes inputs and outputs. Is sued in computer programming, a designing a database, large computer systems, and anyplace where it is necessary to understand a linear concept of how something works.

Urban Legend

A story told as though it is an actual happening to someone either known by the teller, or someone he or she knows. OFten sent by email.

Software

A system (as in operating system), utility, or application program expressed in computer-readable language, that is code. They are what allow a human to make the computer a functional element. Software exists electronically in RAM as instructions for the computer to follow and is often referred to as "program."

Domain Name System (DNS)

A system under which each computer on the Internet has a registered number and name. The alphabetic names are generally used when sending messages or requesting a WWW file because they are easy to remember. The DNS translates these alphabetic names into the numbers that match the character name. These are Internet Protocol (IP) addresses. For example, the domain name www.example.com might translate to 198.105.232.4

Graphical User Interface (GUI)

A way of interacting with the computer in which the user makes selections from images called icons

Graphical User Interface (GUI)

A way of interacting with the computer in which the user makes selections rom images, called icons.

Rich Internet Application (RIA)

A web application that has the features and functions of desktop software.

Internet

A world wide network of computer that traces its origins to 1969. It enables email and provides access to the WWW.

Telephony

Computer software and hardware that can preform functions usually associated with a telephone.

Computer crash

Computer stops working or a program unexpectedly gives an error message and quits work, taking all the unsaved data with it.

Hard wired

Connecting a computer to a network with a wire (cable). Opposed to wireless in which the connection is by radio waves.

DOS

Disk operating system

Pharming

Hacking into a DNS router by malicious people and changing the IP address to one that pretends to be the real site. USers being unaware that they are not at the legitimate site may enter personal information that is used maliciously.

Hoax

In computer, a message sent to people that is false. It is usually a warning of something. These easily proliferate by email. Check all warnings received by the email at Snopes.

Megabits per second

Measurement of the speed of the transfer of data. Is equal to 125,000 bytes. Abbreviated Mbit or Mb.

Download

Moving computer data from one computer to another. This term usually refers to moving data from a server to a smaller computer.

Botnet

Newest, fastest-growing malware threat. Botnets are networks of computers that have been hijacked by a malware virus or worm.

Upload

Transmit information from a smaller computer to a larger one. This process is often associated with placing files on an Internet server from a PC, but it can also refer to copying information from a PDA type computer to a PC.

Task bar

The last line on the screen in a Windows comptuer thtat contains the names of the various programs that are open. If it is not immediately visible, placing the mouse pointer in the location will make it appear. The left portion is the Quick Launch Bar.

Operating System

The most important program on a computer. (Manager of the entire computer system. It is systems software.) It performs tasks such as recognizing keyboard input, sending output to the screen, locating files and controlling peripherals such as disk drives and the printer. All programs run "on top of" of the operating system.

Broadband

The name given to a transmission wire that can carry several channels of information at the same time. Internet connections with Cable TV and DSL are examples. Provides for a faster connection to the Internet.

Speech recognition

The translation by the computer of the spoken work to printed text. Depends on a special type of software.

Which of these is the most flexible and reliable secondary storage device? 1. DVD drive 2. Magnetic tape drive 3. CD-ROM drive 4. Zip drive

1

Application program

A computer program designed for an end user such as a word processor or database. Distinguished from systems software which interacts with the computer.

Active Window

The window on the screen on which the user is working. Other windows may be open, but not currently being worked with. A window is a file in a program such as as document in Microsoft Word.

A physician wishes to send a very large file to a consulting physician, including a patient's chart and diagnostic images with reports. Which is the most appropriate method of sending the data? 1. Utilize a file transfer protocol (FTP) program to upload the information to the physician 2. Remove all graphics from the file, send the file via e-mail, and fax the diagnostic images 3. Attach the file to an e-mail and send it, ensuring encryption is utilized 4. Connect to the physician's computer via dialup and transfer the information

1

Access to patient care data and utilization of nursing research are essential components of evidence-based practice designed to increase patient safety and provide quality care. Which of the following can technology cannot be employed to remove barriers to information and evidence-based practice? 1. Online report cards 2. Handheld devices 3. Electronic spreadsheet software to manage data 4. World Wide Web

1

Handheld or personal digital assistants (PDAs) are more visible in the health care system. Which of the following answers best describes an advantage of using a PDA? 1. A PDA is easily transported to the point of care. 2. The probability of theft is high; therefore, nurses can keep the device in their pockets. 3. The PDA has a small screen size. 4. PDAs can hold up to rough use.

1

Nursing informatics employs information and computer technology to support all aspects of nursing practice, including research. Which is an example of supporting research? 1. Development of a standardized nursing language 2. Identifying evidence of best clinical nursing practices 3. Familiarity with spreadsheets and statistics software and analysis 4. Housing collected client data within automated record systems

1

One of the greatest concerns articulated by Internet users is security breaches. Which of the following is the best method to protect the integrity of the computer and its data? 1. Construct a separate firewall for the Web server. 2. Ignore security warnings. 3. Keep antivirus systems up-to-date and do not install intrusion detection systems to hail attacks. 4. Do not install security patches.

1

Over the next few years, nursing informatics and other health informatics disciplines will crisscross, resulting in more interdisciplinary projects. This statement is true because of which of the following reasons? 1. Nurse informatics specialists will work collaboratively with other disciplines to develop user-friendly systems. 2. Nurse informatics specialists will work with other disciplines in an attempt to gain control over the use of the health care technology. 3. Nurse informatics specialists understand all of the disciplines and are able to effect changes in technology. 4. Nurse informatics specialists are knowledgeable about the needs of the typical consumer of technology.

1

SPIM is defined as which of the following? 1. Unsolicited messages 2. Personal instant messaging 3. Solicited messages 4. Wiki responses

1

The night shift charge nurse is being promoted to the position of mental health unit nurse manager. The supervisor would contact the database administrator (DBA) to allow the nurse manager access to needed data required for this new position. Which of the following suggests this is a correct statement? 1. The DBA is responsible for overseeing all activities related to maintaining the database. 2. The database administrator has no authority over the management of data input. 3. The mental health manager should not have access to the database. 4. The mental health manager does not have to communicate with the database manager and ask for permission for access.

1

There are no available nursing informatics programs including doctoral degrees; therefore, nurses prepare for advanced practice through medical informatics curriculum. This answer is false because of which of the following reasons? 1. There are a number of accredited advanced nursing education programs in informatics in the United States. 2. Advanced degrees in nursing informatics are available only online in the United States. 3. There is limited interest in advanced education in nursing informatics. 4. There are advanced degrees available in nursing informatics, however, with technology experience there is no need for advanced theoretical education.

1

Which is the most effective way to reduce SPAM (unsolicited e-messages) in the workplace? 1. Use "challenge response software" to request confirmation that the e-mail was sent by a person. 2. Allow the e-mail application program to filter all mail and send unwanted messages to the trash. 3. Send and receive all company e-mail from a single e-mail account. 4. Reply to each message and request to be taken off the mailing list.

1

Which of the following answers is the best definition of data? 1. Data are a collection of numbers, characters, or facts that are gathered according to some perceived need for analysis and possibly action at a later point in time. 2. Data are the synthesis of information derived from several sources to produce a single concept or idea. 3. The definition of data is knowledge used appropriately to manage and solve problems. 4. The general term data is used to refer to the management and processing of information with the assistance of computers.

1

Which of the following is an example of data cleansing or scrubbing? 1. Abbreviations are compared using software to ensure standard language is used. 2. When the name of the admitting physician is blank, the primary physician is used by default. 3. Users may sort and compare data to determine relationships. 4. Data are used to identify standardized treatments for specific diseases.

1

Which of the following is not a common input device? 1. Network 2. Keyboard 3. Webcamera 4. Joystick

1

Which of the following responses is most accurate in describing "thin client" or "fat client"? 1. The "thin client" is primarily a display, keyboard, and mouse or other pointing device. 2. "Fat" client technology is also known as server-based computing. 3. "Fat" client technology represents networking model that relies on highly efficient servers. 4. "Thin" client technology used in traditional client/server networks has local drives or storage devices.

1

Which of the following terms is a knowledge management tool that engages software to uncover inter-relationships within large data-sets? 1. Data mining 2. Knowledge discovery 3. Data destruction 4. Data cleansing

1

Which of the following terms serves as a set of programs designed to accomplish a particular task such as word processing, financial management, or drawing? 1. Application software 2. Vista 3. XP 4. Windows

1

Which statement best describes the role of the chief privacy officer (CPO)? 1. Duties include protection of the personal health information of patients, both electronic and paper 2. Duties include strategic planning, information security, and overall management of the information system 3. Duties include assigning and monitoring system access identification codes and passwords 4. Duties include design, maintenance, and security of materials placed on the Internet, intranet, and extranet

1

Which statement by the nurse verifies that the nurse is "information literate"? 1. "I understand how to search for a website and evaluate its usefulness for health care needs." 2. "I utilize databases in the health care setting to input client information such as skin condition." 3. "I use email over the Internet to correspond with clients and provide information." 4. "I can use software applications such as word processing, spreadsheets, and presentations."

1

Which type of storage document is most accurate and improves access to records? 1. Immediate entry of data into automated systems 2. Films of old records converted from old client paper records 3. Document imaging and scanning of old client paper records 4. Original paper records from old client charts

1

Universal Resource Locator (URL)

1) The address one puts in the locator bar of a Web browser; 2) The name given to addresses uesd for documents on the WWW. They generally start with "http://" or "www" or some variation such as "https://"

Equipment and hardware selection are based on personal and institutional needs. Which of the following answers are considered when selecting a system? Standard Text: Select all that apply. 1. Program execution time 2. Number of workers needed to access computer at one time. 3. Storage capacity 4. Backup options 5. Budget constraints

1,2,3,4,5

Java is a widely used programming language that enables the display of moving text, animation, and musical excerpts on Web pages. Which of the following are true about Java? Standard Text: Select all that apply. 1. Helper programs and plug-in programs are often written in Java. 2. Considered an alternative to Microsoft's ActiveX 3. Resides on the server until it is needed by client computer 4. Runs on any Java-enabled browser 5. Reduces the need to purchase, install, and maintain on-site software

1,2,3,4,5

All members of the nurse manager's staff have attended classes that emphasized appropriate system access, input device use, potential harmful effects associated with incorrect data, data verification techniques, and error correction. They received a certificate indicating proficiency in the use of the input device and computer systems. These staff members will not require additional training unless the technology changes significantly. Which of the following suggests that this statement is false? 1. Continuing education is only necessary with significant changes. 2. Continuing education should be consistent. 3. Continuing education should be performed when time permits. 4. Continuing education is essential for point-of-care staff only.

2

Health care consumers have all the information and tools to make health care choices because they can easily compare quality and cost of care. Which of the following is correct? 1. This statement is true because the tool has been invented. 2. The statement is false because the tool has not been developed. 3. The statement is true because most consumers have Internet access. 4. The statement is true because of the steep learning curve associated with searching the Internet.

2

The best estimate of the number of informatics nurses needed over the next few years is which of the following? 1. 500 to 1500 2. 6000 to 12,000 3. 2000 to 5000 4. 15,000 to 25,000

2

The nurse refers the client to a website on smoking cessation after evaluating its contents. Which factor increases the probability that the website is appropriate for the client? 1. The site is written in technical language and has comprehensive chemical diagrams for credibility. 2. The site has a current revision date and a URAC accreditation seal that the site meets quality standards. 3. The site is sponsored by a pharmaceutical company that manufactures a smoking cessation medication. 4. The site has a list of broadly generalized indications for smoking cessation.

2

The reason that nursing lags behind in the education of nursing informatics specialists is because of which of the following? 1. The surplus of nursing informatics professionals in the hospital setting 2. The lack of qualified faculty in graduate programs 3. Too few nurses are interested in the specialty area 4. Nursing informatics is an expensive specialty with little government funding

2

What are the two types of memory categories? 1. Control and central processing units 2. Read-only memory (ROM) and Random access memory (RAM) 3. Flash drives and user ports 4. CDROMs and DVDs

2

What is the one byte binary code representation for the Arabic number 8? 1. 1000 2. 00001000 3. 2222 4. 11111111

2

Which is the most important legal statement about creating personal Web pages? 1. A Web page developer does not have to abide by copyright laws before posting information. 2. A Web page developer must review copyright laws before posting information. 3. Nonprofit organizations are the only entities that must abide by copyright laws. 4. For profit agencies are the only entities that must abide by copyright laws.

2

Which nonprofit professional organization provides direction when issues arise on the Internet? 1. The Web Regulation Agency 2. The Internet Society 3. The Web Society 4. Java

2

Which of the following is an example of a system check? 1. When a duplicate entry is entered into the system, that entry is immediately deleted. 2. The nurse asks clients to verify their names when prompted by the computer system. 3. After turning on the bedside computer, the system performs a self-check before data will input. 4. Software in the system automatically corrects misspelled words and abbreviations.

2

Which of the following is considered a threat to information quality? 1. An unauthorized user hacks into the system to review the clients' records 2. Not verifying information as correct prior to entry 3. An earthquake interrupts the power supply and causes data loss 4. A wireless transmission is intercepted to review a new client's records.

2

Which of the following is recommended when considering World Wide Web home page content and design? 1. To improve readability always use dark backgrounds with light colored text. 2. Do not include a counter; visitors do not need to know how many people visited a site. 3. Include as much information on the introductory page as possible so the user will not need to link to other pages. 4. Do not place a copyright notice on the introductory page; the U.S. Copyright Office does not register Web pages.

2

Which of the following statements is correct about Blu-ray? 1. Blu-ray is a system that has replaced the optical scanner. 2. Blu-ray is a high density optical disc format; rival to HD-DVD. 3. Blu-ray functions are yet to be incorporated in health care systems. 4. Blu-ray has been designed to store data collected at the bedside.

2

Which of the following statements is not part of the data storage process? 1. Environmental control and conditions maximize the shelf life for media 2. Data storage on magnetic tape is a long-term solution to data storage 3. A contingency plan is developed to prevent the loss of data 4. The state dictates the length of time client records are stored

2

Which of the following statements is true about knowledge discovery and the role of the nurse? 1. Point-of-care nurses do not have the education to translate knowledge into best practice models. 2. Nurses have the ability to translate knowledge into improved practice patterns. 3. Nurses cannot act upon data unless in collaboration with other health care professionals. 4. Attending physicians rather than nurses are in the best position to deliver high-quality and cost-effective care that is dependent upon their ability to translate knowledge (evidence) into practice.

2

Which of the following statements is true about portable or laptop computers? 1. Portable or laptop computers are unnecessary at the bedside. 2. Portable or laptop computers can be connected to networks or peripheral devices through the use of a Personal Computer Memory Card International Association (PCMCIA) card. 3. Portable or laptop computers have been replaced by smaller handheld devices. 4. Portable or laptop computers do not have enough memory to effectively store clinical data.

2

Which of the following statements is true about search indexes? 1. Search indexes are appropriate when specific information is requested. 2. Search indexes are appropriate when general information is requested. 3. Search indexes are necessary for access to certain databases. 4. Search indexes can only be found in libraries.

2

Which of the following will have the greatest impact on data integrity? 1. The computer system goes down but is completely restored within one minute. 2. A nurse collects data related to allergies but fails to document all reported allergies. 3. A clinic manager uses secondary storage for storing clinical records offline. 4. A number of printed media clinical records are discarded in the regular trash dumpster

2

A nurse practitioner wishes to send e-mail to all clients on a distribution list without displaying the e-mail addresses of those on the list to the recipients. Which of the following will appropriately accomplish this task? 1. Include the nurse practitioner's e-mail address as primary recipient and the client addresses as carbon copies (CC). 2. The nurse practitioner must send a separate message to each individual client as primary recipient. 3. Include the nurse practitioner's e-mail address as primary recipient and the client addresses as blind copies (BCC). 4. Include the recipient e-mail addresses as primary recipients and the nurse practitioner's address as a blind copy (BCC).

3

Knowledge discovery in databases offers the health care team trended patterns that can be transformed into useful data. Which nursing role can best benefit from knowledge discovery as it pertains to evidence-based practice? 1. The nurse as administrator 2. The nurse as educator 3. The nurse as researcher 4. The nurse at point of care

3

Research best supports the use of which ergonomic device? 1. Ergonomic mouse to reduce wrist and hand pain 2. Support brace used while typing to prevent carpal tunnel syndrome 3. Lumbar back support to maintain natural curves of the back 4. Wrist rests to support the wrists while inputting data and typing

3

Technology committee members debate the merits of online versus offline storage. Which response is the most accurate when describing data storage? 1. Online storage is a slower retrieval system. 2. Offline storage provides access to current data. 3. Offline storage is used for data that are needed less frequently. 4. Online storage provides limited access to current data.

3

The TIGER initiative is an acronym for which of the following? 1. Technology Information Grants Electronic Records 2. Technological Initiative Given Electronic Reform 3. Technology Informatics Guiding Education Reform 4. Technology Information Guiding Electronic Reports

3

The hospital health care library plans to switch some journals from paper format to online subscription. Physicians, nurses, and other health care professionals would be able to access online articles from anywhere by using a valid ID. Which of these is a disadvantage for totally online publications? 1. Current information may require more time to be approved for posting. 2. Libraries must pay higher fees to acquire and store the materials. 3. Those persons without online access may not be able to access the materials. 4. Drawings and photographs are difficult to reproduce in electronic format.

3

The rate of suspected adverse drug reaction (ADR) among clients in the maternity unit is climbing. The nurse manager is aware that a World Health Organization (WHO) ADR database analyzes millions of suspected ADR reports in order to uncover new adverse effects. This WHO tracking is an example of which of the following? 1. Data scrubbing 2. Data mining 3. Knowledge discovery 4. Electronic data interchange

3

Which action indicates the nurse is functioning as a knowledge worker? 1. The nurse auscultates hypoactive bowel sounds while doing a client assessment eight hours postoperatively after abdominal surgery and documents the assessment in the electronic medical record. 2. The nurse administers four units of regular insulin to the client whose blood glucose is 240 at 11:30 a.m. per physician's sliding scale orders and documents it on the electronic medical administration record. 3. The nurse auscultates diminished breath sounds in a postoperative client the morning after abdominal surgery and encourages the client to turn, cough, and deep breathe every hour instead of every two hours. 4. The nurse obtains the client's vital signs of BP-120/82, P-112, and R-32, totals up the intake of 1040 ml and the output of 1100 ml, and records these data in the electronic medical record.

3

Which health risk related to computer use has been best documented? 1. Miscarriage or sterility 2. Ulnar nerve syndrome 3. Carpal tunnel syndrome 4. Cataracts

3

Which of the following is a key motivation to outsource data storage? 1. To allow company personnel to maintain their positions in the company 2. To contract with company employees to maintain their loyalty 3. To reduce costs required for data storage and maintenance 4. To maintain data storage on site with the least amount of effort

3

Which of the following is not associated with information literacy? 1. Recognizing when information is needed 2. Ability to find, evaluate, and effectively use information 3. Familiarity with the use of personal computers and software 4. Understanding ethical issues surrounding the use of information

3

Which of the following is not considered a search engine? 1. Google 2. Altavista 3. Webinar 4. Bing

3

Which of these is an advantage in the use of personal digital assistants (PDAs) in the health care setting? 1. PDAs may be synchronized with any network without the use of special equipment or software. 2. PDAs minimize the chance of interception of data transmission. 3. Current medication information may be easily stored and compared to actual client data. 4. Data loss is minimized due to long battery life and ease of backups.

3

Which statement concerning "thin client technology" is correct? 1. System processing occurs on both the server and on the local PC. 2. A thin client consists of a display with keyboard and requires its own storage device. 3. Software exists on the server, therefore upgrades are done in one step for all clients. 4. When implemented, older PCs formerly used in networking must be replaced.

3

Knowledge management is a structured process for the generation, storage, distribution, and application of what kind of knowledge in the organization? Standard Text: Select all that apply. 1. Chronological knowledge 2. Redundant knowledge 3. Tacit knowledge (personal experience) 4. Generational knowledge 5. Explicit knowledge (evidence)

3,5

A hospital plans to share data with all physician offices that utilize their facilities. Which of the following approaches would best meet the need? 1. Internet 2. Intranet 3. Web portal 4. Extranet

4

A relational database is a type of database that is specifically designed for which of the following? 1. Accessing data stored in multiple databases 2. Exclusive use of a database administrator (DBA) 3. Answering complex analytical questions 4. Using data that are represented as tables

4

Data integrity is crucial to the success of professional nursing practice. Which of the following phrases identifies its relevance to quality care? 1. Data integrity provides a systematic approach to the care of the patient. 2. The use of authentic data ensures mistakes are avoided. 3. All data entered into the system are accurate. 4. Data integrity is a driving force in treatment decision making

4

Data integrity may be affected by how data is stored. Which of the following storage methods is the most reliable? 1. Portable hard drive with removable disk 2. Optical media and disks 3. Magnetic tape or cartridges 4. Redundant Array of Disks (RAID)

4

Describe at least three factors in the current healthcare delivery system that drive the implementation of information technology in the acute care setting. 1. Patient safety 2. Nursing shortage 3. Evidence-based practice 4. Increased numbers of digital natives in nursing practice

4

Security is an important issue for all websites. Which measure best protects the overall security of a health-based website? 1. Connect the Web server directly to the agency computer. 2. Install an antivirus program and update annually. 3. Allow only registered users to access the website. 4. Construct separate firewalls for each Web server.

4

Selecting a computer system depends primarily on the needs and expectations of the organization. Which of the following choices are not relevant in the decision making process? 1. Applications needed to accomplish goals 2. Back up options 3. Cost 4. The computer literacy of the nursing staff

4

Which of the following best describes an intranet? 1. The largest and best known electronic network in the world 2. Limited to systems affiliated with education and government agencies 3. A network outside of the hospital system for use by customers or suppliers 4. A private hospital system that is protected from outside access

4

Which of the following groups have been selected to help drive the changes necessary to transform the health care delivery system, improve quality of services delivery, and improve safety? 1. Software engineers 2. Members of TIGER initiative 3. Members of the Institute of Medicine 4. Informatics nurse specialists

4

Which of the following statements is true regarding intranets? 1. An intranet is immune to viruses and hacker attacks, because accessibility is restricted to employees. 2. An intranet is restricted to employees and allows them to review their personal information at any time. 3. An intranet is open to registered vendors and may be used to price and purchase health care products. 4. An intranet is used to facilitate collaborative data sharing among the employees within the institution.

4

Which statement best distinguishes the difference between information literacy and computer literacy? 1. Information literacy is unnecessary in health care whereas computer literacy provides the basis for computer order entry. 2. Information literacy is the foundation of the EHR whereas computer literacy helps the nurse to access data. 3. A nurse can extrapolate data with computer literacy and not information skills. 4. Information literacy forms the basis for ongoing learning whereas computer literacy refers to a familiarity with the use of personal computers

4

While visiting the American Heart Association website, a client plays the animation of the heart at work. Which of the following was used to play the animation? 1. Browser 2. Search engine 3. Helper program 4. Plug-in

4

Markup language

A computer language that surrounds text with beginning and ending tags, typically set off in angle brackets. HTML and XML are examples.

Local area network (LAN)

A computer network that includes computers in a relatively small area such as a department or a single building. LANs can be connected to form a WAN (wide area network).

Plug-in

A computer program that interacts with another program, usually a Web browser to allow content to be seen. Examples are Adobe Acrobat Reader and Adobe Flash Player. These programs are usually freely available for download from the web.

Denial of service attack

A condition in which an attacker prevents legitimate users from accessing information or services such as email or a company web site. The most common type occurs when an attacks floods a network with information, often with spam.

Modem

A device that allows a computer to send data over telephone lines. It is an acronym for Modem-Demodulator. It converts a computer's digital signal to the analog signal used by telephone lines.

Office suite

A group of desktop application programs consisting of a word processors, spreadsheet, and presentation package form one vendor that are design to work well together. Relational databases may be included in the professional version, or as a generic part of the package Other programs are often bundled with these,

Firewall

A means of preventing unauthorized access to and from an Internet connection. They can involve either hardware or software or both. Further protection is provided by encrypting the information on the network. A router is a form of firewall.

Bandwidth

A measure of the speed at which a line (wire) transmits data. The rates depend on the type of connection such as POTS, DSL, or cable.

File Transfer Protocol (FTP)

A method of placing (uploading) files on the Internet of Web and retrieving (downloading) them. Web browsers handle the downloading seamlessly so users are unaware that this protocol is being used.

World Wide Web (WWW or W3)

A part of the Internet that consists of interlinked documents that are accessed and viewed using a Web browser. WWW document can contain text, images, videos, and other multimedia. Navigation between documents is by clicking on hyperlinks, or areas that access another Web page.

Peer-to-peer network

A peer-to-peer (P2P) network is created when two or more PCs are connected and share resources without going through a separate server computer.

Mouse

A peripheral device connected to the computer, that when moved, moves a pointer on the screen.

Quick Launch Bar

A portion of the last line of the screen that contains program icons that when clicked will open (launch( that program. Users drag the program icons for programs they use frequently from either the desktop or all programs on the Start button to the quick launch bar to make access easier.

Virtual Private Network (VPN)

A private network that is built form a public network by creating "tunneling" links in the network and often using encryption.

Worm

A program that replicates itself without the use of a host file although some modern computer worms also use fuels to hide inside.

Java

A programming language that allows any program written in this language to be used with any operating system.

Java script

A scripting language that is interpreted in the run-time that runs in Web browsers. It easily interacts with HTML elements.

Algorithm

A set of unambiguous steps for accomplishing a defined task. The algorithm has a definite starting and stopping point. IT may contain decision points, but finite choices are given and the results of each choice clearly states. Used when programing a computer, however, individuals use them every day, e.g. the steps one follows in starting a car.

Groupware

A software that facilities collaboration by a group of colleagues attached to a network. It supports such thing as scheduling meetings, email and electronic newsletter. It is sometimes called workgroup productivity software. USer s can be sitting next to each other or half a world apart.

Wire equivalent privacy (WEP)

A standard method of encrypting wireless transmissions and providing secure Internet connections.

Streaming

A technique for delivering data used with audio and video in which the recipient is able to hear or see part of the file before the entire file is delivered.

Digital subscriber line (DSL)

A telephone line that uses sophisticated schemes to pack data so that it can be sent in digital format over existing phone lines in a way that it shares the same line with regular voice. Usability is limited by the distance a user is from the telephone switching station.

Phishing

A trick used to entice people to access a Web site designed to look like a legitimate website and enter information that can be used to steal identities, bank accounts, or use credit cards that aren't their own

Active Server Page (ASP)

A type of Web page that is created dynamically on the fly. It pulls data from various places to create a timely page. These Web pages end in the extension .asp. An add-on for Web pages that allows for the creation of interactive pages that can show data in real time.

Client-server architecture

A type of network connection in which PCs are workstations called clients have software that allows them to communicate with another computer, known as a the server, which can process and respond to the requests of clients.

Trojan horse

A type of virus that comes disguised as another program. That is, a "friend" gives you what is theoretically a calculator program, but when you run it, it releases the Trojan Horse in your computer.

Wireless

A use of any electrical device that connects through radio frequency and is not physically connected to any other device.

Fiber optic cable

A wire as thin as copper wire which contains very thing, pure glass fivers. Because the fibers are so small more fibers can be bundled in a size equivalent to a copper wire. It is the fastest method of sending data with speed currently reaching 1000 megabits per second.

Plain Old Telephone Service (POTS)

An Internet connection that is used by dialing the number of the Internet Service Provider. POTS lines are restricted to a transfer rate of 56.6 kilobits per second to the computer (about 700 characters per second). May be referred to as dial-up. Many metropolitan areas are being replaced by broadband connections.

Cloud computing

Ability to access software and file storage on remote computers using the Internet

IP address

Although the usual way that a computer on the Internet is addressed is through a name, each of these names is backed up by a number assigned to the computer. The address is four numbers from one to 225 separated by a period. IP addresses can be dynamic or static.

Dynamic IP address

An IP address that changes. Having dynamic IP address makes it more difficult for intruders to invade a computer.

Static IP address

An IP address that remains the same every time a computer is connected to the Internet.

XML

An acronym for extensible mark-up language that allows for the creation and formatting of documents in a way that specifies their contents. XML is finding a user in health care as a way to include parts of fee text in a database.

Extranet

An extension of an intranet which provides accessibility to an agency intranet to a specific group of outsides.

Virus

An uninvited, self-replicating, piece of code that infects a computer and proceeds to perform its functions, which are usually destructive to the computer or files without the permission of the owner.

Internet protocol (IP)

One of the two Internet protocols, the IP is responsible for locating the computer in either an email address or Web address (known as a URL) and directing the message or in the case of the WWW, the request for a file, to the correct location.

Transmission Control Protocol (TCP)

One of two agreed upon protocol used on the Internet that enables two host computer to establish a connection and exchange data.

Point and Click

Process of moving a mouse pointer to a desired command and clicking (rapidly depressing and releasing) the left mouse button to select that command. Left handers can reset the mouse for their convenience.

Browser

Short for Web browser, software that locates, downloads and displays Web pages. Two popular browsers are Microsoft Internet Explorer and Mozilla Firefox.

Active X

Small program delivered by Internet Explorer that can run in Windows or Mac operating system. They can be good or harmful.

Shareware

Software that although copyrighted can be freely distributed for trial purposes. Users are honor bound to send the owner of the copyright a registration fee.

Freeware

Software that although copyrighted is given away by the author. Because the author retains the copyright you must follow the author's wishes in terms of what you can do with it, this usually precludes selling it. this is more restrictive than public domain software.

Computer malware

Software that does malicious things. Includes viruses, worms, Trojan horses, spyware, and some adware.

Adware

Software that is combined with another program and presents advertisements to the user of the program. Is sometimes distributed with free versions of downloadable software.

Spyware

Software that is downloaded surreptitiously of a user's computer and records keystrokes for transmission to a third party. May be programmed to only record keystrokes to things like blank accounts or wen the user is shopping online. Most anti-virus software today checks for this type of malware.

Spyware

Software that is downloaded surreptitiously to a user's computer and records keystrokes for transmission to a third party.

Code

Statements written in a programming language which the computer is capable of executing to perform a function.

Desktop

The screen that contains program icons that appears after the computer is turned on. Clicking any of the icons will open the program to which that icon belongs. User can also save folders or files to the desktop for easy access.

Favorite

The term used y Microsoft Internet Explorer to designate a list of folders that the user wishes easy access to. Analogous to Bookmark used by other browsers.

Title bar

The top line on the screen that contains the name of the program in that window. It may also contain the name of the file that is open in that program. It is blue when the window is not minimized (does not fill full screen) and can be used to drag the window containing the program.

Bookmark

The name some browsers (Firefox and Netscape) give to a collection of Web addresses that the user has added to a list to make accessing it easy. Analogous to Favorites in IE.

Net neutrality

The principle that all Internet users should be treated equally in terms of downloading information whether it is a small file, or a large one. This principle has been in effect since the start of the Internet and has led to its phenomenal growth. To alleviate the traffic jams that are developing on the Internet, broadband carriers want to determine which content is delivered the fastest thus altering the principle.

Software piracy

Using a copy of a computer program that s not legally yours to use. On a home computer this would mean a program "given" to you by a friend so you would not have to buy it. At work, it means software for which the institution does not own a license for each and every computer on which it is used. It is taken seriously by the Business Software Alliance and prosecuted.


संबंधित स्टडी सेट्स

L.I.F.E.P.E.C high school health (growth and development)

View Set

Foundations Chapter 37 Bowel Integrity

View Set

Soc. Studies 6th Grade, Chapter 12 (Canada) Vocabulary

View Set

PSYC 302: Chapter 3 (Three Claims, Four Validities: Interrogation Tools for Consumers of Research)

View Set

internal vs. external locus of control

View Set

Ginder Marketing test 3 CH 9,10,11

View Set

Chapter 4 (Highlights)- Working with Sellers

View Set