Nursing Informatics Final Exam with
correct verified answers
Malicious Programs
Viruses, worms, logic bombs, and Trojan horses pose a threat to both Internet and Intranet
users. Ransomeware, patient information, damage.
Malware refers to all forms of computer software designed by criminals, specifically to
damage or disrupt a computer system, often for a profit.
Nursing informatics
Uses information and technology to communicate, manage knowledge, mitigate error, and
support decision making. Is the specialty that integrates nursings cience with multiple
information and analytical sciences to identify, define, manage and communicate data,
information, knowledge, and wisdom in nursing practice.
Peer Review
A process by which the procedures and results of an experiment are evaluated by other
scientists who are in the same field or who are conducting similar research.
Phishing
An attack that sends an email or displays a Web announcement that falsely claims to be
from a legitimate enterprise in an attempt to trick the user into surrendering private
information
Quantitive data
numerical data
Qualitative Data
descriptive data
RAM
Random Access Memory - temporary place to store material that works quickly. erased
when computer turns off. Volatile.
ROM
, Read Only Memory- Permanent instructions that cannot be changed. It makes the BIOS
function.
Sabotage
an action taken to destroy something or to prevent it from working properly; to take such
destructive action
Server Architecture
Client-server and peer-to-peer are examples. Construction of the Internet (architecture)
varies, often depending on the purpose of the network. In client-server architecture, clients
or workstation computers rely on the server to run a program or access data. The server is
often located in a remote setting
Spam unwanted e-mail (usually of a commercial nature sent out
in bulk)
Spyware
A type of Malware that locates and saves data from users without them knowing about it.
General technology skills nurses need
Basic computer skills, information literacy, computer fluency/literacy.
TIGER Initiative
Technology Informatics
Guiding Education Reform
promotes nursing knowledge and skill needed to practice in a technology driven
environment
Trojan horse
A program that appears desirable but actually contains something harmful
URL
Universal resource locator. A location or address identifying where documents can be found
on the Internet; a Web address.
Virus
A computer program that is written to cause corruption of data and can replicate itself.
correct verified answers
Malicious Programs
Viruses, worms, logic bombs, and Trojan horses pose a threat to both Internet and Intranet
users. Ransomeware, patient information, damage.
Malware refers to all forms of computer software designed by criminals, specifically to
damage or disrupt a computer system, often for a profit.
Nursing informatics
Uses information and technology to communicate, manage knowledge, mitigate error, and
support decision making. Is the specialty that integrates nursings cience with multiple
information and analytical sciences to identify, define, manage and communicate data,
information, knowledge, and wisdom in nursing practice.
Peer Review
A process by which the procedures and results of an experiment are evaluated by other
scientists who are in the same field or who are conducting similar research.
Phishing
An attack that sends an email or displays a Web announcement that falsely claims to be
from a legitimate enterprise in an attempt to trick the user into surrendering private
information
Quantitive data
numerical data
Qualitative Data
descriptive data
RAM
Random Access Memory - temporary place to store material that works quickly. erased
when computer turns off. Volatile.
ROM
, Read Only Memory- Permanent instructions that cannot be changed. It makes the BIOS
function.
Sabotage
an action taken to destroy something or to prevent it from working properly; to take such
destructive action
Server Architecture
Client-server and peer-to-peer are examples. Construction of the Internet (architecture)
varies, often depending on the purpose of the network. In client-server architecture, clients
or workstation computers rely on the server to run a program or access data. The server is
often located in a remote setting
Spam unwanted e-mail (usually of a commercial nature sent out
in bulk)
Spyware
A type of Malware that locates and saves data from users without them knowing about it.
General technology skills nurses need
Basic computer skills, information literacy, computer fluency/literacy.
TIGER Initiative
Technology Informatics
Guiding Education Reform
promotes nursing knowledge and skill needed to practice in a technology driven
environment
Trojan horse
A program that appears desirable but actually contains something harmful
URL
Universal resource locator. A location or address identifying where documents can be found
on the Internet; a Web address.
Virus
A computer program that is written to cause corruption of data and can replicate itself.