Deck 3: Basic Computer Network Concepts

Full screen (f)
exit full mode
Question
The nurse recently completed a computer training course about the different types of networks available. Which statement would the nurse identify as correctly describing a local area network (LAN)?

A) The connection includes a large geographical area.
B) A connection of computers that are physically close to one another.
C) Exchanges files with other computers on a standalone network.
D) A network that encompasses a city or town.
Use Space or
up arrow
down arrow
to flip the card.
Question
A nurse is working with a client recently diagnosed with heart failure. He or she asks the nurse about good websites that he or she could use to learn more about his or her condition. The client tells the nurse that his or her computer uses a wireless connection. The nurse understands that this type of connection:

A) Is more secure than hard-wired connections.
B) Does not require nodes.
C) Is limited in distance.
D) Has a router that determines the transmission speed.
Question
While working on a personal computer, a nurse searches for updated practice guidelines on the Internet. The nurse's computer connects to the Internet via a telephone line. This is an example of which type of connection?

A) Broadband
B) Cable
C) Dial-up
D) Digital subscriber lines
Question
A nurse is talking with a client who says, "I've used the World Wide Web (WWW) many times to look up my medications." Which statement best describes the World Wide Web?

A) "The WWW is a network within the Internet."
B) "It is a tool that allows files to be retrieved."
C) "The WWW is maintained by the local consortiums."
D) "The WWW permits access to text-free documents."
Question
A nurse is accessing the World Wide Web using a web browser for information about the incidence of stroke. The nurse would likely be using which browser? Select all that apply.

A) Internet Explorer
B) Firefox
C) Chrome
D) Microsoft Office
E) Opera
Question
A nurse wants to create interactive web pages. Which product would the nurse expect to use?

A) Java
B) JavaScript
C) Active X
D) Active server pages
Question
A nurse receives an e-mail containing a web address hyperlink on his or her personal computer. The e-mail instructs the nurse to go to the website to confirm his or her bank account number. When the nurse clicks on the link, it would take him or her to a phony website. This is an example of:

A) Pharming.
B) Worm.
C) Trojan horse.
D) Phishing.
Question
A nursing informatics specialist is preparing a presentation about online security. When describing different types of computer malware, which would the specialist include? Select all that apply.

A) Botnets
B) Pharming
C) Trojan horse
D) Web cookies
E) Bookmarks
Question
A client contacts his or her healthcare provider through a web-based portal software program to ask for a medication refill. The client is using:

A) Intranet.
B) Virtual private network.
C) Extranet.
D) Plug-in.
Question
A nursing informatics specialist is presenting a class to a local community group about computer security and protection against malware. The specialist determines that the teaching was successful when the group states: Select all that apply.

A) "Reusing a password is probably the best thing to do."
B) "Downloading the latest software updates is important."
C) "Most regular computer users don't get computer viruses."
D) "We should scan downloaded files with antivirus software before installing."
E) "People need to avoid social networking sites entirely."
Question
The nurse is explaining to a client how he or she can access his or her electronic medical record. Which type of connection would the nurse include as being used?

A) Broadband connection
B) Botnet
C) Client-server architecture
D) Metropolitan area network
Question
A client at home is setting up his or her computer so that he or she can access his or her healthcare team. The client will be connected to a Wi-Fi network. Which item would the client need to set up the connection? Select all that apply.

A) Modem
B) Router
C) Mouse
D) Second keyboard
E) Web browser
Question
A client is attempting to access a secure Wi-Fi network. To be successful, which action would the client need to do?

A) Enter the authentication code.
B) Create a new password.
C) Run a virus scan first.
D) Connect to the Internet.
Question
After reviewing the various types of network connections available, a client chooses a network connection that is considered to have excellent signal reliability. Which connection did the client choose?

A) Television cable
B) Fiber-optic cable
C) Satellite
D) Digital subscriber lines
Question
A nurse is accessing the Internet using the following URL-http://www.ahrq.gov/research/findings/evidence-based-reports/index.html. The nurse identifies the ".gov" as:

A) Top-level domain name.
B) Folder.
C) Descriptor.
D) File name.
Question
A nurse is using a web browser and wants to save links to some of the favorite nursing information websites. Which feature would be helpful to use?

A) Streaming
B) Plug-in
C) Bookmark
D) Web cookie
Question
A nurse is about to install antivirus software on his or her home computer. Which action would the nurse need to do first to protect his or her data?

A) Install a firewall.
B) Backup important files in another location.
C) Perform a quick scan of the files.
D) Update the software program.
Question
A nurse is reading a journal article about computer viruses. Which examples of computer viruses would the nurse most likely read about? Select all that apply.

A) Botnet
B) Worm
C) Pharming
D) Trojan horse
E) Phishing
Question
Which characteristics would be associated with spyware?

A) Random pop-up advertisements that occur when using a program
B) Ability to monitor keystrokes to send to a third party
C) Maintenance of default home pages on web browsers
D) Inability to scan the hard drive
Question
A nurse is checking the nurse's e-mail and finds the following: "If you have a file named 'workline' on your computer, delete it immediately. The file contains a virus that will be released in 5 days and destroy your hard drive." The e-mail goes on to describe how to delete the file. The nurse interprets this as:

A) A damaging hoax.
B) An urban legend.
C) A Trojan horse.
D) Spyware.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/20
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Basic Computer Network Concepts
1
The nurse recently completed a computer training course about the different types of networks available. Which statement would the nurse identify as correctly describing a local area network (LAN)?

A) The connection includes a large geographical area.
B) A connection of computers that are physically close to one another.
C) Exchanges files with other computers on a standalone network.
D) A network that encompasses a city or town.
A connection of computers that are physically close to one another.
2
A nurse is working with a client recently diagnosed with heart failure. He or she asks the nurse about good websites that he or she could use to learn more about his or her condition. The client tells the nurse that his or her computer uses a wireless connection. The nurse understands that this type of connection:

A) Is more secure than hard-wired connections.
B) Does not require nodes.
C) Is limited in distance.
D) Has a router that determines the transmission speed.
Is limited in distance.
3
While working on a personal computer, a nurse searches for updated practice guidelines on the Internet. The nurse's computer connects to the Internet via a telephone line. This is an example of which type of connection?

A) Broadband
B) Cable
C) Dial-up
D) Digital subscriber lines
Dial-up
4
A nurse is talking with a client who says, "I've used the World Wide Web (WWW) many times to look up my medications." Which statement best describes the World Wide Web?

A) "The WWW is a network within the Internet."
B) "It is a tool that allows files to be retrieved."
C) "The WWW is maintained by the local consortiums."
D) "The WWW permits access to text-free documents."
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
5
A nurse is accessing the World Wide Web using a web browser for information about the incidence of stroke. The nurse would likely be using which browser? Select all that apply.

A) Internet Explorer
B) Firefox
C) Chrome
D) Microsoft Office
E) Opera
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
6
A nurse wants to create interactive web pages. Which product would the nurse expect to use?

A) Java
B) JavaScript
C) Active X
D) Active server pages
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
7
A nurse receives an e-mail containing a web address hyperlink on his or her personal computer. The e-mail instructs the nurse to go to the website to confirm his or her bank account number. When the nurse clicks on the link, it would take him or her to a phony website. This is an example of:

A) Pharming.
B) Worm.
C) Trojan horse.
D) Phishing.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
8
A nursing informatics specialist is preparing a presentation about online security. When describing different types of computer malware, which would the specialist include? Select all that apply.

A) Botnets
B) Pharming
C) Trojan horse
D) Web cookies
E) Bookmarks
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
9
A client contacts his or her healthcare provider through a web-based portal software program to ask for a medication refill. The client is using:

A) Intranet.
B) Virtual private network.
C) Extranet.
D) Plug-in.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
10
A nursing informatics specialist is presenting a class to a local community group about computer security and protection against malware. The specialist determines that the teaching was successful when the group states: Select all that apply.

A) "Reusing a password is probably the best thing to do."
B) "Downloading the latest software updates is important."
C) "Most regular computer users don't get computer viruses."
D) "We should scan downloaded files with antivirus software before installing."
E) "People need to avoid social networking sites entirely."
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
11
The nurse is explaining to a client how he or she can access his or her electronic medical record. Which type of connection would the nurse include as being used?

A) Broadband connection
B) Botnet
C) Client-server architecture
D) Metropolitan area network
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
12
A client at home is setting up his or her computer so that he or she can access his or her healthcare team. The client will be connected to a Wi-Fi network. Which item would the client need to set up the connection? Select all that apply.

A) Modem
B) Router
C) Mouse
D) Second keyboard
E) Web browser
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
13
A client is attempting to access a secure Wi-Fi network. To be successful, which action would the client need to do?

A) Enter the authentication code.
B) Create a new password.
C) Run a virus scan first.
D) Connect to the Internet.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
14
After reviewing the various types of network connections available, a client chooses a network connection that is considered to have excellent signal reliability. Which connection did the client choose?

A) Television cable
B) Fiber-optic cable
C) Satellite
D) Digital subscriber lines
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
15
A nurse is accessing the Internet using the following URL-http://www.ahrq.gov/research/findings/evidence-based-reports/index.html. The nurse identifies the ".gov" as:

A) Top-level domain name.
B) Folder.
C) Descriptor.
D) File name.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
16
A nurse is using a web browser and wants to save links to some of the favorite nursing information websites. Which feature would be helpful to use?

A) Streaming
B) Plug-in
C) Bookmark
D) Web cookie
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
17
A nurse is about to install antivirus software on his or her home computer. Which action would the nurse need to do first to protect his or her data?

A) Install a firewall.
B) Backup important files in another location.
C) Perform a quick scan of the files.
D) Update the software program.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
18
A nurse is reading a journal article about computer viruses. Which examples of computer viruses would the nurse most likely read about? Select all that apply.

A) Botnet
B) Worm
C) Pharming
D) Trojan horse
E) Phishing
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
19
Which characteristics would be associated with spyware?

A) Random pop-up advertisements that occur when using a program
B) Ability to monitor keystrokes to send to a third party
C) Maintenance of default home pages on web browsers
D) Inability to scan the hard drive
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
20
A nurse is checking the nurse's e-mail and finds the following: "If you have a file named 'workline' on your computer, delete it immediately. The file contains a virus that will be released in 5 days and destroy your hard drive." The e-mail goes on to describe how to delete the file. The nurse interprets this as:

A) A damaging hoax.
B) An urban legend.
C) A Trojan horse.
D) Spyware.
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 20 flashcards in this deck.