You are on page 1of 7

CONCEPT: NURSING INFORMATICS ENDTERM EXAM

Test I Instructions: read each question carefully. Encircle the letter that best answer the
question.

1. What are computer ethics?


a. An honest, moral code that should be followed when on the computer
b. A computer program about honesty
c. A computer that fits on or under a desk
d. A list of commandments in the Bible

2. What is NOT an example of cyber bullying?


a. Creating an embarrassing picture of your classmate and forwarding it to your friend's
email addresses
b. Sending someone a mean text
c. Bullying someone in the hallway
d. Threatening someone in an instant message

3. Which is an example of plagiarism?


a. Reading a paragraph online and retyping it in your own words.
b. Copying and pasting someone else's work into your paper using quotation marks
and citing the author
c. Typing a paper in your own words
d. Copying and pasting a sentence from the Internet into your paper.

4. Which is NOT a consequence of copying or distributing copyrighted software?


a. Community Service c. Up to $10,000 in legal fees
b. Imprisonment d. Up to $50,000 in civil fees

5. Which is not a type of cyber bully?


a. "Mean Girls"
b. Power Hungry or Revenge of the Nerds
c. The Vengeful Angel
d. The Inadvertent Cyber bully "Because I Can"

6. Check TWO ways to prevent or stop cyber bullying?


a. Forward a mean message about a bully to your friends
b. Tell a parent, teacher, or administrator
c. Not forwarding mean texts sent you about a classmate
d. Use instant messenger to talk to your friends about someone's outfit you did not like
that day at school

7. Which is NOT a consequence of plagiarism?


a. You can get kicked out of college.
b. You can make a zero on your assignment.
c. You can get fired from your job.
d. You could get a warning from your college professor.
8. Which of the following is NOT a rule listed in Computer Discovery's Ten Commandments
of Computer Ethics?
a. Thou shalt not use a computer to email.
b. Thou shalt not use a computer to cyber bully.
c. Thou shalt not use a computer to interfere with other people's computer work.
d. Thou shalt not use a computer to be nosy or snoop into other people's computer
files.

9. Which of the following is NOT a rule listed in Computer Discovery's Ten Commandments
of Computer Ethics?
a. Thou shalt not use a computer to lie.
b. Thou shalt not copy copyrighted software and materials.
c. Thou shalt not let others borrow your computer.
d. Thou shalt respect other at all times when using the computer.

10. Thou shalt not create ______________________ software or games.


a. Difficult
b. Copyrighted
c. Easy
d. Harmful

11. Thou shalt not copy ___________________________ software or materials.


a. Public-domain
b. Copyrighted
c. Self-created
d. Self-published

12. "Desktop" is a computer term that refers to:


a. The initial screen showing icons for folders, files, and applications.
b. The part of your work area where the computer monitor sits.
c. Something that can and should be ignored by most users.
d. The list of all of the contents on a particular computer.

13. The "Control Panel" is:


a. A disk on which data can be stored.
b. Another term for a display screen.
c. A computer network that spans a relatively small area.
d. A system tool that allows a user to set certain settings.

14. Select one of the following to determine the proper procedure for shutting down your
computer.
a. It's best to never turn off your computer.
b. Whenever you are ready to quit, simply push the lighted button on your processor.
c. Just unplug your computer
d. Go to the Start menu and click "Shut Down"

15. The Maximize button is used to:


a. Scroll slowly through a window.
b. Expand a window to fill the entire screen.
c. Return a window to its original size.
d. Reduce a window to a button on the taskbar.
16. When you are instructed to "point and click," it means you:
a. Use the mouse to move the pointer around the screen
b. Double-click the mouse
c. Use the mouse to move the pointer around the screen and then click the mouse
button once or twice to select the object.
d. Use the mouse to move the pointer around the screen and press the mouse button
as you move the mouse.

17. The Minimize button is used to:


a. Scroll slowly through a window.
b. Reduce a window to a button on the taskbar.
c. Expand a window to fill the entire screen.
d. Return a window to its original size.

18. What program command saves a copy of a file under a different name?
a. Duplicate
b. Copy
c. Save
d. Save As

19. After you delete a file from your hard disk, it is automatically placed in the:
a. Search box c. Clipboard
b. USB flash drive d. Recycle bin

20. An unwanted program running on a computer is called a


a. Pain c. Virus
b. Sickness d. Encryption

Test II. Enumeration: Give the 10 commandments of computer ethics

21. Thou shalt not use a computer to harm other people.


22. Thou shalt not interfere with other people's computer work.
23. Thou shalt not snoop around in other people's computer files.
24. Thou shalt not use a computer to steal.
25. Thou shalt not use a computer to bear false witness.
26. Thou shalt not copy or use proprietary software for which you have not paid.
27. Thou shalt not use other people's computer resources without authorization or
proper compensation.
28. Thou shalt not appropriate other people's intellectual output.
29. Thou shalt think about the social consequences of the program you are writing or the
system you are designing.
30. Thou shalt always use a computer in ways that ensure consideration and respect for
your fellow humans.

Test III. History of Nursing Informatics in the Philippines.


Instructions: read each question carefully. Encircle the letter that best answer the question.
31. The Philippine Medical Informatics Society (PMIS) and its founders had strong influence in
the development of health informatics in the Philippines. The PMIA board composed of eleven
physicians. The organization was headed by
a. Dr. Alvin Marcelo. c. Dr. Alvin Marciano.
b. Dr. Alvin Mercado. d. Dr. Alvin Mariano.

32. The words "nursing informatics" were unfamiliar among the nursing community until the
year
a. 2006 c. 2008
b. 2007 d. 2009

33. Nursing Informatics course in the undergraduate curriculum was defined by the
Commission on Higher Education (CHED) Memorandum Order 5 Series of 2008. This was later
revised and included as Health Informatics course in CHED Memorandum Order 14 Series of
2009 and was first implemented in the summer of
a. 2007 c. 2009
b. 2008 d. 2010

34. Some of the major milestones in nursing informatics history in the Philippines includes the
participation of the Philippine Nurses Association (PNA) in the development of
a. SHIP99 c. SHAPE99
b. SHEEP99 d. CHIP99

35. In 1999, a study group was formed headed by the National Institute of Health of the
University of the Philippines Manila. This group identified international standards for health
information and their adaptability in the Philippines. Representatives from various sectors
collaborated on this project including the Philippine Nurses Association (PNA) in the person of
a. Ms. Evelyn Potacio c. Ms. Evelyn Estacio
b. Ms. Evelyn Protacio d. Ms. Evelyn Ignacio

36. Early in 2009, two persons both nurses and graduate students of Master of Science in
Health Informatics at the University of the Philippines, Manila began drafting plans to create a
nursing informatics organization which later became as the Philippine Nursing Informatics
Association. Who are these persons
a. Mr. Kristian R. Sumabat and Ms. Mia Alcantara-Santiago
b. Mr. Kristian R. Sumabat and Sheryl Ochea
c. Ms. Alexrandra Bernal and Ms. Pia Pelayo
d. Ms. Rona Abcede, and Mr. Harby Ongbay Abellanosa.

37- 40. Development of training, certification and credentialing programs are in the pipeline for
the Philippine Nursing Informatics Association. Future partnerships with local and international
nursing and health informatics organizations have started as well. Other programs are expected
to be slowly delivered with PNIA's CORE X strategic platform which stands for
37. C - Competency, 38. O - Organization, 39. R - Recognition
40. Ex - Experience and Expertise

Test 2. Multiple Choice. Select the correct answer for each of the following questions.Mark only one
answer by encircling the letter.
1. In 1998, the Canadian Nurses Association spearheaded an initiative project which is the
a. National Nursing Informatics Project c. National Nursing Informatics Protocol
b. National Nursing Informative Project d. National Health Informatics Project

2. In 2006, the Canadian Nurses Association launched the Canadian Nurses Portal Project,
shortened to NurseONE to address this vision, in the form of a
a. e-nursing portal c. e-nursing statistics
b. a-nursing strategy d. e-nursing strategy

3. Initiated the development of the ICNP, which has been translated into at least 12 European
languages and tested in several countries.
a. ICN b. ICP c. ICC d. ICPN

4. Contributes towards the appropriate use of the developed telematics infrastructure across
Europe by educating and training nurses in a harmonious way across Europe in the upcoming
field of nursing informatics.
a. The Nightingale Council b. The Nightingale System
c. The Nightingale Project d. The Nightingale Plan

5. In what year when computers were first introduced to the healthcare sectors in Asian countries
a. 1970s b. 1960s c. 1980s d. 1990s

6. The leading country in telemedicine in Asia Pacific.


a. Korea b. Japan c. Singapore d. China

7. THE PHILIPPINES NURSING INFORMATICS ASSOCIATION was founded by nurses with a common
vision to promote the use of practice, education, administration and research in the Philippines
in what year?
a. 2008 b. 2009 c. 2011 d. 2010

8. The development of Nursing Informatics systems in China also began in the late 1970s and was
first used in
a. 1985 b. 1986 c. 1987 d. 1988

9. Nursing Informatics in South America has been based more on


a. activities of Individuals c. status of individuals
b. acquisition of individuals d. skills of individuals
10. Has published guidelines and protocols to orient the development and deployment of
information and communication technology in Latin America and the Carribean
a. PAJO b. PACO c. PAMO d. PAHO

Test II Enumeration.

A.) VIPS model was developed with the purpose of conceptualizing the essential elements of nursing
care. Give the acronym for the Swedish spelling.
27. well-being
28. Integrity
29. Prevention
30. Safety

B.) VIPS model is used throughout Sweden as well to 5 European countries. What are these countries?
31. Finland
32. Norway
33. Denmark
34. Estonia
35. Latvia

C.) In Thailand, they have the Universal Healthcare Covery Policy to improve the quality and access to
services. They want services to be available to all so they established computer systems in different
places for better communication of services. This is supported by 3 organizations. What are the 3
organization?
36. Nurses Association of Thailand
37. World Health Organization
38. Ministry of Health

D.) Barriers to development of Nursing Informatics continue to remain in Japan. Give at least two(2) of
these barriers.
39. Few researchers and educators
40. Little development on educational tools And the cost of improving the network and computer
environment is high.

1. An act expanding the scope of the practice of midwifery, otherwise known as the philippine midwifery
act of 1992.

a. R.A. No. 7391 b. R.A. No. 7392 c. R.A. No. 7393 d. R.A. No. 7394

2. This bill seeks to strengthen the practice of midwifery in the country by clearly defining the practice of
midwifery, with particular emphasis on their role to provide primary and community health care, and
mandating the Board of Midwifery to monitor the condition of the profession and ensure quality
midwifery education.

a. Senate Bill No. 727 b. Senate Bill No. 737 c. Senate Bill No. 747 d. Senate Bill No. 757

3. An Act Regulating Midwifery Training and Practice.

a. R. A. No. 2643 b. R. A. No. 2644 c. R. A. No. 2645 d. R. A. No. 2646

4. TRUE or FALSE. Hazing not only happens at the college level, but also in high schools, middle schools,
and in the workplace.

5. TRUE or FALSE. If you were hazed, it’s OK to haze other members, because it is tradition.

6. An act passed in 1995, or the Anti-Hazing Law which regulates initiation rites and prohibits physical
harm and violence against applicants.

a. Republic Act 8049 b. Republic Act 8048 c. Republic Act 8047 c. Republic Act 8046
7. An act to further strengthen the anti-drug campaign of the government, amending for the purpose
section 21 of republic act no. 9165, otherwise known as the “comprehensive dangerous drugs act of
2002”

a. R.A. no. 10640 b. R.A. no. 10642 c. R.A. no. 10643 d. R.A. no. 10644

8. High school students who don’t plan to go to college are far more at risk for _____ than students who
do plan to go to college.

a. using illegal drugs b. drinking alcohol c. smoking cigarettes d. all of the above

9. Youth drug use is typically a _____ activity.

a. solitary b. private c. isolated d. group

10. _____ suggests that the decision to use drugs or alcohol is based on the calculated costs and benefits
of the activity.

a. Strain b. Rational choice c. Life-course d. Critical

You might also like