Millennium College of Nursing Sciences, Awka Introduction To Nursing Informatics Question Guide
Millennium College of Nursing Sciences, Awka Introduction To Nursing Informatics Question Guide
Millennium College of Nursing Sciences, Awka Introduction To Nursing Informatics Question Guide
QUESTION GUIDE
2. Which of the following is not one of the four major functions of a computer?
A. output
B. storage
C. processing
D. calculation
1
D. contrast of the pixels on the screen
5. All of the following are important to consider when buying an LCD monitor
EXCEPT
A. brightness
B. viewing angle
C. pixel swap rate
D. resolution
6. Restarting the system after it has been completed powered off is called
A. a warm boot
B. a standby start
C. hibernation
D. a cold boot
10. Which one of the following statements is not true about instant messaging?
A. it is a popular form of communication
B. you communicate in real time
C. only two people can im at the same time
2
D. like e-mail, im is not good for private conversations
11. When shopping online which of the following does not indicate that you have a
secure connection display?
A. a closed padlock icon in the status bar
B. the url begins with https
C. the word “secure” in the title bar
D. the verisign seal on the web page
3
B. a presence provider
C. the internet authority
D. a design company
16. A browser
A. displays web documents
B. allows you to navigate
C. allows you to copy, print and transfer documents
D. all of the above
18. When you use a search engine, the term hit refers to
A. a popular site
B. any site that’s listed
C. any site that’s related to popular music
D. any site related to baseball
19. Search engines search indexes of key terms that are often compiled by a
software program called
A. an insect
B. a spider
C. a worm
D. none of the above
4
D. none of the above
22. On the keyboard, the key you press to finalize a command or entry is
A. enter
B. control
C. escape
D. all of the above
5
B. jack philby
C. john neumann
D. thomas watson
38. ------------ unit of CPU directs and co-ordinates all operations of a computer.
A. alu
B. ram
C. control unit
D. register
39. Memory of a computer is generally expressed in terms of ‘K’, where ‘K’ stands
for
A. 1042
B. 1024
C. 1204
6
D. none of these
41. --------------cards are an integrated circuit that generates an audio signal and
sends it to a computer’s speakers:
A. video card
B. sound cards
C. web cam
D. none of these
42. FORTRAN is a :
A. high level language
B. low level language
C. assembly language
D. none of these
45. These are machines which are used in computers to communicate with other
computing systems:
A. motherboard
B. modem
C. cd rom
D. graphic cards
7
A. local area network
B. loyal area network
C. large area network
D. none of these
56. ………………….. is the primary large printed circuit board within a personal
computer.
A. motherboard
B. main memory
C. magnetic disk
D. none of these
8
D. none of these
59. Which of the following documents handling system is not used for storage of
documents
A. cd-rom
B. microfiche
C. microfilm
D. none of these
63. Any two computers connected through a telephone line should be connected
with a………….on both sides.
A. printer
B. scanner
C. hard disk
D. modem
9
66. Which of the following items is not used in Local Area Networks?
A. modem
B. printer
C. computer
D. cable
68. What is the name of the network technology in which there are bidirectional
links between each possible node?
A. star
B. ring
C. mesh
D. tree
10
A. optical fibre
B. coaxial fibre
C. microwave transmission
D. none of these
72. Which data communication method is used for sending data in both direction
at the same time?
A. half duplex
B. full duplex
C. super duplex
D. simplex
74. Which of the following is suitable for networking in two adjacent buildings?
A. wan
B. lan
C. man
D. van
75. Ethernet networks transmit data in small units. These units are called………
A. baud
B. frames
C. data bundles
D. none of these
11
76. Baud rate means
A. the rate at which data is transferred
B. the rate at which data is processed
C. the rate at which data is received from the modern
D. none of these.
12
D. a command
90. Which one of the following statements is NOT true about instant messaging?
A. it is a popular form of communication
B. you communicate in real time
C. only two people can mi at the same time
D. like e-mail im is not good for private conversations
13
91. When shopping online, which of the following does NOT indicate that you have
a secure connection displays?
A. a closed padlock icon in the status bar.
B. the url begins with https.
C. the word ‘’secure’’ in the title bar.
D. the verisign seal on the web page.
14
96. Which of the following provides the fastest broadband internet connection by
transmitting data at the speed of light
A. cable
B. dsl
C. fiber optics
D. satellite
97. The primary disadvantage to DSL internet access is the quality and
effectiveness of service
A. are affected by the number of users on the same dsl line at any time
B. depend on your proximity to a phone company central office
C. can be affected by adverse weather conditions
D. depend on the internet service provider you select
100. Which of the following is not a use of computers in the legal environment?
A. creating animations that simulate the crime for use in the courtroom
B. tracking criminal behavior patterns
C. predicting criminal behavior patterns
D. conducting interviews with suspects
15
76. Baud rate means
A. the rate at which data is transferred
B. the rate at which data is processed
C. the rate at which data is received from the modern
D. none of these.
16
86. Linux is a ……………………. Operating system
A. open-source
B. windows
C. microsoft
D. mac
90. Which one of the following statements is NOT true about instant messaging?
A. it is a popular form of communication
B. you communicate in real time
C. only two people can mi at the same time
D. like e-mail im is not good for private conversations
17
91. When shopping online, which of the following does NOT indicate that you have
a secure connection displays?
A. a closed padlock icon in the status bar.
B. the url begins with https.
C. the word ‘’secure’’ in the title bar.
D. the verisign seal on the web page.
18
96. Which of the following provides the fastest broadband internet connection by
transmitting data at the speed of light
A. cable
B. dsl
C. fiber optics
D. satellite
97. The primary disadvantage to DSL internet access is the quality and
effectiveness of service
A. are affected by the number of users on the same dsl line at any time
B. depend on your proximity to a phone company central office
C. can be affected by adverse weather conditions
D. depend on the internet service provider you select
100. Which of the following is not a use of computers in the legal environment?
A. creating animations that simulate the crime for use in the courtroom
B. tracking criminal behavior patterns
C. predicting criminal behavior patterns
D. conducting interviews with suspects
19
D. south korea
105. The device that tracks movement is a
A. gps
B. rfid tag
C. mobile phone
D. patient simulator
106. Which of the following is not a good reason to learn more about computers?
A. to keep your home secure
B. to increase your career options
C. to learn how to hack into an organisation’s main computer
D. to make better informed purchasing decisions
20
B. robots
C. home appliances
D. none of these
112. Knowledge based systems have been developed for fields such as:
A. financial markets
B. diagnosing diseases
C. scheduling airplanes
D. all of these
118. The five steps, input, processing, output, storage and retrieval, and
distribution and communication are all part of
A. the information super highway
B. the internet
C. the information processing cycle
D. none of the above
21
120. Typical operating systems include
A. microsoft word and excel
B. adobe photoshop and pagemaker
C. both a and b
D. neither a nor b
22
121. Computers are used in business to
A. process transactions
B. allow people to work at home
C. do desktop publishing of documents
D. all of the above
127. In this type e-governance is created between the government and citizen?
A. g2g
B. g2c
C. g2b
D. none of these
130. This refers to the use of small and portable computing devices in wireless
enabled networks that provide wireless connections to a central main server.
A. cloud computing
B. mobile computing
23
C. green computing
D. none of these
131. This is a mechanism of delivery of short messages over the mobile networks.
A. mms
B. sms
C. ems
D. none of these
134. This is a plastic card embedded with a computer chip that stores and transacts
data between users:
A. credit card
B. smart card
C. debit card
D. none of these
24
C. dna computers
D. graphic cards
D. none of these
25
D. none of these
26
146. E H R means………………………
A. electronic health record
B. electronic health care
C. election hour report
D. none of these
149. ………….. is a computer based tool for mapping and analyzing things that
exist and events that happen on earth.
A. gis
B. gps
C. bis
D. none of the above
151. The device best suited for a sales person who has to demonstrate processor-
intensive multimedia to clients is a
A. smartphone with internet capabilities
B. pda with an external monitor
C. tablet pc
D. notebook computer
154. Portable devices that can be synchronized with your home computer are
A. pdas and gps units
B. ipods pdas and cell phones
C. pagers and gps units
D. any device with bluetooth.
27
B. processed data
C. collection of data
D. none of these
28
D. none of these
162. The height at which the GPS satellite is above the earth’s surface is
A. 12000 miles
B. 1000km
C. 1000miles
D. none of these
163. The knowledge that can be spoken in language and transmitted among
individuals.
A. general knowledge
B. explicit knowledge
C. tacit knowledge
D. none of the above
164. This is the exclusive right granted by statute to the author of the works to
reproduce dramatic, artistic, literary or musical work or to authorize its
reproduction by others.
A. patent
B. copy right
C. trade mark
D. none of the above
165. This is a legal monopoly granted for a limited time to the owner of an
invention.
A. patent
B. copy right
C. trade mark
D. none of the above
166. Any symbol, logo, or name used to enable the public to identify the supplier of
goods.
A. patent
B. copy right
C. trade mark
D. none of the above
29
D. none of these
30
171. IPR stands for………………
A. intellectual property rights
B. individual property rights
C. inter person rights
D. none of these
174. ………………….is a prototype portal site for biological information and bio-
resource information.
A. brnet
B. inflibnet
C. nicenet
D. none of these
31
176. CBT stands for:
A. computer based training
B. computer based tooling
C. computer based technology
D. none of these
180. Intellectual Property Rights does not cover the following area
A. copyright
B. patents
C. trademark
D. none of these
184. When shopping online which of the following does NOT indicate that you have
a secure connection displays?
A. a closed padlock icon in the status bar
B. the url begins with https
C. the word “secure” in the title bar
D. the verisign seal on the web page.
185. Which of the following is annoying, but really doesn’t render any harm to
32
your computer?
A. adware
B. spyware
33
C. sneakware
D. malware
186. One scam that lures internet users into revealing personal information is
A. malware
B. phishing
C. spam
D. internet hoax
188. When hacker use a program that pretends to be useful to a user while actually
allowing the hacker to gain control of the user’s computer, this is called a
A. zero-day attack
B. trojan horse attack
C. distributed denial of service attack
D. boot sector virus attack
34
C. logic bombs
D. macro viruses
191. Flash drives have replaced floppy disks as the preferred method of portable
storage because:
A. they hold much more data than floppy disks
B. data is not magnetic so less subject to errors
C. they have quicker access time than a floppy drive
D. all of the above
193. This is based on individuals who know how to use these technologies and those
who do not.
A. access
B. usage
C. usage quality
D. none of the above
194. This refers to the gap between people who possess regular access to
information technology and those who do not have this access.
A. digital divide
B. discrimination
C. computer divide
D. none of these
195. This type of digital divide is based on the difference between individuals with
access and those without access.
A. access
35
B. usage
C. usage quality
D. none of the above
198. This kind of attack involves altering raw data just before a computer
processes it and then changing it back after the processing is completed.
A. data diddling
B. salami attacks
C. virus attack
D. none of the above
199. This kind of crime is normally common in the financial institutions or for the
purpose of committing financial crimes.
A. data diddling
B. salami attacks
C. virus attack
D. none of the above
36
C. 2008
D. none of these
204. ………………refers to a code of safe and responsible behavior for the Internet
Community
A. cyber ethics
B. social issues
C. cyber crime
D. none of the above
205. ………………… refers to unlawful acts wherein the computer is either a tool
or target or both.
37
A. cyber crime
B. cyber ethics
C. cyber law
D. none of the above
206. ………………refers to sending large number of mail to the victim, which may
be an individual or a company or even mail servers there by ultimately resulting
into crashing.
A. email bombing
B. logic bomb
C. virus
D. none of the above
207. …………….. are programs that attach themselves to a computer or a file and
then circulate themselves to other files and to other computers on a network.
A. virus
B. logic bomb
C. web jacking
D. none of these
208. In ……………… the hacker gains access and control over the web site of
another.
A. web jacking
B. time theft
C. logic bomb
D. none of the above
38
210. ……………………..is the process of coding and scrambling of messages to
prevent unauthorized access to or understanding of the data being transmitted.
A. encryption
B. firewalls
C. antivirus program
D. none of the above
214. Which chapter of the IT Act deals with computer related unlawful acts?
A. chapter x
B. chapter xi
39
C. chapter ix
D. chapter viii
216. This is a software that is distributed under a licensing arrangement and which
allows the computer code to be shared, viewed and modified by other users and
organisations.
A. free software
B. open source software
C. gnu
D. none of the above
219. This is a storage location from which software packages may be retrieved and
installed on a computer.
A. software distribution
40
B. software repository
C. operating system
D. none of the above
220. AbiWord is a :
A. word processor
B. spreadsheet
C. database
D. none of these
41
C. files
D. none of these 6
42