Midterm Exam Nursing Informatics
Midterm Exam Nursing Informatics
Midterm Exam Nursing Informatics
A hash code is created by math function that takes analog information and generates a
string of letters and numbers from it.
Edit
Question 2
Threat is a weakness that makes targets susceptible to an attack.
Edit
Question 3
Match each item to their appropriate description:
Response: Sender => The device that sends the data message.
Response: Transmission medium => The physical path by which a message travels
from sender to receiver.
Edit
Question 4
In the video from the lesson "Netiquette and Digital Ethics", Rule # 3 of Netiquette is
described as what?
Edit
Question 5
78% of Filipino internet users are identified as victims of crimes and malicious activities
committed online.
Response: False, 87%
Edit
Question 6
What are the possible uses of Blockchain technology?
Response: Cryptocurrency
Response: Voting
Edit
Question 7
A networking hardware that connects devices on a computer network by using packet
switching to receive and forward data to the destination device.
Response: Switch
Edit
Question 8
_____ _____ is how the network of devices/computers is arranged through the
connection of various nodes through lines of connections.
Response: network
Response: topology
Edit
Question 9
In the video from the lesson "Netiquette and Digital Ethics", Rule # 8 of Netiquette is
described as what?
Edit
Question 10
Match each item to their appropriate description:
Response: protecting information from being disclosed to unauthorized parties. =>
confidentiality
Edit
Question 11
According to the video from the lesson "Philippine Laws on Cybercrimes, Freedom of
Information and Data Privacy", there are five lawful basis for collecting information, but
they all rely on the concept of _____ .
Response: Consent
Edit
Question 12
In the video from the lesson "Computer Networks, the world wide web and the
Internet", what was mentioned as the first web browser that allowed graphics to be
embedded alongside text?
Response: Mosaic
Edit
Question 13
According to the video from the lesson "Computer Networks, the world wide web and
the Internet", Hardware in IoT can be divided it two categories, namely:
Edit
Question 14
Intellectual property is applicable to both intangible and tangible products.
Response: False
Edit
Question 15
According to the video from the lesson "Philippine Laws on Cybercrimes, Freedom of
Information and Data Privacy", what specific interagency body is tasked for the
enforcement of RA 10175?
Edit
Question 16
According to the video from the lesson "Computer Networks, the world wide web and
the Internet", the elements of Internet of Things are namely as:
Edit
Question 17
A device used to connect media that would otherwise be incompatible.
Edit
Question 18
According to the video from the lesson "Computer Networks, the world wide web and
the Internet", the value of hyperlinked information was conceptualized in 1945 by
whom?
Edit
Question 19
Match each item to their appropriate description:
Response: They believe people should act in ways that are consistent with moral rules.
=> Absolutist
Response: They favor securing the best possible consequences for all concerned. =>
Situationist
Response: They endorsed moral rules as guides for action, but admit following rules will
not always generate the best consequences. => Exceptionist
Response: They base their ethical choices on personal considerations. => Relativist
Edit
Question 20
In 1930, Libel is define under the Revised Penal Code Section 535.
Edit
Question 21
A Point to point is a communication which is accomplished via a distinct type of
one-to-many connection
Edit
Question 22
In the video from the lesson "ICT Trends , Issues , and its Role in different Industry
Sectors", what technology was described as the ability to edit ourselves to cancel out
things like cancer potentially create new beings?
Edit
Question 23
Match each item to their appropriate description:
Response: The communication is unidirectional, as on a one –way street. => Simplex
Response: Each station can both transmit and receive, but not at the same time. =>
Half-duplex
Response: Both stations can transmit and receive simultaneously. => Full- Duplex
Edit
Question 24
The word telecommunication is a compound of the Greek prefix _____ , meaning
distant, far off, or afar, and the Latin _____ , meaning to share.
Response: tele
Response: afar
Edit
Question 1
A hash code is created by math function that takes analog information and generates a
string of letters and numbers from it.
Score: 2 out of 2
Yes
Question 2
Threat is a weakness that makes targets susceptible to an attack.
Score: 2 out of 2
Yes
Question 3
Match each item to their appropriate description:
Score: 5 out of 5
Yes
Question 4
In the video from the lesson "Netiquette and Digital Ethics", Rule # 3 of Netiquette is
described as what?
Score: 2 out of 2
Yes
Question 5
78% of Filipino internet users are identified as victims of crimes and malicious activities
committed online.
Score: 2 out of 2
Yes
Question 6
What are the possible uses of Blockchain technology?
Score: 3 out of 3
Yes
Question 7
A networking hardware that connects devices on a computer network by using packet
switching to receive and forward data to the destination device.
Score: 1 out of 1
Yes
Question 8
_____ _____ is how the network of devices/computers is arranged through the
connection of various nodes through lines of connections.
Score: 2 out of 2
Yes
Question 9
In the video from the lesson "Netiquette and Digital Ethics", Rule # 8 of Netiquette is
described as what?
Score: 2 out of 2
Yes
Question 10
Match each item to their appropriate description:
Score: 3 out of 3
Yes
Question 11
According to the video from the lesson "Philippine Laws on Cybercrimes, Freedom of
Information and Data Privacy", there are five lawful basis for collecting information, but
they all rely on the concept of _____ .
Score: 2 out of 2
Yes
Question 12
In the video from the lesson "Computer Networks, the world wide web and the
Internet", what was mentioned as the first web browser that allowed graphics to be
embedded alongside text?
Score: 2 out of 2
Yes
Question 13
According to the video from the lesson "Computer Networks, the world wide web and
the Internet", Hardware in IoT can be divided it two categories, namely:
Score: 2 out of 2
Yes
Question 14
Intellectual property is applicable to both intangible and tangible products.
Score: 0 out of 1
No
Question 15
According to the video from the lesson "Philippine Laws on Cybercrimes, Freedom of
Information and Data Privacy", what specific interagency body is tasked for the
enforcement of RA 10175?
Score: 2 out of 2
Yes
Question 16
According to the video from the lesson "Computer Networks, the world wide web and
the Internet", the elements of Internet of Things are namely as:
Score: 1 out of 4
Question 17
A device used to connect media that would otherwise be incompatible.
Score: 1 out of 1
Yes
Question 18
According to the video from the lesson "Computer Networks, the world wide web and
the Internet", the value of hyperlinked information was conceptualized in 1945 by
whom?
Score: 2 out of 2
Yes
Question 19
Match each item to their appropriate description:
Score: 3 out of 4
Question 20
In 1930, Libel is define under the Revised Penal Code Section 535.
Score: 1 out of 2
Question 21
A Point to point is a communication which is accomplished via a distinct type of
one-to-many connection
Score: 2 out of 2
Yes
Question 22
In the video from the lesson "ICT Trends , Issues , and its Role in different Industry
Sectors", what technology was described as the ability to edit ourselves to cancel out
things like cancer potentially create new beings?
Score: 0 out of 2
No
Question 23
Match each item to their appropriate description:
Score: 3 out of 3
Yes
Question 24
The word telecommunication is a compound of the Greek prefix _____ , meaning
distant, far off, or afar, and the Latin _____ , meaning to share.
Score: 1 out of 2