978-0132574952 Chapter 04 Part 2

subject Type Homework Help
subject Pages 9
subject Words 2996
subject Authors Toni Lee Hebda

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Correct Answer: 4
Rationale 1: A browser is a retrieval program that allows access to hypertext and hypermedia documents on the
Web by using HTTP. There are some things that browsers do not do, such as play animations. In this application, a
plug-in was required (Adobe Flash Player).
Rationale 2: Search engines use automated programs that search the Web, compiling a list of links to sites
relevant to keywords supplied by the user. The correct answer is a plug-in; it is a program used to extend the
capabilities of a browser. In this case a browser was running in order to view the Web page and the plug-in was
needed to extend its capabilities (to play animation).
Rationale 3: There are some things that helper programs do not do, such as play animations. In this application, a
plug-in was required (Adobe Flash Player). The main difference between helper and plug-in programs is that the
first does not require the browser to be running to function, while the second does. The correct answer is a plug-
in; it is a program used to extend the capabilities of a browser. In this case a browser was running in order to view
the Web page and the plug-in was needed to extend its capabilities (to play animation).
Rationale 4: In this application, a plug-in was required (Adobe Flash Player). A browser was running in order to
view the Web page and the plug-in was needed to extend its capabilities.
Global Rationale:
Cognitive Level: Applying
Client Need: Safe Effective Care Environment
Client Need Sub: Management of Care
Nursing/Integrated Concepts: Communication and Documentation
Learning Outcome:
Question 13
Type: MCSA
SPIM is defined as which of the following?
1. Unsolicited messages
2. Personal instant messaging
3. Solicited messages
4. Wiki responses
page-pf2
Question 14
Type: MCSA
Which of the following statements is true about search indexes?
1. Search indexes are appropriate when specific information is requested.
2. Search indexes are appropriate when general information is requested.
3. Search indexes are necessary for access to certain databases.
4. Search indexes can only be found in libraries.
page-pf3
Question 15
Type: MCMA
Java is a widely used programming language that enables the display of moving text, animation, and musical
excerpts on Web pages. Which of the following are true about Java?
Standard Text: Select all that apply.
1. Helper programs and plug-in programs are often written in Java.
2. Considered an alternative to Microsoft's ActiveX
3. Resides on the server until it is needed by client computer
4. Runs on any Java-enabled browser
5. Reduces the need to purchase, install, and maintain on-site software
page-pf4
Question 16
Type: MCSA
A hospital plans to share data with all physician offices that utilize their facilities. Which of the following
approaches would best meet the need?
1. Internet
2. Intranet
3. Web portal
4. Extranet
page-pf5
Question 17
Type: MCSA
Which of the following is not an e-mail organizational domain?
1. .edu
2. .ca
3. .govn
4. .org
Question 18
Type: MCSA
Which nonprofit professional organization provides direction when issues arise on the Internet?
1. The Web Regulation Agency
2. The Internet Society
3. The Web Society
Hebda, Handbook of Informatics, 5/e Test Bank
Copyright 2012 by Pearson Education, Inc.
page-pf6
4. Java
Question 19
Type: FIB
URL is an acronym for_____________________.
Standard Text:
Correct Answer: Uniform Resource Locator
Hebda, Handbook of Informatics, 5/e Test Bank
Copyright 2012 by Pearson Education, Inc.
page-pf7
Rationale : URL is an acronym for Uniform Resource Locator.
Global Rationale:
Cognitive Level: Remembering
Client Need: Safe Effective Care Environment
Client Need Sub: Management of Care
Nursing/Integrated Concepts: Teaching and Learning
Learning Outcome:
Question 20
Type: MCSA
One of the greatest concerns articulated by Internet users is security breaches. Which of the following is the best
method to protect the integrity of the computer and its data?
1. Construct a separate firewall for the Web server.
2. Ignore security warnings.
3. Keep antivirus systems up-to-date and do not install intrusion detection systems to hail attacks.
4. Do not install security patches.
page-pf8
Question 21
Type: MCSA
Which of the following is not considered a search engine?
1. Google
2. Altavista
3. Webinar
4. Bing
Question 22
Type: MCSA
Mrs. Jones is admitted to the medical-surgical unit with acute shortness of breath and substernal chest pain that
she has experienced for several days. The nurse asks her why she did not contact her primary care provider sooner
and she responded, "The website that I checked said that I had an allergy." What is the best response to Mrs.
Jones?
1. "You are right. The information on the Internet is fairly accurate."
2. "Mrs. Jones, not all websites are accurate and you should check to make sure they were created by a reputable
source."
3. "The Internet has a great deal of accurate information."
Hebda, Handbook of Informatics, 5/e Test Bank
Copyright 2012 by Pearson Education, Inc.
page-pf9
4. "Why would you check the Internet first?"
Question 23
Type: MCSA
Which is the most important legal statement about creating personal Web pages?
1. A Web page developer does not have to abide by copyright laws before posting information.
2. A Web page developer must review copyright laws before posting information.
3. Nonprofit organizations are the only entities that must abide by copyright laws.
4. For profit agencies are the only entities that must abide by copyright laws.
page-pfa
Hebda, Handbook of Informatics, 5/e Test Bank
Copyright 2012 by Pearson Education, Inc.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.