G-W Learning
|
Health Sciences
Activities
Web Links
Resources
Support
Mobile Site
Back
Chapter Review and Assessment
Short Answer
Give three examples of computer hardware. Explain the function of each item.
Give three examples of computer software. Explain the function of each item.
What is the difference between the Internet and the World Wide Web?
What is malware?
Why is it important for a healthcare facility to maintain powerful firewalls that protect their computer system?
Why might a patient need a bone marrow transplant? Describe the science behind this procedure.
What are four of the most commonly transplanted organs?
How does robotic surgery differ from traditional surgery?
True/False
True or False?
Maintaining confidentiality of patient records is the duty of all members of the healthcare team.
A. True
B. False
True or False?
Employers in many workplaces can monitor your activity on the Internet while you are at work.
A. True
B. False
True or False?
MRI, CT, and PET are all abbreviations for diagnostic imaging procedures.
A. True
B. False
True or False?
Quality control procedures are limited to the dietary department of the hospital.
A. True
B. False
True or False?
Scientists have been successful in cloning mammals, plants, and reptiles.
A. True
B. False
True or False?
Robotic surgery is performed with no human intervention.
A. True
B. False
True or False?
CPU stands for central progression unit.
A. True
B. False
True or False?
Medical information found on the Internet is always accurate.
A. True
B. False
True or False?
Scanners are categorized as software.
A. True
B. False
Multiple Choice
_____ is
not
a type of computer disruption.
A. A cookie
B. A virus
C. Spyware
D. Destructo-ware
A(n) _____ is a small mesh tube used to expand blocked or narrowed arteries.
A. stent
B. dialysis machine
C. artificial lymph node
D. MRI
The term _____ describes devices that are connected to the computer.
A. databases
B. malware
C. software
D. hardware
Programs and data are stored at remote locations and accessed online when _____ is used
A. a USB flash drive
B. cloud technology
C. remote saving
D. a jump drive
_____ enable online learning and include student tracking, assessment, and communication tools.
A. Cookies
B. Firewalls
C. Virtual learning environments
D. Podcasts
A computer virus is capable of _____.
A. destroying hardware
B. duplicating itself
C. spreading through e-mails
D. All of the above.
_____ are formed by a machine that scans the body for tracer material, which helps show how tissues and organs are functioning.
A. CT scans
B. MRIs
C. PET scans
D. All of the above.
A computer scanner is _____.
A. used to listen to police calls
B. considered software
C. is never combined with any other device
D. converts scanned items into digital files
Healthcare simulations are used _____.
A. only in medical schools
B. for educating patients about upcoming procedures
C. widely in many schools for training healthcare workers
D. for demonstrating procedures for the general public
Critical Thinking Exercises
What steps have you taken to protect the data on your computer? Have you ever experienced an intrusion into your computer? If so, what could you have done to prevent this computer disruption?
Are your computer skills up to par? Do you feel confident in your abilities to use complex computer systems like the ones found in most healthcare facilities? If not, what can you do to improve your computer skills?
What healthcare technology interests you the most? Why?
Would you consider donating your organs in the event of a fatal accident? Have you checked the organ donor box on your driver’s license? Do you have objections to being an organ donor?
Research a controversy that has developed from advances in biotechnology. Examples of controversial topics include cloning, stem cell research, animal testing, and selling organs for transplant.
Your Name
Your E-mail
Send yourself a copy
Your Instructor's E-mail
Additional Recipient's E-mail (optional)
Comments
I confirm my input is correct and am ready to submit