Which of the following examples of nursing actions that demonstrate being with is inaccurate?
1. Being emotionally present to another
2. Seeking to understand another point of view
3. Learning what matters most to each patient and family
4. Assessing the patient's physical well-being
Question 2Which of the following is not a clue that spyware has infected a computer?
1. Ability to SKYPE
2. Appearance of pop-ups
3. Random error messages
4. Poor system performance
Question 3Which of the following is a state of mind, a specific place, freedom from intrusion, or control over the exposure of self or of personal information?
1. Privacy
2. Confidentiality
3. Security
4. HIPAA
Question 4During an attempted carjacking, the female victim slams a car door on the male assailant's hand, possibly causing serious injuries. The assailant runs away.
Local police contact the emergency department of a local hospital to determine if anyone matching the assailant's description has been treated for a hand injury. The hospital reveals that they currently have such a patient. The police ask the nurse manager to reveal the identity of the patient. It is noted that no court order has been issued. The nurse manager asks the patient to sign a consent form that allows the hospital to reveal his name and does mention the police. If the patient signs the consent form, what would it be considered? 1. Informed consent
2. Consent
3. HIPAA violation
4. Breech of privacy
Question 5Which of the following is the protection of information against threats to its integrity, inadvertent disclosure, or availability?
1. Information security
2. Survivability
3. Confidentiality
4. Privacy
Question 6Which of the following measures are recommended for enhancing information security? Select all that apply.
1. File deletion software is used to overwrite hard disk files, using meaningless information.
2. Storage media that has been erased is disposed of in the dumpster.
3. Individuals routinely witness and record the destruction of records.
4. Papers such as prescriptions, laboratory specimen labels, and identification bracelets are disposed of in the dumpster.
5. Each page of output is assigned a serial number and the numbers are recorded when documents are destroyed.