REGIS NU631 2021 March Week 10 Quiz Latest (100% Graded)
NU631 Scientific Inquiry for Evidence-Based Practice
Week 10 Quiz
Question 1What are the principal tasks of data collection?
a.Performing constant comparison for qualitative data
b.Maintaining research controls as indicated in the study design
c.Cross-checking with the literature review
d.Obtaining institutional review board permission
Question 2How may raw research data, with identifiers, obtained from a hospital be stored?
a.It must be kept only in the hospital’s computer system; at the end of the workday, all excerpted data must be deleted.
b.In a password-protected computer, located in a private office or residence.
c.In any e-mail account
d.On a private website
Question 3What are the purposes of completing a pilot study?
a.It helps identify problems the researcher might encounter while collecting data.
b.It justifies the existence of a research gap.
c.It gives the researcher preliminary data to present the institutional review board in order to obtain permission to conduct research.
d.It provides nominal and ordinal data with which the researcher can construct better instruments.
Question 4A nurse is conducting her master’s thesis research in the unit in which she works as a staff nurse. The focus of her thesis is burned children’s pain, with a child life specialist assisting the child versus without. She is providing child life specialist presence every other day at the mid-morning dressing change. For obvious reasons, she wants to keep everything else consistent for the four contiguous days of data collection. On the second day of four, with the child life specialist present, one child demonstrates poor pain control. The nurse researcher would ordinarily advocate for more pain medication for this child, but if she does, she will not be able to compare the data with that of the previous day. What is this an example of?
b.Subject as object
Question 5How may research data, code-named and stripped of all identifiers, be stored?
a.Separate from the master list of identifiers and codes
b.Only in a locked box in a safe
c.Anywhere the researcher decides to store it that has reasonable security
d.Only in a password-protected computer, located in a private office or residence
Question 6A researcher intends to collect data, including patients’ ratings of pain and anxiety, during a procedure. No electrical equipment or photography may be used in the procedure room. In order to record the various pain and anxiety ratings, the researcher may plan to use which of the following? Select all that apply.
a.A plug-in word processor
b.A form with large margins, or a column for comments, or both
c.A pencil with an eraser
d.A form with prelabeled columns and rows
Question 7Planning as a step in the quantitative research process ends when the data collection has begun. Which is the true statement about planning in the qualitative research process?
a.Since sample size is not usually decided upon ahead of time, there is no practical reward to planning the qualitative research study ahead of time.
b.There is no planning in the qualitative research process; it all emanates from the data collected.
c.Everything about a qualitative study is planned ahead of time, except for analysis of the data.
d.The researcher may adapt strategies for data collection or analysis well into the study.
Question 8What is the nursing research institute abbreviated as at the National Institutes of Health?
Question 9What does NIH stand for?
a.National Institutes of Health
b.National Institutes of Healthy-Living
c.National Institutes of Harmony
d.National Institutes of Healing
Question 10The quantitative researcher collects many pieces of quantitative data as words, not numbers. Prior to statistical analysis, all of the data pieces must be coded. What does this mean?
a.The data are transformed into numerals corresponding to words, such as: 0—no college degree, 1—bachelor’s degree, 2—master’s degree, 3—PhD or EdD.
b.The essence of each word is noted; later, these essences emerge as themes.
c.The data are typed into a computer, and the computer is instructed to transform the words into binary values, using only 0 and 1, by adding up the numbers of each letter in the alphabet.
d.The data regarding protected data are transformed to code names; a list is made and kept in a secure location.