【单选题】
某患儿因急性颅内高压入院治疗,目前该患儿出现瞳孔大小不等,正确的体位是___
A. 仰卧位
B. 俯卧位
C. 头低脚高位
D. 头肩抬高25°
E. 平卧,头偏向一侧
查看试卷,进入试卷练习
微信扫一扫,开始刷题

答案
D
解析
暂无解析
相关试题
【单选题】
以下关于新生儿蓝光治疗描述正确的是___
A. 灯管与皮肤的距离为55~65cm
B. 光疗时不需要补充水分
C. 光疗时体温>38.5C要暂停光疗
D. 当血清胆红素下降到205μmol/L以下时可停止光疗
E. 灯管使用超过1000小时要更换
【单选题】
婴幼儿腹泻治疗原则不包括___
A. 调整、适当限制饮食
B. 纠正水、电解质紊乱
C. 控制肠道内外感染,长期应用广谱抗生素
D. 加强护理,防止并发症
E. 严密观察病情,对症治疗
【单选题】
暖箱护理的注意事项,哪项是错误的___
A. 使用暖箱应随时观察情况
B. 冬季暖箱应放在取暖设备附近
C. 暖箱不宜放在阳光直射处
D. 掌握暖箱性能,安全使用
E. 严禁骤然提高暖箱温度
【单选题】
4岁小儿,曾有过多出汗,碱性磷酸酶正常,严重"O"型腿。应给予___
A. 按摩腿外部肌群
B. 做俯卧位抬头展胸运动
C. 手术矫正
D. 维生素D肌内注射
E. 口服维生素D同时服用钙剂
【单选题】
早产儿肝脏功能不全,生理性黄疸的特点为___
A. 较足月儿轻,持续时间短
B. 较足月儿重,持续时间长
C. 较足月儿轻,持续时间长
D. 较足月儿重,持续时间短
E. 与足月儿一致
【单选题】
患儿,足月顺产,6天,母乳喂养,吃奶好,皮肤黄染,血清胆红素153μmol/L。应采取的措施是___
A. 输血浆
B. 输血蛋白
C. 蓝光照射
D. 换血治疗
E. 不需处理
【单选题】
过敏性紫癜的临床表现不正确的是___
A. 反复发作性皮肤紫癜,大小不等,高于皮肤表面,对称性分批出现,多位于下肢及臀部
B. 腹型表现为阵发性腹绞痛或持续性钝痛,多位于脐周或下腹部
C. 关节型多见四肢大关节游走性疼痛,常伴有关节肿胀、发热
D. 关节型治愈后留有后遗症
E. 紫癜发生1周后若出现蛋白尿、血尿或管型尿为肾型
【单选题】
关于小儿身长发育,正确的是___
A. 婴儿期和学龄期两个增长高峰
B. 2~12岁计算公式为:年龄×7+80(cm)
C. 1周岁时为65cm
D. 12岁时上部量与下部量相等
【单选题】
婴儿期计划免疫下列哪项不正确___
A. 2个月开始服脊髓灰质炎减毒活疫苗糖丸
B. 2~3个月接种卡介苗
C. 8个月注射麻疹疫苗
D. 3个月接种白百破三联疫苗
E. 1岁后结合季节,注射乙脑疫苗
【单选题】
患儿,5个月。健康查体发现有颅骨软化、枕秃,诊断为维生素D缺乏性佝偻病。除补充维生素D外,应___
A. 增加母乳量
B. 增加房间温度
C. 增加睡眠时间
D. 增加户外活动
E. 增加饮水量
【单选题】
下列不符合新生儿期特点的是___
A. 易发生适应环境不良综合征
B. 常因分娩带来产伤和窒息
C. 发病率高,死亡率也高
D. 免疫功能低下和多发感染性疾病
E. 生理调节功能基本成熟
【单选题】
护士给婴儿盆浴为防水进入耳朵的方法是___
A. 左手托住小儿头颈部
B. 用左手拇指及中指将双耳郭压住耳孔
C. B.用左手拇指及中指将双耳郭压住耳孔
D. 洗澡时戴防水耳塞
E. 洗澡前用棉球塞耳孔
【单选题】
女性,25岁,妊娠6个月,因头晕、心悸、气短、面色苍白入院,诊断为营养性巨幼细胞性贫血,应多补充的食物不包括___
A. 谷类
B. 动物肝、肾
C. 新鲜水果
D. 绿叶蔬菜
E. 紫菜、木耳、香菇
推荐试题
【填空题】
27.20世纪80年代末、90年代初,随着东欧剧变和苏联解体,持续近半个世纪的冷战格局被打破。 “___ ” 是当前乃至今后相当长时期内世界主要战略力量对比的总体态势和总体特征。
【单选题】
What is an example of social engineering?___
A. gaining access to a computer by observing the user login credentials
B. gaining access to a build through an unguarded entrance
C. gaining access to a server by using a USB stick
D. gaining access to a server room by posing as local IT
【单选题】
Which type of Layer 2 attack enables the attacker to intercept traffic that is intended for one specific recipient?___
A. BPDU attack
B. DHCP starvation I LAB
C. MAC address spoofing
D. CAM table overflow
【单选题】
Which about nested policy maps in a zone-based firewall is true ?___
A. They are limited to two leve ls in a hierarchical policy
B. Parent policies are previously defined policies that are defined by using the service policy command
C. A child policy is a new policy that uses a pre-existing policy.
D. A child policy is a new that uses a pre-existing policy
【单选题】
In which configuration do you configure the ip ospf authentication key 1 command?___
A. routing process
B. interface
C. privileged
D. global
【单选题】
Which statement about command authorization and security contexts is true?___
A. If command authorization is configured, it must be enabled on all contexts.
B. The change to command invokes a new context session with the credentials of the currently
C. AAA settings are applied on a per-context basis
D. The enable. 15 user ang admins with chang to permission ha e dfferent command authorization levels pertontext
【单选题】
Which command do you enter to enable authentication for OSPF on an interface?___
A. router(config-if)#ip ospf message-digest-key 1 md5 CIS COPASS
B. router(config-if)#ip ospf authentication message-digest
C. router(config-if)#ip ospf authentication-key CISCOPASS
D. router(config-if)#area 0 authentication message-digest
【单选题】
What feature defines a campus area network?___
A. It has a single geographic location
B. It lacks external connectivity.
C. It has a limited number of segments.
D. It has limited or restricted Internet access
【单选题】
Which type of attack most commonly involves a direct attack on a network?___
A. :phishing
B. Trojan horse
C. denial of service
D. social engineering
【单选题】
What information does the key length provide in an encryption algorithm?___
A. the cipher block size
B. the hash bloc k size
C. the number of permutations
D. the packet size
【单选题】
How do you verify TaCACS+ connectivity to a device?___
A. You successfully log in to the device by using the local credentials
B. You connect via console port and receive the login prompt.
C. You connect to the device using SSH and receive the login prompt.
D. You successfully log in to the device by using ACS credentials
【单选题】
Which term best describes the concept of preventing the modification of data in transit and in storage?___
A. availability
B. confidentially
C. fidelity
D. integrity
【单选题】
Which loS command is used to define the authentication key for ntp?___
A. switch(config )#ntp authentication-key 1 mds Clcs
B. switch(config )#ntp authenticate
C. switch(config)#ntp trusted-key 1
D. switch(config)#ntp source 192.168.0.1
【单选题】
What is true about the cisco lOS Resilient Configuration feature ?___
A. The feature can be disabled through a remote session
B. There is additional space required to secure the primary cisco lOS image file.
C. The feature automatically detects image or configuration version mismatch.
D. Remote storage is used for securing files
【单选题】
When is the default deny all policy an exception in zone-based firewalls?___
A. when traffic terminates on the router via the self zone
B. when traffic traverses two interfaces in different zones
C. when traffic traverses two interfaces in the same zone
D. when traffic sources from the router via the self zone
【单选题】
.If an access port is assigned as an isolated port in a PVLAN, which network ports can it communicate with?___
A. promiscuous ports in the same PLVAN
B. isolated ports in the same PVLAN
C. all ports in the same PAVLAN at ILAR
D. all ports in the adjacent PVLAN
【单选题】
Which IPSEC mode is used to encypt traffic directly between a client and a server VPN endpoint?___
A. quick mode
B. transport mode
C. aggressive mode
D. tunnel mode