NCLEX-RN
NCLEX RN Questions with Detailed Explanations Questions
Extract:
Question 1 of 5
The nurse is preparing to assess a client admitted with a diagnosis of trigeminal neuralgia (tic douloureux). On review of the client's record, which symptom should the nurse expect the client is experiencing?
Correct Answer: C
Rationale: Trigeminal neuralgia is a chronic syndrome characterized by an abrupt onset of pain. It involves one or more divisions of the trigeminal nerve (cranial nerve V). The remaining options are incorrect.
Question 2 of 5
A mother who is breast-feeding and has known food sensitivities is asking the nurse what foods she should avoid in her diet. The nurse should advise her to avoid which foods? Select all that apply.
Correct Answer: C
Rationale: Common food allergens like peanuts can pass through breast milk and cause reactions in sensitive infants. Fish, soy, beef, and lamb are less commonly associated with allergic reactions in breast-fed infants unless specific sensitivities are known.
Question 3 of 5
A client reports gas pains after surgery and requests medication. The nurse reviews the medication prescription sheet to see if which medication is prescribed for the relief of gas pains?
Correct Answer: B
Rationale: Simethicone is an antiflatulent used in the relief of pain caused by excessive gas in the gastrointestinal tract. Droperidol is used to treat postoperative nausea and vomiting. Acetaminophen is a nonopioid analgesic. Magnesium hydroxide is an antacid and laxative.
Question 4 of 5
A client with a diagnosis of Parkinson's disease is prescribed pramipexole (Mirapex). The nurse should monitor the client for which of the following side effects?
Correct Answer: B
Rationale: Pramipexole, a dopamine agonist, commonly causes drowsiness, which the nurse should monitor in Parkinson's clients.
Question 5 of 5
Which of these statements related to information technology is accurate?
Correct Answer: B
Rationale: The most common breaches of healthcare data security occur internally by staff , through actions like unauthorized access or improper handling of information, rather than external hackers or low-risk social media . Data deletion does not always destroy all evidence.