Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A piece of code that sits dormant on a user;s computer until it is triggered by a specific event such as a specific date. Once the code is triggered the logic bomb ' detonates - : erasing and corrupting data on the user's computer.






2. A backup that backs up all selected files on a daily basis.






3. The condition of being actually or potentially subject to a legal obligation based on one's actions or omissions.






4. A network attack in which an attacker hijacks or manipulates multiple computers(through the use of zombies or drones)






5. An effort to set standards - specifications - and criteria for the implementation - use - and security of healthcare IT systems.






6. A communication protocol that enables the transfer of files between a user's workstation and a remote host






7. A facility equipped to treat patients suffering traumatic injuries.






8. Individually identifiable health information that is transmitted or maintained in any form or medium by a covered entity or business associate.






9. The automatic process for checking a prescription for medication against a patents's known allergies for possible drug-allergy reactions - and against current medications for possible adverse drug-drug interactions.






10. The official ANSI term for IDE drives.






11. A private network that is configured within a public network such as the Internet.






12. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.






13. A software program that scans a Computer or network for known viruses - Trojans - worms - and other malacious software.






14. Derived from the Latin 'statim -' a term used to connote immediacy or urgency.






15. The U.S. federal program to provide healthcare for certain low-income individual and families.






16. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.






17. Online or electronic software that provides a stat-to-finish workflow from the time a patient is scheduled though their checkout after their appointment - including insurance verification - check-in - check-out - and payment.






18. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.






19. The three principles of security control and management: confidentiality integrity and availability. Also known as the information security triad or triple.






20. Specific healthcare industry standards and a framework concerning the exchange and integration of patient's electronic information between software systems - which are adhered to by vendors developing interfaces - ensuring that of this disparate soft






21. The compilation of protocols - polices - and hardware that govern access on devices to and from a network.






22. The procedures - processes - or actions - as defined by state and national licensing boards - that are permitted for an individual in a particular licensing area - usually driven by criteria such as specific education and experience requirements.






23. An area where minor procedures are perform - including minor surgeries not requiring anesthesia and post-operative care.






24. Personal computer components that enable users to view the text and graphical data output from a computer.






25. A personal computer storage decide that stores data optically - rather than magnetically.






26. Classification for a drug or substance that has a lower potential for abuse as compared to those categorized in schedule IV; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical o






27. A part of the U.S. Department of Health and Human Services - OCN is scared what encouraging - administering - and regulating the advancement of IT in healthcare.






28. A personal computer storage device that uses fixed media and magnetic data storage.






29. A residential facility or community for patients who may need assistance with some functions of daily living - such as bathing or medication reminders - but can otherwise remain mostly independent.






30. A healthcare record standard - similar to CCR but more robust as it was developed by both the HL7 and American Society for Testings and Materials.






31. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.






32. A device used often to scan patient's driver licenses or insurance card to store withing the EMR/EHR system.






33. A Protocol used to automatically assign IP addressing information to IP network computers.






34. A hospital owned and operated by a federal - state or city government. Typically provides subsidized medical services to patients unable to pay for medical services.






35. A TCP/IP utility used to verity the network connectivity of a computer.






36. A server that displays web pages to clients.






37. An area where surgical procedures are performer in a sterile environment.






38. A security designation that determines the clearance for an information zone within the EHR system.






39. Term used to communicate that a patient has gone into cardiac arrest - and immediate medical attention/ rapid response is needed to resuscitation the patient.






40. Pronounced 'I-triple-E.' An organization of scientists - engineers - and student of electronics and related fiends whose technical and standards committees develop - publish and revise computing and telecommunications standards.






41. Protected Extensible Authentication Protocol - Similar to EAP-TLS - PEAP is an open standard developed by a coalition made up of Cisco Systems - Microsoft - and RSA Security.






42. Systematized Nomenclature of Medicine-clinical Terms - An organized collection of numeric codes correlating to clinical information such as diseases - procedures - microorganisms - medications - and so forth that may be used in a patient's records.






43. A protocol that provides 64-bit - 128-bit - and 256-bit encryption using the RC4 algorithm for wireless communication that uses the 802.11a and 802.11b protocols.






44. A device that distributes and manages print jobs sent from client computers.






45. The implementation and practice of various control mechanisms that are intended to restrict physical access to facilities.






46. An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.






47. The fundamental security goal of ensuring that electronic data is not altered or tampered with.






48. Electronic conversion of hard copy documents to digital form.






49. The section of HIPAA that establishes a rule set to govern the use and disclosure of PHI by covered entities. The goal of the Privacy Rule is to protect a person's health information while allowing adequate transfer of information to promote efficien






50. A non-profit organization that promotes the adaption of healthcare IT systems - as well as certifies health record technology.