Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A trauma center that can provide treatment - surgery and intensive care to most trauma patients but does not have all available specialist and their equipment in facility. It has transfers agreements with a Level I or II facility for the treatment of






2. Electronic conversion of hard copy documents to digital form.






3. Personal Health Information - Information about an individual held by parties that are involved in the healthcare and billing process.






4. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.






5. A personal computer storage device that stores data magnetically on a removable tape.






6. A type of cable that features a central conductor surrounded bu the braided or foil shielding. a dialectric insulator separates the conductor shield and the entire package is wrapped in an insulating layer called a jacket. The data signal is transmit






7. A server that contains at least one DHCP scope.






8. A personal computer connection type that transfers data - usually 8 bits at a time - over eight wires and is often used for a printer.






9. An AES cipher-based encryption protocol used in WPA2.






10. Unwanted software that collects personal user data from a system and transmits it to a third party.






11. The ability to connect to systems and services from an offsite or remote location using a remote access method.






12. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.






13. The use of various technologies to create images of the human body for use in the clinical field - such as diagnosis - treatment - and tracking of a disease or medical issue within the body.






14. A network attack in which an attacker hijacks or manipulates multiple computers(through the use of zombies or drones)






15. A class of technology separates computing software from the hardware it runs via an additional software layer - allowing multiple operating systems to run on one computer simultaneously.






16. Software systems solutions developed using specific industry standards and rules that allow all the myriad medical systems to communicate as seamlessly as possible with one another.






17. Data that is added to a patient EMR to allow for quick searching and file location.






18. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.






19. A hospital specialized to treat a specific disease or condition or a specific type of patient.






20. An agency of the U.S. Department of Commerce. NIST's mission us to promote U.S. innovation and industrial competitiveness by advancing measurement science - standards - and technology in ways that enhance economic security and improve our quality of






21. A hospital that treats a wide variety of medical issues including emergencies and inpatient/outpatient care - and performs general surgeries.






22. Malicious code that masquerades as a harmless file. When a user executes it - thinking it is a harmless application - it destroys and corrupts data on the user's hard drive.






23. A family of specification developed by the IEEE for wireless LAN technology.






24. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.






25. A portable electronic security token that contains biometric user data - or other identification information.






26. The method used to repeatedly delete and overwrite any traces or bits of sensitive data that may remain on a device after data wiping has been done.






27. The U.S. federal program to provide healthcare for certain low-income individual and families.






28. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.






29. Software that allows staff to track a patient's flow of care in the system from registration thought treatment - and during and after discharge.






30. Derived from the Latin 'statim -' a term used to connote immediacy or urgency.






31. An area within a medical facility designed to prevent the spread of airborne infections though the use of negative pressurization control of the air inside and outside the room.






32. A unique 10-digit - three segment numeric code assigned to each registered drug manufactured - processed - and distributed by registered drug manufacturers.






33. Protection mechanism used to identify - authenticate - and authorize access to computers and their corresponding systems.






34. An attack that targets a computer's physical components and peripherals - including hard disk - motherboard - keyboard network cabling - or smart card reader.






35. A piece of code that sits dormant on a user;s computer until it is triggered by a specific event such as a specific date. Once the code is triggered the logic bomb ' detonates - : erasing and corrupting data on the user's computer.






36. A hospital owned by a not-for-profit organization - religious organization - or government organization. Profits do not go to individual investors - but reinvested back into hospital or community.






37. A federal health insurance program for the elderly and some disable individuals in the United States - with three main parts: Part A for inpatient - Part B for outpatient - and prescriptions drug coverage.






38. Time to Live - A value that determines how many hops an IP packet ca travel before being discarded.






39. A method in which an attacker with access to the target network redirects an IP address to the MAC address of a computer that is not the intended recipient.






40. World Health Organization - A division of the United Nations that manages the authority of international public health.






41. A health record standard that was developed by a number of American healthcare organization as a means of creating summary documents containing the most relevant pertinent information about a patient that can be shared electronically between medical






42. A type of cable in which one or more glass or plastic strands - plus additional fiber strands or wraps - are surrounded by a protective oyster jacket. Light pulses carry the signal though fiber optic cable.






43. An older personal computer connection standard hat provides high-performance data transfer between the SCSI device and the other components of the computer. Pronounced ' scuzzy.'






44. Systematized Nomenclature of Medicine-clinical Terms - An organized collection of numeric codes correlating to clinical information such as diseases - procedures - microorganisms - medications - and so forth that may be used in a patient's records.






45. A patient maintained health record that can be shared with medical professionals. Generally not a part of Legal Heath Record.






46. Pretty Good Privacy - A method of securing emails created to prevent attackers form intercepting and manipulating emails and attachments by encrypting and digitally singing the contents of the emails using public key cryptography.






47. A server that stores files and programs.






48. A powerful - centralized computer system that performs data storage and processing tasks on behalf of clients and other network devices.






49. The compilation of protocols - polices - and hardware that govern access on devices to and from a network.






50. The transmission of a patient's prescription for medication electronically from the describer's computer to the pharmacy's computer.