Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The fundamental security goal of ensuring that electronic data is not altered or tampered with.






2. An IT role that is responsible for the network infrastructure and components withing an organization.






3. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.






4. A wireless standard for home and business implementations that adds QoS features and multimedia support to 802.11a and 802.11b






5. A type of attack where the goal is to obtain sensitive data including user names and passwords - from network users though deception and trickery.






6. A policy that defines how people and resources will be protected in a natural or man-made disaster and how the organization will recover from the disaster.






7. Any room used to temporarily house patient when they are in transition between their patient room and another location - such as before or after testes or surgeries.






8. A LAN implementation in which nodes use a wireless network card to connect to other stations.






9. Classification for a drug or substance that has a high potential for abuse; currently has no accepted medical use in treatment in the United States; and has a lack of accepted safety for use under medical supervision.






10. A part of the U.S. Department of Health and Human Services - OCN is scared what encouraging - administering - and regulating the advancement of IT in healthcare.






11. Software systems solutions developed using specific industry standards and rules that allow all the myriad medical systems to communicate as seamlessly as possible with one another.






12. Classification for a drug or substance that has low potential for abuse as compared those in categorized in Schedule III; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical or p






13. A protocol that provides 64-bit - 128-bit - and 256-bit encryption using the RC4 algorithm for wireless communication that uses the 802.11a and 802.11b protocols.






14. A type of social engineering attack where a request for a website - typicality an e-commerce site - is redirected to a similar looking - but fake - website.






15. The procedures - processes - or actions - as defined by state and national licensing boards - that are permitted for an individual in a particular licensing area - usually driven by criteria such as specific education and experience requirements.






16. An IT role that is responsible for the maintenance of an organization's hardware systems. networks - and server systems.






17. Specific healthcare industry standards and a framework concerning the exchange and integration of patient's electronic information between software systems - which are adhered to by vendors developing interfaces - ensuring that of this disparate soft






18. A device used to convert paper to electronic format and then associates the file with the proper patient.






19. A unique 10-digit - three segment numeric code assigned to each registered drug manufactured - processed - and distributed by registered drug manufacturers.






20. A healthcare provider that meets legally defined criteria and thus is eligible for incentive payments for the implementation of EHR systems.






21. A healthcare record standard - similar to CCR but more robust as it was developed by both the HL7 and American Society for Testings and Materials.






22. A technique used in cryptography to generate random numbers to be used along with a secret key to provide data encryption.






23. Personal computer components that enable users to enter data or instructions into a computer.






24. A server that stores files and programs.






25. One of several internationally endorsed medical codding classifications list which gives a numeric code to diseases - signs and symptoms - possible complaints - abnormalities - and possible causes of injuries and diseases..






26. A personal computer storage device that uses fixed media and magnetic data storage.






27. Personal Health Information - Information about an individual held by parties that are involved in the healthcare and billing process.






28. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.






29. Picture Archiving and Communications System - Application system where medical images of almost all kinds - including MRIs - CAT scans - ultrasounds - mammograms - etc. - can be stored and retrieved electronically by various members of a health organ






30. The process of transforming handwritten - scanned images of text or typed text into machine-encoded text.






31. A list of all NDC identification numbers - compiled and published by the Food and Drug Administration.






32. The ability to connect to systems and services from an offsite or remote location using a remote access method.






33. The U.S. Agency charged with protecting the health of the population and providing various human services.






34. A service added to the IP protocol that attempts to report on the condition of a connection between two nodes.






35. Systematized Nomenclature of Medicine-clinical Terms - An organized collection of numeric codes correlating to clinical information such as diseases - procedures - microorganisms - medications - and so forth that may be used in a patient's records.






36. A regulatory concept describing the ideal of effectively and efficiently leveraging EHR technology in the medical workplace.






37. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.






38. The section of HIPAA that establishes a rule set to govern the use and disclosure of PHI by covered entities. The goal of the Privacy Rule is to protect a person's health information while allowing adequate transfer of information to promote efficien






39. The official ANSI term for IDE drives.






40. Treatment provided when a patient's medical condition reqires being admitted a healthcare facility for anywhere from an overnight stay to a long-term sstay - due to the fact that the patient's condition must be closely monitored.






41. A backup that backs up all the files in a selected storage location that have changed since the last full backup.






42. Records that are not for public consumption and require appropriate release before they can be shared.






43. A fast - secure - but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency.






44. An investor-owned hospital - usually owned by a corporation or group of private individuals - that aims to gain profits for the services provided which are then paid to those invested in the ownership.






45. A senior - skilled medical staff member who serves as an instructor or supervisor - providing experience and feedback - to medical students or newly hired employees still in training.






46. An all-encompassing solution of many other IT-based pieces that streamlines the workflow processes of all activities needed to run a practice or facility while providing the ability to becomes a paperless office - including patient tracking - medical






47. A patient maintained health record that can be shared with medical professionals. Generally not a part of Legal Heath Record.






48. A physical security control system that has a door at each end of a secure chamber.






49. An EHR system that had been certified by ONC






50. A computer model where functionality is divided into two roles: A server computer which provides services and controls network operations and a client computer which uses the services provides by the servers.