Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.






2. The VPN protocol that is an Internet standard for sending IP datagram packets over serial point-to-point links.






3. A type of cable in which multiple insulated conductors are twisted together and clad in a protective and insulating out jacket.






4. A type or network attack where an attacker captures network traffic and store it for re-transmission at a later time to gain unauthorized access.






5. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.






6. A hospital owned and operated by a federal - state or city government. Typically provides subsidized medical services to patients unable to pay for medical services.






7. The intermediary between the medical biller at the healthcare organization and the paying insurance company who ensures that the claim has no errors before it is transmitted to the insurance company.






8. A portable electronic security token that contains biometric user data - or other identification information.






9. A security protocol created by the IEEE task group to replace WEP.






10. A health information organization comprised of key stakeholders in the health care industry a specific geographical region who oversee the health information exchange of healthcare providers in the area.






11. A process in which a list of patient's medication orders is compared to a list of those that the patient has been taking in order to avoid any possible medication errors such as duplicated prescriptions - errors in dosage - or potentially hazardous d






12. The process of transforming handwritten - scanned images of text or typed text into machine-encoded text.






13. Serial ATA Connection - A personal computer connection tat provides a serial data channel between the drive controller and the disk drives.






14. Pretty Good Privacy - A method of securing emails created to prevent attackers form intercepting and manipulating emails and attachments by encrypting and digitally singing the contents of the emails using public key cryptography.






15. A personal computer storage device that stores data magnetically on a removable tape.






16. Devices that provide alternative input or output methods or additional data storage though a connection to the system unit via cable or a wireless connection.






17. Software that provides one location where charges are entered codes can be checked - insurance claims and statements can be generated and sent - claim denials can be managed and payments can be posted and processed.






18. An independent medical practice opened by one or more accredited medical practitioners of any specialty area in an office environment.






19. See Host Computer






20. A personal computer connection type that transfers data - usually 8 bits at a time - over eight wires and is often used for a printer.






21. A residential facility 'steps' of care based on the residents' needs:Residents can start out with more Independence though assisted living - with the comfort of knowing nursing home care is available at the same facility when they can no longer remai






22. A health record standard that was developed by a number of American healthcare organization as a means of creating summary documents containing the most relevant pertinent information about a patient that can be shared electronically between medical






23. A server that displays web pages to clients.






24. Picture Archiving and Communications System - Application system where medical images of almost all kinds - including MRIs - CAT scans - ultrasounds - mammograms - etc. - can be stored and retrieved electronically by various members of a health organ






25. A family of specification developed by the IEEE for wireless LAN technology.






26. A type of cable in which one or more glass or plastic strands - plus additional fiber strands or wraps - are surrounded by a protective oyster jacket. Light pulses carry the signal though fiber optic cable.






27. A wireless standard for home and business implementations that adds QoS features and multimedia support to 802.11a and 802.11b






28. The process is assigning a universally recognized and used medical code number to a specific medical diagnosis or procedure.






29. Originally frequent and repetitive postings in electronic bulletin boards; more commonly unsolicited or distasteful commercial email form - anonymous sources.






30. An area where all medical imaging procedures are conducted.






31. Time to Live - A value that determines how many hops an IP packet ca travel before being discarded.






32. A private room where a patient is examined and diagnosed by a medical practitioner.






33. A fast - secure - but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency.






34. The automatic process for checking a prescription for medication against a patents's known allergies for possible drug-allergy reactions - and against current medications for possible adverse drug-drug interactions.






35. The part of the ARRA that promote the adoption in meaningful use of healthcare IT through enchanced enforcement and extension of HIPAA policies.






36. The service that maps names to IP addresses on most TCP/IP networks - including the Internet.






37. A protocol that uses the HTTP over SSL protocol and encapsulates an IP packet wit a PPP header and then with an SSTP header.






38. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.






39. A device that distributes and manages print jobs sent from client computers.






40. The three principles of security control and management: confidentiality integrity and availability. Also known as the information security triad or triple.






41. A residential facility or community for patients who may need assistance with some functions of daily living - such as bathing or medication reminders - but can otherwise remain mostly independent.






42. A team of clinicians assigned to work with a specific patient at any given time.






43. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.






44. Using symbols to mark off a sidewalk or wall to indicate that there is an open wireless networking which may be offering Internet access.






45. An area of the facility where those needing immediate medical treatment arrive and are provided with initial care for their medical illness or injury - before being admitted for further treatment by another department.






46. A legal document that may be signed by a patient (or those acting legally on behalf of a patient) to acknowledge the risks involved in a specific medical procedure or medication.






47. The section of HIPAA that establishes a rule set to govern the use and disclosure of PHI by covered entities. The goal of the Privacy Rule is to protect a person's health information while allowing adequate transfer of information to promote efficien






48. A systematic way of approving and executing changing in order to assure maximum security - stability and availability of information technology services.






49. A process in which information is transcribed into an unreadable form by anyone who does not have the encryption key.






50. An IT role that is responsible for ensuring that an organization's security policies are being followed by employees and that sufficient controls are in place to prevent unauthorized access to systems and facilities -