Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A server-side programming language used to develop dynamic web pages by embedding its coded into an HTML pages.






2. An agency of the U.S. Department of Commerce. NIST's mission us to promote U.S. innovation and industrial competitiveness by advancing measurement science - standards - and technology in ways that enhance economic security and improve our quality of






3. A server that consists of databases that store domain name information and translate and resolve fully qualified domain name requests from clients.






4. A health information organization comprised of key stakeholders in the health care industry a specific geographical region who oversee the health information exchange of healthcare providers in the area.






5. Individually identifiable health information that is transmitted or maintained in any form or medium by a covered entity or business associate.






6. A checks-and-balances systems that ensures that a patient is receiving the correct medication - the correct dose of medication at the correct time - from an authorize caregiver by requiring that bar codes storing information about the patient medicat






7. An attack where the attacker exploits a legitimate computer session to obtain unauthorized access to an organization's network or services.






8. A policy that defines how people and resources will be protected in a natural or man-made disaster and how the organization will recover from the disaster.






9. See Host Computer






10. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.






11. An Adobe platform that allows developers to create animations - videos - and other interactive components using the ActionScript programming language.






12. An attack where the attacker is able to predict of control the IV of an encryption process - thus giving the attacker access to view the encrypted data that is supposed to be hidden from everyone else except the user of network.






13. A type of network that is established spontaneously through a peer-to-peer wireless connection.






14. Any drugs or chemical substance that is regulated by the federal government in its production - possession - or use - including illegal and prescription drugs.






15. An invitation for vendors to submit a plan and bid for the delivery of a product or service.






16. A healthcare record standard - similar to CCR but more robust as it was developed by both the HL7 and American Society for Testings and Materials.






17. Classification for a drug or substance that has low potential for abuse as compared those in categorized in Schedule III; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical or p






18. Also called Wi-Fi - short for wired fidelity - '802.11b is probably the most common and certainly the lest expensive wireless network protocol used to transfer data among computers with wireless network cards or between a wireless computer or device






19. An analysis technique that determines the coverage area of a wireless network - identifies any sources of interference - and establishes other characteristics of the coverage area.






20. A powerful - centralized computer system that performs data storage and processing tasks on behalf of clients and other network devices.






21. Systems that store networking hardware and provide networking services to local area networks within a medical environment.






22. A server that provides database services to other computers in a network.






23. A technique used in cryptography to generate random numbers to be used along with a secret key to provide data encryption.






24. The use of various technologies to create images of the human body for use in the clinical field - such as diagnosis - treatment - and tracking of a disease or medical issue within the body.






25. A protocol that uses the HTTP over SSL protocol and encapsulates an IP packet wit a PPP header and then with an SSTP header.






26. A type of cable in which one or more glass or plastic strands - plus additional fiber strands or wraps - are surrounded by a protective oyster jacket. Light pulses carry the signal though fiber optic cable.






27. A legal document that may be signed by a patient (or those acting legally on behalf of a patient) to acknowledge the risks involved in a specific medical procedure or medication.






28. A file property that essentially indicates whether the file has been modified since the last back up.






29. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.






30. A LAN implementation in which nodes use a wireless network card to connect to other stations.






31. A wired or wireless device that is used to scan and identify patients using the unique barcode located on their ID wrist band.






32. A server that isolates internal networks form the Internet by downloading and storing Internet files on behalf of internal clients.






33. A method of computing that relies on the Internet to provided the resources - software - data and media needs of a user - business - or organization.






34. A server that receives email request from hosts on a network - and redirects them to the intended recipient.






35. A personal computer storage decide that stores data optically - rather than magnetically.






36. A device that manages all fax messages sent with a network. A server or software program that enables users to send and receive fax messages though a network connection.






37. A sample of code that spreads from one computer to another by attacking itself to other files. The code in a virus corrupts and erases files on a user's computer - including executable files - when the files to which it was attached is opened or exec






38. An older personal computer connection standard hat provides high-performance data transfer between the SCSI device and the other components of the computer. Pronounced ' scuzzy.'






39. Service-level Agreement - a contractual agreement between a service provider and a customer that stipulates the precise services and support options the vendor must provide.






40. Using symbols to mark off a sidewalk or wall to indicate that there is an open wireless networking which may be offering Internet access.






41. Also known as an acute care facility. This facility proves services aimed to resolve immediate and short-term medical conditions like pregnancy or a heart attack.






42. An area within a medical facility designed to prevent the spread of airborne infections though the use of negative pressurization control of the air inside and outside the room.






43. A document that defines the authorized uses of PHI and how the information is to be used and managed.






44. A hardware device or a computer software program that acts as a communication hub to provide heightened wireless security and extend the physical range of a wireless local area network.






45. An IEEE standard used to provide a port based authentication mechanism for wireless communications using the 802.11a and 802.11b protocols.






46. A type of communication service which involves a private dialogue between two persons via instant-text-based messages over the internet.






47. The U.S. Agency charged with protecting the health of the population and providing various human services.






48. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. also called a zombie.






49. A residential facility for terminally ill patients who have reached the end stages of their condition. Hospice care is designed to provide comfort and care for patients and support for the patient's family during end-of-life.






50. An AES cipher-based encryption protocol used in WPA2.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests