Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also knows as a sniffing attack.






2. A server that proves the most accurate actual time to all clients in a computer network.






3. The standard language that defines how web pages are formatted and displayed.






4. Unwanted software that collects personal user data from a system and transmits it to a third party.






5. A method of computing that relies on the Internet to provided the resources - software - data and media needs of a user - business - or organization.






6. A device that has multiple network ports and combines multiple physical network segments into a single logical network.






7. A method used to securely remove data from hard drives and other electronic storage devices.






8. A trauma center that can provide treatment - surgery and intensive care to most trauma patients but does not have all available specialist and their equipment in facility. It has transfers agreements with a Level I or II facility for the treatment of






9. Serial ATA Connection - A personal computer connection tat provides a serial data channel between the drive controller and the disk drives.






10. A package of files used to address a specific problem - often specific to a particular customers's problem and not released to all customers at large.






11. A hospital specialized to treat a specific disease or condition or a specific type of patient.






12. A command line utility used to display the connection-specific DNS suffix - IP address - subnet mask - and default gateway.






13. Originally frequent and repetitive postings in electronic bulletin boards; more commonly unsolicited or distasteful commercial email form - anonymous sources.






14. A physical security control system that has a door at each end of a secure chamber.






15. An area of the facility where those needing immediate medical treatment arrive and are provided with initial care for their medical illness or injury - before being admitted for further treatment by another department.






16. A healthcare facility that performs surgical procedures that does not require hospitalization. Surgeries are usually outpatient - meaning the surgery performed dos not require stay for recovery.






17. A team of clinicians assigned to work with a specific patient at any given time.






18. A TCP/IP utility used to verity the network connectivity of a computer.






19. A device used to take pictures of patients - because some EMR/EHR systems allow for a patient's picture to be tied to their electronic record.






20. A trauma center that can provide the highest possible level of surgical care to trauma patients - with a full range of specialists and technology available 24 hours a day. It is required to have an ongoing research program and trauma education/ preve






21. Classification for a drug or substance that has a lower potential for abuse as compared to those categorized in schedule IV; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical o






22. A personal computer storage device that stores data in non-volatile special memory instead of on disks or tape.






23. Universal Serial Bus - A hardware interface standard designed to provide connections for numerous peripherals.






24. The ability to connect to systems and services from an offsite or remote location using a remote access method.






25. Within wireless networking - the phenomenon by which radio waves from other devices interfere with the 802.11 wireless signals.






26. An IT role that is responsible for assisting end users and attempts to restore normal service to users as quickly as possible.






27. A type of attack where the goal is to obtain sensitive data including user names and passwords - from network users though deception and trickery.






28. An area where surgical procedures are performer in a sterile environment.






29. Any message containing incorrect or misleading information that is disseminated to multiple users though unofficial channels.






30. A high-speed serial bus developed by Apple and Texas Instruments that allows for the connection of up to 63 devices. Originally a trademarked term for IEEE 1394 - but is now used interchangeably.






31. Also known as an acute care facility. This facility proves services aimed to resolve immediate and short-term medical conditions like pregnancy or a heart attack.






32. A systematic way of approving and executing changing in order to assure maximum security - stability and availability of information technology services.






33. An IEEE standard used to provide a port based authentication mechanism for wireless communications using the 802.11a and 802.11b protocols.






34. A healthcare record standard - similar to CCR but more robust as it was developed by both the HL7 and American Society for Testings and Materials.






35. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.






36. An investor-owned hospital - usually owned by a corporation or group of private individuals - that aims to gain profits for the services provided which are then paid to those invested in the ownership.






37. A wide variety of medical services that are provided in a patient's home by an accredited home health aide - often including physical therapy and medication delivery thought more complicated methods like injection intravenous therapy - etc.






38. A wireless standard for home and business implementations that adds QoS features and multimedia support to 802.11a and 802.11b






39. A type of cable in which multiple insulated conductors are twisted together and clad in a protective and insulating out jacket.






40. An area within a medical facility designed to prevent the spread of airborne infections though the use of negative pressurization control of the air inside and outside the room.






41. Classification for a drug or substance that has low potential for abuse as compared those in categorized in Schedule III; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical or p






42. Specific healthcare industry standards and a framework concerning the exchange and integration of patient's electronic information between software systems - which are adhered to by vendors developing interfaces - ensuring that of this disparate soft






43. A communication protocol that enables the transfer of files between a user's workstation and a remote host






44. A file property that essentially indicates whether the file has been modified since the last back up.






45. A device that connects multiple network that use the same protocol.






46. Software systems solutions developed using specific industry standards and rules that allow all the myriad medical systems to communicate as seamlessly as possible with one another.






47. A server that runs applications for client use or is used by developers to store and share application components that can be used in web applications.






48. A formalized statement that defines how security will be implemented within a particular organization.






49. The three principles of security control and management: confidentiality integrity and availability. Also known as the information security triad or triple.






50. A method in which an attacker with access to the target network redirects an IP address to the MAC address of a computer that is not the intended recipient.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests