Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie






2. An IT role that is responsible for the network infrastructure and components withing an organization.






3. Service-level Agreement - a contractual agreement between a service provider and a customer that stipulates the precise services and support options the vendor must provide.






4. A federal health insurance program for the elderly and some disable individuals in the United States - with three main parts: Part A for inpatient - Part B for outpatient - and prescriptions drug coverage.






5. A method of computing that relies on the Internet to provided the resources - software - data and media needs of a user - business - or organization.






6. A residential facility or community for patients who may need assistance with some functions of daily living - such as bathing or medication reminders - but can otherwise remain mostly independent.






7. Electronic messages sent between users or groups.






8. An area of the facility where those needing immediate medical treatment arrive and are provided with initial care for their medical illness or injury - before being admitted for further treatment by another department.






9. Data that is added to a patient EMR to allow for quick searching and file location.






10. The three principles of security control and management: confidentiality integrity and availability. Also known as the information security triad or triple.






11. A short-range wireless radio network transmission medium usually used between two personal devices such as between a mobile phone and wireless headset. A wireless connection method that is used to communicate from one device to another in a small are






12. A team of clinicians assigned to work with a specific patient at any given time.






13. Any method of securing you wireless LAN network to prevent unauthorized network access and network data theft while ensuring that authorized users can connect to the network.






14. Any medical treatment or services provided on an outpatient basis.






15. A personal computer storage device that stores data in non-volatile special memory instead of on disks or tape.






16. The standard language that defines how web pages are formatted and displayed.






17. A portable electronic security token that contains biometric user data - or other identification information.






18. A server that proves the most accurate actual time to all clients in a computer network.






19. An area within a medical facility designed to prevent the spread of airborne infections though the use of negative pressurization control of the air inside and outside the room.






20. An agency of the U.S. Department of Commerce. NIST's mission us to promote U.S. innovation and industrial competitiveness by advancing measurement science - standards - and technology in ways that enhance economic security and improve our quality of






21. An outpatient facility where treatment can be provided for medical problems or conditions that need immediate medical attention - but are not an emergency.






22. A device that distributes and manages print jobs sent from client computers.






23. An Instant messaging service that uses strong encryption to send and receive secure messages.






24. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.






25. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.






26. Mechanism that are put in place to limit access to electronic health information.






27. A server-side programing languague developed by Microsoft to provide a method to create dynamic web pages.






28. A personal computer storage device that uses fixed media and magnetic data storage.






29. An older personal computer connection standard hat provides high-performance data transfer between the SCSI device and the other components of the computer. Pronounced ' scuzzy.'






30. Serial ATA Connection - A personal computer connection tat provides a serial data channel between the drive controller and the disk drives.






31. A trauma center that can provide essential trauma care 24 hours a day with all available specialties - personnel - and equipment. It provides comprehensive trauma care and clinical assistance to a level I facility as needed. It is differentiated from






32. A health information organization comprised of key stakeholders in the health care industry a specific geographical region who oversee the health information exchange of healthcare providers in the area.






33. The federal agency that oversees the regulation of food safety - tobacco products - prescription and over-the-counter medication - dietary supplements - vaccines - medical devices - sanitation requirements - and other related public health products a






34. A backup that backs up all selected files regardless of the state of the archived bit.






35. Personal Health Information - Information about an individual held by parties that are involved in the healthcare and billing process.






36. A sample of code that spreads from one computer to another by attacking itself to other files. The code in a virus corrupts and erases files on a user's computer - including executable files - when the files to which it was attached is opened or exec






37. Secure FTP - A secure version of FTP that uses SSH as an encryption method to transfer - access - and manage files.






38. Hardware components that enable users to interact with computers.






39. Access given to certain members in an organization to use data on a system without the need for authenticating themselves.






40. An investor-owned hospital - usually owned by a corporation or group of private individuals - that aims to gain profits for the services provided which are then paid to those invested in the ownership.






41. An effort to set standards - specifications - and criteria for the implementation - use - and security of healthcare IT systems.






42. A communication protocol that enables the transfer of files between a user's workstation and a remote host






43. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.






44. Software systems solutions developed using specific industry standards and rules that allow all the myriad medical systems to communicate as seamlessly as possible with one another.






45. Software that allows staff to track a patient's flow of care in the system from registration thought treatment - and during and after discharge.






46. U.S. economic stimulus legislation; provisions include funding of some healthcare initiatives and the creation of the HITECH Act.






47. Any adverse reaction to a medication being taken.






48. Remote Authentication Dial-in User Services - A standard protocol for providing centralized authentication and authorization services form remote users.






49. A doctor who serves as the frist contact for a a patient for a variety of medical services - including physicals or well-visits - and who also serves as either the diagnosing doctor or the referring doctor when a patient presents a medical condition






50. Cisco Systems' proprietary EAP implementation.