Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.






2. A server that isolates internal networks form the Internet by downloading and storing Internet files on behalf of internal clients.






3. A unique 10-digit - three segment numeric code assigned to each registered drug manufactured - processed - and distributed by registered drug manufacturers.






4. Any room used to temporarily house patient when they are in transition between their patient room and another location - such as before or after testes or surgeries.






5. Software protection systems in an organization.






6. A document that lists agreed upon actions between two parties.






7. A method of computing that relies on the Internet to provided the resources - software - data and media needs of a user - business - or organization.






8. A TCP/IP utility used to verity the network connectivity of a computer.






9. Software as a Service - A method that uses the cloud to provide application services to users.






10. Using symbols to mark off a sidewalk or wall to indicate that there is an open wireless networking which may be offering Internet access.






11. A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also knows as a sniffing attack.






12. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.






13. A trauma center that can provide the highest possible level of surgical care to trauma patients - with a full range of specialists and technology available 24 hours a day. It is required to have an ongoing research program and trauma education/ preve






14. The standard language that defines how web pages are formatted and displayed.






15. A type of cable in which one or more glass or plastic strands - plus additional fiber strands or wraps - are surrounded by a protective oyster jacket. Light pulses carry the signal though fiber optic cable.






16. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.






17. A protocol used to connect to and access a remote computer.






18. An itemized form containing all the information needed to file a claim. including patient information and services rendered for a visit - that is compiled by the healthcare provider's medical biller and supplied to the insurance company as the source






19. Any drugs or chemical substance that is regulated by the federal government in its production - possession - or use - including illegal and prescription drugs.






20. The U.S. Agency charged with protecting the health of the population and providing various human services.






21. Serial ATA Connection - A personal computer connection tat provides a serial data channel between the drive controller and the disk drives.






22. A server that contains at least one DHCP scope.






23. A process in which a list of patient's medication orders is compared to a list of those that the patient has been taking in order to avoid any possible medication errors such as duplicated prescriptions - errors in dosage - or potentially hazardous d






24. An IEEE standard used to provide a port based authentication mechanism for wireless communications using the 802.11a and 802.11b protocols.






25. A programming and query language common to many large scale database systems.






26. Classification for a drug or substance that has low potential for abuse as compared those in categorized in Schedule III; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical or p






27. A residential facility for individuals with persistent medical conditions who are currently unable to live independently - but do not need constant medical care or supervision.






28. The management of performance levels of servers to ensure that critical operations are highly available to resources.






29. An IT role that is responsible for the maintenance of an organization's hardware systems. networks - and server systems.






30. An attack where the attacker is able to predict of control the IV of an encryption process - thus giving the attacker access to view the encrypted data that is supposed to be hidden from everyone else except the user of network.






31. A technique used in cryptography to generate random numbers to be used along with a secret key to provide data encryption.






32. An invitation for vendors to submit a plan and bid for the delivery of a product or service.






33. See Host Computer






34. The security layer of a WAP and the wireless equivalent of TLS in wired networks.






35. A method used to remove data from magnetic media. Degaussing changes the magnetic alignment of data - so that it cannot be recovered






36. A protocol that uses the HTTP over SSL protocol and encapsulates an IP packet wit a PPP header and then with an SSTP header.






37. The U.S. federal program to provide healthcare for certain low-income individual and families.






38. The condition of being actually or potentially subject to a legal obligation based on one's actions or omissions.






39. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.






40. A list of all NDC identification numbers - compiled and published by the Food and Drug Administration.






41. A password that meets the complexity requirements that are set by a system administrator and documented in a password policy.






42. A high-speed serial bus developed by Apple and Texas Instruments that allows for the connection of up to 63 devices. Originally a trademarked term for IEEE 1394 - but is now used interchangeably.






43. A private network that is configured within a public network such as the Internet.






44. A server-side programming language used to develop dynamic web pages by embedding its coded into an HTML pages.






45. A hardware device or a computer software program that acts as a communication hub to provide heightened wireless security and extend the physical range of a wireless local area network.






46. World Health Organization - A division of the United Nations that manages the authority of international public health.






47. The automatic process for checking a prescription for medication against a patents's known allergies for possible drug-allergy reactions - and against current medications for possible adverse drug-drug interactions.






48. An IT role that is responsible for designing - implementing - maintaining - and repairing databases. Usually also responsible for the security of an organization's database system and all the data stored on the systems.






49. A patient maintained health record that can be shared with medical professionals. Generally not a part of Legal Heath Record.






50. Within wireless networking - the phenomenon by which radio waves from other devices interfere with the 802.11 wireless signals.