Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Mechanism that are put in place to limit access to electronic health information.






2. A non-profit organization that promotes the adaption of healthcare IT systems - as well as certifies health record technology.






3. A server that stores files and programs.






4. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.






5. A family of specification developed by the IEEE for wireless LAN technology.






6. The federal agency that oversees the regulation of food safety - tobacco products - prescription and over-the-counter medication - dietary supplements - vaccines - medical devices - sanitation requirements - and other related public health products a






7. The de facto standard VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP - frame relay - or ATM.






8. A process in which information is transcribed into an unreadable form by anyone who does not have the encryption key.






9. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.






10. A personal computer storage device that stores data magnetically on a removable tape.






11. Platform as a Service - a method that uses the l=cloud to provide any platform-type service.






12. A server that runs applications for client use or is used by developers to store and share application components that can be used in web applications.






13. A type of cable that features a central conductor surrounded bu the braided or foil shielding. a dialectric insulator separates the conductor shield and the entire package is wrapped in an insulating layer called a jacket. The data signal is transmit






14. A device that manages all fax messages sent with a network. A server or software program that enables users to send and receive fax messages though a network connection.






15. Classification for a drug or substance that has a lower potential for abuse as compared to those categorized in schedule IV; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical o






16. Software that provides one location where charges are entered codes can be checked - insurance claims and statements can be generated and sent - claim denials can be managed and payments can be posted and processed.






17. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.






18. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.






19. A personal computer storage decide that stores data optically - rather than magnetically.






20. A type of cable in which multiple insulated conductors are twisted together and clad in a protective and insulating out jacket.






21. The process of transforming handwritten - scanned images of text or typed text into machine-encoded text.






22. Software that provides a single system for tracking and managing compliance with medical claims audits that are performed by both government and commercial healthcare(insurance) organizations.






23. A backup that backs up all selected files regardless of the state of the archived bit.






24. A form of eavesdropping where the attacker makes an independent convection between two victims and steals information to use fraudulently.






25. The section of HIPAA that establishes a rule set to govern the use and disclosure of PHI by covered entities. The goal of the Privacy Rule is to protect a person's health information while allowing adequate transfer of information to promote efficien






26. A hospital affiliated with a nearby medical school - allowing medical students and residents to gain hands-on learning and obtain real works experience by working in the hospital environment.






27. Protected Extensible Authentication Protocol - Similar to EAP-TLS - PEAP is an open standard developed by a coalition made up of Cisco Systems - Microsoft - and RSA Security.






28. A list of all NDC identification numbers - compiled and published by the Food and Drug Administration.






29. A process in which a list of patient's medication orders is compared to a list of those that the patient has been taking in order to avoid any possible medication errors such as duplicated prescriptions - errors in dosage - or potentially hazardous d






30. An independent medical practice opened by one or more accredited medical practitioners of any specialty area in an office environment.






31. A backup that backs up all the files in a selected storage location that have changed since the last full backup.






32. A common type of email-based social engineering attack where the attacker sends an email that seems to come form a respected bank or financial institution.






33. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.






34. Time to Live - A value that determines how many hops an IP packet ca travel before being discarded.






35. Universal Serial Bus - A hardware interface standard designed to provide connections for numerous peripherals.






36. The transmission of a patient's prescription for medication electronically from the describer's computer to the pharmacy's computer.






37. Classification for a drug or substance that has low potential for abuse as compared those in categorized in Schedule III; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical or p






38. A hospital owned by a not-for-profit organization - religious organization - or government organization. Profits do not go to individual investors - but reinvested back into hospital or community.






39. A device that provides network connectivity capabilities for computer systems.






40. See Host Computer






41. A protocol used to connect to and access a remote computer.






42. Software that allows staff to track a patient's flow of care in the system from registration thought treatment - and during and after discharge.






43. The management of performance levels of servers to ensure that critical operations are highly available to resources.






44. A policy that defines how people and resources will be protected in a natural or man-made disaster and how the organization will recover from the disaster.






45. A type of network that is established spontaneously through a peer-to-peer wireless connection.






46. Implemented security measures that restrict - detect - and monitor access to specific physical areas or assets.






47. A legal document that may be signed by a patient (or those acting legally on behalf of a patient) to acknowledge the risks involved in a specific medical procedure or medication.






48. The mechanism by which individual hardware MAC addresses are matched to an IP address on a network.






49. Malicious code that masquerades as a harmless file. When a user executes it - thinking it is a harmless application - it destroys and corrupts data on the user's hard drive.






50. An older personal computer connection standard hat provides high-performance data transfer between the SCSI device and the other components of the computer. Pronounced ' scuzzy.'