Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A network that displays characteristics of more than one of the three standard network models.






2. A high-speed serial bus developed by Apple and Texas Instruments that allows for the connection of up to 63 devices. Originally a trademarked term for IEEE 1394 - but is now used interchangeably.






3. Five-digit CPT codes used to describe a medical professional-patient interaction - such as an office visit or a hospital - to facilitate in the billing process.






4. The mechanism by which individual hardware MAC addresses are matched to an IP address on a network.






5. A personal computer storage decide that stores data optically - rather than magnetically.






6. U.S. economic stimulus legislation; provisions include funding of some healthcare initiatives and the creation of the HITECH Act.






7. Peer-to-peer - A network that has a broadcasting application architecture that distributes tasks between peer systems who have equal privileges - and in which resources sharing - processing - and communication controls are decentralized.






8. A personal computer storage device that stores data in non-volatile special memory instead of on disks or tape.






9. Protection mechanism used to identify - authenticate - and authorize access to computers and their corresponding systems.






10. A specification for wireless data though put at the rate of up to 54Mbps in the 2.4GHz that is a potential replacement for 802.11b.






11. A health information organization comprised of key stakeholders in the health care industry a specific geographical region who oversee the health information exchange of healthcare providers in the area.






12. A hardware rack that holds networking equipment to provide connections from public lines coming into the physical building generaly from the ISP - to all the IDFs located what a medical facility






13. Treatment provided when a patient's medical condition reqires being admitted a healthcare facility for anywhere from an overnight stay to a long-term sstay - due to the fact that the patient's condition must be closely monitored.






14. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.






15. A server that proves the most accurate actual time to all clients in a computer network.






16. A device used to fax prescription or to print out prescription information for the EMR/EHR system.






17. A legal document that may be signed by a patient (or those acting legally on behalf of a patient) to acknowledge the risks involved in a specific medical procedure or medication.






18. A residential facility 'steps' of care based on the residents' needs:Residents can start out with more Independence though assisted living - with the comfort of knowing nursing home care is available at the same facility when they can no longer remai






19. An IT role that is responsible for assisting end users and attempts to restore normal service to users as quickly as possible.






20. The U.S. federal program to provide healthcare for certain low-income individual and families.






21. A server-side programing languague developed by Microsoft to provide a method to create dynamic web pages.






22. An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.






23. The role - department - or individual that is formally responsible for a health record.






24. The fundamental security goal of ensuring that systems operate continuously and that authorized persons can access data that they need.






25. The section of HIPAA that establishes national standards for the security of personal electronic health information maintained by a cover entity.






26. Software components that allow users to perform specific tasks and job functions on a computer.






27. A wireless standard for home and business implementations that adds QoS features and multimedia support to 802.11a and 802.11b






28. Picture Archiving and Communications System - Application system where medical images of almost all kinds - including MRIs - CAT scans - ultrasounds - mammograms - etc. - can be stored and retrieved electronically by various members of a health organ






29. Hardware components that enable users to interact with computers.






30. The consolidation of all of the recorded health information about a person stored withing a given network. EHR's generally contain multiple EMR's collected from various facilities and providers within a provider network or umbrella organization.






31. A server that contains at least one DHCP scope.






32. A healthcare record standard - similar to CCR but more robust as it was developed by both the HL7 and American Society for Testings and Materials.






33. Application code that enables various applications to communicate with each other.






34. A network attack that uses special monitor software to gain access to private communications on the network wire or across a wireless network. Also known as an eavesdropping attack.






35. A sample of code that spreads from one computer to another by attacking itself to other files. The code in a virus corrupts and erases files on a user's computer - including executable files - when the files to which it was attached is opened or exec






36. Pretty Good Privacy - A method of securing emails created to prevent attackers form intercepting and manipulating emails and attachments by encrypting and digitally singing the contents of the emails using public key cryptography.






37. A personal computer storage device that uses fixed media and magnetic data storage.






38. Secure Shell - A protocol for secure remote logon and secure transfer of data.






39. A TCP/IP utility used to verity the network connectivity of a computer.






40. An IEEE standard used to provide a port based authentication mechanism for wireless communications using the 802.11a and 802.11b protocols.






41. An effort to set standards - specifications - and criteria for the implementation - use - and security of healthcare IT systems.






42. An attack were an attacker scans your systems to see which ports are listening in an attempt to find a way to gain unauthorized access/






43. A network in which a central host computer controls all network communication and performs the data processing and storage on behalf of network clients.






44. Cisco Systems' proprietary EAP implementation.






45. Secure FTP - A secure version of FTP that uses SSH as an encryption method to transfer - access - and manage files.






46. An all-encompassing solution of many other IT-based pieces that streamlines the workflow processes of all activities needed to run a practice or facility while providing the ability to becomes a paperless office - including patient tracking - medical






47. A fast - secure - but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency.






48. A facility equipped to treat patients suffering traumatic injuries.






49. An Instant messaging service that uses strong encryption to send and receive secure messages.






50. Electronic conversion of hard copy documents to digital form.






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests