Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Authentication schemes based on individuals' physical characters.






2. The process is assigning a universally recognized and used medical code number to a specific medical diagnosis or procedure.






3. A document that lists agreed upon actions between two parties.






4. Data that is added to a patient EMR to allow for quick searching and file location.






5. A private room where a patient is examined and diagnosed by a medical practitioner.






6. A computer model where functionality is divided into two roles: A server computer which provides services and controls network operations and a client computer which uses the services provides by the servers.






7. A protocol used to connect to and access a remote computer.






8. Platform as a Service - a method that uses the l=cloud to provide any platform-type service.






9. The implementation and practice of various control mechanisms that are intended to restrict physical access to facilities.






10. A senior - skilled medical staff member who serves as an instructor or supervisor - providing experience and feedback - to medical students or newly hired employees still in training.






11. A server that uses the File Transfer Protocol(FTP) to exchange files over an Internet connection.






12. An area within a medical facility designed to prevent the spread of airborne infections though the use of negative pressurization control of the air inside and outside the room.






13. A type of communication service which involves a private dialogue between two persons via instant-text-based messages over the internet.






14. The official ANSI term for IDE drives.






15. A checks-and-balances systems that ensures that a patient is receiving the correct medication - the correct dose of medication at the correct time - from an authorize caregiver by requiring that bar codes storing information about the patient medicat






16. An Instant messaging service that uses strong encryption to send and receive secure messages.






17. A class of technology separates computing software from the hardware it runs via an additional software layer - allowing multiple operating systems to run on one computer simultaneously.






18. Using symbols to mark off a sidewalk or wall to indicate that there is an open wireless networking which may be offering Internet access.






19. A personal computer storage device that stores data in non-volatile special memory instead of on disks or tape.






20. A form of eavesdropping where the attacker makes an independent convection between two victims and steals information to use fraudulently.






21. Software that allows staff to track a patient's flow of care in the system from registration thought treatment - and during and after discharge.






22. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. Also called a drone.






23. The U.S. federal program to provide healthcare for certain low-income individual and families.






24. A doctor who serves as the frist contact for a a patient for a variety of medical services - including physicals or well-visits - and who also serves as either the diagnosing doctor or the referring doctor when a patient presents a medical condition






25. A high-speed serial bus developed by Apple and Texas Instruments that allows for the connection of up to 63 devices. Originally a trademarked term for IEEE 1394 - but is now used interchangeably.






26. A healthcare facility that performs surgical procedures that does not require hospitalization. Surgeries are usually outpatient - meaning the surgery performed dos not require stay for recovery.






27. A systematic way of approving and executing changing in order to assure maximum security - stability and availability of information technology services.






28. An implementation in which voice signals are transmitter over IP networks.






29. A method of computing that relies on the Internet to provided the resources - software - data and media needs of a user - business - or organization.






30. A patient maintained health record that can be shared with medical professionals. Generally not a part of Legal Heath Record.






31. A server that stores files and programs.






32. Protection mechanism used to identify - authenticate - and authorize access to computers and their corresponding systems.






33. An attack that targets a computer's physical components and peripherals - including hard disk - motherboard - keyboard network cabling - or smart card reader.






34. An IT role that is responsible for ensuring that an organization's security policies are being followed by employees and that sufficient controls are in place to prevent unauthorized access to systems and facilities -






35. A method used to remove data from magnetic media. Degaussing changes the magnetic alignment of data - so that it cannot be recovered






36. A residential facility for individuals with persistent medical conditions who are currently unable to live independently - but do not need constant medical care or supervision.






37. A method used to securely remove data from hard drives and other electronic storage devices.






38. A health information organization comprised of key stakeholders in the health care industry a specific geographical region who oversee the health information exchange of healthcare providers in the area.






39. Records that are released for public viewing.






40. Private and non-government businesses that contract with individual or employments to help pay medical expenses. These insurers also have seperate contracts with many health organization that specify negotiated rate structures for that health organiz






41. The fundamental security goal of keeping information and communications private and protecting then from unauthorized access.






42. Pretty Good Privacy - A method of securing emails created to prevent attackers form intercepting and manipulating emails and attachments by encrypting and digitally singing the contents of the emails using public key cryptography.






43. A type of cable that features a central conductor surrounded bu the braided or foil shielding. a dialectric insulator separates the conductor shield and the entire package is wrapped in an insulating layer called a jacket. The data signal is transmit






44. Classification for a drug or substance that has a high potential for abuse; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to severe psychological or physical dependence.






45. A standard that adds AES security to the 802.11 standard






46. A residential facility for patients who need constant medical or nursing care and supervision.






47. An outpatient facility where treatment can be provided for medical problems or conditions that need immediate medical attention - but are not an emergency.






48. The U.S. Agency charged with protecting the health of the population and providing various human services.






49. A document that defines the authorized uses of PHI and how the information is to be used and managed.






50. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.