SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Medical services that can be proved to a patient without the need for the patient to be admitted to any type of healthcare facility.
Outpatient Treatment
Break Glass Access
ISP (Internet Service Provider)
Private Health Record
2. A device used to take pictures of patients - because some EMR/EHR systems allow for a patient's picture to be tied to their electronic record.
Wireless Security
Camera
Parallel Tracking Software
DHCP (Dynamic Host Control Protocol)
3. A network that displays characteristics of more than one of the three standard network models.
802.11b
Input Devices
Mixed Mode
Data Sanitation
4. A type of social engineering attack where a request for a website - typicality an e-commerce site - is redirected to a similar looking - but fake - website.
Pharming
War Chalking
Switch
Fax Printer
5. A trauma center that can provide initial evaluation stabilization - and diagnosis of a trauma patient - but then the patient must be transferred to a Level I - II - or III facility for treatment and care. It is differentiated from a Level IV because
XML (EXtensible Markup Language)
Logic Bomb
Level V Trauma Center
Document Imaging
6. A healthcare record standard - similar to CCR but more robust as it was developed by both the HL7 and American Society for Testings and Materials.
Logical Access Control
CCD(Continuity of Care Document)
API (Application Programming Interface)
Public Hospital
7. A department within a medical organization dedicated to handling ROI requests for EMR/EHR information release.
802.11b
Schedule III Controlled Substance
DRP (Disaster Recovery Plan)
ROI Department
8. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.
HIPAA (Health Insurance Portability and Accountability Act)
Input Devices
Custodian
Coaxial Cable
9. A patient maintained health record that can be shared with medical professionals. Generally not a part of Legal Heath Record.
Medical Record Controls
PHI
RHIO (Regional Health Information Organization)
PHR (Personal Health Record)
10. Protection mechanism used to identify - authenticate - and authorize access to computers and their corresponding systems.
IEEE (Institute of Electrical and Electronic Engineers)
Logical Access Control
VPN (Virtual Private Network)
BAA (Business Associate Agreement)
11. Application code that enables various applications to communicate with each other.
Level V Trauma Center
EHR (Electronic Health Record)
API (Application Programming Interface)
Structured Data
12. A device that provides network connectivity capabilities for computer systems.
Data Sanitation
For-Profit Hospital
NIC (Network Interface Card )
RHIO (Regional Health Information Organization)
13. A device that connects multiple network that use the same protocol.
Router
Metadata
Encryption
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
14. A backup that backs up all selected files on a daily basis.
Daily Backup
DHCP (Dynamic Host Control Protocol)
AP (Access Points)
Meaningful Use
15. An agency of the U.S. Department of Commerce. NIST's mission us to promote U.S. innovation and industrial competitiveness by advancing measurement science - standards - and technology in ways that enhance economic security and improve our quality of
NIST (National Institute of Standards and Technology)
CCHIT(Certification Commission for Health Information Technology)
IV (Initialization Vector)
HL7
16. Pretty Good Privacy - A method of securing emails created to prevent attackers form intercepting and manipulating emails and attachments by encrypting and digitally singing the contents of the emails using public key cryptography.
DDoS (Distributed Denial of Service)
Phishing
PGP
FireWire Connection
17. A programming and query language common to many large scale database systems.
Medicare
Data Wiping
Change Management
SQL (Structured Query Language)
18. Unwanted software loaded onto a system for the purposes of presenting commercial advertisements to the user.
Integrity
Tracking and Auditing Software
adware
Private Practice
19. A trauma center that can provide essential trauma care 24 hours a day with all available specialties - personnel - and equipment. It provides comprehensive trauma care and clinical assistance to a level I facility as needed. It is differentiated from
Level II Trauma Center
PEAP
Fiber
Trauma Center
20. The use of various technologies to create images of the human body for use in the clinical field - such as diagnosis - treatment - and tracking of a disease or medical issue within the body.
L2TP (Layer Two Tunneling Protocol)
Imaging
Trojan Horse
Secure Chat
21. An Adobe platform that allows developers to create animations - videos - and other interactive components using the ActionScript programming language.
Flash
HL7
NIST (National Institute of Standards and Technology)
HHS (U.S. Department of Health and Human Services)
22. The U.S. Agency charged with protecting the health of the population and providing various human services.
ad hoc
Urgent Care Facility
Bluesnarfing
HHS (U.S. Department of Health and Human Services)
23. Originally frequent and repetitive postings in electronic bulletin boards; more commonly unsolicited or distasteful commercial email form - anonymous sources.
Code Blue
Spam
EAP (Extensible Authentication Protocol)
Preceptor
24. Pronounced 'I-triple-E.' An organization of scientists - engineers - and student of electronics and related fiends whose technical and standards committees develop - publish and revise computing and telecommunications standards.
Host Computer
Break Glass Access
IEEE (Institute of Electrical and Electronic Engineers)
Degaussing
25. A hospital affiliated with a nearby medical school - allowing medical students and residents to gain hands-on learning and obtain real works experience by working in the hospital environment.
IM (Instant Messaging)
Schedule II Controlled Substance
Teaching Hospital
Mixed Mode
26. A trauma center that can provide treatment - surgery and intensive care to most trauma patients but does not have all available specialist and their equipment in facility. It has transfers agreements with a Level I or II facility for the treatment of
Display Devices
Wireless Security
802.11n
Level III Trauma Center
27. A file property that essentially indicates whether the file has been modified since the last back up.
Bluesnarfing
Float Room
Archive Flag
e-Prescribing
28. A type of network that is established spontaneously through a peer-to-peer wireless connection.
ad hoc
TCP/IP (Transmission Control Protocol/ Internet Protocol)
PHI
Barcode Scanner
29. Electronic conversion of hard copy documents to digital form.
Mail Server
Document Imaging
EAP (Extensible Authentication Protocol)
SaaS
30. A software or hardware device that protects a system or network by blocking unwanted network traffic.
Firewall
Code Blue
CPOE (Computerized Physician Order Entry)
Examination Room
31. A hardware device or a computer software program that acts as a communication hub to provide heightened wireless security and extend the physical range of a wireless local area network.
AP (Access Points)
Storage Server
OCR (Optical Character Recognition)
Intermediate Care facility
32. A personal computer storage device that uses fixed media and magnetic data storage.
Stat
HDD (Hard Disk Drive)
Fiber
Examination Room
33. The service that maps names to IP addresses on most TCP/IP networks - including the Internet.
IDF (International Distribution Frame)
Change Management
DNS (Domain Name System)
P2P
34. The consolidation of all of the recorded health information about a person stored withing a given network. EHR's generally contain multiple EMR's collected from various facilities and providers within a provider network or umbrella organization.
EHR (Electronic Health Record)
Bluetooth
Transitive Access
WAN (Wide Area Network )
35. Time to Live - A value that determines how many hops an IP packet ca travel before being discarded.
Float Room
TTL
Virtualization
The Joint Commission
36. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.
Document Imaging
Print Server
HTML (Hypertext Markup Language)
WAN (Wide Area Network )
37. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.
Non-profit Hospital
Software Update
ARRA (American Recovery and Reinvestment Act
Private Practice
38. A hospital owned by a not-for-profit organization - religious organization - or government organization. Profits do not go to individual investors - but reinvested back into hospital or community.
Non-profit Hospital
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
Coaxial Cable
Level III Trauma Center
39. An area where patients are housed after a surgical procedure or any procedure requiring anesthesia and are closely monitored for any indications of post-operative complications.
Recover Room
Custodian
DNS Server
Procedure Room
40. A process in which information is transcribed into an unreadable form by anyone who does not have the encryption key.
Encryption
Level II Trauma Center
USB Connection
Server Utilization
41. Parallel Advanced Technology Attachment - A personal computer connection that provides a parallel data channel from a disk controllers to the disk driver.
Fiber
FTP (File Transfer Protocol)
PATA Connection
PEAP
42. Secure FTP - A secure version of FTP that uses SSH as an encryption method to transfer - access - and manage files.
Medication Reconciliation
HL7
DRP (Disaster Recovery Plan)
Secure File Transfer Protocol
43. A protocol that uses the HTTP over SSL protocol and encapsulates an IP packet wit a PPP header and then with an SSTP header.
Parallel Tracking Software
Practice Management Software
SSTP (Secure Socket Tunneling Protocol)
Document Imaging
44. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.
HTTPS (Hypertext Transfer Protocol Secure)
Data Sanitation
EHR (Electronic Health Record)
Network Administrator
45. A network attack that uses special monitor software to gain access to private communications on the network wire or across a wireless network. Also known as an eavesdropping attack.
Sniffing
Liability Waiver
802.11a
Hospice Care
46. Online or electronic software that provides a stat-to-finish workflow from the time a patient is scheduled though their checkout after their appointment - including insurance verification - check-in - check-out - and payment.
NDC ID (National Drug Code Identification)
Archive Flag
Scheduling Software
Isolation Room
47. Software as a Service - A method that uses the cloud to provide application services to users.
Privacy Rule
CMS (Centers for Medicare and Medicaid Services)
FireWire Connection
SaaS
48. A specification for wireless data though put at the rate of up to 54Mbps in the 2.4GHz that is a potential replacement for 802.11b.
802.11g
Logic Bomb
CCR (Continuity of Care Record)
Document Imaging
49. A server that consists of databases that store domain name information and translate and resolve fully qualified domain name requests from clients.
DHCP (Dynamic Host Control Protocol)
Level II Trauma Center
Controlled substance
DNS Server
50. An attack that targets a computer's physical components and peripherals - including hard disk - motherboard - keyboard network cabling - or smart card reader.
adware
Hardware Attack
Applications
Intermediate Care facility
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests