Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The transmission of a patient's prescription for medication electronically from the describer's computer to the pharmacy's computer.






2. A method used to securely remove data from hard drives and other electronic storage devices.






3. A network in which a central host computer controls all network communication and performs the data processing and storage on behalf of network clients.






4. A technique used in cryptography to generate random numbers to be used along with a secret key to provide data encryption.






5. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.






6. A LAN implementation in which nodes use a wireless network card to connect to other stations.






7. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.






8. A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones - tablets and laptops to other Bluetooth-enabled devices.






9. An itemized form containing all the information needed to file a claim. including patient information and services rendered for a visit - that is compiled by the healthcare provider's medical biller and supplied to the insurance company as the source






10. Peer-to-peer - A network that has a broadcasting application architecture that distributes tasks between peer systems who have equal privileges - and in which resources sharing - processing - and communication controls are decentralized.






11. A trauma center that can provide the highest possible level of surgical care to trauma patients - with a full range of specialists and technology available 24 hours a day. It is required to have an ongoing research program and trauma education/ preve






12. Electronic messages sent between users or groups.






13. A powerful - centralized computer system that performs data storage and processing tasks on behalf of clients and other network devices.






14. Secure FTP - A secure version of FTP that uses SSH as an encryption method to transfer - access - and manage files.






15. A network attack that uses special monitor software to gain access to private communications on the network wire or across a wireless network. Also known as an eavesdropping attack.






16. Unwanted software loaded onto a system for the purposes of presenting commercial advertisements to the user.






17. A type of cable in which one or more glass or plastic strands - plus additional fiber strands or wraps - are surrounded by a protective oyster jacket. Light pulses carry the signal though fiber optic cable.






18. The procedures - processes - or actions - as defined by state and national licensing boards - that are permitted for an individual in a particular licensing area - usually driven by criteria such as specific education and experience requirements.






19. A hardware rack that holds networking equipment to provide connections from public lines coming into the physical building generaly from the ISP - to all the IDFs located what a medical facility






20. An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.






21. A device used often to scan patient's driver licenses or insurance card to store withing the EMR/EHR system.






22. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.






23. A device that connects multiple network that use the same protocol.






24. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.






25. Treatment provided when a patient's medical condition reqires being admitted a healthcare facility for anywhere from an overnight stay to a long-term sstay - due to the fact that the patient's condition must be closely monitored.






26. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.






27. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.






28. A unique 10-digit - three segment numeric code assigned to each registered drug manufactured - processed - and distributed by registered drug manufacturers.






29. An area where all medical imaging procedures are conducted.






30. Also called Wi-Fi - short for wired fidelity - '802.11b is probably the most common and certainly the lest expensive wireless network protocol used to transfer data among computers with wireless network cards or between a wireless computer or device






31. Cisco Systems' proprietary EAP implementation.






32. A Windows Server computer that runs the Active Directory service. Directory information is automatically replicated between the DC's






33. A system that extinguishes fire using special gases.






34. Unwanted software that collects personal user data from a system and transmits it to a third party.






35. Any room used to temporarily house patient when they are in transition between their patient room and another location - such as before or after testes or surgeries.






36. A server that proves the most accurate actual time to all clients in a computer network.






37. An implementation in which voice signals are transmitter over IP networks.






38. A device that provides network connectivity capabilities for computer systems.






39. Software that provides one location where charges are entered codes can be checked - insurance claims and statements can be generated and sent - claim denials can be managed and payments can be posted and processed.






40. Implemented security measures that restrict - detect - and monitor access to specific physical areas or assets.






41. A file property that essentially indicates whether the file has been modified since the last back up.






42. A trauma center that can provide initial evaluation stabilization - and diagnosis of a trauma patient - but then the patient must be transferred to a Level I - II - or III facility for treatment and care. It is differentiated from a Level IV because






43. Software that allows for electronic entry of all medical orders/instructions for treatment for a patient from their licensed caregiver which can then be accessed by other medical staff.






44. Classification for a drug or substance that has a high potential for abuse; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to severe psychological or physical dependence.






45. Also known as an acute care facility. This facility proves services aimed to resolve immediate and short-term medical conditions like pregnancy or a heart attack.






46. Using symbols to mark off a sidewalk or wall to indicate that there is an open wireless networking which may be offering Internet access.






47. An attack that targets a computer's physical components and peripherals - including hard disk - motherboard - keyboard network cabling - or smart card reader.






48. Medical services that can be proved to a patient without the need for the patient to be admitted to any type of healthcare facility.






49. Term used to communicate that a patient has gone into cardiac arrest - and immediate medical attention/ rapid response is needed to resuscitation the patient.






50. Any method of securing you wireless LAN network to prevent unauthorized network access and network data theft while ensuring that authorized users can connect to the network.