Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Using symbols to mark off a sidewalk or wall to indicate that there is an open wireless networking which may be offering Internet access.






2. An area where minor procedures are perform - including minor surgeries not requiring anesthesia and post-operative care.






3. A technique used in cryptography to generate random numbers to be used along with a secret key to provide data encryption.






4. Individually identifiable health information that is transmitted or maintained in any form or medium by a covered entity or business associate.






5. Pretty Good Privacy - A method of securing emails created to prevent attackers form intercepting and manipulating emails and attachments by encrypting and digitally singing the contents of the emails using public key cryptography.






6. A facility that provides long-term services - such as rehabilitation - that address more permanent or long-term medical conditions like mental illness.






7. Devices that provide alternative input or output methods or additional data storage though a connection to the system unit via cable or a wireless connection.






8. World Health Organization - A division of the United Nations that manages the authority of international public health.






9. A checks-and-balances systems that ensures that a patient is receiving the correct medication - the correct dose of medication at the correct time - from an authorize caregiver by requiring that bar codes storing information about the patient medicat






10. An area within a medical facility designed to prevent the spread of airborne infections though the use of negative pressurization control of the air inside and outside the room.






11. A healthcare record standard - similar to CCR but more robust as it was developed by both the HL7 and American Society for Testings and Materials.






12. The standard language that defines how web pages are formatted and displayed.






13. A server that isolates internal networks form the Internet by downloading and storing Internet files on behalf of internal clients.






14. Cisco Systems' proprietary EAP implementation.






15. An IT role that is responsible for the network infrastructure and components withing an organization.






16. A software and/or hardware system that scans - audits - and monitors the security infrastructure for signs of attacks in progress.






17. A systematic way of approving and executing changing in order to assure maximum security - stability and availability of information technology services.






18. The automatic process for checking a prescription for medication against a patents's known allergies for possible drug-allergy reactions - and against current medications for possible adverse drug-drug interactions.






19. An IT role that is responsible for designing - implementing - maintaining - and repairing databases. Usually also responsible for the security of an organization's database system and all the data stored on the systems.






20. An attack where the attacker is able to predict of control the IV of an encryption process - thus giving the attacker access to view the encrypted data that is supposed to be hidden from everyone else except the user of network.






21. Electronic conversion of hard copy documents to digital form.






22. A device used for patient billing to capture an electronic signature.






23. A type of cable in which one or more glass or plastic strands - plus additional fiber strands or wraps - are surrounded by a protective oyster jacket. Light pulses carry the signal though fiber optic cable.






24. A team of clinicians assigned to work with a specific patient at any given time.






25. A legal document that may be signed by a patient (or those acting legally on behalf of a patient) to acknowledge the risks involved in a specific medical procedure or medication.






26. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.






27. A method that uses the cloud to provide any or all infrastructure needs.






28. A high-speed serial bus developed by Apple and Texas Instruments that allows for the connection of up to 63 devices. Originally a trademarked term for IEEE 1394 - but is now used interchangeably.






29. An area of the facility where those needing immediate medical treatment arrive and are provided with initial care for their medical illness or injury - before being admitted for further treatment by another department.






30. An itemized form containing all the information needed to file a claim. including patient information and services rendered for a visit - that is compiled by the healthcare provider's medical biller and supplied to the insurance company as the source






31. A sample of code that spreads from one computer to another by attacking itself to other files. The code in a virus corrupts and erases files on a user's computer - including executable files - when the files to which it was attached is opened or exec






32. Electronic messages sent between users or groups.






33. A health record standard that was developed by a number of American healthcare organization as a means of creating summary documents containing the most relevant pertinent information about a patient that can be shared electronically between medical






34. A list of all NDC identification numbers - compiled and published by the Food and Drug Administration.






35. Private and non-government businesses that contract with individual or employments to help pay medical expenses. These insurers also have seperate contracts with many health organization that specify negotiated rate structures for that health organiz






36. A network that displays characteristics of more than one of the three standard network models.






37. The part of the ARRA that promote the adoption in meaningful use of healthcare IT through enchanced enforcement and extension of HIPAA policies.






38. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.






39. Online or electronic software that provides a stat-to-finish workflow from the time a patient is scheduled though their checkout after their appointment - including insurance verification - check-in - check-out - and payment.






40. A trauma center that can provide essential trauma care 24 hours a day with all available specialties - personnel - and equipment. It provides comprehensive trauma care and clinical assistance to a level I facility as needed. It is differentiated from






41. Unwanted software that collects personal user data from a system and transmits it to a third party.






42. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.






43. A method used to securely remove data from hard drives and other electronic storage devices.






44. A patient maintained health record that can be shared with medical professionals. Generally not a part of Legal Heath Record.






45. Records that are released for public viewing.






46. Specific healthcare industry standards and a framework concerning the exchange and integration of patient's electronic information between software systems - which are adhered to by vendors developing interfaces - ensuring that of this disparate soft






47. The transmission of a patient's prescription for medication electronically from the describer's computer to the pharmacy's computer.






48. A software or hardware device that protects a system or network by blocking unwanted network traffic.






49. A server-side programming language used to develop dynamic web pages by embedding its coded into an HTML pages.






50. A password that meets the complexity requirements that are set by a system administrator and documented in a password policy.