Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Online or electronic software that provides a stat-to-finish workflow from the time a patient is scheduled though their checkout after their appointment - including insurance verification - check-in - check-out - and payment.






2. Any adverse reaction to a medication being taken.






3. A hospital owned and operated by a federal - state or city government. Typically provides subsidized medical services to patients unable to pay for medical services.






4. The part of the ARRA that promote the adoption in meaningful use of healthcare IT through enchanced enforcement and extension of HIPAA policies.






5. A policy that defines how people and resources will be protected in a natural or man-made disaster and how the organization will recover from the disaster.






6. A family of specification developed by the IEEE for wireless LAN technology.






7. A company that provides access to the Internet.






8. A patient maintained health record that can be shared with medical professionals. Generally not a part of Legal Heath Record.






9. A senior - skilled medical staff member who serves as an instructor or supervisor - providing experience and feedback - to medical students or newly hired employees still in training.






10. Any room used to temporarily house patient when they are in transition between their patient room and another location - such as before or after testes or surgeries.






11. A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also knows as a sniffing attack.






12. A form of eavesdropping where the attacker makes an independent convection between two victims and steals information to use fraudulently.






13. A legal document that may be signed by a patient (or those acting legally on behalf of a patient) to acknowledge the risks involved in a specific medical procedure or medication.






14. An invitation for vendors to submit a plan and bid for the delivery of a product or service.






15. A residential facility for individuals with persistent medical conditions who are currently unable to live independently - but do not need constant medical care or supervision.






16. An Adobe platform that allows developers to create animations - videos - and other interactive components using the ActionScript programming language.






17. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.






18. A residential facility or community for patients who may need assistance with some functions of daily living - such as bathing or medication reminders - but can otherwise remain mostly independent.






19. Classification for a drug or substance that has low potential for abuse as compared those in categorized in Schedule III; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical or p






20. Software that provides a single system for tracking and managing compliance with medical claims audits that are performed by both government and commercial healthcare(insurance) organizations.






21. Unwanted software that collects personal user data from a system and transmits it to a third party.






22. A formalized statement that defines how security will be implemented within a particular organization.






23. A hardware rack that holds networking equipment to provide connections from public lines coming into the physical building generaly from the ISP - to all the IDFs located what a medical facility






24. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.






25. A security protocol that uses certificates for authentication and encryption to protect web communication.






26. The de facto standard VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP - frame relay - or ATM.






27. A device used to convert paper to electronic format and then associates the file with the proper patient.






28. Term used to communicate that a patient has gone into cardiac arrest - and immediate medical attention/ rapid response is needed to resuscitation the patient.






29. One of several internationally endorsed medical codding classifications list which gives a numeric code to diseases - signs and symptoms - possible complaints - abnormalities - and possible causes of injuries and diseases..






30. A type or network attack where an attacker captures network traffic and store it for re-transmission at a later time to gain unauthorized access.






31. A method of computing that relies on the Internet to provided the resources - software - data and media needs of a user - business - or organization.






32. An area where patients are housed after a surgical procedure or any procedure requiring anesthesia and are closely monitored for any indications of post-operative complications.






33. World Health Organization - A division of the United Nations that manages the authority of international public health.






34. Platform as a Service - a method that uses the l=cloud to provide any platform-type service.






35. A backup that backs up all the files in a selected storage location that have changed since the last full backup.






36. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.






37. A network attack that uses special monitor software to gain access to private communications on the network wire or across a wireless network. Also known as an eavesdropping attack.






38. Data that is added to a patient EMR to allow for quick searching and file location.






39. An attack that targets a computer's physical components and peripherals - including hard disk - motherboard - keyboard network cabling - or smart card reader.






40. A piece of code that sits dormant on a user;s computer until it is triggered by a specific event such as a specific date. Once the code is triggered the logic bomb ' detonates - : erasing and corrupting data on the user's computer.






41. Derived from the Latin 'statim -' a term used to connote immediacy or urgency.






42. A wired or wireless device that is used to scan and identify patients using the unique barcode located on their ID wrist band.






43. A VPN protocol that is an extension of the PPP remote access protocol.






44. A widely adopted markup language used in many documents - websites - and web applications.






45. A back up that backs up all files in a selected storage location that have changed since the last full or differential backup.






46. A server that uses the File Transfer Protocol(FTP) to exchange files over an Internet connection.






47. Using symbols to mark off a sidewalk or wall to indicate that there is an open wireless networking which may be offering Internet access.






48. Mechanism that are put in place to limit access to electronic health information.






49. A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones - tablets and laptops to other Bluetooth-enabled devices.






50. A device that distributes and manages print jobs sent from client computers.






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests