Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A hardware device or a computer software program that acts as a communication hub to provide heightened wireless security and extend the physical range of a wireless local area network.






2. A high-speed serial bus developed by Apple and Texas Instruments that allows for the connection of up to 63 devices. Originally a trademarked term for IEEE 1394 - but is now used interchangeably.






3. Software that allows staff to track a patient's flow of care in the system from registration thought treatment - and during and after discharge.






4. Any adverse reaction to a medication being taken.






5. A list of all NDC identification numbers - compiled and published by the Food and Drug Administration.






6. Unwanted software that collects personal user data from a system and transmits it to a third party.






7. Access given to certain members in an organization to use data on a system without the need for authenticating themselves.






8. Personal computer components that enable users to view the text and graphical data output from a computer.






9. Classification for a drug or substance that has low potential for abuse as compared those in categorized in Schedule III; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical or p






10. A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also knows as a sniffing attack.






11. A back up that backs up all files in a selected storage location that have changed since the last full or differential backup.






12. The standard language that defines how web pages are formatted and displayed.






13. A team of clinicians assigned to work with a specific patient at any given time.






14. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. Also called a drone.






15. A residential facility 'steps' of care based on the residents' needs:Residents can start out with more Independence though assisted living - with the comfort of knowing nursing home care is available at the same facility when they can no longer remai






16. Electronic messages sent between users or groups.






17. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.






18. A non-profit organization that promotes the adaption of healthcare IT systems - as well as certifies health record technology.






19. A regulatory concept describing the ideal of effectively and efficiently leveraging EHR technology in the medical workplace.






20. A hardware rack that holds networking equipment to provide connections from public lines coming into the physical building generaly from the ISP - to all the IDFs located what a medical facility






21. The use of various technologies to create images of the human body for use in the clinical field - such as diagnosis - treatment - and tracking of a disease or medical issue within the body.






22. The amount of work a server performs on a regular basis.






23. A standard that adds AES security to the 802.11 standard






24. A method in which an attacker with access to the target network redirects an IP address to the MAC address of a computer that is not the intended recipient.






25. A physical security control system that has a door at each end of a secure chamber.






26. A device that provides network connectivity capabilities for computer systems.






27. Any room used to temporarily house patient when they are in transition between their patient room and another location - such as before or after testes or surgeries.






28. A Protocol used to automatically assign IP addressing information to IP network computers.






29. A health record standard that was developed by a number of American healthcare organization as a means of creating summary documents containing the most relevant pertinent information about a patient that can be shared electronically between medical






30. A U.S. federal agency responsible not only for overseeing its named services but also for administering a children's insurance program - some portions of HIPAA - and other programs.






31. An area where minor procedures are perform - including minor surgeries not requiring anesthesia and post-operative care.






32. The U.S. federal program to provide healthcare for certain low-income individual and families.






33. A document that lists agreed upon actions between two parties.






34. A type of cable in which multiple insulated conductors are twisted together and clad in a protective and insulating out jacket.






35. A service added to the IP protocol that attempts to report on the condition of a connection between two nodes.






36. A systematic way of approving and executing changing in order to assure maximum security - stability and availability of information technology services.






37. Service-level Agreement - a contractual agreement between a service provider and a customer that stipulates the precise services and support options the vendor must provide.






38. A personal computer storage device that stores data magnetically on a removable tape.






39. A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones - tablets and laptops to other Bluetooth-enabled devices.






40. A server that stores files and programs.






41. A programming and query language common to many large scale database systems.






42. Software protection systems in an organization.






43. Secure FTP - A secure version of FTP that uses SSH as an encryption method to transfer - access - and manage files.






44. Authentication schemes based on individuals' physical characters.






45. A device that distributes and manages print jobs sent from client computers.






46. A unique 10-digit - three segment numeric code assigned to each registered drug manufactured - processed - and distributed by registered drug manufacturers.






47. A network attack in which an attacker hijacks or manipulates multiple computers(through the use of zombies or drones)






48. An itemized form containing all the information needed to file a claim. including patient information and services rendered for a visit - that is compiled by the healthcare provider's medical biller and supplied to the insurance company as the source






49. A hospital owned and operated by a federal - state or city government. Typically provides subsidized medical services to patients unable to pay for medical services.






50. A common type of email-based social engineering attack where the attacker sends an email that seems to come form a respected bank or financial institution.