SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A trauma center that can provide the highest possible level of surgical care to trauma patients - with a full range of specialists and technology available 24 hours a day. It is required to have an ongoing research program and trauma education/ preve
Level I Trauma Center
PHR (Personal Health Record)
Assisted Living Facility
RHIO (Regional Health Information Organization)
2. Systematized Nomenclature of Medicine-clinical Terms - An organized collection of numeric codes correlating to clinical information such as diseases - procedures - microorganisms - medications - and so forth that may be used in a patient's records.
SNOMED CT
Liability Waiver
Optical Disk
DBA (Database Administrator)
3. The federal agency that oversees the regulation of food safety - tobacco products - prescription and over-the-counter medication - dietary supplements - vaccines - medical devices - sanitation requirements - and other related public health products a
Bluesnarfing
SSTP (Secure Socket Tunneling Protocol)
Worm
FDA (Food and Drug Administration)
4. An IT role that is responsible for designing - implementing - maintaining - and repairing databases. Usually also responsible for the security of an organization's database system and all the data stored on the systems.
WTLS (Wireless Transport Layer Security)
WAN (Wide Area Network )
DBA (Database Administrator)
CPT (Current Procedural Terminology)
5. Implemented security measures that restrict - detect - and monitor access to specific physical areas or assets.
Sniffing
Flash
Physical Security Controls
Schedule IV Controlled Substance
6. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.
Intermediate Care facility
Software Patch
Private Health Insurers
FDA (Food and Drug Administration)
7. A health record standard that was developed by a number of American healthcare organization as a means of creating summary documents containing the most relevant pertinent information about a patient that can be shared electronically between medical
Treatment Team
CCR (Continuity of Care Record)
DBA (Database Administrator)
Flash
8. A class of technology separates computing software from the hardware it runs via an additional software layer - allowing multiple operating systems to run on one computer simultaneously.
Scheduling Software
Virtualization
SCSI (Small Computer Systems Interface)
Degaussing
9. The compilation of protocols - polices - and hardware that govern access on devices to and from a network.
NAC (Network Access Control)
Signature Pads
Router
Web Server
10. Classification for a drug or substance that has a high potential for abuse; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to severe psychological or physical dependence.
Specialized Hospital
Imaging
Schedule II Controlled Substance
Home Healthcare
11. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.
Worm
Tape Drive
PAN (Personal Area Network)
Outpatient Treatment
12. Classification for a drug or substance that has less potential for abuse that those categorized as Schedule I or II; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to moderate or low physical depe
Schedule III Controlled Substance
Interference
HITECH Health Information Technology for Economic and Clinical Health Act)
Schedule IV Controlled Substance
13. A protocol used to connect to and access a remote computer.
IM (Instant Messaging)
RDP (Remote Desktop Protocol)
PPP (Point-to-Point Protocol)
Acuity
14. An independent medical practice opened by one or more accredited medical practitioners of any specialty area in an office environment.
Software Update
Private Practice
MOU (Memorandum of Understanding)
Site Survey
15. A computer model where functionality is divided into two roles: A server computer which provides services and controls network operations and a client computer which uses the services provides by the servers.
Fiber
lient-Server
ICMP (Internet Control Message Protocol)
Proxy Server
16. A specification for wireless data though put at the rate of up to 54Mbps in the 2.4GHz that is a potential replacement for 802.11b.
RADIUS
WAN (Wide Area Network )
Network Administrator
802.11g
17. Software that provides one location where charges are entered codes can be checked - insurance claims and statements can be generated and sent - claim denials can be managed and payments can be posted and processed.
Surgical Center
Billing and Coding Software
Firewall
Medicare
18. A network that connects wireless devices in a very close proximity but not though a wireless access point.
PAN (Personal Area Network)
Bluejacking
802.11g
Systems Administrator
19. A software and/or hardware system that scans - audits - and monitors the security infrastructure for signs of attacks in progress.
TKIP (Temporary Key Integrity Protocol)
IDS (Intrusion Detection System)
BAA (Business Associate Agreement)
CCR (Continuity of Care Record)
20. A department within a medical organization dedicated to handling ROI requests for EMR/EHR information release.
Ping
Applications
PATA Connection
ROI Department
21. A regulatory concept describing the ideal of effectively and efficiently leveraging EHR technology in the medical workplace.
Meaningful Use
SSL (Secure Sockets Layer)
Home Healthcare
Packet Sniffing
22. A hardware device or a computer software program that acts as a communication hub to provide heightened wireless security and extend the physical range of a wireless local area network.
E/M Codes (Evaluation and Management Codes)
AP (Access Points)
Isolation Room
Applications
23. A list of description and accompanying five-digit numeric codes used for reporting medical services and procedures - which is published every year by the American Medical Association.
Server Load
EHR (Electronic Health Record)
CPT (Current Procedural Terminology)
P2P
24. A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones - tablets and laptops to other Bluetooth-enabled devices.
802.11b
Bluejacking
Long-stay Facility
Short-stay Facility
25. Pronounced 'I-triple-E.' An organization of scientists - engineers - and student of electronics and related fiends whose technical and standards committees develop - publish and revise computing and telecommunications standards.
Systems Administrator
Final Rule
PCP Primary Care Physician
IEEE (Institute of Electrical and Electronic Engineers)
26. A personal computer storage device that stores data in non-volatile special memory instead of on disks or tape.
Nursing Home
Solid State Storage
Degaussing
Spyware
27. Unwanted software that collects personal user data from a system and transmits it to a third party.
Spyware
Permission
WAN (Wide Area Network )
Wireless Security
28. A device used for patient billing to capture an electronic signature.
Assisted Living Facility
P2P
Signature Pads
Level I Trauma Center
29. One of several internationally endorsed medical codding classifications list which gives a numeric code to diseases - signs and symptoms - possible complaints - abnormalities - and possible causes of injuries and diseases..
ICD-10 (International Statistical Classification of Diseases and Related Health Problems - 10th revision)
Fiber
Bluetooth
OCR (Optical Character Recognition)
30. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.
Centralized
Serial Connection
Spyware
DNS Server
31. Classification for a drug or substance that has low potential for abuse as compared those in categorized in Schedule III; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical or p
Schedule IV Controlled Substance
Bluejacking
Schedule V Controlled Substance
IDS (Intrusion Detection System)
32. An IT role that is responsible for assisting end users and attempts to restore normal service to users as quickly as possible.
Differential Backup
Desktop Support
MDF (Main Distribution Frame)
Biometrics
33. Universal Serial Bus - A hardware interface standard designed to provide connections for numerous peripherals.
Assisted Living Facility
WAN (Wide Area Network )
USB
802.1x
34. A software or hardware device that protects a system or network by blocking unwanted network traffic.
Private Practice
Optical Disk
Break Glass Access
Firewall
35. A server-side programing languague developed by Microsoft to provide a method to create dynamic web pages.
Archive Flag
Wireless Security
ASP (Active Server Pages)
VoIP (Voice over IP)
36. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie
Covered Entity
LAN (Local Area Network)
LEAP (Lightweight Extensible Authentication Protocol)
Time Server
37. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.
Trojan Horse
Virtualization
MOU (Memorandum of Understanding)
EMI (Electromagnetic Interference)
38. A powerful - centralized computer system that performs data storage and processing tasks on behalf of clients and other network devices.
Host Computer
Eavesdropping
DoS (Denial of Service attack)
Security Administrator
39. Originally frequent and repetitive postings in electronic bulletin boards; more commonly unsolicited or distasteful commercial email form - anonymous sources.
API (Application Programming Interface)
Spam
Network Administrator
HIPAA (Health Insurance Portability and Accountability Act)
40. Any adverse reaction to a medication being taken.
HL7
Drug Allergy
Data Wiping
Schedule IV Controlled Substance
41. A fast - secure - but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency.
Cloud Computing
Level V Trauma Center
RDP (Remote Desktop Protocol)
802.11a
42. The process of transforming handwritten - scanned images of text or typed text into machine-encoded text.
OCR (Optical Character Recognition)
Medical Interfaces
TKIP (Temporary Key Integrity Protocol)
Social Engineering Attack
43. A software program that scans a Computer or network for known viruses - Trojans - worms - and other malacious software.
PACS
Encryption
Teaching Hospital
antivirus software
44. A document that lists agreed upon actions between two parties.
Security Policy
MOU (Memorandum of Understanding)
Fax Printer
PAN (Personal Area Network)
45. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.
WAN (Wide Area Network )
SLA
CCR (Continuity of Care Record)
Isolation Room
46. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.
Scope of Practice
HIPAA (Health Insurance Portability and Accountability Act)
adware
CMS (Centers for Medicare and Medicaid Services)
47. An IT role that is responsible for ensuring that an organization's security policies are being followed by employees and that sufficient controls are in place to prevent unauthorized access to systems and facilities -
Server Utilization
Security Administrator
Schedule IV Controlled Substance
UPS
48. Medical services that can be proved to a patient without the need for the patient to be admitted to any type of healthcare facility.
Ping
802.11n
PPTP (Point-to-Point Tunneling Protocol)
Outpatient Treatment
49. A personal computer storage device that stores data magnetically on a removable tape.
Tape Drive
Keyfob
DoS (Denial of Service attack)
Archive Flag
50. Remote Authentication Dial-in User Services - A standard protocol for providing centralized authentication and authorization services form remote users.
DNS (Domain Name System)
Fax Printer
CCHIT(Certification Commission for Health Information Technology)
RADIUS