Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The transmission of a patient's prescription for medication electronically from the describer's computer to the pharmacy's computer.






2. Software systems solutions developed using specific industry standards and rules that allow all the myriad medical systems to communicate as seamlessly as possible with one another.






3. An investor-owned hospital - usually owned by a corporation or group of private individuals - that aims to gain profits for the services provided which are then paid to those invested in the ownership.






4. An attack that targets a computer's physical components and peripherals - including hard disk - motherboard - keyboard network cabling - or smart card reader.






5. An analysis technique that determines the coverage area of a wireless network - identifies any sources of interference - and establishes other characteristics of the coverage area.






6. A residential facility 'steps' of care based on the residents' needs:Residents can start out with more Independence though assisted living - with the comfort of knowing nursing home care is available at the same facility when they can no longer remai






7. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.






8. A file property that essentially indicates whether the file has been modified since the last back up.






9. An IT role that is responsible for ensuring that an organization's security policies are being followed by employees and that sufficient controls are in place to prevent unauthorized access to systems and facilities -






10. A family of specification developed by the IEEE for wireless LAN technology.






11. A server-side programming language used to develop dynamic web pages by embedding its coded into an HTML pages.






12. Individually identifiable health information that is transmitted or maintained in any form or medium by a covered entity or business associate.






13. A backup that backs up all the files in a selected storage location that have changed since the last full backup.






14. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie






15. See Host Computer






16. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.






17. A type of cable that features a central conductor surrounded bu the braided or foil shielding. a dialectric insulator separates the conductor shield and the entire package is wrapped in an insulating layer called a jacket. The data signal is transmit






18. Remote Authentication Dial-in User Services - A standard protocol for providing centralized authentication and authorization services form remote users.






19. The federal agency that oversees the regulation of food safety - tobacco products - prescription and over-the-counter medication - dietary supplements - vaccines - medical devices - sanitation requirements - and other related public health products a






20. A service added to the IP protocol that attempts to report on the condition of a connection between two nodes.






21. A process in which a list of patient's medication orders is compared to a list of those that the patient has been taking in order to avoid any possible medication errors such as duplicated prescriptions - errors in dosage - or potentially hazardous d






22. Any message containing incorrect or misleading information that is disseminated to multiple users though unofficial channels.






23. An effort to set standards - specifications - and criteria for the implementation - use - and security of healthcare IT systems.






24. Secure FTP - A secure version of FTP that uses SSH as an encryption method to transfer - access - and manage files.






25. A portable electronic security token that contains biometric user data - or other identification information.






26. A trauma center that can provide the highest possible level of surgical care to trauma patients - with a full range of specialists and technology available 24 hours a day. It is required to have an ongoing research program and trauma education/ preve






27. Systematized Nomenclature of Medicine-clinical Terms - An organized collection of numeric codes correlating to clinical information such as diseases - procedures - microorganisms - medications - and so forth that may be used in a patient's records.






28. A device used for patient billing to capture an electronic signature.






29. The section of HIPAA that establishes a rule set to govern the use and disclosure of PHI by covered entities. The goal of the Privacy Rule is to protect a person's health information while allowing adequate transfer of information to promote efficien






30. An invitation for vendors to submit a plan and bid for the delivery of a product or service.






31. A facility equipped to treat patients suffering traumatic injuries.






32. A computer model where functionality is divided into two roles: A server computer which provides services and controls network operations and a client computer which uses the services provides by the servers.






33. Devices that provide alternative input or output methods or additional data storage though a connection to the system unit via cable or a wireless connection.






34. An IT role that is responsible for the network infrastructure and components withing an organization.






35. A password that meets the complexity requirements that are set by a system administrator and documented in a password policy.






36. A network attack that uses special monitor software to gain access to private communications on the network wire or across a wireless network. Also known as an eavesdropping attack.






37. An IEEE standard used to provide a port based authentication mechanism for wireless communications using the 802.11a and 802.11b protocols.






38. Parallel Advanced Technology Attachment - A personal computer connection that provides a parallel data channel from a disk controllers to the disk driver.






39. A server that stores files and programs.






40. A protocol that provides 64-bit - 128-bit - and 256-bit encryption using the RC4 algorithm for wireless communication that uses the 802.11a and 802.11b protocols.






41. A type of attack where the goal is to obtain sensitive data including user names and passwords - from network users though deception and trickery.






42. A hospital that treats a wide variety of medical issues including emergencies and inpatient/outpatient care - and performs general surgeries.






43. A health information organization comprised of key stakeholders in the health care industry a specific geographical region who oversee the health information exchange of healthcare providers in the area.






44. The U.S. federal program to provide healthcare for certain low-income individual and families.






45. A federal health insurance program for the elderly and some disable individuals in the United States - with three main parts: Part A for inpatient - Part B for outpatient - and prescriptions drug coverage.






46. A wired or wireless device that is used to scan and identify patients using the unique barcode located on their ID wrist band.






47. An IT role that is responsible for designing - implementing - maintaining - and repairing databases. Usually also responsible for the security of an organization's database system and all the data stored on the systems.






48. Also known as an acute care facility. This facility proves services aimed to resolve immediate and short-term medical conditions like pregnancy or a heart attack.






49. A form of eavesdropping where the attacker makes an independent convection between two victims and steals information to use fraudulently.






50. A device used to fax prescription or to print out prescription information for the EMR/EHR system.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests