Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An analysis technique that determines the coverage area of a wireless network - identifies any sources of interference - and establishes other characteristics of the coverage area.






2. The mechanism by which individual hardware MAC addresses are matched to an IP address on a network.






3. Unwanted software loaded onto a system for the purposes of presenting commercial advertisements to the user.






4. Time to Live - A value that determines how many hops an IP packet ca travel before being discarded.






5. An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.






6. The intermediary between the medical biller at the healthcare organization and the paying insurance company who ensures that the claim has no errors before it is transmitted to the insurance company.






7. Specific healthcare industry standards and a framework concerning the exchange and integration of patient's electronic information between software systems - which are adhered to by vendors developing interfaces - ensuring that of this disparate soft






8. A personal computer storage device that stores data magnetically on a removable tape.






9. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.






10. A computer model where functionality is divided into two roles: A server computer which provides services and controls network operations and a client computer which uses the services provides by the servers.






11. A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also knows as a sniffing attack.






12. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie






13. An IT role that is responsible for designing - implementing - maintaining - and repairing databases. Usually also responsible for the security of an organization's database system and all the data stored on the systems.






14. The section of HIPAA that establishes national standards for the security of personal electronic health information maintained by a cover entity.






15. A device used for patient billing to capture an electronic signature.






16. A widely adopted markup language used in many documents - websites - and web applications.






17. Records that are not for public consumption and require appropriate release before they can be shared.






18. A programming and query language common to many large scale database systems.






19. Uninterruptible Power Supply - A battery back up device that is intended to save computer components from damage due to power problems such as power failures - spikes - and sags.






20. Access given to certain members in an organization to use data on a system without the need for authenticating themselves.






21. Derived from the Latin 'statim -' a term used to connote immediacy or urgency.






22. A security protocol created by the IEEE task group to replace WEP.






23. Classification for a drug or substance that has a high potential for abuse; currently has no accepted medical use in treatment in the United States; and has a lack of accepted safety for use under medical supervision.






24. A device used to convert paper to electronic format and then associates the file with the proper patient.






25. Also known as an acute care facility. This facility proves services aimed to resolve immediate and short-term medical conditions like pregnancy or a heart attack.






26. Devices that provide alternative input or output methods or additional data storage though a connection to the system unit via cable or a wireless connection.






27. A network attack in which an attacker disables systems that provide network services by consuming a networks link's available bandwidth - consuming a single system's available resources - or exploiting programming flaws in an application or operation






28. A wireless standard for home and business implementations that adds QoS features and multimedia support to 802.11a and 802.11b






29. The standard language that defines how web pages are formatted and displayed.






30. A health record standard that was developed by a number of American healthcare organization as a means of creating summary documents containing the most relevant pertinent information about a patient that can be shared electronically between medical






31. An older personal computer connection standard hat provides high-performance data transfer between the SCSI device and the other components of the computer. Pronounced ' scuzzy.'






32. A fast - secure - but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency.






33. Mechanism that are put in place to limit access to electronic health information.






34. A legal document that may be signed by a patient (or those acting legally on behalf of a patient) to acknowledge the risks involved in a specific medical procedure or medication.






35. A list of description and accompanying five-digit numeric codes used for reporting medical services and procedures - which is published every year by the American Medical Association.






36. An area where surgical procedures are performer in a sterile environment.






37. The compilation of protocols - polices - and hardware that govern access on devices to and from a network.






38. A personal computer storage device that uses fixed media and magnetic data storage.






39. Pretty Good Privacy - A method of securing emails created to prevent attackers form intercepting and manipulating emails and attachments by encrypting and digitally singing the contents of the emails using public key cryptography.






40. A personal computer storage device that stores data in non-volatile special memory instead of on disks or tape.






41. An invitation for vendors to submit a plan and bid for the delivery of a product or service.






42. A Specialized file server that is designed and dedicated to support only data storage needs.






43. One of several internationally endorsed medical codding classifications list which gives a numeric code to diseases - signs and symptoms - possible complaints - abnormalities - and possible causes of injuries and diseases..






44. A document that lists agreed upon actions between two parties.






45. A server that runs applications for client use or is used by developers to store and share application components that can be used in web applications.






46. An EHR system that had been certified by ONC






47. Any medical treatment or services provided on an outpatient basis.






48. A residential facility for terminally ill patients who have reached the end stages of their condition. Hospice care is designed to provide comfort and care for patients and support for the patient's family during end-of-life.






49. A high-speed serial bus developed by Apple and Texas Instruments that allows for the connection of up to 63 devices. Originally a trademarked term for IEEE 1394 - but is now used interchangeably.






50. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.