Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A document that defines the authorized uses of PHI and how the information is to be used and managed.






2. A server that runs applications for client use or is used by developers to store and share application components that can be used in web applications.






3. A TCP/IP utility used to verity the network connectivity of a computer.






4. A process in which a list of patient's medication orders is compared to a list of those that the patient has been taking in order to avoid any possible medication errors such as duplicated prescriptions - errors in dosage - or potentially hazardous d






5. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.






6. The use of various technologies to create images of the human body for use in the clinical field - such as diagnosis - treatment - and tracking of a disease or medical issue within the body.






7. Any method of securing you wireless LAN network to prevent unauthorized network access and network data theft while ensuring that authorized users can connect to the network.






8. A facility equipped to treat patients suffering traumatic injuries.






9. A class of technology separates computing software from the hardware it runs via an additional software layer - allowing multiple operating systems to run on one computer simultaneously.






10. A high-speed serial bus developed by Apple and Texas Instruments that allows for the connection of up to 63 devices. Originally a trademarked term for IEEE 1394 - but is now used interchangeably.






11. A document that lists agreed upon actions between two parties.






12. A private room where a patient is examined and diagnosed by a medical practitioner.






13. A residential facility 'steps' of care based on the residents' needs:Residents can start out with more Independence though assisted living - with the comfort of knowing nursing home care is available at the same facility when they can no longer remai






14. A type of attack where the goal is to obtain sensitive data including user names and passwords - from network users though deception and trickery.






15. A hospital owned and operated by a federal - state or city government. Typically provides subsidized medical services to patients unable to pay for medical services.






16. A file property that essentially indicates whether the file has been modified since the last back up.






17. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.






18. Data that is added to a patient EMR to allow for quick searching and file location.






19. A device that connects multiple network that use the same protocol.






20. The method used to repeatedly delete and overwrite any traces or bits of sensitive data that may remain on a device after data wiping has been done.






21. A hospital affiliated with a nearby medical school - allowing medical students and residents to gain hands-on learning and obtain real works experience by working in the hospital environment.






22. A server-side programing languague developed by Microsoft to provide a method to create dynamic web pages.






23. A form of eavesdropping where the attacker makes an independent convection between two victims and steals information to use fraudulently.






24. A type of cable in which multiple insulated conductors are twisted together and clad in a protective and insulating out jacket.






25. Any room used to temporarily house patient when they are in transition between their patient room and another location - such as before or after testes or surgeries.






26. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.






27. The acuteness - or level of severity - of an illness or disease.






28. The service that maps names to IP addresses on most TCP/IP networks - including the Internet.






29. A residential facility or community for patients who may need assistance with some functions of daily living - such as bathing or medication reminders - but can otherwise remain mostly independent.






30. The fundamental security goal of ensuring that electronic data is not altered or tampered with.






31. Private and non-government businesses that contract with individual or employments to help pay medical expenses. These insurers also have seperate contracts with many health organization that specify negotiated rate structures for that health organiz






32. A security designation that determines the clearance for an information zone within the EHR system.






33. A wide variety of medical services that are provided in a patient's home by an accredited home health aide - often including physical therapy and medication delivery thought more complicated methods like injection intravenous therapy - etc.






34. Temporary and specific emergency access to specifically locked PHI data in order to gain access to information which enables tasks completion.






35. Remote Authentication Dial-in User Services - A standard protocol for providing centralized authentication and authorization services form remote users.






36. A command line utility used to display the connection-specific DNS suffix - IP address - subnet mask - and default gateway.






37. A security protocol that uses certificates for authentication and encryption to protect web communication.






38. The section of HIPAA that establishes a rule set to govern the use and disclosure of PHI by covered entities. The goal of the Privacy Rule is to protect a person's health information while allowing adequate transfer of information to promote efficien






39. Secure Shell - A protocol for secure remote logon and secure transfer of data.






40. An investor-owned hospital - usually owned by a corporation or group of private individuals - that aims to gain profits for the services provided which are then paid to those invested in the ownership.






41. Records that are not for public consumption and require appropriate release before they can be shared.






42. Uninterruptible Power Supply - A battery back up device that is intended to save computer components from damage due to power problems such as power failures - spikes - and sags.






43. A healthcare record standard - similar to CCR but more robust as it was developed by both the HL7 and American Society for Testings and Materials.






44. A type of network that is established spontaneously through a peer-to-peer wireless connection.






45. The amount of work a server performs on a regular basis.






46. Unwanted software that collects personal user data from a system and transmits it to a third party.






47. Picture Archiving and Communications System - Application system where medical images of almost all kinds - including MRIs - CAT scans - ultrasounds - mammograms - etc. - can be stored and retrieved electronically by various members of a health organ






48. The part of the ARRA that promote the adoption in meaningful use of healthcare IT through enchanced enforcement and extension of HIPAA policies.






49. An all-encompassing solution of many other IT-based pieces that streamlines the workflow processes of all activities needed to run a practice or facility while providing the ability to becomes a paperless office - including patient tracking - medical






50. An attack were an attacker scans your systems to see which ports are listening in an attempt to find a way to gain unauthorized access/