Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The process of transforming handwritten - scanned images of text or typed text into machine-encoded text.






2. A facility that provides long-term services - such as rehabilitation - that address more permanent or long-term medical conditions like mental illness.






3. A server-side programing languague developed by Microsoft to provide a method to create dynamic web pages.






4. An area where patients are housed after a surgical procedure or any procedure requiring anesthesia and are closely monitored for any indications of post-operative complications.






5. Parallel Advanced Technology Attachment - A personal computer connection that provides a parallel data channel from a disk controllers to the disk driver.






6. A policy that defines how people and resources will be protected in a natural or man-made disaster and how the organization will recover from the disaster.






7. A server that isolates internal networks form the Internet by downloading and storing Internet files on behalf of internal clients.






8. The fundamental security goal of keeping information and communications private and protecting then from unauthorized access.






9. A healthcare record standard - similar to CCR but more robust as it was developed by both the HL7 and American Society for Testings and Materials.






10. Hardware components that enable users to interact with computers.






11. A process in which a list of patient's medication orders is compared to a list of those that the patient has been taking in order to avoid any possible medication errors such as duplicated prescriptions - errors in dosage - or potentially hazardous d






12. A device that has multiple network ports and combines multiple physical network segments into a single logical network.






13. A security protocol that uses certificates for authentication and encryption to protect web communication.






14. An EHR system that had been certified by ONC






15. A device that manages all fax messages sent with a network. A server or software program that enables users to send and receive fax messages though a network connection.






16. Temporary and specific emergency access to specifically locked PHI data in order to gain access to information which enables tasks completion.






17. A server that displays web pages to clients.






18. A personal computer storage device that stores data magnetically on a removable tape.






19. The amount of work a server performs on a regular basis.






20. A form of eavesdropping where the attacker makes an independent convection between two victims and steals information to use fraudulently.






21. Software that provides a single system for tracking and managing compliance with medical claims audits that are performed by both government and commercial healthcare(insurance) organizations.






22. A software or hardware device that protects a system or network by blocking unwanted network traffic.






23. Access given to certain members in an organization to use data on a system without the need for authenticating themselves.






24. An IT role that is responsible for designing - implementing - maintaining - and repairing databases. Usually also responsible for the security of an organization's database system and all the data stored on the systems.






25. The official record that an organization would release if requested.






26. Term used to communicate that a patient has gone into cardiac arrest - and immediate medical attention/ rapid response is needed to resuscitation the patient.






27. A backup that backs up all selected files regardless of the state of the archived bit.






28. A device used to convert paper to electronic format and then associates the file with the proper patient.






29. A utility used to determine the route data takes to get to a particular destination.






30. The mechanism by which individual hardware MAC addresses are matched to an IP address on a network.






31. Pretty Good Privacy - A method of securing emails created to prevent attackers form intercepting and manipulating emails and attachments by encrypting and digitally singing the contents of the emails using public key cryptography.






32. A type of cable in which one or more glass or plastic strands - plus additional fiber strands or wraps - are surrounded by a protective oyster jacket. Light pulses carry the signal though fiber optic cable.






33. A trauma center that can provide treatment - surgery and intensive care to most trauma patients but does not have all available specialist and their equipment in facility. It has transfers agreements with a Level I or II facility for the treatment of






34. Implemented security measures that restrict - detect - and monitor access to specific physical areas or assets.






35. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.






36. A password that meets the complexity requirements that are set by a system administrator and documented in a password policy.






37. The U.S. Agency charged with protecting the health of the population and providing various human services.






38. A security protocol created by the IEEE task group to replace WEP.






39. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.






40. An outpatient facility where treatment can be provided for medical problems or conditions that need immediate medical attention - but are not an emergency.






41. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. also called a zombie.






42. A software program that scans a Computer or network for known viruses - Trojans - worms - and other malacious software.






43. Secure FTP - A secure version of FTP that uses SSH as an encryption method to transfer - access - and manage files.






44. Any method of securing you wireless LAN network to prevent unauthorized network access and network data theft while ensuring that authorized users can connect to the network.






45. Any room used to temporarily house patient when they are in transition between their patient room and another location - such as before or after testes or surgeries.






46. An older personal computer connection standard hat provides high-performance data transfer between the SCSI device and the other components of the computer. Pronounced ' scuzzy.'






47. A trauma center that can provide the highest possible level of surgical care to trauma patients - with a full range of specialists and technology available 24 hours a day. It is required to have an ongoing research program and trauma education/ preve






48. A facility equipped to treat patients suffering traumatic injuries.






49. Classification for a drug or substance that has a lower potential for abuse as compared to those categorized in schedule IV; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical o






50. A method used to securely remove data from hard drives and other electronic storage devices.