Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The condition of being actually or potentially subject to a legal obligation based on one's actions or omissions.






2. A type of cable that features a central conductor surrounded bu the braided or foil shielding. a dialectric insulator separates the conductor shield and the entire package is wrapped in an insulating layer called a jacket. The data signal is transmit






3. Electronic messages sent between users or groups.






4. Also known as an acute care facility. This facility proves services aimed to resolve immediate and short-term medical conditions like pregnancy or a heart attack.






5. A high-speed serial bus developed by Apple and Texas Instruments that allows for the connection of up to 63 devices. Originally a trademarked term for IEEE 1394 - but is now used interchangeably.






6. The standard language that defines how web pages are formatted and displayed.






7. An authentication protocol that enables systems to use hardware-based identifiers - such as fingerprint scanners or smart card readers - for authentication.






8. An EHR system that had been certified by ONC






9. Within wireless networking - the phenomenon by which radio waves from other devices interfere with the 802.11 wireless signals.






10. A secure version of HTTP that supports e-commerce by providing a secure connection between a web browser and a server.






11. An area where all medical imaging procedures are conducted.






12. Unwanted software that collects personal user data from a system and transmits it to a third party.






13. A LAN implementation in which nodes use a wireless network card to connect to other stations.






14. Peer-to-peer - A network that has a broadcasting application architecture that distributes tasks between peer systems who have equal privileges - and in which resources sharing - processing - and communication controls are decentralized.






15. Time to Live - A value that determines how many hops an IP packet ca travel before being discarded.






16. Access given to certain members in an organization to use data on a system without the need for authenticating themselves.






17. A device used to convert paper to electronic format and then associates the file with the proper patient.






18. Software that allows staff to track a patient's flow of care in the system from registration thought treatment - and during and after discharge.






19. A service added to the IP protocol that attempts to report on the condition of a connection between two nodes.






20. Term used to communicate that a patient has gone into cardiac arrest - and immediate medical attention/ rapid response is needed to resuscitation the patient.






21. Individually identifiable health information that is transmitted or maintained in any form or medium by a covered entity or business associate.






22. A personal computer connection type that transfers data - usually 8 bits at a time - over eight wires and is often used for a printer.






23. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.






24. A back up that backs up all files in a selected storage location that have changed since the last full or differential backup.






25. Secure Shell - A protocol for secure remote logon and secure transfer of data.






26. A trauma center that can provide treatment - surgery and intensive care to most trauma patients but does not have all available specialist and their equipment in facility. It has transfers agreements with a Level I or II facility for the treatment of






27. A file property that essentially indicates whether the file has been modified since the last back up.






28. Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. also called a zombie.






29. A wired or wireless device that is used to scan and identify patients using the unique barcode located on their ID wrist band.






30. The service that maps names to IP addresses on most TCP/IP networks - including the Internet.






31. Treatment provided when a patient's medical condition reqires being admitted a healthcare facility for anywhere from an overnight stay to a long-term sstay - due to the fact that the patient's condition must be closely monitored.






32. A widely adopted markup language used in many documents - websites - and web applications.






33. Any medical treatment or services provided on an outpatient basis.






34. Software protection systems in an organization.






35. An older personal computer connection standard hat provides high-performance data transfer between the SCSI device and the other components of the computer. Pronounced ' scuzzy.'






36. Hardware components that enable users to interact with computers.






37. A specification for wireless data though put at the rate of up to 54Mbps in the 2.4GHz that is a potential replacement for 802.11b.






38. An Instant messaging service that uses strong encryption to send and receive secure messages.






39. A type of cable in which multiple insulated conductors are twisted together and clad in a protective and insulating out jacket.






40. A part of the U.S. Department of Health and Human Services - OCN is scared what encouraging - administering - and regulating the advancement of IT in healthcare.






41. The implementation and practice of various control mechanisms that are intended to restrict physical access to facilities.






42. A software and/or hardware system that scans - audits - and monitors the security infrastructure for signs of attacks in progress.






43. A software program that scans a Computer or network for known viruses - Trojans - worms - and other malacious software.






44. Unwanted software loaded onto a system for the purposes of presenting commercial advertisements to the user.






45. An itemized form containing all the information needed to file a claim. including patient information and services rendered for a visit - that is compiled by the healthcare provider's medical biller and supplied to the insurance company as the source






46. A software or hardware device that protects a system or network by blocking unwanted network traffic.






47. A method used to securely remove data from hard drives and other electronic storage devices.






48. A family of specification developed by the IEEE for wireless LAN technology.






49. An IEEE standard used to provide a port based authentication mechanism for wireless communications using the 802.11a and 802.11b protocols.






50. A private network that is configured within a public network such as the Internet.