Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The part of the ARRA that promote the adoption in meaningful use of healthcare IT through enchanced enforcement and extension of HIPAA policies.






2. The ability to connect to systems and services from an offsite or remote location using a remote access method.






3. Individually identifiable health information that is transmitted or maintained in any form or medium by a covered entity or business associate.






4. A short-range wireless radio network transmission medium usually used between two personal devices such as between a mobile phone and wireless headset. A wireless connection method that is used to communicate from one device to another in a small are






5. Classification for a drug or substance that has less potential for abuse that those categorized as Schedule I or II; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to moderate or low physical depe






6. U.S. economic stimulus legislation; provisions include funding of some healthcare initiatives and the creation of the HITECH Act.






7. Records that are not for public consumption and require appropriate release before they can be shared.






8. Personal computer components that enable users to enter data or instructions into a computer.






9. The acuteness - or level of severity - of an illness or disease.






10. Uninterruptible Power Supply - A battery back up device that is intended to save computer components from damage due to power problems such as power failures - spikes - and sags.






11. A utility used to determine the route data takes to get to a particular destination.






12. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.






13. A method used to remove data from magnetic media. Degaussing changes the magnetic alignment of data - so that it cannot be recovered






14. An area where all medical imaging procedures are conducted.






15. A residential facility 'steps' of care based on the residents' needs:Residents can start out with more Independence though assisted living - with the comfort of knowing nursing home care is available at the same facility when they can no longer remai






16. Any drugs or chemical substance that is regulated by the federal government in its production - possession - or use - including illegal and prescription drugs.






17. An authentication protocol that enables systems to use hardware-based identifiers - such as fingerprint scanners or smart card readers - for authentication.






18. A method used to securely remove data from hard drives and other electronic storage devices.






19. A server that is primarily used to share - store - and access files.






20. A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones - tablets and laptops to other Bluetooth-enabled devices.






21. The fundamental security goal of keeping information and communications private and protecting then from unauthorized access.






22. An Adobe platform that allows developers to create animations - videos - and other interactive components using the ActionScript programming language.






23. An itemized form containing all the information needed to file a claim. including patient information and services rendered for a visit - that is compiled by the healthcare provider's medical biller and supplied to the insurance company as the source






24. Software components that allow users to perform specific tasks and job functions on a computer.






25. A formalized statement that defines how security will be implemented within a particular organization.






26. A personal computer storage decide that stores data optically - rather than magnetically.






27. Software as a Service - A method that uses the cloud to provide application services to users.






28. A network in which a central host computer controls all network communication and performs the data processing and storage on behalf of network clients.






29. Authentication schemes based on individuals' physical characters.






30. A hardware rack that holds networking equipment to provide connections from public lines coming into the physical building generaly from the ISP - to all the IDFs located what a medical facility






31. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie






32. A protocol that provides 64-bit - 128-bit - and 256-bit encryption using the RC4 algorithm for wireless communication that uses the 802.11a and 802.11b protocols.






33. The federal agency that oversees the regulation of food safety - tobacco products - prescription and over-the-counter medication - dietary supplements - vaccines - medical devices - sanitation requirements - and other related public health products a






34. A hospital that treats a wide variety of medical issues including emergencies and inpatient/outpatient care - and performs general surgeries.






35. A personal computer connection that enables you to connect multiple peripherals to a single port with high performance and minimal device configuration.






36. The compilation of protocols - polices - and hardware that govern access on devices to and from a network.






37. The process is assigning a universally recognized and used medical code number to a specific medical diagnosis or procedure.






38. A server-side programing languague developed by Microsoft to provide a method to create dynamic web pages.






39. Treatment provided when a patient's medical condition reqires being admitted a healthcare facility for anywhere from an overnight stay to a long-term sstay - due to the fact that the patient's condition must be closely monitored.






40. An area of the facility where those needing immediate medical treatment arrive and are provided with initial care for their medical illness or injury - before being admitted for further treatment by another department.






41. A specification for wireless data though put at the rate of up to 54Mbps in the 2.4GHz that is a potential replacement for 802.11b.






42. A technique used in cryptography to generate random numbers to be used along with a secret key to provide data encryption.






43. A family of specification developed by the IEEE for wireless LAN technology.






44. A type or network attack where an attacker captures network traffic and store it for re-transmission at a later time to gain unauthorized access.






45. A senior - skilled medical staff member who serves as an instructor or supervisor - providing experience and feedback - to medical students or newly hired employees still in training.






46. Platform as a Service - a method that uses the l=cloud to provide any platform-type service.






47. The condition of being actually or potentially subject to a legal obligation based on one's actions or omissions.






48. Derived from the Latin 'statim -' a term used to connote immediacy or urgency.






49. Classification for a drug or substance that has a lower potential for abuse as compared to those categorized in schedule IV; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical o






50. The three principles of security control and management: confidentiality integrity and availability. Also known as the information security triad or triple.