Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A server that is primarily used to share - store - and access files.






2. A trauma center that can provide initial evaluation stabilization - and diagnosis of a trauma patient - but then the patient must be transferred to a Level I - II - or III facility for treatment and care. It is differentiated from a Level IV because






3. The ability to connect to systems and services from an offsite or remote location using a remote access method.






4. Electronic conversion of hard copy documents to digital form.






5. A method of computing that relies on the Internet to provided the resources - software - data and media needs of a user - business - or organization.






6. A residential facility 'steps' of care based on the residents' needs:Residents can start out with more Independence though assisted living - with the comfort of knowing nursing home care is available at the same facility when they can no longer remai






7. Peer-to-peer - A network that has a broadcasting application architecture that distributes tasks between peer systems who have equal privileges - and in which resources sharing - processing - and communication controls are decentralized.






8. The official ANSI term for IDE drives.






9. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.






10. An unauthorized wireless access point on a corporate or private network - which allows unauthorized individuals to connect to the network.






11. Any adverse reaction to a medication being taken.






12. A device that distributes and manages print jobs sent from client computers.






13. Derived from the Latin 'statim -' a term used to connote immediacy or urgency.






14. A residential facility for patients who need constant medical or nursing care and supervision.






15. A file property that essentially indicates whether the file has been modified since the last back up.






16. A piece of code that sits dormant on a user;s computer until it is triggered by a specific event such as a specific date. Once the code is triggered the logic bomb ' detonates - : erasing and corrupting data on the user's computer.






17. A list of all NDC identification numbers - compiled and published by the Food and Drug Administration.






18. Service-level Agreement - a contractual agreement between a service provider and a customer that stipulates the precise services and support options the vendor must provide.






19. A residential facility or community for patients who may need assistance with some functions of daily living - such as bathing or medication reminders - but can otherwise remain mostly independent.






20. An area where minor procedures are perform - including minor surgeries not requiring anesthesia and post-operative care.






21. A unique 10-digit - three segment numeric code assigned to each registered drug manufactured - processed - and distributed by registered drug manufacturers.






22. Secure Shell - A protocol for secure remote logon and secure transfer of data.






23. An attack where the attacker is able to predict of control the IV of an encryption process - thus giving the attacker access to view the encrypted data that is supposed to be hidden from everyone else except the user of network.






24. Also known as an acute care facility. This facility proves services aimed to resolve immediate and short-term medical conditions like pregnancy or a heart attack.






25. Classification for a drug or substance that has less potential for abuse that those categorized as Schedule I or II; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to moderate or low physical depe






26. Temporary and specific emergency access to specifically locked PHI data in order to gain access to information which enables tasks completion.






27. Records that are released for public viewing.






28. A trauma center that can provide essential trauma care 24 hours a day with all available specialties - personnel - and equipment. It provides comprehensive trauma care and clinical assistance to a level I facility as needed. It is differentiated from






29. Software that allows staff to track a patient's flow of care in the system from registration thought treatment - and during and after discharge.






30. World Health Organization - A division of the United Nations that manages the authority of international public health.






31. A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also knows as a sniffing attack.






32. An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.






33. The consolidation of all of the recorded health information about a person stored withing a given network. EHR's generally contain multiple EMR's collected from various facilities and providers within a provider network or umbrella organization.






34. An implementation in which voice signals are transmitter over IP networks.






35. The method used to repeatedly delete and overwrite any traces or bits of sensitive data that may remain on a device after data wiping has been done.






36. An independent medical practice opened by one or more accredited medical practitioners of any specialty area in an office environment.






37. A security protocol that uses certificates for authentication and encryption to protect web communication.






38. A server that uses the File Transfer Protocol(FTP) to exchange files over an Internet connection.






39. Originally frequent and repetitive postings in electronic bulletin boards; more commonly unsolicited or distasteful commercial email form - anonymous sources.






40. A command line utility used to display the connection-specific DNS suffix - IP address - subnet mask - and default gateway.






41. A wide variety of medical services that are provided in a patient's home by an accredited home health aide - often including physical therapy and medication delivery thought more complicated methods like injection intravenous therapy - etc.






42. An attack where the attacker exploits a legitimate computer session to obtain unauthorized access to an organization's network or services.






43. Specific healthcare industry standards and a framework concerning the exchange and integration of patient's electronic information between software systems - which are adhered to by vendors developing interfaces - ensuring that of this disparate soft






44. Classification for a drug or substance that has low potential for abuse as compared those in categorized in Schedule III; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical or p






45. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.






46. A form of eavesdropping where the attacker makes an independent convection between two victims and steals information to use fraudulently.






47. An IT role that is responsible for the network infrastructure and components withing an organization.






48. A server that consists of databases that store domain name information and translate and resolve fully qualified domain name requests from clients.






49. A type or network attack where an attacker captures network traffic and store it for re-transmission at a later time to gain unauthorized access.






50. Treatment provided when a patient's medical condition reqires being admitted a healthcare facility for anywhere from an overnight stay to a long-term sstay - due to the fact that the patient's condition must be closely monitored.