Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A regulatory concept describing the ideal of effectively and efficiently leveraging EHR technology in the medical workplace.






2. World Health Organization - A division of the United Nations that manages the authority of international public health.






3. A formalized statement that defines how security will be implemented within a particular organization.






4. A trauma center that can provide treatment - surgery and intensive care to most trauma patients but does not have all available specialist and their equipment in facility. It has transfers agreements with a Level I or II facility for the treatment of






5. A list of all NDC identification numbers - compiled and published by the Food and Drug Administration.






6. A healthcare provider that meets legally defined criteria and thus is eligible for incentive payments for the implementation of EHR systems.






7. A password that meets the complexity requirements that are set by a system administrator and documented in a password policy.






8. An attack where the attacker exploits a legitimate computer session to obtain unauthorized access to an organization's network or services.






9. A type of social engineering attack where a request for a website - typicality an e-commerce site - is redirected to a similar looking - but fake - website.






10. A process in which information is transcribed into an unreadable form by anyone who does not have the encryption key.






11. The intermediary between the medical biller at the healthcare organization and the paying insurance company who ensures that the claim has no errors before it is transmitted to the insurance company.






12. See Host Computer






13. An area where patients are housed after a surgical procedure or any procedure requiring anesthesia and are closely monitored for any indications of post-operative complications.






14. A device used for patient billing to capture an electronic signature.






15. A private network that is configured within a public network such as the Internet.






16. Software that allows staff to track a patient's flow of care in the system from registration thought treatment - and during and after discharge.






17. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie






18. The amount of work a server performs on a regular basis.






19. An IT role that is responsible for the network infrastructure and components withing an organization.






20. A security protocol that uses certificates for authentication and encryption to protect web communication.






21. Protection mechanism used to identify - authenticate - and authorize access to computers and their corresponding systems.






22. A part of the U.S. Department of Health and Human Services - OCN is scared what encouraging - administering - and regulating the advancement of IT in healthcare.






23. A backup that backs up all selected files on a daily basis.






24. A server that receives email request from hosts on a network - and redirects them to the intended recipient.






25. Derived from the Latin 'statim -' a term used to connote immediacy or urgency.






26. A method in which an attacker with access to the target network redirects an IP address to the MAC address of a computer that is not the intended recipient.






27. The standard language that defines how web pages are formatted and displayed.






28. An all-encompassing solution of many other IT-based pieces that streamlines the workflow processes of all activities needed to run a practice or facility while providing the ability to becomes a paperless office - including patient tracking - medical






29. A type of network that is established spontaneously through a peer-to-peer wireless connection.






30. The use of various technologies to create images of the human body for use in the clinical field - such as diagnosis - treatment - and tracking of a disease or medical issue within the body.






31. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.






32. A method of computing that relies on the Internet to provided the resources - software - data and media needs of a user - business - or organization.






33. A federal health insurance program for the elderly and some disable individuals in the United States - with three main parts: Part A for inpatient - Part B for outpatient - and prescriptions drug coverage.






34. A network attack in which an attacker hijacks or manipulates multiple computers(through the use of zombies or drones)






35. A personal computer storage device that uses fixed media and magnetic data storage.






36. A network attack that uses special monitor software to gain access to private communications on the network wire or across a wireless network. Also known as an eavesdropping attack.






37. The service that maps names to IP addresses on most TCP/IP networks - including the Internet.






38. An area where minor procedures are perform - including minor surgeries not requiring anesthesia and post-operative care.






39. A protocol that provides 64-bit - 128-bit - and 256-bit encryption using the RC4 algorithm for wireless communication that uses the 802.11a and 802.11b protocols.






40. Term used to communicate that a patient has gone into cardiac arrest - and immediate medical attention/ rapid response is needed to resuscitation the patient.






41. A trauma center that can provide the highest possible level of surgical care to trauma patients - with a full range of specialists and technology available 24 hours a day. It is required to have an ongoing research program and trauma education/ preve






42. A server that runs applications for client use or is used by developers to store and share application components that can be used in web applications.






43. A hardware rack that holds networking equipment to provide connections from public lines coming into the physical building generaly from the ISP - to all the IDFs located what a medical facility






44. A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones - tablets and laptops to other Bluetooth-enabled devices.






45. An invitation for vendors to submit a plan and bid for the delivery of a product or service.






46. An EHR system that had been certified by ONC






47. An unauthorized wireless access point on a corporate or private network - which allows unauthorized individuals to connect to the network.






48. An Adobe platform that allows developers to create animations - videos - and other interactive components using the ActionScript programming language.






49. A hospital owned by a not-for-profit organization - religious organization - or government organization. Profits do not go to individual investors - but reinvested back into hospital or community.






50. The part of the ARRA that promote the adoption in meaningful use of healthcare IT through enchanced enforcement and extension of HIPAA policies.