SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Using symbols to mark off a sidewalk or wall to indicate that there is an open wireless networking which may be offering Internet access.
War Chalking
Integrity
SSH
File Server
2. An area where minor procedures are perform - including minor surgeries not requiring anesthesia and post-operative care.
TCP/IP (Transmission Control Protocol/ Internet Protocol)
Procedure Room
ARP(Address Resolution Protocol)
The Joint Commission
3. A technique used in cryptography to generate random numbers to be used along with a secret key to provide data encryption.
HL7
War Driving
IV (Initialization Vector)
NIC (Network Interface Card )
4. Individually identifiable health information that is transmitted or maintained in any form or medium by a covered entity or business associate.
Protected Health Information
Non-profit Hospital
Security Administrator
Fiber
5. Pretty Good Privacy - A method of securing emails created to prevent attackers form intercepting and manipulating emails and attachments by encrypting and digitally singing the contents of the emails using public key cryptography.
DNS (Domain Name System)
PHR (Personal Health Record)
Home Healthcare
PGP
6. A facility that provides long-term services - such as rehabilitation - that address more permanent or long-term medical conditions like mental illness.
Centralized
Schedule III Controlled Substance
Long-stay Facility
Zombie
7. Devices that provide alternative input or output methods or additional data storage though a connection to the system unit via cable or a wireless connection.
e-Prescribing
adware
PATA Connection
External Devices
8. World Health Organization - A division of the United Nations that manages the authority of international public health.
Web Server
Schedule I Controlled Substance
WHO
VoIP (Voice over IP)
9. A checks-and-balances systems that ensures that a patient is receiving the correct medication - the correct dose of medication at the correct time - from an authorize caregiver by requiring that bar codes storing information about the patient medicat
Logic Bomb
Bedside Medication Verification
EHR (Electronic Health Record)
SCSI (Small Computer Systems Interface)
10. An area within a medical facility designed to prevent the spread of airborne infections though the use of negative pressurization control of the air inside and outside the room.
Isolation Room
Eavesdropping
CPT (Current Procedural Terminology)
Serial Connection
11. A healthcare record standard - similar to CCR but more robust as it was developed by both the HL7 and American Society for Testings and Materials.
Incremental Backup
CCD(Continuity of Care Document)
Tape Drive
Applications
12. The standard language that defines how web pages are formatted and displayed.
IaaS (Infrastructure as a Service)
Schedule I Controlled Substance
Liability Waiver
HTML (Hypertext Markup Language)
13. A server that isolates internal networks form the Internet by downloading and storing Internet files on behalf of internal clients.
PHI
External Devices
Proxy Server
Signature Pads
14. Cisco Systems' proprietary EAP implementation.
Server Utilization
Secure File Transfer Protocol
Final Rule
LEAP (Lightweight Extensible Authentication Protocol)
15. An IT role that is responsible for the network infrastructure and components withing an organization.
Virtualization
TKIP (Temporary Key Integrity Protocol)
ROI Department
Network Administrator
16. A software and/or hardware system that scans - audits - and monitors the security infrastructure for signs of attacks in progress.
Permission
Medical Record Controls
Non-profit Hospital
IDS (Intrusion Detection System)
17. A systematic way of approving and executing changing in order to assure maximum security - stability and availability of information technology services.
Worm
TCP/IP (Transmission Control Protocol/ Internet Protocol)
Change Management
Secure Chat
18. The automatic process for checking a prescription for medication against a patents's known allergies for possible drug-allergy reactions - and against current medications for possible adverse drug-drug interactions.
PHP
Server Utilization
Barcode Scanner
Formulary Checking
19. An IT role that is responsible for designing - implementing - maintaining - and repairing databases. Usually also responsible for the security of an organization's database system and all the data stored on the systems.
WHO
SSL (Secure Sockets Layer)
DBA (Database Administrator)
Acuity
20. An attack where the attacker is able to predict of control the IV of an encryption process - thus giving the attacker access to view the encrypted data that is supposed to be hidden from everyone else except the user of network.
Cloud Computing
IV Attack
Availability
adware
21. Electronic conversion of hard copy documents to digital form.
PPP (Point-to-Point Protocol)
Cloud Computing
Document Imaging
Bluetooth
22. A device used for patient billing to capture an electronic signature.
Meaningful Use
Surgical Center
Signature Pads
ARRA (American Recovery and Reinvestment Act
23. A type of cable in which one or more glass or plastic strands - plus additional fiber strands or wraps - are surrounded by a protective oyster jacket. Light pulses carry the signal though fiber optic cable.
Fiber
Certified EHR System
ISP (Internet Service Provider)
Private Practice
24. A team of clinicians assigned to work with a specific patient at any given time.
Drug Allergy
Specialized Hospital
Site Survey
Treatment Team
25. A legal document that may be signed by a patient (or those acting legally on behalf of a patient) to acknowledge the risks involved in a specific medical procedure or medication.
Database Server
Examination Room
Acuity
Liability Waiver
26. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.
Legal Health Record
DNS (Domain Name System)
Billing and Coding Software
Worm
27. A method that uses the cloud to provide any or all infrastructure needs.
IaaS (Infrastructure as a Service)
RADIUS
Parallel Tracking Software
Formulary Checking
28. A high-speed serial bus developed by Apple and Texas Instruments that allows for the connection of up to 63 devices. Originally a trademarked term for IEEE 1394 - but is now used interchangeably.
FireWire Connection
HL7
PAN (Personal Area Network)
EHR (Electronic Health Record)
29. An area of the facility where those needing immediate medical treatment arrive and are provided with initial care for their medical illness or injury - before being admitted for further treatment by another department.
ISP (Internet Service Provider)
Legal Health Record
Security Administrator
ED (Emergency Department)
30. An itemized form containing all the information needed to file a claim. including patient information and services rendered for a visit - that is compiled by the healthcare provider's medical biller and supplied to the insurance company as the source
PCP Primary Care Physician
HDD (Hard Disk Drive)
Superbill
Level II Trauma Center
31. A sample of code that spreads from one computer to another by attacking itself to other files. The code in a virus corrupts and erases files on a user's computer - including executable files - when the files to which it was attached is opened or exec
Virus
Storage Server
Time Server
Secure File Transfer Protocol
32. Electronic messages sent between users or groups.
NAS (Network Attached Storage)
Email
Secure File Transfer Protocol
Archive Flag
33. A health record standard that was developed by a number of American healthcare organization as a means of creating summary documents containing the most relevant pertinent information about a patient that can be shared electronically between medical
Level IV Trauma Center
PHR (Personal Health Record)
Superbill
CCR (Continuity of Care Record)
34. A list of all NDC identification numbers - compiled and published by the Food and Drug Administration.
CCD(Continuity of Care Document)
National Drug Code Directory
LEAP (Lightweight Extensible Authentication Protocol)
MDF (Main Distribution Frame)
35. Private and non-government businesses that contract with individual or employments to help pay medical expenses. These insurers also have seperate contracts with many health organization that specify negotiated rate structures for that health organiz
API (Application Programming Interface)
Bluesnarfing
Private Health Insurers
Assisted Living Facility
36. A network that displays characteristics of more than one of the three standard network models.
External Devices
Mixed Mode
E/M Codes (Evaluation and Management Codes)
Logic Bomb
37. The part of the ARRA that promote the adoption in meaningful use of healthcare IT through enchanced enforcement and extension of HIPAA policies.
HHS (U.S. Department of Health and Human Services)
FTP (File Transfer Protocol)
HITECH Health Information Technology for Economic and Clinical Health Act)
Structured Data
38. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.
RFP (Request for Proposal)
WAN (Wide Area Network )
XML (EXtensible Markup Language)
Code Blue
39. Online or electronic software that provides a stat-to-finish workflow from the time a patient is scheduled though their checkout after their appointment - including insurance verification - check-in - check-out - and payment.
Router
PCP Primary Care Physician
Scheduling Software
API (Application Programming Interface)
40. A trauma center that can provide essential trauma care 24 hours a day with all available specialties - personnel - and equipment. It provides comprehensive trauma care and clinical assistance to a level I facility as needed. It is differentiated from
ISP (Internet Service Provider)
Confidentiality
Level II Trauma Center
L2TP (Layer Two Tunneling Protocol)
41. Unwanted software that collects personal user data from a system and transmits it to a third party.
Secure File Transfer Protocol
Signature Pads
ARRA (American Recovery and Reinvestment Act
Spyware
42. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.
Document Scanner
Site Survey
Intermediate Care facility
HIPAA (Health Insurance Portability and Accountability Act)
43. A method used to securely remove data from hard drives and other electronic storage devices.
Secure Shredding
Database Server
Hospice Care
Billing Clearinghouse
44. A patient maintained health record that can be shared with medical professionals. Generally not a part of Legal Heath Record.
PHR (Personal Health Record)
HTML (Hypertext Markup Language)
War Driving
Private Health Insurers
45. Records that are released for public viewing.
Non-profit Hospital
Protected Health Information
Public Health Record
Worm
46. Specific healthcare industry standards and a framework concerning the exchange and integration of patient's electronic information between software systems - which are adhered to by vendors developing interfaces - ensuring that of this disparate soft
Availability
WHO
HL7
Software Update
47. The transmission of a patient's prescription for medication electronically from the describer's computer to the pharmacy's computer.
802.11g
Eavesdropping
e-Prescribing
The Joint Commission
48. A software or hardware device that protects a system or network by blocking unwanted network traffic.
ISP (Internet Service Provider)
Firewall
HHS (U.S. Department of Health and Human Services)
ARRA (American Recovery and Reinvestment Act
49. A server-side programming language used to develop dynamic web pages by embedding its coded into an HTML pages.
Optical Disk
PHP
HHS (U.S. Department of Health and Human Services)
Hospice Care
50. A password that meets the complexity requirements that are set by a system administrator and documented in a password policy.
Strong Password
DoS (Denial of Service attack)
Main Frame
Level IV Trauma Center