Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A trauma center that can provide the highest possible level of surgical care to trauma patients - with a full range of specialists and technology available 24 hours a day. It is required to have an ongoing research program and trauma education/ preve






2. Systematized Nomenclature of Medicine-clinical Terms - An organized collection of numeric codes correlating to clinical information such as diseases - procedures - microorganisms - medications - and so forth that may be used in a patient's records.






3. The federal agency that oversees the regulation of food safety - tobacco products - prescription and over-the-counter medication - dietary supplements - vaccines - medical devices - sanitation requirements - and other related public health products a






4. An IT role that is responsible for designing - implementing - maintaining - and repairing databases. Usually also responsible for the security of an organization's database system and all the data stored on the systems.






5. Implemented security measures that restrict - detect - and monitor access to specific physical areas or assets.






6. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.






7. A health record standard that was developed by a number of American healthcare organization as a means of creating summary documents containing the most relevant pertinent information about a patient that can be shared electronically between medical






8. A class of technology separates computing software from the hardware it runs via an additional software layer - allowing multiple operating systems to run on one computer simultaneously.






9. The compilation of protocols - polices - and hardware that govern access on devices to and from a network.






10. Classification for a drug or substance that has a high potential for abuse; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to severe psychological or physical dependence.






11. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.






12. Classification for a drug or substance that has less potential for abuse that those categorized as Schedule I or II; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to moderate or low physical depe






13. A protocol used to connect to and access a remote computer.






14. An independent medical practice opened by one or more accredited medical practitioners of any specialty area in an office environment.






15. A computer model where functionality is divided into two roles: A server computer which provides services and controls network operations and a client computer which uses the services provides by the servers.






16. A specification for wireless data though put at the rate of up to 54Mbps in the 2.4GHz that is a potential replacement for 802.11b.






17. Software that provides one location where charges are entered codes can be checked - insurance claims and statements can be generated and sent - claim denials can be managed and payments can be posted and processed.






18. A network that connects wireless devices in a very close proximity but not though a wireless access point.






19. A software and/or hardware system that scans - audits - and monitors the security infrastructure for signs of attacks in progress.






20. A department within a medical organization dedicated to handling ROI requests for EMR/EHR information release.






21. A regulatory concept describing the ideal of effectively and efficiently leveraging EHR technology in the medical workplace.






22. A hardware device or a computer software program that acts as a communication hub to provide heightened wireless security and extend the physical range of a wireless local area network.






23. A list of description and accompanying five-digit numeric codes used for reporting medical services and procedures - which is published every year by the American Medical Association.






24. A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones - tablets and laptops to other Bluetooth-enabled devices.






25. Pronounced 'I-triple-E.' An organization of scientists - engineers - and student of electronics and related fiends whose technical and standards committees develop - publish and revise computing and telecommunications standards.






26. A personal computer storage device that stores data in non-volatile special memory instead of on disks or tape.






27. Unwanted software that collects personal user data from a system and transmits it to a third party.






28. A device used for patient billing to capture an electronic signature.






29. One of several internationally endorsed medical codding classifications list which gives a numeric code to diseases - signs and symptoms - possible complaints - abnormalities - and possible causes of injuries and diseases..






30. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.






31. Classification for a drug or substance that has low potential for abuse as compared those in categorized in Schedule III; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical or p






32. An IT role that is responsible for assisting end users and attempts to restore normal service to users as quickly as possible.






33. Universal Serial Bus - A hardware interface standard designed to provide connections for numerous peripherals.






34. A software or hardware device that protects a system or network by blocking unwanted network traffic.






35. A server-side programing languague developed by Microsoft to provide a method to create dynamic web pages.






36. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie






37. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.






38. A powerful - centralized computer system that performs data storage and processing tasks on behalf of clients and other network devices.






39. Originally frequent and repetitive postings in electronic bulletin boards; more commonly unsolicited or distasteful commercial email form - anonymous sources.






40. Any adverse reaction to a medication being taken.






41. A fast - secure - but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency.






42. The process of transforming handwritten - scanned images of text or typed text into machine-encoded text.






43. A software program that scans a Computer or network for known viruses - Trojans - worms - and other malacious software.






44. A document that lists agreed upon actions between two parties.






45. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.






46. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.






47. An IT role that is responsible for ensuring that an organization's security policies are being followed by employees and that sufficient controls are in place to prevent unauthorized access to systems and facilities -






48. Medical services that can be proved to a patient without the need for the patient to be admitted to any type of healthcare facility.






49. A personal computer storage device that stores data magnetically on a removable tape.






50. Remote Authentication Dial-in User Services - A standard protocol for providing centralized authentication and authorization services form remote users.