SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Healthcare It+ Technician
Start Test
Study First
Subjects
:
certifications
,
comptia-healthcare-it+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The transmission of a patient's prescription for medication electronically from the describer's computer to the pharmacy's computer.
Recover Room
PPP (Point-to-Point Protocol)
Assisted Living Facility
e-Prescribing
2. Software systems solutions developed using specific industry standards and rules that allow all the myriad medical systems to communicate as seamlessly as possible with one another.
Port Scanning
Medicare
National Drug Code Directory
Medical Interfaces
3. An investor-owned hospital - usually owned by a corporation or group of private individuals - that aims to gain profits for the services provided which are then paid to those invested in the ownership.
HTTPS (Hypertext Transfer Protocol Secure)
PHR (Personal Health Record)
For-Profit Hospital
DC (Domain Controller)
4. An attack that targets a computer's physical components and peripherals - including hard disk - motherboard - keyboard network cabling - or smart card reader.
RHIO (Regional Health Information Organization)
Long-stay Facility
Hardware Attack
Zombie
5. An analysis technique that determines the coverage area of a wireless network - identifies any sources of interference - and establishes other characteristics of the coverage area.
Rogue Access Point
Billing and Coding Software
Site Survey
Flash
6. A residential facility 'steps' of care based on the residents' needs:Residents can start out with more Independence though assisted living - with the comfort of knowing nursing home care is available at the same facility when they can no longer remai
File Server
Nursing Home
Continuing Care Facility
Code Blue
7. A non-proprietary - routable network protocol suite that enables computers to communicate over all types or networks.
TCP/IP (Transmission Control Protocol/ Internet Protocol)
Controlled substance
P2P
Meaningful Use
8. A file property that essentially indicates whether the file has been modified since the last back up.
Systems Administrator
Eavesdropping
For-Profit Hospital
Archive Flag
9. An IT role that is responsible for ensuring that an organization's security policies are being followed by employees and that sufficient controls are in place to prevent unauthorized access to systems and facilities -
Security Administrator
Level I Trauma Center
802.11g
Software Hotfix
10. A family of specification developed by the IEEE for wireless LAN technology.
ipconfig
WAN (Wide Area Network )
802.11
Privacy Rule
11. A server-side programming language used to develop dynamic web pages by embedding its coded into an HTML pages.
PAN (Personal Area Network)
PHP
Logical Security
Certified EHR System
12. Individually identifiable health information that is transmitted or maintained in any form or medium by a covered entity or business associate.
Protected Health Information
RHIO (Regional Health Information Organization)
PAN (Personal Area Network)
TCP/IP (Transmission Control Protocol/ Internet Protocol)
13. A backup that backs up all the files in a selected storage location that have changed since the last full backup.
Differential Backup
SQL (Structured Query Language)
CPOE (Computerized Physician Order Entry)
EMI (Electromagnetic Interference)
14. Any healthcare provider that conducts certain transactions in electronic form - a healthcare clearinghouse or a health plan. All covered entities fall under the HHS Administrative Simplification standards adopted as port of HIPAA. All covered entitie
Covered Entity
PAN (Personal Area Network)
Procedure Room
Email
15. See Host Computer
DNS (Domain Name System)
API (Application Programming Interface)
Signature Pads
Main Frame
16. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.
Billing Clearinghouse
Fax Printer
Formulary Checking
WAN (Wide Area Network )
17. A type of cable that features a central conductor surrounded bu the braided or foil shielding. a dialectric insulator separates the conductor shield and the entire package is wrapped in an insulating layer called a jacket. The data signal is transmit
Coaxial Cable
Code Blue
Solid State Storage
Scope of Practice
18. Remote Authentication Dial-in User Services - A standard protocol for providing centralized authentication and authorization services form remote users.
Acuity
Ping
RADIUS
DC (Domain Controller)
19. The federal agency that oversees the regulation of food safety - tobacco products - prescription and over-the-counter medication - dietary supplements - vaccines - medical devices - sanitation requirements - and other related public health products a
FDA (Food and Drug Administration)
CPOE (Computerized Physician Order Entry)
PEAP
Code Blue
20. A service added to the IP protocol that attempts to report on the condition of a connection between two nodes.
Custodian
Physical Security
Software Patch
ICMP (Internet Control Message Protocol)
21. A process in which a list of patient's medication orders is compared to a list of those that the patient has been taking in order to avoid any possible medication errors such as duplicated prescriptions - errors in dosage - or potentially hazardous d
Security Administrator
Barcode Scanner
Imaging Center
Medication Reconciliation
22. Any message containing incorrect or misleading information that is disseminated to multiple users though unofficial channels.
Drone
Bluetooth
Hoax
802.1x
23. An effort to set standards - specifications - and criteria for the implementation - use - and security of healthcare IT systems.
Server Load
Internet Modem
Final Rule
Procedure Room
24. Secure FTP - A secure version of FTP that uses SSH as an encryption method to transfer - access - and manage files.
Secure File Transfer Protocol
Assisted Living Facility
Preceptor
Formulary Checking
25. A portable electronic security token that contains biometric user data - or other identification information.
SaaS
Certified EHR System
Keyfob
802.11a
26. A trauma center that can provide the highest possible level of surgical care to trauma patients - with a full range of specialists and technology available 24 hours a day. It is required to have an ongoing research program and trauma education/ preve
Short-stay Facility
Level I Trauma Center
Server Utilization
Long-stay Facility
27. Systematized Nomenclature of Medicine-clinical Terms - An organized collection of numeric codes correlating to clinical information such as diseases - procedures - microorganisms - medications - and so forth that may be used in a patient's records.
Schedule IV Controlled Substance
TTL
SNOMED CT
802.11
28. A device used for patient billing to capture an electronic signature.
Isolation Room
CMS (Centers for Medicare and Medicaid Services)
Strong Password
Signature Pads
29. The section of HIPAA that establishes a rule set to govern the use and disclosure of PHI by covered entities. The goal of the Privacy Rule is to protect a person's health information while allowing adequate transfer of information to promote efficien
File Server
For-Profit Hospital
Privacy Rule
SaaS
30. An invitation for vendors to submit a plan and bid for the delivery of a product or service.
RADIUS
RFP (Request for Proposal)
HIPAA (Health Insurance Portability and Accountability Act)
Eligible Provider
31. A facility equipped to treat patients suffering traumatic injuries.
Social Engineering Attack
Bluejacking
Sensitivity Label
Trauma Center
32. A computer model where functionality is divided into two roles: A server computer which provides services and controls network operations and a client computer which uses the services provides by the servers.
Coaxial Cable
ad hoc
Host Computer
lient-Server
33. Devices that provide alternative input or output methods or additional data storage though a connection to the system unit via cable or a wireless connection.
External Devices
PGP
antivirus software
Level I Trauma Center
34. An IT role that is responsible for the network infrastructure and components withing an organization.
TKIP (Temporary Key Integrity Protocol)
Network Administrator
Procedure Room
Controlled substance
35. A password that meets the complexity requirements that are set by a system administrator and documented in a password policy.
Strong Password
Security Policy
PCP Primary Care Physician
Human Interface Devices
36. A network attack that uses special monitor software to gain access to private communications on the network wire or across a wireless network. Also known as an eavesdropping attack.
SATA Connection
Metadata
Stat
Sniffing
37. An IEEE standard used to provide a port based authentication mechanism for wireless communications using the 802.11a and 802.11b protocols.
RDP (Remote Desktop Protocol)
IV Attack
802.1x
EHR (Electronic Health Record)
38. Parallel Advanced Technology Attachment - A personal computer connection that provides a parallel data channel from a disk controllers to the disk driver.
File Server
PATA Connection
Archive Flag
Long-stay Facility
39. A server that stores files and programs.
TKIP (Temporary Key Integrity Protocol)
Procedure Room
Storage Server
Display Devices
40. A protocol that provides 64-bit - 128-bit - and 256-bit encryption using the RC4 algorithm for wireless communication that uses the 802.11a and 802.11b protocols.
RHIO (Regional Health Information Organization)
WEP (Wired Equivalency Protocol)
TCP/IP (Transmission Control Protocol/ Internet Protocol)
Break Glass Access
41. A type of attack where the goal is to obtain sensitive data including user names and passwords - from network users though deception and trickery.
Schedule I Controlled Substance
Social Engineering Attack
IV (Initialization Vector)
PEAP
42. A hospital that treats a wide variety of medical issues including emergencies and inpatient/outpatient care - and performs general surgeries.
General/Community Hospital
Fiber
Card/Badge Scanner
Liability
43. A health information organization comprised of key stakeholders in the health care industry a specific geographical region who oversee the health information exchange of healthcare providers in the area.
IV (Initialization Vector)
DRP (Disaster Recovery Plan)
Treatment Team
RHIO (Regional Health Information Organization)
44. The U.S. federal program to provide healthcare for certain low-income individual and families.
IV (Initialization Vector)
Incremental Backup
Spam
Medicaid
45. A federal health insurance program for the elderly and some disable individuals in the United States - with three main parts: Part A for inpatient - Part B for outpatient - and prescriptions drug coverage.
Medicare
Signature Pads
Level V Trauma Center
Storage Server
46. A wired or wireless device that is used to scan and identify patients using the unique barcode located on their ID wrist band.
SQL (Structured Query Language)
Medical Record Controls
Legal Health Record
Barcode Scanner
47. An IT role that is responsible for designing - implementing - maintaining - and repairing databases. Usually also responsible for the security of an organization's database system and all the data stored on the systems.
ATA (Advanced Technology Attachment)
DBA (Database Administrator)
RDP (Remote Desktop Protocol)
Firewall
48. Also known as an acute care facility. This facility proves services aimed to resolve immediate and short-term medical conditions like pregnancy or a heart attack.
ROI Department
NAS (Network Attached Storage)
TCP/IP (Transmission Control Protocol/ Internet Protocol)
Short-stay Facility
49. A form of eavesdropping where the attacker makes an independent convection between two victims and steals information to use fraudulently.
Man-in-the-middle
LAN (Local Area Network)
Custodian
Mail Server
50. A device used to fax prescription or to print out prescription information for the EMR/EHR system.
FTP (File Transfer Protocol)
Recover Room
Fax Printer
PATA Connection
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests