Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A standard that adds AES security to the 802.11 standard






2. Electronic conversion of hard copy documents to digital form.






3. The transmission of a patient's prescription for medication electronically from the describer's computer to the pharmacy's computer.






4. An EHR system that had been certified by ONC






5. A process in which a list of patient's medication orders is compared to a list of those that the patient has been taking in order to avoid any possible medication errors such as duplicated prescriptions - errors in dosage - or potentially hazardous d






6. A piece of code that spreads fro one computer to another on its own - not by attaching itself to another file. Like a virus - a worm can corrupt or erase files on your hard drive.






7. The act of searching for instances of wireless LAN while in motion - using wireless tracking devices like mobile phones - smartphones - tablets - or laptops.






8. A backup that backs up all selected files on a daily basis.






9. A server that is primarily used to share - store - and access files.






10. Online or electronic software that provides a stat-to-finish workflow from the time a patient is scheduled though their checkout after their appointment - including insurance verification - check-in - check-out - and payment.






11. A sample of code that spreads from one computer to another by attacking itself to other files. The code in a virus corrupts and erases files on a user's computer - including executable files - when the files to which it was attached is opened or exec






12. A device that provides network connectivity capabilities for computer systems.






13. The fundamental security goal of ensuring that systems operate continuously and that authorized persons can access data that they need.






14. An attack that targets a computer's physical components and peripherals - including hard disk - motherboard - keyboard network cabling - or smart card reader.






15. Treatment provided when a patient's medical condition reqires being admitted a healthcare facility for anywhere from an overnight stay to a long-term sstay - due to the fact that the patient's condition must be closely monitored.






16. A device used often to scan patient's driver licenses or insurance card to store withing the EMR/EHR system.






17. An area where minor procedures are perform - including minor surgeries not requiring anesthesia and post-operative care.






18. A part of the U.S. Department of Health and Human Services - OCN is scared what encouraging - administering - and regulating the advancement of IT in healthcare.






19. A backup that backs up all the files in a selected storage location that have changed since the last full backup.






20. Any medical treatment or services provided on an outpatient basis.






21. An agency of the U.S. Department of Commerce. NIST's mission us to promote U.S. innovation and industrial competitiveness by advancing measurement science - standards - and technology in ways that enhance economic security and improve our quality of






22. An area where surgical procedures are performer in a sterile environment.






23. A file property that essentially indicates whether the file has been modified since the last back up.






24. The consolidation of all of the recorded health information about a person stored withing a given network. EHR's generally contain multiple EMR's collected from various facilities and providers within a provider network or umbrella organization.






25. A server that receives email request from hosts on a network - and redirects them to the intended recipient.






26. A personal computer storage device that uses fixed media and magnetic data storage.






27. Personal Health Information - Information about an individual held by parties that are involved in the healthcare and billing process.






28. A piece of software created to fix problems with or provide updates to a program or application. This may include fixing known vulnerabilities or bugs - or improving functionality or performance.






29. A protocol used to connect to and access a remote computer.






30. An attack were an attacker scans your systems to see which ports are listening in an attempt to find a way to gain unauthorized access/






31. Software that allows staff to track a patient's flow of care in the system from registration thought treatment - and during and after discharge.






32. A legal document that may be signed by a patient (or those acting legally on behalf of a patient) to acknowledge the risks involved in a specific medical procedure or medication.






33. A wide variety of medical services that are provided in a patient's home by an accredited home health aide - often including physical therapy and medication delivery thought more complicated methods like injection intravenous therapy - etc.






34. A personal computer connection that enables you to connect multiple peripherals to a single port with high performance and minimal device configuration.






35. A device that distributes and manages print jobs sent from client computers.






36. A network that sans multiple geographic locations - connecting multiple LANs using long-range transmission media.






37. The fundamental security goal of ensuring that electronic data is not altered or tampered with.






38. Any message containing incorrect or misleading information that is disseminated to multiple users though unofficial channels.






39. A command line utility used to display the connection-specific DNS suffix - IP address - subnet mask - and default gateway.






40. A method in which an attacker with access to the target network redirects an IP address to the MAC address of a computer that is not the intended recipient.






41. A U.S. law that established rules for the governance of health information privacy - security - breach notification administrative simplification - and enforcement.






42. A federal health insurance program for the elderly and some disable individuals in the United States - with three main parts: Part A for inpatient - Part B for outpatient - and prescriptions drug coverage.






43. Classification for a drug or substance that has a lower potential for abuse as compared to those categorized in schedule IV; is currently accepted for medical use in treatment in the United States; and abuse of which may lead to limited to physical o






44. An invitation for vendors to submit a plan and bid for the delivery of a product or service.






45. Disturbances caused by electromagnetic radiation emitted from any external source - which may interrupt - obstruct - degrade - or limit the performance of an electrical circuit.






46. A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.






47. An independent medical practice opened by one or more accredited medical practitioners of any specialty area in an office environment.






48. A residential facility for terminally ill patients who have reached the end stages of their condition. Hospice care is designed to provide comfort and care for patients and support for the patient's family during end-of-life.






49. Uninterruptible Power Supply - A battery back up device that is intended to save computer components from damage due to power problems such as power failures - spikes - and sags.






50. A short-range wireless radio network transmission medium usually used between two personal devices such as between a mobile phone and wireless headset. A wireless connection method that is used to communicate from one device to another in a small are