Test your basic knowledge |

Comptia Healthcare It+ Technician

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A method used by attackers to send out unwanted Bluetooth signals from mobile phones smartphones - tablets and laptops to other Bluetooth-enabled devices.






2. Five-digit CPT codes used to describe a medical professional-patient interaction - such as an office visit or a hospital - to facilitate in the billing process.






3. A device that distributes and manages print jobs sent from client computers.






4. The federal agency that oversees the regulation of food safety - tobacco products - prescription and over-the-counter medication - dietary supplements - vaccines - medical devices - sanitation requirements - and other related public health products a






5. An IT role that is responsible for designing - implementing - maintaining - and repairing databases. Usually also responsible for the security of an organization's database system and all the data stored on the systems.






6. A residential facility for terminally ill patients who have reached the end stages of their condition. Hospice care is designed to provide comfort and care for patients and support for the patient's family during end-of-life.






7. A personal computer storage decide that stores data optically - rather than magnetically.






8. A personal computer storage device that stores data magnetically on a removable tape.






9. A computer model where functionality is divided into two roles: A server computer which provides services and controls network operations and a client computer which uses the services provides by the servers.






10. Secure Shell - A protocol for secure remote logon and secure transfer of data.






11. A device that provides network connectivity capabilities for computer systems.






12. A healthcare provider that meets legally defined criteria and thus is eligible for incentive payments for the implementation of EHR systems.






13. A personal computer connection that enables you to connect multiple peripherals to a single port with high performance and minimal device configuration.






14. A backup that backs up all the files in a selected storage location that have changed since the last full backup.






15. A legal document that may be signed by a patient (or those acting legally on behalf of a patient) to acknowledge the risks involved in a specific medical procedure or medication.






16. A company that provides access to the Internet.






17. A device that has multiple network ports and combines multiple physical network segments into a single logical network.






18. A type of cable in which multiple insulated conductors are twisted together and clad in a protective and insulating out jacket.






19. A regulatory concept describing the ideal of effectively and efficiently leveraging EHR technology in the medical workplace.






20. A hardware rack that holds networking equipment to provide connections from public lines coming into the physical building generaly from the ISP - to all the IDFs located what a medical facility






21. Devices that provide alternative input or output methods or additional data storage though a connection to the system unit via cable or a wireless connection.






22. Protection mechanism used to identify - authenticate - and authorize access to computers and their corresponding systems.






23. An IEEE standard used to provide a port based authentication mechanism for wireless communications using the 802.11a and 802.11b protocols.






24. A method in which an attacker with access to the target network redirects an IP address to the MAC address of a computer that is not the intended recipient.






25. A personal computer connection type that transfers data - usually 8 bits at a time - over eight wires and is often used for a printer.






26. A type or network attack where an attacker captures network traffic and store it for re-transmission at a later time to gain unauthorized access.






27. A checks-and-balances systems that ensures that a patient is receiving the correct medication - the correct dose of medication at the correct time - from an authorize caregiver by requiring that bar codes storing information about the patient medicat






28. An area where minor procedures are perform - including minor surgeries not requiring anesthesia and post-operative care.






29. A hospital owned by a not-for-profit organization - religious organization - or government organization. Profits do not go to individual investors - but reinvested back into hospital or community.






30. A fast - secure - but relatively expensive protocol for wireless communication. The 802.11a protocol supports speeds up to 54 Mbps in the 5 GHz frequency.






31. A device used to take pictures of patients - because some EMR/EHR systems allow for a patient's picture to be tied to their electronic record.






32. Malicious code that masquerades as a harmless file. When a user executes it - thinking it is a harmless application - it destroys and corrupts data on the user's hard drive.






33. A senior - skilled medical staff member who serves as an instructor or supervisor - providing experience and feedback - to medical students or newly hired employees still in training.






34. A short-range wireless radio network transmission medium usually used between two personal devices such as between a mobile phone and wireless headset. A wireless connection method that is used to communicate from one device to another in a small are






35. A specification for wireless data though put at the rate of up to 54Mbps in the 2.4GHz that is a potential replacement for 802.11b.






36. A hardware device or a computer software program that acts as a communication hub to provide heightened wireless security and extend the physical range of a wireless local area network.






37. A server that receives email request from hosts on a network - and redirects them to the intended recipient.






38. A standard that adds AES security to the 802.11 standard






39. An area within a medical facility designed to prevent the spread of airborne infections though the use of negative pressurization control of the air inside and outside the room.






40. The method used to repeatedly delete and overwrite any traces or bits of sensitive data that may remain on a device after data wiping has been done.






41. Secure FTP - A secure version of FTP that uses SSH as an encryption method to transfer - access - and manage files.






42. See Host Computer






43. A hospital affiliated with a nearby medical school - allowing medical students and residents to gain hands-on learning and obtain real works experience by working in the hospital environment.






44. Software as a Service - A method that uses the cloud to provide application services to users.






45. A facility that provides long-term services - such as rehabilitation - that address more permanent or long-term medical conditions like mental illness.






46. The U.S. federal program to provide healthcare for certain low-income individual and families.






47. A personal computer connection that transfers data one bit at a time over a single wire and is often used for an external modem.






48. A network device that modulates digital information onto an analog signal at one end - and demodulates the analog signal back to digital data - used for dial-up Internet connections.






49. Any medical treatment or services provided on an outpatient basis.






50. A piece of code that sits dormant on a user;s computer until it is triggered by a specific event such as a specific date. Once the code is triggered the logic bomb ' detonates - : erasing and corrupting data on the user's computer.