Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

CHAPTER 5 HIT

HIT IT OPERATIONS

QuestionAnswer
An organization that provides access to the Internet Internet service provider (ISP)
A network that covers a large area. Used to connect networks together such as when facilities or doctor’s offices connect to the Internet. wide area network (WAN)
A type of data transmission technology that uses fiber optic cabling. It transmits up to 1.544 mbps (megabits per second). T-line
Strings of glass or plastic in a cable where data is sent as pulses of light. fiber optic
The private network that is secured within a facility internet
A suite of protocols used for communication on the Internet or an intranet TCP/IP
A description of all communication on a network expressed as seven layers. Open Systems Interconnection model (OSI model
A network architecture in which client computers rely on services or resources provided by a server computer client-server architecture
An application protocol that defines how data is sent to and from a web server on the web hypertext transfer protocol (HTTP)
A secure version of HTTP that encrypts data sent to and from a web server. hypertext transfer protocol secure (HTTPS)
A protocol standard for exchanging files over the Internet or an intranet. file transfer protocol (FTP)
A protocol developed by Microsoft and used with the Remote Desktop Connection utility that allows a user to connect to a remote computer over a network. remote desktop protocol (RDP)
A number assigned to a client or server application that serves as an address to the application, which the OS uses to get network communication to the correct application. port
A protocol used in TCP/IP networks at the transport layer of the OSI model. TCP is responsible for guaranteeing data is received and in the correct order transmission control protocol (TCP)
A protocol used in TCP/IP networks at the network layer of the OSI model. IP is responsible for finding the best path to a destination and breaking down messages into packets small enough to travel through the network and reassembling the packets when rec Internet protocol (IP)
The address used to identify a computer or other device on a TCP/IP network. A TCP/IP version 4 IP address has 32 bits, and a TCP/IP version 6 address has 128 bits. IP address
service that resolves domain names into the IP address that the network uses to reach the correct computer on the network domain name service (DNS)
A small network of computers or other connected devices covering a small area such as a home, business, school, or airport local area network (LAN)
The wireless standards used for local networks as defined by the IEEE 802.11 specifications. wireless fidelity (Wi-Fi)
A device that enables a wireless computer , printer, or other device to connect to a network wireless access point (WAP or AP)
A large-scale computer that supports many users and client computers. mainframe
A device or piece of equipment that does not require a reboot to establish a connection and function. hot swappable
The server that administers the user account information, authenticates usernames and passwords, and enforces security policy. domain controller
The Microsoft database managed by the domain controller that system administrators use to control access to the Windows domain. It contains information about users, groups of users, computers on the domain,organization active directory (AD)
A server that connects computers and other devices on a network with printers on the same network. print server
Applications and data stored on remote computers on the Internet made available through a browser. cloud computing
A service that hosts hardware remotely, that is needed for cloud computing. Organizations are allowed to use the hardware to host operating systems and software belonging to the organization Infrastructure-as-a-Service (IaaS)
A service that hosts hardware and operating systems remotely that is needed for cloud computing. Organizations are allowed to use the hardware and operating system to host the software belonging to the organization. Platform-as-a-Service (PaaS)
A software delivery method where the hardware hosting the software is housed remotely and organizations are allowed to access the software and functions as a web-based service Software-as-a-Service (SaaS)
One physical machine hosts multiple activities normally implemented on individual machines. virtualization
Applications or even the entire desktop are made available to a user from a remote server. Only user interaction is presented at the client machine and all other processing takes place at the server. Also called remote desktop service. terminal services
A programming language used to manage data stored in databases structured query language (SQL)
A common markup language used for developing web pages hypertext markup language (HTML)
A markup language used to write a new markup language. You can create your own HTML tags extensible markup language (XML)
An open source, server-side, HTML embedded scripting language used to create dynamic web pages. hypertext preprocessor (PHP)
A server-side, HTML embedded scripting language used to create dynamic web pages. active server pages (ASP or ASP.NET)
A segment of programming code that can be used by many programs. An API can be a routine, protocol, or tool used to build a software application application program interface (API) software application
A plug-in or add-on to a browser used to add multimedia graphics to web pages. Adobe Flash
A network that is a wireless, decentralized, temporary, and peer-to-peer connection. ad hoc.
A centralized network. Devices connect to an access point to join the network. infrastructure
A security protocol used on a wireless LAN that uses a static encryption key wired equivalent privacy (WEP)
A security protocol used on a wireless LAN that uses TKIP for encryption Wi-Fi protected access (WPA)
A security protocol used on a wireless LAN that uses AES for encryption. Currently the preferred encryption standard for a wireless LAN Wi-Fi protected access 2 (WPA2)
An encryption cipher that uses a block length of 128 bits. The National Institute of Standards and Technology (NIST) adopted AES as an encryption standard advanced encryption standard (AES)
A protocol and system used to authenticate access to a network. User passwords to the network are sent over the network encrypted using the RADIUS encryption standard. remote authentication dial-in user service (RADIUS)
The name assigned to a wireless access point. service set identifier (SSID)
A network device that separates one network from another and logically and physically belongs to both networks. router
A router or other gateway device substitutes its own IP address for the IP address of computers behind the firewall that it is protecting network address translation (NAT
Communication from outside the network is allowed past the firewall only to a specific computer and port port forwarding
An IP address manually assigned to a computer or device. A static IP address does not change automatically. static IP address
The service running on a router or other network device that automatically assigns an IP address to a computer or device when it joins the network dynamic host configuration protocol (DHCP)
An IP address assigned by DHCP. dynamic IP address
A series of 1s and 0s that determine which part of an IP address identifies the local network and which part identifies the host. subnet mask
The IP address of a router that should receive all requests for communication with computers outside the local network default gateway
A device with multiple network ports for connecting devices such as computers, printers, or servers. switch
A device used to convert the signal from the ISP to Ethernet used by the router and local network Internet modem
A command used in the command prompt window to display the TCP/IP network configuration values. ipconfig
A command used in the command prompt window to send a request to another device to find out if the two devices can communicate on the network. ping
Command is used to trace the path a connection takes to reach a target host. tracert.
A vendor that offers an IS provided remotely . application service provider (ASP)
A process of sending data several bits at a time through several streams simultaneously parallel communication
A process of sending data one bit at a time through a single stream serial communication
A standard for a hot swappable port. universal serial bus (USB)
A standard for a hot swappable port generally used for transferring multimedia data. Also called Firewire IEEE 1394
A standard for a hot swappable port and storage devices that use these ports are usually found on servers and are used by hard drives and optical drives. small computer system interface (SCSI)
A wireless communication protocol used to connect personal devices over short distances. Bluetooth
A device used to identify patients or medication, manage medication, track test specimens, and so on. The device reads a barcode and inputs the data into an IS. barcode scanner
A device used to scan paper documents into an electronic image or document document scanner
A device used for security and convenience that scans a card or badge to transfer data or detect identity. card or badge scanner
A device used to transfer written signatures into an electronic image. signature pad
a device with multiple network ports for connecting devices such as computers, printers, or servers switch
an example of a client server application email
The protocol used for utilities that provide a window to view the desktop of another computer is _________. RDP
The Internet protocol (IP) is used at the ________layer of the OSI model network
An IP address identifies a computer on a TCP/IP network. TCP/IP version 4 IP addresses contain _______ bits 32
A software application used to locate, retrieve and display content on the World Wide Web, including Web pages, images, video and other files. Browser
Assigned by a manufacturer, a hexadecimal number that uniquely identifies a network card – sometimes referred to as a physical address. mac address
Because of the rapid growth of the Internet and the number of devices on the Internet ____ is being replaced by ___. IPv4, IPv6
IEEE is the Institute of Electrical and Electronics Engineers. IEEE’s standards for wireless local networks are defined by 802.11
Kearney County hospital is a small facility. They access the applications they need for a hospital information system (HIS) through a cloud computing service that provides the hardware, the platform, and the applications. This service also includes update Software as a Service (SaaS)
At the Megalith Data Center one physical server is able to host multiple activities such as concurrent hosting of Web server, email server, and file server activities. Which of the following terms best describes this configuration? virtualization
The primary purpose of HTML is which of the following? develop and lay out web pages
What scripting language is associated with dynamic web pages? PHP
Includes all the devices, organization, and services for large groups of computers to be linked together infrastructure
Which of the following is a service running on a network device that automatically assigns IP addresses? DHCP
The current preferred encryption standard for a wireless LAN is which of the following? WPA2
A device that separates one network from another and enables traffic to flow between them is known by which of the following names? Router
Which of the following commands is a request to another device to discover whether the two devices can communicate on the network? ping
A command used at the command prompt window to display the TCP/IP network configuration values ipconfig
A command that will the path connection takes to reach a target host and how long the wait times are for each hop, or jump from one router to the next. tracert
The contents of a hard drive, including configuration settings and applications stored so the contents can be replicated to another computer. disk image
A table of MAC addresses are used to limit traffic on a network. Messages with MAC addresses not listed in the table are not allowed on the network. firewall
A digital networking communications method that groups all transmitted data into suitably sized blocks packet switching
Designed for sensitive medical equipment -- generally orange in color. Hospital-grade outlet
Connected to the emergency generator in case of an outage – will lose power for only a few seconds – generally red in color. Emergency generator outlet
Will lose power completely if the power fails in a facility – generally white, ivory, or brown. Regular outlet
The application is installed on the client computer. thick client
Application is accessed by a computer but not installed on a computer. thin client
Installed on a server that allows multiple clients to simultaneously log in to access. terminal services
backs up new and changed files and does not mark the files as having been backed up. differential backup
backs up the files that have been created or changed since the last incremental backup and marks the files as having been backed up. incremental backup
The three goals of encryption are: confidential, fast, not waste space
a procedure whereby, on request by one physician, another physician reviews a patient's medical history, examines the patient, and makes recommendations as to care and treatment Consultation
the transfer of care for a patient from one clinician to another. referral
What does the Provider Type field in the HL7 standards indicate? Major grouping of the service or occupation of the practitioner
Which of the following is the default port for Telnet? Port 23
used for the File Transfer Protocol (FTP) control channel. Port 21
used for Secure Shell (SSH) remote connection. Port 22
used by the Simple Mail Transport Protocol (SMTP). Port 25
Which of these technologies would be the best for user authentication to access the server room? Biometrics
In what format are most operating systems passwords stored? hash
Which type of backup program resets the file archive bit each time it runs? (Choose two.) incremental, full
Which of these is a common application-layer protocol used in VoIP communications and signaling protocol for controlling voice and video calls over the Internet.? Session Initiation Protocol (SIP)
provides cryptographic privacy and authentication for data communications Pretty Good Privacy (PGP)
A service desk caller complains she cannot connect to web sites. After the service-desk technician instructs the caller to type a web server's IP address instead of the web site's URL, the web site appears on the caller's workstation. What service is mo Domain Name Service (DNS)
service issues an IP address to a workstation when it boots up Dynamic Host Configuration Protocol (DHCP) service
used to test for host connectivity. Internet Control Message Protocol (ICMP)
used by IP hosts to manage their dynamic multicast group membership Internet Group Management Protocol (IGMP)
You are a network administrator who needs to configure a Windows workstation to connect to the LAN and Internet web sites. Which of the following parameters would you need to configure on the workstation's NIC? (Choose three.) IP address, Subnet mask, Gateway router
What type of lock uses buttons that must be pushed in the correct sequence to open a door? Cipher
What is the U.S. government's principal agency for protecting the health of all Americans and providing essential human services, especially for those who are least able to help themselves? The Department of Health and Human Services (HHS)
A software contractor for your healthcare organization has requested temporary access through your firewall to upload data via an SSH/SFTP connection. What TCP port needs to be opened? TCP port 22
What LAN infrastructure device is used for workstation connectivity in a modern star topology architecture? Switches
used in early LAN star topology architecture but created a single collision domain for all attached workstations A hub
used for layer 3 (Network) connectivity Routers
connect separate network segments at layer 2 of the OSI model bridges
You work as a network administrator for a small hospital LAN. A new workstation needs to be configured to receive TCP/IP address information each time it boots. Which service must be running to accomplish this? (DHCP) Dynamic Host Configuration Protocol
What is the minimum HITECH Act penalty for a "violation resulted from reasonable cause?" The minimum penalty is $1,000 per violation.
A user reports that after running the ipconfig command, her workstation's IP address is 169.254.23.32. What service has failed? DHCP
Your service desk receives a call from a user who has no network access. You instruct her to look at the LED on the network interface card (NIC) to determine whether it is illuminated. She informs you that the LED is dark. What does this indicate? indicates no connection to the Ethernet switch.
As a network administrator of a healthcare organization, what is the most important process involved with data backup operations? Verifying data integrity by testing the data restore function
In the medical office workflow model, which of these describe the recording of vital personal information such as health data? Registration
Secure access to web sites uses the HTTPS protocol. What security protocol is used by HTTP to achieve this? Secure Sockets Layer (SSL)
As a network administrator of a healthcare facility, you are required to authorize access to PHI based on employee roles. One group of clerical staff members must access PHI to answer patient billing information. Which of these file-level permissions sh Read
Created by: Wynston
Popular Medical sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards