Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

HIT IT OPERATIONS

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
An organization that provides access to the Internet   Internet service provider (ISP)  
🗑
A network that covers a large area. Used to connect networks together such as when facilities or doctor’s offices connect to the Internet.   wide area network (WAN)  
🗑
A type of data transmission technology that uses fiber optic cabling. It transmits up to 1.544 mbps (megabits per second).   T-line  
🗑
Strings of glass or plastic in a cable where data is sent as pulses of light.   fiber optic  
🗑
The private network that is secured within a facility   internet  
🗑
A suite of protocols used for communication on the Internet or an intranet   TCP/IP  
🗑
A description of all communication on a network expressed as seven layers.   Open Systems Interconnection model (OSI model  
🗑
A network architecture in which client computers rely on services or resources provided by a server computer   client-server architecture  
🗑
An application protocol that defines how data is sent to and from a web server on the web   hypertext transfer protocol (HTTP)  
🗑
A secure version of HTTP that encrypts data sent to and from a web server.   hypertext transfer protocol secure (HTTPS)  
🗑
A protocol standard for exchanging files over the Internet or an intranet.   file transfer protocol (FTP)  
🗑
A protocol developed by Microsoft and used with the Remote Desktop Connection utility that allows a user to connect to a remote computer over a network.   remote desktop protocol (RDP)  
🗑
A number assigned to a client or server application that serves as an address to the application, which the OS uses to get network communication to the correct application.   port  
🗑
A protocol used in TCP/IP networks at the transport layer of the OSI model. TCP is responsible for guaranteeing data is received and in the correct order   transmission control protocol (TCP)  
🗑
A protocol used in TCP/IP networks at the network layer of the OSI model. IP is responsible for finding the best path to a destination and breaking down messages into packets small enough to travel through the network and reassembling the packets when rec   Internet protocol (IP)  
🗑
The address used to identify a computer or other device on a TCP/IP network. A TCP/IP version 4 IP address has 32 bits, and a TCP/IP version 6 address has 128 bits.   IP address  
🗑
service that resolves domain names into the IP address that the network uses to reach the correct computer on the network   domain name service (DNS)  
🗑
A small network of computers or other connected devices covering a small area such as a home, business, school, or airport   local area network (LAN)  
🗑
The wireless standards used for local networks as defined by the IEEE 802.11 specifications.   wireless fidelity (Wi-Fi)  
🗑
A device that enables a wireless computer , printer, or other device to connect to a network   wireless access point (WAP or AP)  
🗑
A large-scale computer that supports many users and client computers.   mainframe  
🗑
A device or piece of equipment that does not require a reboot to establish a connection and function.   hot swappable  
🗑
The server that administers the user account information, authenticates usernames and passwords, and enforces security policy.   domain controller  
🗑
The Microsoft database managed by the domain controller that system administrators use to control access to the Windows domain. It contains information about users, groups of users, computers on the domain,organization   active directory (AD)  
🗑
A server that connects computers and other devices on a network with printers on the same network.   print server  
🗑
Applications and data stored on remote computers on the Internet made available through a browser.   cloud computing  
🗑
A service that hosts hardware remotely, that is needed for cloud computing. Organizations are allowed to use the hardware to host operating systems and software belonging to the organization   Infrastructure-as-a-Service (IaaS)  
🗑
A service that hosts hardware and operating systems remotely that is needed for cloud computing. Organizations are allowed to use the hardware and operating system to host the software belonging to the organization.   Platform-as-a-Service (PaaS)  
🗑
A software delivery method where the hardware hosting the software is housed remotely and organizations are allowed to access the software and functions as a web-based service   Software-as-a-Service (SaaS)  
🗑
One physical machine hosts multiple activities normally implemented on individual machines.   virtualization  
🗑
Applications or even the entire desktop are made available to a user from a remote server. Only user interaction is presented at the client machine and all other processing takes place at the server. Also called remote desktop service.   terminal services  
🗑
A programming language used to manage data stored in databases   structured query language (SQL)  
🗑
A common markup language used for developing web pages   hypertext markup language (HTML)  
🗑
A markup language used to write a new markup language. You can create your own HTML tags   extensible markup language (XML)  
🗑
An open source, server-side, HTML embedded scripting language used to create dynamic web pages.   hypertext preprocessor (PHP)  
🗑
A server-side, HTML embedded scripting language used to create dynamic web pages.   active server pages (ASP or ASP.NET)  
🗑
A segment of programming code that can be used by many programs. An API can be a routine, protocol, or tool used to build a software application   application program interface (API) software application  
🗑
A plug-in or add-on to a browser used to add multimedia graphics to web pages.   Adobe Flash  
🗑
A network that is a wireless, decentralized, temporary, and peer-to-peer connection.   ad hoc.  
🗑
A centralized network. Devices connect to an access point to join the network.   infrastructure  
🗑
A security protocol used on a wireless LAN that uses a static encryption key   wired equivalent privacy (WEP)  
🗑
A security protocol used on a wireless LAN that uses TKIP for encryption   Wi-Fi protected access (WPA)  
🗑
A security protocol used on a wireless LAN that uses AES for encryption. Currently the preferred encryption standard for a wireless LAN   Wi-Fi protected access 2 (WPA2)  
🗑
An encryption cipher that uses a block length of 128 bits. The National Institute of Standards and Technology (NIST) adopted AES as an encryption standard   advanced encryption standard (AES)  
🗑
A protocol and system used to authenticate access to a network. User passwords to the network are sent over the network encrypted using the RADIUS encryption standard.   remote authentication dial-in user service (RADIUS)  
🗑
The name assigned to a wireless access point.   service set identifier (SSID)  
🗑
A network device that separates one network from another and logically and physically belongs to both networks.   router  
🗑
A router or other gateway device substitutes its own IP address for the IP address of computers behind the firewall that it is protecting   network address translation (NAT  
🗑
Communication from outside the network is allowed past the firewall only to a specific computer and port   port forwarding  
🗑
An IP address manually assigned to a computer or device. A static IP address does not change automatically.   static IP address  
🗑
The service running on a router or other network device that automatically assigns an IP address to a computer or device when it joins the network   dynamic host configuration protocol (DHCP)  
🗑
An IP address assigned by DHCP.   dynamic IP address  
🗑
A series of 1s and 0s that determine which part of an IP address identifies the local network and which part identifies the host.   subnet mask  
🗑
The IP address of a router that should receive all requests for communication with computers outside the local network   default gateway  
🗑
A device with multiple network ports for connecting devices such as computers, printers, or servers.   switch  
🗑
A device used to convert the signal from the ISP to Ethernet used by the router and local network   Internet modem  
🗑
A command used in the command prompt window to display the TCP/IP network configuration values.   ipconfig  
🗑
A command used in the command prompt window to send a request to another device to find out if the two devices can communicate on the network.   ping  
🗑
Command is used to trace the path a connection takes to reach a target host.   tracert.  
🗑
A vendor that offers an IS provided remotely .   application service provider (ASP)  
🗑
A process of sending data several bits at a time through several streams simultaneously   parallel communication  
🗑
A process of sending data one bit at a time through a single stream   serial communication  
🗑
A standard for a hot swappable port.   universal serial bus (USB)  
🗑
A standard for a hot swappable port generally used for transferring multimedia data. Also called Firewire   IEEE 1394  
🗑
A standard for a hot swappable port and storage devices that use these ports are usually found on servers and are used by hard drives and optical drives.   small computer system interface (SCSI)  
🗑
A wireless communication protocol used to connect personal devices over short distances.   Bluetooth  
🗑
A device used to identify patients or medication, manage medication, track test specimens, and so on. The device reads a barcode and inputs the data into an IS.   barcode scanner  
🗑
A device used to scan paper documents into an electronic image or document   document scanner  
🗑
A device used for security and convenience that scans a card or badge to transfer data or detect identity.   card or badge scanner  
🗑
A device used to transfer written signatures into an electronic image.   signature pad  
🗑
a device with multiple network ports for connecting devices such as computers, printers, or servers   switch  
🗑
an example of a client server application   email  
🗑
The protocol used for utilities that provide a window to view the desktop of another computer is _________.   RDP  
🗑
The Internet protocol (IP) is used at the ________layer of the OSI model   network  
🗑
An IP address identifies a computer on a TCP/IP network. TCP/IP version 4 IP addresses contain _______ bits   32  
🗑
A software application used to locate, retrieve and display content on the World Wide Web, including Web pages, images, video and other files.   Browser  
🗑
Assigned by a manufacturer, a hexadecimal number that uniquely identifies a network card – sometimes referred to as a physical address.   mac address  
🗑
Because of the rapid growth of the Internet and the number of devices on the Internet ____ is being replaced by ___.   IPv4, IPv6  
🗑
IEEE is the Institute of Electrical and Electronics Engineers. IEEE’s standards for wireless local networks are defined by   802.11  
🗑
Kearney County hospital is a small facility. They access the applications they need for a hospital information system (HIS) through a cloud computing service that provides the hardware, the platform, and the applications. This service also includes update   Software as a Service (SaaS)  
🗑
At the Megalith Data Center one physical server is able to host multiple activities such as concurrent hosting of Web server, email server, and file server activities. Which of the following terms best describes this configuration?   virtualization  
🗑
The primary purpose of HTML is which of the following?   develop and lay out web pages  
🗑
What scripting language is associated with dynamic web pages?   PHP  
🗑
Includes all the devices, organization, and services for large groups of computers to be linked together   infrastructure  
🗑
Which of the following is a service running on a network device that automatically assigns IP addresses?   DHCP  
🗑
The current preferred encryption standard for a wireless LAN is which of the following?   WPA2  
🗑
A device that separates one network from another and enables traffic to flow between them is known by which of the following names?   Router  
🗑
Which of the following commands is a request to another device to discover whether the two devices can communicate on the network?   ping  
🗑
A command used at the command prompt window to display the TCP/IP network configuration values   ipconfig  
🗑
A command that will the path connection takes to reach a target host and how long the wait times are for each hop, or jump from one router to the next.   tracert  
🗑
The contents of a hard drive, including configuration settings and applications stored so the contents can be replicated to another computer.   disk image  
🗑
A table of MAC addresses are used to limit traffic on a network. Messages with MAC addresses not listed in the table are not allowed on the network.   firewall  
🗑
A digital networking communications method that groups all transmitted data into suitably sized blocks   packet switching  
🗑
Designed for sensitive medical equipment -- generally orange in color.   Hospital-grade outlet  
🗑
Connected to the emergency generator in case of an outage – will lose power for only a few seconds – generally red in color.   Emergency generator outlet  
🗑
Will lose power completely if the power fails in a facility – generally white, ivory, or brown.   Regular outlet  
🗑
The application is installed on the client computer.   thick client  
🗑
Application is accessed by a computer but not installed on a computer.   thin client  
🗑
Installed on a server that allows multiple clients to simultaneously log in to access.   terminal services  
🗑
backs up new and changed files and does not mark the files as having been backed up.   differential backup  
🗑
backs up the files that have been created or changed since the last incremental backup and marks the files as having been backed up.   incremental backup  
🗑
The three goals of encryption are:   confidential, fast, not waste space  
🗑
a procedure whereby, on request by one physician, another physician reviews a patient's medical history, examines the patient, and makes recommendations as to care and treatment   Consultation  
🗑
the transfer of care for a patient from one clinician to another.   referral  
🗑
What does the Provider Type field in the HL7 standards indicate?   Major grouping of the service or occupation of the practitioner  
🗑
Which of the following is the default port for Telnet?   Port 23  
🗑
used for the File Transfer Protocol (FTP) control channel.   Port 21  
🗑
used for Secure Shell (SSH) remote connection.   Port 22  
🗑
used by the Simple Mail Transport Protocol (SMTP).   Port 25  
🗑
Which of these technologies would be the best for user authentication to access the server room?   Biometrics  
🗑
In what format are most operating systems passwords stored?   hash  
🗑
Which type of backup program resets the file archive bit each time it runs? (Choose two.)   incremental, full  
🗑
Which of these is a common application-layer protocol used in VoIP communications and signaling protocol for controlling voice and video calls over the Internet.?   Session Initiation Protocol (SIP)  
🗑
provides cryptographic privacy and authentication for data communications   Pretty Good Privacy (PGP)  
🗑
A service desk caller complains she cannot connect to web sites. After the service-desk technician instructs the caller to type a web server's IP address instead of the web site's URL, the web site appears on the caller's workstation. What service is mo   Domain Name Service (DNS)  
🗑
service issues an IP address to a workstation when it boots up   Dynamic Host Configuration Protocol (DHCP) service  
🗑
used to test for host connectivity.   Internet Control Message Protocol (ICMP)  
🗑
used by IP hosts to manage their dynamic multicast group membership   Internet Group Management Protocol (IGMP)  
🗑
You are a network administrator who needs to configure a Windows workstation to connect to the LAN and Internet web sites. Which of the following parameters would you need to configure on the workstation's NIC? (Choose three.)   IP address, Subnet mask, Gateway router  
🗑
What type of lock uses buttons that must be pushed in the correct sequence to open a door?   Cipher  
🗑
What is the U.S. government's principal agency for protecting the health of all Americans and providing essential human services, especially for those who are least able to help themselves?   The Department of Health and Human Services (HHS)  
🗑
A software contractor for your healthcare organization has requested temporary access through your firewall to upload data via an SSH/SFTP connection. What TCP port needs to be opened?   TCP port 22  
🗑
What LAN infrastructure device is used for workstation connectivity in a modern star topology architecture?   Switches  
🗑
used in early LAN star topology architecture but created a single collision domain for all attached workstations   A hub  
🗑
used for layer 3 (Network) connectivity   Routers  
🗑
connect separate network segments at layer 2 of the OSI model   bridges  
🗑
You work as a network administrator for a small hospital LAN. A new workstation needs to be configured to receive TCP/IP address information each time it boots. Which service must be running to accomplish this?   (DHCP) Dynamic Host Configuration Protocol  
🗑
What is the minimum HITECH Act penalty for a "violation resulted from reasonable cause?"   The minimum penalty is $1,000 per violation.  
🗑
A user reports that after running the ipconfig command, her workstation's IP address is 169.254.23.32. What service has failed?   DHCP  
🗑
Your service desk receives a call from a user who has no network access. You instruct her to look at the LED on the network interface card (NIC) to determine whether it is illuminated. She informs you that the LED is dark. What does this indicate?   indicates no connection to the Ethernet switch.  
🗑
As a network administrator of a healthcare organization, what is the most important process involved with data backup operations?   Verifying data integrity by testing the data restore function  
🗑
In the medical office workflow model, which of these describe the recording of vital personal information such as health data?   Registration  
🗑
Secure access to web sites uses the HTTPS protocol. What security protocol is used by HTTP to achieve this?   Secure Sockets Layer (SSL)  
🗑
As a network administrator of a healthcare facility, you are required to authorize access to PHI based on employee roles. One group of clerical staff members must access PHI to answer patient billing information. Which of these file-level permissions sh   Read  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: Wynston
Popular Medical sets