Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
CompTIA HIT-001 CompTIA Healthcare IT Technician http://killexams.com/exam-detail/HIT-001 DEMO Find some pages taken from full version Following pages are for demo purpose only. Demo pages are randomly taken from full version. Full version can be different from the demo version. You can request the updated Demo by contacting [email protected]. For Details about Full version Click http://killexams.com/exam-detail/HIT-001 HIT-001 QUESTION: 516 What is the data transfer rate of IEEE 1394 standard? A. 400Mbps B. 480Mbps C. 12Mbps D. 600Mbps Answer: A Explanation: Institute of Electrical and Electronics Engineers (IEEE) 1394 supports a data transfer rate of 400Mbps. However, most of the devices currently available run at 200 Mbps. QUESTION: 517 Which of the following stores document copies and backup media away from the computer center? A. Storage area network B. Network attached storage C. On-site storage D. Off-site storage Answer: D Explanation: Off-site storage refers to a location away from the computer center where document copies and backup media are kept. This storage method is more secure but less convenient and more costly. Answer: C is incorrect. On-site storage refers to the same location where the work place is. It is considered more convenient but less secure in case of disaster. Answer: A is incorrect. A storage area network (SAN) is an architecture to attach remote computer storage devices (such as disk arrays, tape libraries, and optical jukeboxes) to servers in such a way that the devices appear as locally attached to the operating system. Answer: B is incorrect. Network attached storage (NAS), in contrast to SAN, uses file-based protocols such as NFS or SMB/CIFS where it is clear that the storage is remote, and computers request a portion of an abstract file rather than a disk block. QUESTION: 518 Which of the following statements are true regarding the security advantages of cloud computing?Each correct answer represents a complete solution. Choose all that apply. 302 303 http://www. HIT-001 A. It has advanced honeypot capabilities. B. It provides a greater resiliency. C. It can be implemented without any organizational changes. D. It provides fault tolerance and reliability. Answer: A, B, D Explanation: The security advantages for cloud computing are as follows: It provides data fragmentation and dispersal. It builds a dedicated security team. It has a greater investment in security infrastructure. It provides fault tolerance and reliability. It provides a greater resiliency. It provides hypervisor protection against network attacks. It offers possible reduction of Certification and Accreditation activities. It provides simplification of compliance analysis. An unbiased party holds the data. It has low-cost disaster recovery and data storage solutions. It provides on- demand security controls. It provides real-time detection of system tampering. It provides rapid re- constitution of services. It has advanced honeypot capabilities. Answer: C is incorrect. Organizational changes are needed to implement cloud computing. QUESTION: 519 A user named Rick wants to configure a TCP/IP network at his residence. He has three computers. He chooses star topology to connect his computers. He wants to configure his computers with static IP addressing. Which of the following are the required parameters that he will configure for each computer on the network?Each correct answer represents a complete solution. Choose all that apply. A. MAC Address B. Subnet mask C. IP address D. Default gateway Answer: B, C Explanation: IP address and subnet mask are the required parameters to configure manual addressing for a computer on a TCP/IP network. QUESTION: 520 Fill in the blank with the appropriate word. A is a device that controls the movement of the cursor or pointer on the computer screen.A mouseis a device that controls the movement of the cursor or pointer on the computer screen. 303 304 http://www. HIT-001 Answer: A mouse consists of a metal or plastic Explanation: casing, a ball that sticks out of the bottom of the casing and is rolled on a flat surface, one or more buttons on the top of the casing, and a cable that connects the mouse to the computer. As the ball is moved over the surface in any direction, a sensor sends impulses to the computer that causes a mouse-responsive program to reposition cursor on the monitor. QUESTION: 521 As a member of the healthcare IT team, you are asked to send a patient's MRI exam from the MRI department to a PACS system for permanent archival. Which of the following would you depend on for transmission of these images? A. HIPPA B. DICOM C. EMTALA D. Health Level 7 Answer: B Explanation: DICOM, short for Digital Imaging and Communications in Medicine, refers to the standard of handling, storing, printing and transmitting information in medical imaging. Answer: D is incorrect. Health Level 7 is incorrect as this is a is an international community of healthcare subject matter experts and information scientists collaborating to create standards for the exchange, management and integration of electronic healthcare information. HL7 promotes the use of such informatics standards within and among healthcare organizations to increase the effectiveness and efficiency of healthcare information delivery for the benefit of all. QUESTION: 522 On which of the following factors does the capacity of an access point depend?Each correct answer represents a complete solution. Choose all that apply. A. Channel reuse B. Co-location C. Number of users D. Software applications Answer: C, D 304 305 http://www. HIT-001 Explanation: The capacity of an access point is the maximum number of users the access point can service effectively, offering the best performance. The capacity depends on several factors including the following. Software applications in use. Applications that are more bandwidth- intensive reduces the capacity of the access point. Desired throughput or performance and number of users. A large number of bandwidth-intensive application users connected to an access point will cause poor performance. Therefore, limiting the capacity of an access point to a certain number of users will give the connected users the best performance. Answer: A, B are incorrect. The capacity of an access point does not depend on channel reuse or co-location. Channel reuse and co-location is a method of using non-overlapping channels in such a way that the overlapping cells are on different RF channels. Channel reuse is done by mapping out the access points on a floor plan and verifying that the RF cells propagated by the access points do not overlap on the same RF channels. This type of channel plan can be done manually or with site survey software applications. The figure given below shows the co-location of access points with proper channel reuse. In the figure, overlapping areas use different channels to prevent interference. QUESTION: 523 In medical terminology, the suffix -ology is used to describe which of the following? A. Disease B. Inflammation C. Study of D. Opening Answer: C 305 306 http://www. HIT-001 Explanation: In medical terminology, any word that ends with the suffix -ology refers to the study of a particular process. Examples, Cardiology is the study of the heart, Oncology is the study of tumors, and Pulmonology is the study of the lungs. Answer: B is incorrect. inflammation is incorrect as any medical term referring to inflammation ends with the suffix -itis. Answer: A is incorrect. Disease is incorrect as any condition that refers to a disease process is accompanied by the suffix -osis, example diverticulosis is as disease of the diverticulum. Answer: D is incorrect. Opening is incorrect as any medical condition that refers to opening ends with the suffix -otomy, example thoracotomy means an opening was made in the thorax. QUESTION: 524 Which of the following categories of information technology in the health care setting involves bar coding applications? A. Clinical IT B. Infrastructure IT C. Administrative IT D. Financial IT Answer: B Explanation: Applications of infrastructure information technology support the infrastructure of the health care facility. These applications include voice recognition for medical records and medical transcription as well as bar coding applications for medical devices and drugs. Answer: C is incorrect. Administrative IT is incorrect as these applications are used to make staff scheduling, patient registration and payroll procedures more efficient. Answer: A is incorrect. Clinical IT is incorrect as these applications are used for prescription of drugs and ordering of laboratory tests and medical procedures Answer: D is incorrect. Financial IT is incorrect as these applications are used to improve the efficiency of billing and accounting practices. 306 307 http://www. For More exams visit http://killexams.com Kill your exam at First Attempt....Guaranteed!