Download Free Pass4sure HIT-001 PDF

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Airborne Networking wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Computer security wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Transcript
CompTIA
HIT-001
CompTIA Healthcare IT Technician
http://killexams.com/exam-detail/HIT-001
DEMO
Find some pages taken from full version
Following pages are for demo purpose only. Demo pages are randomly taken from full version.
Full version can be different from the demo version.
You can request the updated Demo by contacting [email protected].
For Details about Full version Click http://killexams.com/exam-detail/HIT-001
HIT-001
QUESTION: 516
What is the data transfer rate of IEEE 1394 standard?
A. 400Mbps
B. 480Mbps
C. 12Mbps
D. 600Mbps
Answer: A
Explanation:
Institute of Electrical and Electronics Engineers (IEEE) 1394 supports a data transfer rate of
400Mbps. However, most of the devices currently available run at 200 Mbps.
QUESTION: 517
Which of the following stores document copies and backup media away from the computer
center?
A. Storage area network
B. Network attached storage
C. On-site storage
D. Off-site storage
Answer: D
Explanation:
Off-site storage refers to a location away from the computer center where document copies and
backup media are kept. This storage method is more secure but less convenient and more
costly. Answer: C is incorrect. On-site storage refers to the same location where the work place
is. It is considered more convenient but less secure in case of disaster. Answer: A is incorrect.
A storage area network (SAN) is an architecture to attach remote computer storage devices
(such as disk arrays, tape libraries, and optical jukeboxes) to servers in such a way that the
devices appear as locally attached to the operating system. Answer: B is incorrect. Network
attached storage (NAS), in contrast to SAN, uses file-based protocols such as NFS or
SMB/CIFS where it is clear that the storage is remote, and computers request a portion of an
abstract file rather than a disk block.
QUESTION: 518
Which of the following statements are true regarding the security advantages of cloud
computing?Each correct answer represents a complete solution. Choose all that apply.
302
303
http://www.
HIT-001
A. It has advanced honeypot capabilities.
B. It provides a greater resiliency.
C. It can be implemented without any organizational changes.
D. It provides fault tolerance and reliability.
Answer: A, B, D
Explanation:
The security advantages for cloud computing are as follows: It provides data fragmentation and
dispersal. It builds a dedicated security team. It has a greater investment in security
infrastructure. It provides fault tolerance and reliability. It provides a greater resiliency. It
provides hypervisor protection against network attacks. It offers possible reduction of
Certification and Accreditation activities. It provides simplification of compliance analysis. An
unbiased party holds the data. It has low-cost disaster recovery and data storage solutions. It
provides on- demand security controls. It provides real-time detection of system tampering. It
provides rapid re- constitution of services. It has advanced honeypot capabilities. Answer: C is
incorrect. Organizational changes are needed to implement cloud computing.
QUESTION: 519
A user named Rick wants to configure a TCP/IP network at his residence. He has three
computers. He chooses star topology to connect his computers. He wants to configure his
computers with static IP addressing. Which of the following are the required parameters that he
will configure for each computer on the network?Each correct answer represents a complete
solution. Choose all that apply.
A. MAC Address
B. Subnet mask
C. IP address
D. Default gateway
Answer: B, C
Explanation:
IP address and subnet mask are the required parameters to configure manual addressing for a
computer on a TCP/IP network.
QUESTION: 520
Fill in the blank with the appropriate word. A is a device that controls the movement of the
cursor or pointer on the computer screen.A mouseis a device that controls the movement of the
cursor or pointer on the computer screen.
303
304
http://www.
HIT-001
Answer: A mouse consists of a metal or plastic
Explanation:
casing, a ball that sticks out of the bottom of the casing and is rolled on a flat surface, one or
more buttons on the top of the casing, and a cable that connects the mouse to the computer. As
the ball is moved over the surface in any direction, a sensor sends impulses to the computer
that causes a mouse-responsive program to reposition cursor on the monitor.
QUESTION: 521
As a member of the healthcare IT team, you are asked to send a patient's MRI exam from the
MRI department to a PACS system for permanent archival. Which of the following would you
depend on for transmission of these images?
A. HIPPA
B. DICOM
C. EMTALA
D. Health Level 7
Answer: B
Explanation:
DICOM, short for Digital Imaging and Communications in Medicine, refers to the standard of
handling, storing, printing and transmitting information in medical imaging. Answer: D is
incorrect. Health Level 7 is incorrect as this is a is an international community of healthcare
subject matter experts and information scientists collaborating to create standards for the
exchange, management and integration of electronic healthcare information. HL7 promotes the
use of such informatics standards within and among healthcare organizations to increase the
effectiveness and efficiency of healthcare information delivery for the benefit of all.
QUESTION: 522
On which of the following factors does the capacity of an access point depend?Each correct
answer represents a complete solution. Choose all that apply.
A. Channel reuse
B. Co-location
C. Number of users
D. Software applications
Answer: C, D
304
305
http://www.
HIT-001
Explanation:
The capacity of an access point is the maximum number of users the access point can service
effectively, offering the best performance. The capacity depends on several factors including
the following. Software applications in use. Applications that are more bandwidth- intensive
reduces the capacity of the access point. Desired throughput or performance and number of
users. A large number of bandwidth-intensive application users connected to an access point
will cause poor performance. Therefore, limiting the capacity of an access point to a certain
number of users will give the connected users the best performance. Answer: A, B are
incorrect. The capacity of an access point does not depend on channel reuse or co-location.
Channel reuse and co-location is a method of using non-overlapping channels in such a way
that the overlapping cells are on different RF channels. Channel reuse is done by mapping out
the access points on a floor plan and verifying that the RF cells propagated by the access points
do not overlap on the same RF channels. This type of channel plan can be done manually or
with site survey software applications. The figure given below shows the co-location of access
points with proper channel reuse. In the figure, overlapping areas use different channels to
prevent interference.
QUESTION: 523
In medical terminology, the suffix -ology is used to describe which of the following?
A. Disease
B. Inflammation
C. Study of
D. Opening
Answer: C
305
306
http://www.
HIT-001
Explanation:
In medical terminology, any word that ends with the suffix -ology refers to the study of a
particular process. Examples, Cardiology is the study of the heart, Oncology is the study of
tumors, and Pulmonology is the study of the lungs. Answer: B is incorrect. inflammation is
incorrect as any medical term referring to inflammation ends with the suffix -itis. Answer: A is
incorrect. Disease is incorrect as any condition that refers to a disease process is accompanied
by the suffix -osis, example diverticulosis is as disease of the diverticulum. Answer: D is
incorrect. Opening is incorrect as any medical condition that refers to opening ends with the
suffix -otomy, example thoracotomy means an opening was made in the thorax.
QUESTION: 524
Which of the following categories of information technology in the health care setting involves
bar coding applications?
A. Clinical IT
B. Infrastructure IT
C. Administrative IT
D. Financial IT
Answer: B
Explanation:
Applications of infrastructure information technology support the infrastructure of the health
care facility. These applications include voice recognition for medical records and medical
transcription as well as bar coding applications for medical devices and drugs. Answer: C is
incorrect. Administrative IT is incorrect as these applications are used to make staff
scheduling, patient registration and payroll procedures more efficient. Answer: A is incorrect.
Clinical IT is incorrect as these applications are used for prescription of drugs and ordering of
laboratory tests and medical procedures Answer: D is incorrect. Financial IT is incorrect as
these applications are used to improve the efficiency of billing and accounting practices.
306
307
http://www.
For More exams visit http://killexams.com
Kill your exam at First Attempt....Guaranteed!