Quiz Mode allows you to practice the quiz as a real exam, you'll have a timer, answers will be hidden, you'll be allowed to fill your answers, get the result at the end and store your results.
Which of the following is NOT one of the four fundamental elements of all computer systems?
Which of the following must be installed on the computer or provided by the operating system to convert data output from one device into a format compatible with another device?
Which of the following best describes the most widely used type of computer in today's health care facility?
Which of the following is an example of hardware?
Which of the following abbreviations applies to a compact disk that allows data to be erased and rewritten?
Secure Internet sites can be easily discernable by a small padlock found anywhere on the web site window.
Secure wireless sites can be identified by a small padlock next to the network name, which is shown when your wireless device searches for a signal.
Electronic patient records from a single medical practice, hospital, or pharmacy is known as an EHR (Electronic Health Record).
Phishing is a practice in which the recipient of an e-mail is directed to go to a website to provide information to her bank, the IRS, or other official organization.
When using anti-virus software, the suspicious behavior approach is often insufficient due to the continual creation of new viruses.
A smartphone accesses small computer programs called apps that are designed to meet a multitude of computing functions.
Smartphones (a type of personal digital assistant or PDA) are replacing computer monitors in the exam rooms due to their extreme mobility.
Magnetic disk drives can be internal or external to the computer unit.
Flash memory devices cannot be used for system backups.
Redundant Array of Independent Disks (RAID) is a type of storage media like optical or flash.
WiFi employs radio transmission and is vulnerable to eavesdropping by unauthorized users on the transmission.
BluetoothÂ® is the name given to a radio technology capable of transmitting signals over short distances (30-foot range).
WiFi is less vulnerable than BluetoothÂ® to have unauthorized eavesdropping.
Which of the following refers to storage memory that is lost when the computer is turned off or experiences a power failure?
Which of the following is a form of an input/output device that alters digital data from a computer and transmits it over telephone lines or cable installations?
Which of the following is a true statement regarding a Universal System Bus (USB) port?
The most common network(s) encountered in the medical office is (are) which of the following?
Which of the following networks transmits data that are broken into packets and are reassembled when they reach the final destination?
Which of the following statements is NOT true regarding system backup?
Which of the following is NOT a true statement regarding defragmentation of a computer system?
Which of the following best describes the most widely known injury associated with individuals routinely using a computer.
Which of the following best describes how computer equipment should be set up to minimize the occurrence of injury?
Which of the following best describes the starting point for a meaningful information security system?
Viruses find their way onto a system through which of the following?
Computer ergonomics addresses safety issues and concerns specific to which of the following?
When computerizing the medical office, it is important NOT to do which of the following?
When in the exam room, which of the following is important to remember when entering patient information onto the computer?
To prevent damage to computer components from static discharges, which of the following are required at all workstations?
Which of the following is an example of application software functions?
Which of the following is NOT a function of the TPMS (Total Practice Management System)?
What will make electronic health records a reality?