It is more faster and easier to pass the CompTIA HIT-001 exam by using Exact CompTIA CompTIA Healthcare IT Technician Exam questuins and answers. Immediate access to the Improved HIT-001 Exam and find the same core area HIT-001 questions with professionally verified answers, then PASS your exam with a high score now.

2021 Dec HIT-001 practice question

Q151. Which of the following options will you use to minimize ESD problems? 

A. A plastic CPU cover. 

B. An antiglare screen. 

C. Wearing synthetic clothes in the computer lab. 

D. A wrist strap. 

Answer:

Explanation: To minimize Electrostatic Discharge (ESD) problems, you should wear a wrist strap when you are working on computer components. A wrist strap is a simple wire with a watchband-style strap at one enA, D clip on the other end. The clip is connected to a common ground or to the piece of equipment being worked on. Answer: B is incorrect. An antiglare screen on the monitor is used to protect the eyes from radiation. Answer: C is incorrect. Wearing synthetic clothes can make the ESD problem worse. Synthetic clothes an transfer ESD charges from your skin when they rub against your clothes and can damage the computer components. It happens when your body or clothes come in contact with computer components. Answer: A is incorrect. A plastic CPU cover cannot decrease the ESD problem. 


Q152. Which of the following methods of filing is best suited for small, low volume facilities? 

A. Filing Cabinets with Drawers 

B. Open Shelf Files 

C. Compressible Units with Open Files 

D. Motorized Revolving Files 

Answer:

Explanation: The best filing method for small, low volume facilities is filing cabinets with drawers. This type of filing allows for patient records to be locked, fireproofed and protected from the environment, however, this method required significant space. Answer: B is incorrect. Open shelf files is incorrect as this method is best for high volume facilities with multiple filing staff to provide security. This option also requires significant floor space. Answer: D is incorrect. Motorized revolving files is best for limited space, low volume facilities with one file clerk. This option allows for patient records to be covered and locked but is expensive to acquire and maintain. Answer: C is incorrect. Compressible units with open files is best for limited space, medium volume facilities with two or three file clerks. This method allows for easy access and saves space. 


Q153. You work as a Network Administrator for McRobert Inc. You plan to configure your Windows Vista computer for Internet access. To achieve this, which of the following communication protocols needs to be bound to the dial-up adapter? 

A. AppleTalk 

B. TCP/IP 

C. NetBEUI 

D. DLC 

Answer:

Explanation: Transmission Control Protocol/Internet Protocol (TCP/IP) is a suite of standard protocols that govern how data passes between networks. It can be used to provide communication between the basic operating systems, on local and wide-area networks (WANs). It is considered the primary protocol of the Internet and the World Wide Web. Answer: C is incorrect. NetBIOS Extended User Interface (NetBEUI) is a Microsoft proprietary protocol. NetBEUI is usually used in single LANs comprising one to two hundred clients. It is a non-routable protocol. NetBEUI was developed by IBM for its LAN Manager product and has been adopted by Microsoft for its Windows NT, LAN Manager, and Windows for Workgroups products. Answer: D is incorrect. Data link control (DLC) is a non-routable protocol. It provides connection and communication between computers using Microsoft operating systems and mainframe computers. Multiple connections to different IBM hosts and AS/400 computers can be established using the DLC protocol. Answer: A is incorrect. AppleTalk is Apple's proprietary protocol suite for Macintosh network communications. It uses services built into the operating system to provide a multilayer, peer-to-peer architecture. It has very limited support on other platforms. 


Q154. Your responsibility as healthcare information technologist is to ensure the billing and accounting practices of the facility are performed in the most efficient manner. Which of the following types of information technology are you responsible for? 

A. Clinical IT 

B. Infrastructure IT 

C. Financial IT 

D. Administrative IT 

Answer:

Explanation: Applications of financial information technology are used to improve the efficiency of billing and accounting practices. Answer: D is incorrect. Administrative IT is incorrect as these applications are used to make staff scheduling, patient registration and payroll procedures more efficient. Answer: A is incorrect. Clinical IT is incorrect as these applications are used for prescription of drugs and ordering of laboratory tests and medical procedures. Answer: B is incorrect. Infrastructure IT is incorrect as these applications support the infrastructure of the health care facility. These applications include voice recognition for medical records and medical transcription as well as bar coding applications for medical devices and drugs. 


Q155. Which of the following is used to query a relational database management system (RDBMS)? 

A. ASP 

B. SQL 

C. HTML 

D. CGI 

Answer:

Explanation: SQL stands for Structured Query Language. It is used for requesting information from a database. It also contains statements for inserting, updating, and administering data and objects in a database. SQL is a non-procedural language. In non-procedural languages, a user instructs a computer to compute the desired result and the language compiler itself decides the best sequence of operations to compute it. Whereas in procedural languages, such as C, a user is required to instruct a computer to perform a sequence of operations on a database for computing the desired result. In 1986, ANSI approved a rudimentary version of SQL as the official standard, but most versions of SQL since then have included many extensions to the ANSI standard. The SQL standard was revised in 1991 by ANSI. Most of the relational database management systems support SQL. Answer: A is incorrect. Active Server Pages (ASP) is Microsoft's open application environment in which HTML pages, scripts, and ActiveX components are combined to create Web-based applications. ASP is used as a server-side scripting language. Answer: C is incorrect. HTML stands for Hypertext Markup Language. It is a set of markup symbols or codes used to create Web pages and define formatting specifications. The markup tells the Web browser how to display the content of the Web page. Answer: D is incorrect. The Common Gateway Interface (CGI) specification is used for creating executable programs that run on a Web server. CGI defines the communication link between a Web server and Web applications. It gives a network or Internet resource access to specific programs. For example, when users submit an HTML form on a Web site, CGI is used to pass this information to a remote application for processing, and retrieve the results from the application. It then returns these results to the user by means of an HTML page. 


Up to date HIT-001 exam price:

Q156. Your customer wants to make sure that only computers he has authorized can get on his Wi-Fi. What is the most appropriate security measure you can recommend? 

A. Mac filtering 

B. A firewall 

C. WPA encryption 

D. WEP encryption 

Answer:

Explanation: Mac filtering only allows computers that have their MAC address listed with the router to connect. 


Q157. As a healthcare information technologist, there are standards in which you must abide by for managing and integrating electronic healthcare information. Which of the following is responsible for instituting those standards? 

A. HIPPA 

B. EMTALA 

C. Health Level 7 

D. DICOM 

Answer:

Explanation: Health Level 7 (HL7) is an international community of healthcare subject matter experts and information scientists collaborating to create standards for the exchange, management and integration of electronic healthcare information. HL7 promotes the use of such informatics standards within and among healthcare organizations to increase the effectiveness and efficiency of healthcare information delivery for the benefit of all. Answer: D is incorrect. DICOM is incorrect as this term, short for Digital Imaging and Communications in Medicine, refers to the standard of handling, storing, printing and transmitting information in medical imaging. Answer: B is incorrect. EMTALA is incorrect as this legislation legally obligates health care facilities to provide emergent care regardless of citizenship, legal status or ability to pay. Answer: A is incorrect. HIPPA is incorrect as this is the legislation designed to insure the privacy and security of personal health information. 


Q158. On which of the following factors does the capacity of an access point depend?Each correct answer represents a complete solution. Choose all that apply. 

A. Channel reuse 

B. Co-location 

C. Number of users 

D. Software applications 

Answer: CD 

Explanation: The capacity of an access point is the maximum number of users the access point can service effectively, offering the best performance. The capacity depends on several factors including the following. Software applications in use. Applications that are more bandwidth-intensive reduces the capacity of the access point. Desired throughput or performance and number of users. A large number of bandwidth-intensive application users connected to an access point will cause poor performance. Therefore, limiting the capacity of an access point to a certain number of users will give the connected users the best performance. Answer: A, B are incorrect. The capacity of an access point does not depend on channel reuse or co-location. Channel reuse and co-location is a method of using non-overlapping channels in such a way that the overlapping cells are on different RF channels. Channel reuse is done by mapping out the access points on a floor plan and verifying that the RF cells propagated by the access points do not overlap on the same RF channels. This type of channel plan can be done manually or with site survey software applications. The figure given below shows the co-location of access points with proper channel reuse. In the figure, overlapping areas use different channels to prevent interference. 


Q159. Which of the following is software that gathers information about a user and violates the user's personal security? 

A. Spamware 

B. Spyware 

C. Adware 

D. Malware 

Answer:

Explanation: Spyware is software that gathers information about a user without his knowledge. Spyware can get into a computer when the user downloads software from the Internet. Spyware can search the contents of a hard disk, address book of an e-mail, or any information about the computer, and transmits the information to the advertisers or other interested parties. Answer: C is incorrect. Adware is software that automatically downloads and display advertisements in the Web browser without user permission. When a user visits a site or downloads software, sometimes a hidden adware software is also downloaded to display advertisement automatically. This can be quite irritating to user. Some adware can also be spyware. Answer: A is incorrect. Spamware is software designed by or for spammers to send out automated spam e-mail. Spamware is used to search for e-mail addresses to build lists of e-mail addresses to be used either for spamming directly or to be sold to spammers. The spamware package also includes an e-mail harvesting tool. Answer: D is incorrect. Malware is a software that is designed to damage or corrupt a system such as a Trojan horse, virus or worm. 


Q160. Which of the following statements about SD cards are true? Each correct answer represents a complete solution. Choose two. 

A. It is used as RAM on client computers and servers. 

B. It is a type of non-volatile memory card. 

C. It is a 184-pin memory module. 

D. It is used with mobile phones and digital cameras. 

Answer: BD 

Explanation: Secure Digital (SD) card is a non-volatile memory card format used in portable devices such as mobile phones, digital cameras, and handheld computers. SD cards are based on the older MultiMediaCard (MMC) format, but they are a little thicker than MMC cards. Generally an SD card offers a write-protect switch on its side. SD cards generally measure 32 mm x 24 mm x 

2.1 mm, but they can be as thin as 1.4 mm. The devices that have SD card slots can use the thinner MMC cards, but the standard SD cards will not fit into the thinner MMC slots. Some SD cards are also available with a USB connector. SD card readers allow SD cards to be accessed via many connectivity ports such as USB, FireWire, and the common parallel port. Answer: A is incorrect. SD cards cannot be used as RAM. Answer: C is incorrect. Rambus Inline Memory Module (RIMM) is a type of memory that has 184 pins. It was developed by Rambus, Intel, and Kingston. This module only supports Rambus memory and fits on its own slot.