CompTIA Healthcare IT Technician HIT-001 Cert Guide - Joy Dark, Jean Andrews

CompTIA Healthcare IT Technician HIT-001 Cert Guide

Joy Dark, Jean Andrews (Autoren)

Media-Kombination
432 Seiten
2012
Pearson IT Certification
978-0-7897-4929-1 (ISBN)
59,95 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Learn, prepare, and practice for CompTIA Healthcare IT Technician HIT-001 exam success with this CompTIA Approved Cert Guide from Pearson IT Certification, a leader in IT Certification learning and a CompTIA Approved Platinum Partner.









Limited Time Offer: Buy CompTIA Healthcare IT Technician HIT-001Cert Guide and receive a 10% off discount code for the CompTIA Healthcare IT Technician HIT-001 exam.  To receive your 10% off discount code:

1. Register your product at pearsonITcertification.com/register

2. Follow the instructions

3. Go to your Account page and click on “Access Bonus Content”






This study guide helps you master all the topics on the new Healthcare IT Technician HIT-001 exam, including



Healthcare IT roles and trends
Standards agencies, laws, and regulations
HIPAA controls and compliance
Record retention, disposal, and archiving
Comprehensive coverage of health IT security
EHR/EMR access roles and responsibilities
Setup and troubleshooting for EHR/EMR PCs, servers, and networks
Legal best practices, requirements, and documentation

In this best-of-breed study guide, two leading experts bring together all the knowledge, preparation hints, and test-taking tips you’ll need to succeed on your CompTIA HIT-001 exam, and transition into a successful Healthcare IT career. Their concise, focused approach explains each exam objective from a practical, real-world perspective, helping you quickly identify weaknesses, strengthen conceptual understanding and hands-on skills, and retain everything you’ll need to know.

 

Every feature of this book is designed to support both efficient exam preparation and long-term mastery:



Opening Topics Lists define the topics you’ll need to learn in each chapter, with numbering linked directly to official exam objectives
Concise Tables and Figures bring together knowledge in an easy-to-use format
Exam Tips call attention to the information that’s most crucial to know for the exam
Notes provide deeper context and links to additional information
Key Terms definitions and a complete glossary explain all of the field’s essential terminology
HIT in the Real World stories link concepts to real HIT work environments
Chapter Summaries help you quickly review every key topic
Acronym Drills reinforce learning of important acronyms
Review Quizzes help you gauge your knowledge; all answers are provided and explained at the end of the book
Practical Application critical thinking questions deepen your understanding

The companion CD contains the powerful Pearson IT Certification Practice Test Engine, complete with access to a large library of exam-realistic questions. This state-of-the-art assessment engine offers you a wealth of customization options and reporting features to help you study more efficiently! Use step-by-step Study Mode or run a powerful simulation that mimics actual exam conditions. Whenever you want, get a complete assessment of your current knowledge, so you can focus scarce study time where you need it most!




Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this CompTIA approved study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time.




Companion CD

The CD contains two free, complete practice exams, beep codes, memory tables, and a glossary.

 

Includes Exclusive Offer for 70% Off Premium Edition eBook and Practice Test

 

Pearson IT Certification Practice Test minimum system requirements:

Windows XP (SP3), Windows Vista (SP2), or Windows 7; Microsoft .NET Framework 4.0 Client; Pentium class 1GHz processor (or equivalent); 512 MB RAM; 650 MB disc space plus 50 MB for each downloaded practice exam

 

Joy Dark has worked in the healthcare IT field in several capacities. She first worked as a help desk technician providing first-level support at a company that supports more than 130 hospitals in 29 states. Later she focused on providing second-level support for clinical information systems, specializing in perioperative information systems and the emergency department information systems. Next she switched gears to become a support operations specialist, helping to design support protocols and structures as well as managing the transition of support when hospitals converted information systems. Now she has authored the CompTIA Healthcare IT Technician HIT-001 Cert Guide and contributes in writing other technical books. Before healthcare IT, Joy was an elementary school teacher in both the United States and in South America. She lives in Dalton, Georgia, with her sister and Doberman dog. She has two sisters who are physicians (anesthesiology and emergency medicine) who have shared plenty of stories, facts, and opinions about the healthcare environment that have helped to shape the content in this book.   Jean Andrews, Ph.D., has more than 30 years of experience in the computer industry, including more than 13 years in the college classroom. She has worked in a wide variety of businesses and corporations designing, writing, and supporting applications software; managing a PC repair help desk; and troubleshooting wide area networks. She has written a variety of books on software, hardware, and the Internet. She lives in northeast Georgia.

Introduction xxxix

Chapter 1 Introducing Healthcare IT 2

    The Importance of the HITECH Act 3

    Getting to Know Healthcare 5

        Types of Healthcare Facilities 6

        Focus on Hospitals 7

        Departments in the Hospital 8

        Patient Flow Through a Hospital Stay 9

        Inpatient Admittance 9

        Outpatient Admittance 11

        Emergency Department Patient 12

    The Goals of Healthcare IT 15

        Why Have IT in Healthcare? 15

        Prepare for a Career in Healthcare IT 16

    Chapter Summary 19

        The Importance of the HITECH Act 19

        Getting to Know Healthcare 19

        Goals of Healthcare IT 20

    Key Terms 20

    Acronym Drill 21

    Review Questions 22

    Practical Application 23

Chapter 2 Introducing Data Flow in HIT 24

    Learning Support Flow 25

    Getting to Know Information Systems 27

    Getting to Know HIS 28

        Functions of an HIS 29

    Getting to Know the Interface 33

        The Message 34

        The Message Path 36

    Following the Data Flow 38

        Three IS Sources of an ADT Message 39

        HIS-originated ADT Data Flow 39

        EDIS ADT Data Flow 40

        Perioperative IS Data Flow 42

        Data Flow Other Than ADT 44

        Pharmacy IS Data Flow 44

        RIS Data Flow 48

        LIS Data Flow 49

        EDIS Data Flow 52

    Chapter Summary 54

        Learning Support Flow 54

        Getting to Know Information Systems 54

        Getting to Know HIS 54

        Getting to Know the Interface 55

        Following the Data Flow 55

    Key Terms 56

    Acronym Drill 57

    Review Questions 58

    Practical Application 60

Chapter 3 Regulatory Requirements 64

    Identifying Standard Agencies, Laws, and Regulations 65

        Agencies Governing Healthcare 65

        Department of Health and Human Services 66

        National Institute of Standards and Technology (NIST) 72

        Healthcare Programs 74

        Healthcare Laws 76

        Health Insurance Portability and Accountability Act (HIPAA) 76

        American Recovery and Reinvestment Act (ARRA) 77

        Health Information Technology for Economic and Clinical Health (HITECH) Act 78

        Regulations of Healthcare Laws 79

    Learning HIPAA Controls and Compliance Issues 80

    Learning Rules of Record Retention and Disposal 83

        Types of Health Records 83

        Record Retention 85

        Record Disposal 85

    Learning Legal Best Practices and Documentation 86

    Chapter Summary 90

        Identifying Standard Agencies, Laws, and Regulations 90

        Learning HIPAA Controls and Compliance Issues 91

        Learning Rules of Record Retention and Disposal 91

        Learning Legal Best Practices and Documentation 92

    Key Terms 92

    Acronym Drill 93

    Review Questions 93

    Practical Application 94

Chapter 4 Organizational Behavior 96

    Handling PHI 97

        Physical Safeguards 98

        Technical Safeguards 103

    Applying Proper Communication Methods 105

        E-Mail 106

        IM Versus Secure Chat 106

        EMR/EHR System 107

        Fax 108

        Secure FTP 108

        Phone 109

        VoIP 111

    Identifying EHR/EMR Access Roles and Responsibilities 113

        Medical and Medical Support Roles 114

        Technical Roles 119

        System Administrator 119

        Security Administrator 120

        Network Administrator 121

        Database Administrator 122

        Desktop Support Technician 123

        Third-Party Access 123

        Role-Based Access and Exceptions 124

        Access Based on Sensitive Patient Data 126

        Levels of Access and Audit Trails 126

    Identifying Organizational Structures and Different Methods of Operation 127

        Hospitals 127

        Private Practices 129

        Nursing Homes 130

        Assisted Living Facilities 130

        Surgical Centers 131

        Home Healthcare 131

        Hospice 131

    Executing Daily Activities 132

        Communication 132

        IT Functions in a Healthcare Environment 133

        HIT Technician Presence in the Hospital 134

    Chapter Summary 139

        Handling PHI 139

        Applying Proper Communication Methods 139

        Identifying EHR/EMR Access Roles and Responsibilities 139

        Identifying Organizational Structures and Different Methods of Operation 141

        Executing Daily Activities 141

    Key Terms 142

    Acronym Drill 144

    Review Questions 144

    Practical Application 146

Chapter 5 IT Operations 148

    How the Internet or an Intranet Works 149

        The OSI Model 151

        Application, Presentation, and Session Layer Protocols 153

        Transport and Network Layers 156

        Data Link and Physical Layers 159

        Servers on the Network 160

        Cloud Computing and Virtualization 163

        Programming Languages 168

    How a Network Works 172

        Basic Network Devices and Hardware 175

        Wireless Access Point 175

        Router 177

        Switch 182

        Internet Modem 183

        Network Tools 184

        ipconfig Command 184

        ping Command 185

        tracert Command 186

        Solving Network Problems 188

        Duplicate IP Address 189

        Broken Cables and Crosstalk 190

        Interference with Wireless Networks 190

        Poor AP Placement 190

        Lost Connectivity to the ISP 191

        Power Failure, Blackouts, and Brownouts 191

    Managing Network Resources 192

        Locally Hosted or Remote EHR and EMR Information Systems 193

        Considerations for Servers on a Network 194

        Security Risks 195

        High Traffic and Load Balancing 196

        Hardware and Software Specifications Required by Vendors 196

        Purging Old Logs 196

        Maintain Backups and Downtime Procedures 196

    Configuring a Workstation and Peripherals 198

        Deploy a Workstation 198

        Maintain Operating System Updates 203

        Troubleshoot Common Problems 204

        Problems with a Mouse 204

        Problems with a Monitor 205

        Problems with a Printer 205

        Power Problems 206

        Software Patches, Hotfixes, and Updates 206

        Peripheral Devices 207

        Mobile Storage 211

        Flash Drives and External Hard Drives 211

        DVDs and CDs 212

        SD Cards 212

        Tapes 212

        Mobile Computing Devices 213

    Chapter Summary 215

        How the Internet or an Intranet Works 215

        How a Network Works 215

        Managing Network Resources 216

        Configuring a Workstation and Peripherals 216

    Key Terms 217

    Acronym Drill 219

    Review Questions 220

    Practical Application 224

Chapter 6 Medical Business Operations 226

    Understanding the Clinical Environment 227

        Medical Terms, Imaging, and Tests 228

        Medical Terms 228

        Medical Imaging 232

        Medical Tests 236

        Medical Departments 240

        Clinical Environment 242

    Supporting Software Used in Healthcare Facilities 245

        Clinical Software and Modules 246

        Scheduling Software 246

        Patient Tracking Software 247

        Order Entry Software 248

        Practice Management Software 249

        Billing and Coding Software 250

        Tracking and Auditing Software 252

        Document Imaging 253

        Medical Images of the Human Body 253

        Digital Images of Patient Records 255

        Change Control 256

        Support Requests 258

    How a Healthcare Interface Works 259

        HL7 Message 260

        Typical Interface Issues 262

    Chapter Summary 266

        Understanding the Clinical Environment 266

        Supporting Software Used in Healthcare Facilities 267

        How a Healthcare Interface Works 269

    Key Terms 270

    Acronym Drill 271

    Review Questions 272

    Practical Application 275

Chapter 7 Security 280

    What Are We Up Against? 281

        Social Engineering 281

        Electronic Attacks 282

    Understanding Permission Levels 283

    Understanding Physical Security 285

        Location and Access 286

        Servers 286

        Network Hardware 287

        Printers, Scanners, and Copiers 289

        Accessing Secured Resources 290

        Environmental Security 293

    Using Password Best Practices 294

    Understanding Encryption Types 296

        Types of Encryption 296

        Communication 298

        Storage 299

        Dissemination of PHI 301

    How to Secure Wireless Networks 302

    How to Remotely Access the Facility’s Network 303

    Securing Backups 306

    Disposing of PHI 307

    Chapter Summary 310

        What Are We Up Against? 310

        Understanding Permission Levels 310

        Understanding Physical Security 311

        Using Password Best Practices 311

        Understanding Encryption Types 312

        How to Secure Wireless Networks 312

        How to Remotely Access the Facility’s Network 313

        Securing Backups 313

        Disposing of PHI 314

    Key Terms 314

    Acronym Drill 315

    Review Questions 317

    Practical Application 318

Appendix A Answers to Acronym Drills, Review Questions, and Practical Application Exercises 320

Appendix B CompTIA Healthcare IT Technician ACRONYMS 336

Key Terms Glossary 342

TOC, 9780789749291, 5/24/2012

 

Erscheint lt. Verlag 5.7.2012
Verlagsort Upper Saddle River
Sprache englisch
Maße 192 x 240 mm
Gewicht 1046 g
Themenwelt Informatik Weitere Themen Hardware
Informatik Weitere Themen Zertifizierung
ISBN-10 0-7897-4929-7 / 0789749297
ISBN-13 978-0-7897-4929-1 / 9780789749291
Zustand Neuware
Haben Sie eine Frage zum Produkt?