Chapter 5 Key Terms Flashcards

Learn the definitions of the Key Terms used within the Healthcare and IT world

1
Q

Active Directory (AD)

A

The Microsoft database managed by the domain controller that system administrator use to control access to the Windows domain. Active directory contains information about users, groups of users, computers on the domain, organizational units, and configuration data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Active Server Pages (ASP or ASP.NET)

A

A server-side, HTPL-embedded scripting language used to create dynamic web pages. ASP is provided by Microsoft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ad Hoc

A

A network that is wireless, decentralized, temporary, and a peer-to-peer connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Adobe Flash

A

A plug-in or add-on to a browser used to add multimedia graphics to web pages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Advanced Encryption Standard (AES)

A

An encryption cipher that uses a block of length of 128 bits. The National Institute of Standards and Technology (NIST) adopted AES as an encryption standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Application Program Interface (API)

A

A segment of programming code that can be used by many programs. An API can be a routine, protocol, or tool used to build a software application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Application Server Provider (ASP)

A

A vendor that offers an IS provided remotely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Barcode Scanner

A

Is mainly used for inventory of medicines and to confirm a patient’s identity before administering medication. They can also be used to track test specimens, surgical tool sterilization, or many other uses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bluetooth

A

A wireless communication protocol used to connect personal devices over a short distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Card or Badge Scanner

A

A device used for security and convenience that scans a card or badge to transfer data or detect identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Client-Server Architecture

A

A network architecture in which client computers rely on services or resources provided by a server computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cloud Computing

A

Applications and data stored on remote computers on the Intranet made available through a browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Default Gateway

A

The IP address of a router that should receive all request for communication with computers outside the local network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Disk Image

A

The contents of a hard drive including configuration settings and applications stored so the contents can be replicated to another computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Document Scanner

A

A device used to scan paper documents into an electronic image or document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Domain Controller

A

The server that administers the user account information, authenticates usernames and passwords, and enforces security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Domain Name Service (DNS)

A

A service that resolves domain names into IP address that the network uses to reach the correct computer on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Dynamic Host Configuration Protocol (DHCP)

A

The service running on a router or other network device that automatically assigns an IP address to a computer or device when it joins the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Dynamic IP Address

A

The service running on a router or other network device that automatically assigns an IP address to a computer or device when it joins the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Extensible Markup Language (XML)

A

A makeup language used to write a new markup language. Using XML, you can create your own HTML tags

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Fiber Optic

A

Strings of glass or plastic in a cable where data is sent as pulses of light, also called fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

File Transfer protocol (FTP)

A

A method to communicate over a network electronically. This communication method enables documents to be placed on and copied from a remote server. FTP is great for sharing large files with other people who also have access to the FTP server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Hot Swappable

A

A device or piece of equipment that does not require a reboot to establish a connection a function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Hypertext Markup Language (HTML)

A

A common markup language used for developing web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Hypertext Preprocessor (PHP)

A

An open source, server-side, HTML embedded scripting language used to create dynamic web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Hypertext Transfer Protocol (HTTP)

A

An application protocol that defines how data is sent to and from the web server on the web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Hypertext Transfer Protocol Secure (HTTPS)

A

A secure version of HTTP that encrypts data sent to and from web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

IEEE 1394

A

A standard for hot-swappable port generally used for transferring multimedia data, also called Firewire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Infrastructure

A

A centralized network. Devices connect to an access point to join the network

30
Q

Infrastructure as a Service (IaaS)

A

A service that host hardware remotely needed for cloud computing. Organizations are allowed to use the hardware to host operating systems and software belonging to the organization

31
Q

Internet Modem

A

A device used to convert the signal from the ISP to Ethernet used by the router and local network

32
Q

Internet Protocol (IP)

A

A protocol used in TCP/IP networks at the network layer of the OSI model. IP is responsible for finding the best path to a destination and breaking down messages into packets small enough to travel through the network and reassembling the packets when received

33
Q

Internet Service Provider (ISP)

A

An organization that provides access to the Internet

34
Q

Intranet

A

The private network is secured within a facility. All intranets use TCP/IP suite of protocols also used on the Internet

35
Q

IP Address

A

The address used to identify a computer or other device on a TCP/IP network. A TCP/IP version 4 IP address has 32 bits, and a TCP/IP version 6 address has 128 bits

36
Q

Ipconfig

A

A command used in the command prompt window to display the TCP/IP network configuration values

37
Q

Local Area Network (LAN)

A

A small network of computers or other connected devices covering a small area as a home, business, school, or airport

38
Q

Mainframe

A

Mainframe

39
Q

Network Address Translation (NAT)

A

A router or other gateway device substitutes its own IP address for the IP address of computers behind a firewall that it is protecting

40
Q

Open Systems Interconnection Model (OSI Model)

A

A description of all communication on a network expressed as seven layers

41
Q

Parallel Communication

A

A process of sending data several bits at a time through several streams simultaneously

42
Q

Ping

A

A command used in the command prompt window to send a request to another device to find out if the two devices can communicate on the network

43
Q

Platform as a Service (PaaS)

A

A service that host hardware and operating systems remotely need for cloud computing. Organizations are allowed to use the hardware and operating system to host the software belonging to the organization

44
Q

Port

A

A number assigned to a client or server application that the serves as an address to the application, which the OS uses to get network communication to the correct application. Common ports assignments are designated by TCP/IP, also called a number or port address

45
Q

Port Forwarding

A

Communication from outside the network is allowed past the firewall only to a specific computer and port

46
Q

Print Server

A

A server that connects computers and other devices on a network with printers on the same network, also called printer server

47
Q

Remote Authentication Dial in User Services (RADIUS)

A

A protocol and system used to authenticate access to a network. User passwords to the network are sent over the network encrypted using the RADIUS encryption standard

48
Q

Remote Desktop Protocol (RDP)

A

A protocol developed by Microsoft and used with the Remote Desktop Connection utility that allows a user to connect to a remote computer over a network

49
Q

Router

A

A network device that separates one network from another. The router logically and physically belongs to both networks

50
Q

Serial Communication

A

A process of sending data one bit at a time through a single stream

51
Q

Service Set Identifier (SSID)

A

The name assigned to a wireless access point

52
Q

Signature Pad

A

A device used to transfer written signatures into an electronic image

53
Q

Small Computer System Interface (SCSI)

A

A standard for hot-swappable ports and storage devices that use these ports. SCSI connections are usually found on servers and are used by hard drives and optical ports

54
Q

Software-as-a-Service (SaaS)

A

A software delivery method where the hardware hosting the software is housed remotely and organizations are allowed to access the software and the functions as a web-based service

55
Q

Static IP Address

A

An IP address manually assigned to a computer or device. A static IP address does not change automatically

56
Q

Structured Query Language (SQL)

A

A programming language used to manage data stored in databases

57
Q

Subnet Mask

A

A series of 1s and 0s that determine which part of an IP address identifies the local network and which part identifies the host

58
Q

Switch

A

A device with multiple network ports for connecting devices such as computers, printers, or servers

59
Q

T-Line

A

A type of data transmission technology that uses fiber optic cabling. A T1-line transmits up to 1.544 mbps (megabits per second). A T3-line transmits up to 45 mbps

60
Q

TCP /IP

A

A suite of protocols used for communication on the Internet or an intranet

61
Q

Terminal Services

A

Applications or even the entire desktop are made available to a user from a remote server. Only user interaction is presented at the client machine and all other processing takes place at the server, also called remote desktop services

62
Q

Tracert

A

The trace route command is used to trace the path a connection takes to reach a target host

63
Q

Transmission control Protocol (TCP)

A

A protocol used in TCP/IP networks at the transport layer of the OSI model. TCP is responsible for guaranteeing data is received and in the correct order

64
Q

Universal Serial Bus (USB)

A

A standard for a hot-swappable port. USB standard 2.0 (Hi-Speed USB) is approximately 40 times faster than the original USB. USB standard 3.0 (SuperSpeed USB) is approximately 10 times faster than USB 2.0

65
Q

Virtualization

A

One physical machine host multiple activities normally implemented on individual machines

66
Q

Virus Definitions

A

The unique identifiers of a computer virus that antivirus software uses to detect threats and eliminate them, also called virus signature

67
Q

Wide Area Network (WAN)

A

A network that covers a large area. WANs are used to connect networks together such when facilities of doctor’s offices connect to the Internet

68
Q

Wi-Fi Protected Access (WPA)

A

A security protocol used on a wireless LAN that uses TKIP for encryption

69
Q

Wi-Fi Protected Access 2 (WPA2)

A

A security protocol used on a wireless LAN that uses AES for encryption. WPA2 is currently the preferred encryption standard for a wireless LAN

70
Q

Wired Equivalent Privacy (WEP)

A

A security protocol used on a wireless LAN that uses TKIP for encryption

71
Q

Wireless Access Point (WAP or AP)

A

A device that enables a wireless computer, printer, or other device to connect to a network

72
Q

Wireless Fidelity (Wi-Fi)

A

The wireless standards used for local networks as defined by the IEEE 802.11 specifications