- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
Learn, prepare, and practice for CompTIA Healthcare IT Technician HIT-001 exam success with this CompTIA Approved Cert Guide from Pearson IT Certification, a leader in IT Certification learning and a CompTIA Approved Platinum Partner. Limited Time Offer: Buy CompTIA Healthcare IT Technician HIT-001Cert Guide and receive a 10% off discount code for the CompTIA Healthcare IT Technician HIT-001 exam. To receive your 10% off discount code: 1. Register your product at pearsonITcertification.com/register2. Follow the instructions 3. Go to your Account page and click on "Access Bonus Content"This study guide helps you master all the topics on the new Healthcare IT Technician HIT-001 exam, includingHealthcare IT roles and trends Standards agencies, laws, and regulations HIPAA controls and compliance Record retention, disposal, and archiving Comprehensive coverage of health IT security EHR/EMR access roles and responsibilities Setup and troubleshooting for EHR/EMR PCs, servers, and networks Legal best practices, requirements, and documentationIn this best-of-breed study guide, two leading experts bring together all the knowledge, preparation hints, and test-taking tips you'll need to succeed on your CompTIA HIT-001 exam, and transition into a successful Healthcare IT career. Their concise, focused approach explains each exam objective from a practical, real-world perspective, helping you quickly identify weaknesses, strengthen conceptual understanding and hands-on skills, and retain everything you'll need to know. Every feature of this book is designed to support both efficient exam preparation and long-term mastery:Opening Topics Lists define the topics you'll need to learn in each chapter, with numbering linked directly to official exam objectives Concise Tables and Figures bring together knowledge in an easy-to-use format Exam Tips call attention to the information that's most crucial to know for the exam Notes provide deeper context and links to additional information Key Terms definitions and a complete glossary explain all of the field's essential terminology HIT in the Real World stories link concepts to real HIT work environments Chapter Summaries help you quickly review every key topic Acronym Drills reinforce learning of important acronyms Review Quizzes help you gauge your knowledge; all answers are provided and explained at the end of the book Practical Application critical thinking questions deepen your understandingThe companion CD contains the powerful Pearson IT Certification Practice Test Engine, complete with access to a large library of exam-realistic questions. This state-of-the-art assessment engine offers you a wealth of customization options and reporting features to help you study more efficiently! Use step-by-step Study Mode or run a powerful simulation that mimics actual exam conditions. Whenever you want, get a complete assessment of your current knowledge, so you can focus scarce study time where you need it most!Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this CompTIA approved study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time.Companion CDThe CD contains two free, complete practice exams, beep codes, memory tables, and a glossary.Includes Exclusive Offer for 70% Off Premium Edition eBook and Practice TestPearson IT Certification Practice Test minimum system requirements:Windows XP (SP3), Windows Vista (SP2), or Windows 7; Microsoft .NET Framework 4.0 Client; Pentium class 1GHz processor (or equivalent); 512 MB RAM; 650 MB disc space plus 50 MB for each downloaded practice exam
Contents
Introduction xxxixChapter 1 Introducing Healthcare IT 2The Importance of the HITECH Act 3Getting to Know Healthcare 5Types of Healthcare Facilities 6Focus on Hospitals 7Departments in the Hospital 8Patient Flow Through a Hospital Stay 9Inpatient Admittance 9Outpatient Admittance 11Emergency Department Patient 12The Goals of Healthcare IT 15Why Have IT in Healthcare? 15Prepare for a Career in Healthcare IT 16Chapter Summary 19The Importance of the HITECH Act 19Getting to Know Healthcare 19Goals of Healthcare IT 20Key Terms 20Acronym Drill 21Review Questions 22Practical Application 23Chapter 2 Introducing Data Flow in HIT 24Learning Support Flow 25Getting to Know Information Systems 27Getting to Know HIS 28Functions of an HIS 29Getting to Know the Interface 33The Message 34The Message Path 36Following the Data Flow 38Three IS Sources of an ADT Message 39HIS-originated ADT Data Flow 39EDIS ADT Data Flow 40Perioperative IS Data Flow 42Data Flow Other Than ADT 44Pharmacy IS Data Flow 44RIS Data Flow 48LIS Data Flow 49EDIS Data Flow 52Chapter Summary 54Learning Support Flow 54Getting to Know Information Systems 54Getting to Know HIS 54Getting to Know the Interface 55Following the Data Flow 55Key Terms 56Acronym Drill 57Review Questions 58Practical Application 60Chapter 3 Regulatory Requirements 64Identifying Standard Agencies, Laws, and Regulations 65Agencies Governing Healthcare 65Department of Health and Human Services 66National Institute of Standards and Technology (NIST) 72Healthcare Programs 74Healthcare Laws 76Health Insurance Portability and Accountability Act (HIPAA) 76American Recovery and Reinvestment Act (ARRA) 77Health Information Technology for Economic and Clinical Health (HITECH) Act 78Regulations of Healthcare Laws 79Learning HIPAA Controls and Compliance Issues 80Learning Rules of Record Retention and Disposal 83Types of Health Records 83Record Retention 85Record Disposal 85Learning Legal Best Practices and Documentation 86Chapter Summary 90Identifying Standard Agencies, Laws, and Regulations 90Learning HIPAA Controls and Compliance Issues 91Learning Rules of Record Retention and Disposal 91Learning Legal Best Practices and Documentation 92Key Terms 92Acronym Drill 93Review Questions 93Practical Application 94Chapter 4 Organizational Behavior 96Handling PHI 97Physical Safeguards 98Technical Safeguards 103Applying Proper Communication Methods 105E-Mail 106IM Versus Secure Chat 106EMR/EHR System 107Fax 108Secure FTP 108Phone 109VoIP 111Identifying EHR/EMR Access Roles and Responsibilities 113Medical and Medical Support Roles 114Technical Roles 119System Administrator 119Security Administrator 120Network Administrator 121Database Administrator 122Desktop Support Technician 123Third-Party Access 123Role-Based Access and Exceptions 124Access Based on Sensitive Patient Data 126Levels of Access and Audit Trails 126Identifying Organizational Structures and Different Methods of Operation 127Hospitals 127Private Practices 129Nursing Homes 130Assisted Living Facilities 130Surgical Centers 131Home Healthcare 131Hospice 131Executing Daily Activities 132Communication 132IT Functions in a Healthcare Environment 133HIT Technician Presence in the Hospital 134Chapter Summary 139Handling PHI 139Applying Proper Communication Methods 139Identifying EHR/EMR Access Roles and Responsibilities 139Identifying Organizational Structures and Different Methods of Operation 141Executing Daily Activities 141Key Terms 142Acronym Drill 144Review Questions 144Practical Application 146Chapter 5 IT Operations 148How the Internet or an Intranet Works 149The OSI Model 151Application, Presentation, and Session Layer Protocols 153Transport and Network Layers 156Data Link and Physical Layers 159Servers on the Network 160Cloud Computing and Virtualization 163Programming Languages 168How a Network Works 172Basic Network Devices and Hardware 175Wireless Access Point 175Router 177Switch 182Internet Modem 183Network Tools 184ipconfig Command 184ping Command 185tracert Command 186Solving Network Problems 188Duplicate IP Address 189Broken Cables and Crosstalk 190Interference with Wireless Networks 190Poor AP Placement 190Lost Connectivity to the ISP 191Power Failure, Blackouts, and Brownouts 191Managing Network Resources 192Locally Hosted or Remote EHR and EMR Information Systems 193Considerations for Servers on a Network 194Security Risks 195High Traffic and Load Balancing 196Hardware and Software Specifications Required by Vendors 196Purging Old Logs 196Maintain Backups and Downtime Procedures 196Configuring a Workstation and Peripherals 198Deploy a Workstation 198Maintain Operating System Updates 203Troubleshoot Common Problems 204Problems with a Mouse 204Problems with a Monitor 205Problems with a Printer 205Power Problems 206Software Patches, Hotfixes, and Updates 206Peripheral Devices 207Mobile Storage 211Flash Drives and External Hard Drives 211DVDs and CDs 212SD Cards 212Tapes 212Mobile Computing Devices 213Chapter Summary 215How the Internet or an Intranet Works 215How a Network Works 215Managing Network Resources 216Configuring a Workstation and Peripherals 216Key Terms 217Acronym Drill 219Review Questions 220Practical Application 224Chapter 6 Medical Business Operations 226Understanding the Clinical Environment 227Medical Terms, Imaging, and Tests 228Medical Terms 228Medical Imaging 232Medical Tests 236Medical Departments 240Clinical Environment 242Supporting Software Used in Healthcare Facilities 245Clinical Software and Modules 246Scheduling Software 246Patient Tracking Software 247Order Entry Software 248Practice Management Software 249Billing and Coding Software 250Tracking and Auditing Software 252Document Imaging 253Medical Images of the Human Body 253Digital Images of Patient Records 255Change Control 256Support Requests 258How a Healthcare Interface Works 259HL7 Message 260Typical Interface Issues 262Chapter Summary 266Understanding the Clinical Environment 266Supporting Software Used in Healthcare Facilities 267How a Healthcare Interface Works 269Key Terms 270Acronym Drill 271Review Questions 272Practical Application 275Chapter 7 Security 280What Are We Up Against? 281Social Engineering 281Electronic Attacks 282Understanding Permission Levels 283Understanding Physical Security 285Location and Access 286Servers 286Network Hardware 287Printers, Scanners, and Copiers 289Accessing Secured Resources 290Environmental Security 293Using Password Best Practices 294Understanding Encryption Types 296Types of Encryption 296Communication 298Storage 299Dissemination of PHI 301How to Secure Wireless Networks 302How to Remotely Access the Facility's Network 303Securing Backups 306Disposing of PHI 307Chapter Summary 310What Are We Up Against? 310Understanding Permission Levels 310Understanding Physical Security 311Using Password Best Practices 311Understanding Encryption Types 312How to Secure Wireless Networks 312How to Remotely Access the Facility's Network 313Securing Backups 313Disposing of PHI 314Key Terms 314Acronym Drill 315Review Questions 317Practical Application 318Appendix A Answers to Acronym Drills, Review Questions, and Practical Application Exercises 320Appendix B CompTIA Healthcare IT Technician ACRONYMS 336Key Terms Glossary 342TOC, 9780789749291, 5/24/2012