Test your basic knowledge |

Comptia A + Certification

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A computer circuit board that attaches to and controls SCSI devices.






2. A RAM standard that replaces the original DDR2 standard and requires far less power - while providing almost twice the bandwidth. A stick of DDR3 SDRAM has 240 pins - but is keyed so it will not fit into a socket designed for DDR2. DDR3 SO-DIMMs have






3. A variety of persuasion techniques used for many purposes






4. In reference to IDE PATA drives - the master drive on the first channel.






5. RAM that doubles the rate of speed at which a standard SDRAM can process data. Also called DDR and DDR1. A stick of DDR1 SDRAM has 184 pins.






6. The original digital versatile disc (DVD) encoding format used for movies sold at retail.






7. A part of the NTFS file system used to store a transaction-based database - with all file accesses treated as transactions - and if a transaction is not complete - NTFS will roll back to the last successful transaction.






8. Client software for browsing and accessing the content on the World Wide Web. Examples include Internet Explorer and Firefox.






9. Aka KVM switch.






10. Aka capture card.






11. A registry key that exists within another key.






12. In fiber-optics - a single light wave passing down a cable.






13. Two or more disks working together in one of the several RAID schemes.






14. Memory locations within a CPU that is used as a scratch pad for calculations. Modern CPUs have dedicated registers for specific functions and general-purpose registers for multiple purposes.






15. In an IP packet - a value field that shows how many routers the packet can cross before being discarded.






16. The primary control device for a computer system. The CPU is simply a chip containing a set of components that manages all the activities. Also called a processor.






17. A utility that provides remote terminal emulation for connecting to computers and network devices running server software that can respond - without needing to be concerned with the actual operating system running on either system.






18. In the laser printing process - the step at which the heat-sensitive toner is fused to the paper by heated fusing rollers.






19. The second version of the IEEE 1394 standard; it supports speeds up to 3.2 Gbps and distances of up to 100 meters.






20. Aka Internet service provider.






21. A subprotocol of TCP/IP used for connectionless communications in which each packet is sent without establishing a connection.






22. The protocol used to allow client computers to pick up e-mail from mail servers. The current version is POP3.






23. A small device containing a microchip used to generate unique passwords for logging on to a computer or a network.






24. The amount of time it takes a packet to travel from one point to another.






25. In an IP configuration - the address of the local router that acts as a gateway from the local network to other IP networks.






26. Aka digitizing tablet.






27. The appropriate responses that you make during a conversation.






28. A depressed area on an optical disc that is alternated with raised areas to be interpreted as data.






29. An early PC hard drive interface.






30. Digital versatile disc (DVD) discs that can be rewritten to - and data can also be overwritten. This standard is newer than DVD-RW. This term also refers to the drives that can write to these discs.






31. Aka second-level domain.






32. This attack occurs when a massive number (up to hundreds of thousands) of computers send DoS attacks to a server - making it unavailable.






33. A utility for migrating data from many computers - or if you need to perform what Microsoft calls a "wipe-and-load migration" from and to the same computer. Available in Windows XP - Vista - and Windows 7.






34. A user interface that takes advantage of the video system's graphics capabilities for manipulated graphic elements that represent objects and tasks.






35. A version of the FAT file system used by MS-DOS for hard drives - using a 16-bit file allocation table.






36. A setting on an LCD display that adjusts the viewable area of the display horizontally.






37. A cooling fan mounted directly on the case - as opposed to a power supply fan - which is inside the power supply.






38. The first physical sector on a hard disk - which contains the initial boot program that the BIOS loads into memory during bootup. It also contains the partition table.






39. A virus that gains access to a computer by masquerading as a harmless program that a user innocently installs on the computer.






40. In reference to a memory module - how much information the processor can access from or write to memory in a single cycle.






41. A power supply that only accepts one input power voltage.






42. A network that covers a relatively small area - such as a building - home - office - or campus. The typical distances are measured in hundreds of meters.






43. In Windows Vista - a vertical bar found by default on the right side of the desktop. Here - you will find gadgets and mini-programs.






44. Aka Hypertext Transfer Protocol (HTTP).






45. A software fix for a single problem.






46. A specialized device for testing a power supply unit that comes with connectors compatible with the output connectors on a standard power supply.






47. An improved version of WPA that does not support older network cards and offers both secure authentication and data encryption. It uses EAP for a variety of authentication methods






48. Threats that are not truly malicious code - but can have indirect negative effects - such as decreasing performance or using up bandwidth. Grayware includes spyware - adware - spam - and spim.






49. One or more lights (usually LEDs) on a device that indicate the device's operational status through the color of the light - by blinking or remaining steady or both.






50. Aka single inline memory module.