Test your basic knowledge |

Comptia A + Certification

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A firewall service that inspects (or filters) each packet that enters or leaves the network - applying a set of security rules defined by a network administrator - and not allowing packets that fail inspection to pass between networks.






2. A part of the NTFS file system used to store a transaction-based database - with all file accesses treated as transactions - and if a transaction is not complete - NTFS will roll back to the last successful transaction.






3. In a Wi-Fi network - the networking mode that allows peer-to-peer communications without the use of a centralized wireless hub - called a wireless access point (WAP).






4. A group of schemes designed to provide either better performance or improved data reliability through redundancy.






5. A single-sided - double-layer digital versatile disc (DVD) that stores 8.54 GB of data - or over four hours of video.






6. The oldest of the Wi-Fi encryption standards. It uses 64- or 128-bit encryption that is easily broken. It does not encrypt the actual data in a packet - and it does not perform user authentication on a packet.






7. A special-purpose computer designed for a certain task and installed within a device.






8. The type of electrical current delivered by a battery in which the electrons flow in only one direction.






9. Aka Compact Disc-Read-Only Memory.






10. Aka lithium-ion (Li-ion) battery.






11. In computer networking - a network located between a private network and the Internet with a firewall on both sides. A DMZ contains servers offering services to users on the Internet and inside the protected private network.






12. A plastic card - often the size of a credit card - that contains a microchip. The microchip can store information and perform functions - depending on the type of smart card. Some smart cards only store data - whereas others may have a variety of fun






13. Aka microcode.






14. Aka video graphics array.






15. A service on a laptop that configures a card after socket services has recognized it.






16. A device that converts digital signals from the broadband connection to voice for the analog phone and the analog voice signals to digital signals for the digital network.






17. The Internet service that manages access to Internet domain names and the naming system it uses for computers and resources connected to the Internet or in a private network.






18. Aka IEEE 1394.






19. The practice of applying a digital signature to device driver code.






20. An assigned address or range of addresses on a system's address bus that - together with an interrupt request line (IRQ) - allows a device to be recognized by the processor.






21. On a Microsoft Windows network - a resource - such as a file folder or printer - that is available on the network.






22. A CPU component that manages the CPU cache.






23. An improved version of WPA that does not support older network cards and offers both secure authentication and data encryption. It uses EAP for a variety of authentication methods






24. To renew a product activation - required when the activation program discovers significant changes in a computer or the activated product has been installed on a second computer.






25. Aka virtual file allocation table.






26. An early method for addressing the disparity between the drive geometry supported by PC BIOSs and the physical geometry of drives.






27. A multi-GPU solution developed by NVIDIA.






28. A component of the Windows operating system that resides in a file and is loaded into memory during the kernel loading phase of the Windows startup.






29. A security feature of many Windows versions that allows it to encrypt files on an NTFS volume.






30. A special substance - also called thermal paste or heat sink compound - that increases the heat conductivity between a fan or heat sink and a chip.






31. A private internetwork.






32. Cabling that contains a single copper wire surrounded by several layers of insulating plastic and a woven wire sheath that provides protection.






33. Aka low-voltage differential signaling (LVDS).






34. In an operating system GUI - a tiny graphic representing an application - folder - disk - menu item - or other entity.






35. A protocol for computer-to-computer (host-to-host) transfer of files over a TCP/IP network - regardless of the operating system in use.






36. A wireless network standard that uses the 5 GHz band.






37. Things used for authentication - such as something you know - something you have - or something you are. Authentication involves one or more of these factors and can - therefore - be one-factor - two-factor - or three-factor authentication.






38. At first - a terminal was not much more than a display - a keyboard - and the minimal circuitry for connecting to the mainframe. Now - a terminal can be a computer running Windows or other operating system - plus terminal client emulation software th






39. Aka communication network riser.






40. The amount of time it takes a packet to travel from one point to another.






41. Both the connectors on the RDRAM memory modules and the motherboard sockets (or slots) that match them.






42. A type of power supply that converts AC power to voltages needed for a device. AC adapters are generally used for portable PC systems and other devices.






43. A technical standards organization.






44. The cellular network standards used by Verizon and Sprint-Nextel.






45. Aka v-hold.






46. In a CPU - special memory that resides outside the CPU's core and is used to temporarily store instructions and data in order to increase the processing speed. Also called Level 2 (L2) cache and Level 3 (L3) cache - depending on the design of the CPU






47. A standard for interconnecting electronic musical instruments to communicate with computers and among themselves.






48. A disc designed to store all types of data usable by a computer. This term also refers to the drives that read and write to these discs. There are various types of DVD drives and media.






49. A laptop is a small - easily transported computer - generally weighing less than 7 pounds and with roughly the same dimensions as a 1- to 2-inch-thick stack of magazines. Laptops computers have an all-in-one layout in which the keyboard - and often t






50. A strap designed to discharge static electricity from your body. One end attaches to the wrist - whereas the other end attaches to a grounded object.