Test your basic knowledge |

Comptia A + Certification

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A network connection device that passes traffic between two networks - using the physical address (MAC address) of the destination device.






2. Aka denial of service (DoS) attack.






3. A network in which dedicated computers called servers store data and provide print services or other capabilities to computers running the appropriate client service or services.






4. A cooling system that uses liquid to transfer heat away from components.






5. A generic term for a collection of information on known malware (not just viruses).






6. Aka zero insertion force (ZIF) socket.






7. A power supply form factor that pairs with an ATX motherboard and case.






8. An interface standard developed by the American National Standards Institute (ANSI) - it is used for both internal and external hard drives and optical drives as well as devices such as printers - modems - scanners - and many other peripherals.






9. In the FAT file system - the top-level directory in which the operating system stores information about files - including a reference to the FAT table so it knows where to find the file's contents on disk. The NTFS file system also has a root - or to






10. A set of behaviors including active listening and active speaking that shows you are fully engaged in the conversation and encourages the other person to also communicate in a positive manner.






11. A wireless data encryption standard based on the IEEE 802.11i security standard. It issues keys per-user and per-session and includes encryption key integrity checking. It uses Temporal Key Integrity Protocol (TKIP).






12. The first physical sector on a floppy disk or the first sector on a hard drive partition. The boot record contains information about the OS. The boot record on a primary active partition is used to start the operating system. Also called the boot sec






13. A fraudulent method of obtaining personal and financial information through the use of pop-ups or e-mail messages that purport to be from a legitimate organization - such as a bank - credit card company - or retailer.






14. A server that manages DNS names.






15. Memory that does not require power to keep stored data intact. Also called flash memory.






16. Aka Small Outline DIMM.






17. This attack occurs when a massive number (up to hundreds of thousands) of computers send DoS attacks to a server - making it unavailable.






18. On a circuit board - a small connector that slides down on a pair of pins jutting up from the board. Multiple pins are often side-by-side - and a jumper joins a pair of them.






19. A technical standards organization.






20. The code used to provide multiple language support to Windows.






21. A device that in its traditional configuration as a local KVM switch connects a single keyboard - video display - and mouse to two or more computer systems - allowing the user to switch control from one computer to another.






22. Aka read-only memory.






23. The original digital discs created in 1995 for storing video.






24. Aka root key.






25. In Microsoft Windows - NTFS permissions are used to specify and control which users and groups can access certain files and folders and what each user or group can do with them.






26. The moving of data from one storage device to another.






27. A joke program that produces strange behavior - such as screen distortions - erratic cursor behavior - or strange icons to appear on the screen.






28. A string of characters that a user enters - along with an identifier - such as a user name - in order to be authenticated.






29. A single dot on a display screen. A contraction of "Picture Element."






30. Aka digital video interface.






31. Also called striping with distributed parity or striping with interleave parity - this RAID method involves a set of disks in which every time data is written to disk - a portion is written to each disk in turn - creating a "stripe" of data across th






32. An interface on a PC that originally was unidirectional and operated at a speed of 150 KBps - but now has several operation modes.






33. A RAM standard that replaces the original DDR standard. Using far less power than DDR1 - a stick of DDR2 SDRAM has 240 pins.






34. A simple type of component video signal that sends three separate signals






35. Aka refresh rate.






36. A DVD drive that cannot write to but can read DVD discs.






37. In networking - the authorization to access a computer or resource on a computer. Specific permission levels include read - change - modify - etc.






38. A term applied to a CPU - motherboard - or other components that conform to the Intel 32-bit x86 specification. Also referred to as 32-bit.






39. Aka High-Definition Multimedia Interface.






40. An LCD display that accepts a digital signal. Early LCD displays accepted an analog signal and converted it to digital internally.






41. A user interface that takes advantage of the video system's graphics capabilities for manipulated graphic elements that represent objects and tasks.






42. An external serial bus standardized by the IEEE. Apple first developed it as FireWire. Other manufacturers call it i.link or Lynx. It can support up to 63 daisy-chained devices. Since the introduction of the faster update - IEEE 1394b - the original






43. An assigned address or range of addresses on a system's address bus that - together with an interrupt request line (IRQ) - allows a device to be recognized by the processor.






44. The box that houses the main computer system.






45. Laser discs sold at retail stores that contain music (audio CDs) or software (data CDs).






46. A TCP/IP protocol developed as a solution to the dwindling number of IP addresses on the Internet and that also serves to hide IP addresses on a private network from the Internet.






47. Aka external cache.






48. A database of all configuration settings in Windows.






49. Software instructions stored in ROM chips. It exists on most PC components and on the motherboard.






50. Aka external cache.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests