Test your basic knowledge |

Comptia A + Certification

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Memory that can only be read and that contains program code. ROM is also called firmware.






2. A RAM standard that replaces the original DDR standard. Using far less power than DDR1 - a stick of DDR2 SDRAM has 240 pins.






3. An organization that creates standards for laptop computer peripheral devices.






4. An area on the top left of the Windows XP Start menu containing shortcuts to Windows Update and programs for browsing the Internet and using e-mail.






5. A firewall service that inspects (or filters) each packet that enters or leaves the network - applying a set of security rules defined by a network administrator - and not allowing packets that fail inspection to pass between networks.






6. An identifier assigned to a process when it starts.






7. A cooling fan mounted directly on the case - as opposed to a power supply fan - which is inside the power supply.






8. The oldest of the Wi-Fi encryption standards. It uses 64- or 128-bit encryption that is easily broken. It does not encrypt the actual data in a packet - and it does not perform user authentication on a packet.






9. The Microsoft Website from which you can download updates to Windows.






10. A virtual communication circuit that is created and remains available between two endpoints - which are normally some form of data terminal equipment (DTE). Telecommunications companies provide PVC service to companies requiring a dedicated circuit b






11. A blanket term used for DVD discs regardless of the type of data they contain.






12. A set of rules and practices describing how an organization protects and manages sensitive information. A security policy applies to all employees.






13. A device - usually resembling a power strip - that protects equipment from power surges.






14. A DVD drive that cannot write to but can read DVD discs.






15. A program file or some special data file that is part of the operating system and is very important to proper operation of the OS.






16. A reading and writing device in a floppy or hard drive that is mounted on an articulated arm that moves back and forth over the floppy disk or metal platter.






17. A category of software that runs surreptitiously on a user's computer in order to gather information without the user's permission and then sends that information to the people who requested it.






18. A server running the Dynamic Host Configuration Protocol (DHCP) service. This server allocates IP addresses to DHCP client computers.






19. RAM that doubles the rate of speed at which a standard SDRAM can process data. Also called DDR and DDR1. A stick of DDR1 SDRAM has 184 pins.






20. Aka floating-point unit.






21. A term applied to a CPU - motherboard - or other components that conform to the newer 64-bit architecture. Also referred to as 64-bit.






22. The difference in value between a display's brightest white and darkest black. Modern LCD displays have a contrast ratio of 500:1 or greater.






23. A data encryption technology used for securing data transmitted over the Internet. TLS succeeded SSL.






24. A server containing source files for installing software onto client computers. The shared folder containing these files is a software distribution point.






25. Aka Encrypting File System (EFS).






26. A standardized document that contains general information - ingredients - and fire and explosion warnings as well as health - disposal - and safe transportation information about a particular product. Any manufacturer that sells a potentially hazardo






27. Aka direct current.






28. The hardware architecture - including the CPU - BIOS - and chipset.






29. A virus that gains access to a computer by masquerading as a harmless program that a user innocently installs on the computer.






30. A drive that can write either to CD-R discs or to specially designed CD-RW discs. In the case of the CD-RW discs - the drive can write more than once to the same portion of disc - overwriting old data.






31. A chip that retains system settings such as the time - keyboard settings - and boot sequence.






32. The successor to the Mini PCI. It has a 64-bit data bus and is half the size of a Mini PCI Card.






33. A network service that handles the requests for Internet services - such as Web pages - files on an FTP server - and mail for a proxy client without exposing that client's IP address to the Internet. There is specific proxy server and client software






34. Aka pointing stick.






35. A perpetrator of malicious software attacks against computers and networks. Also called a cracker.






36. Aka liquid crystal display.






37. A fiber-optic connector that resembles an RJ-45 network connector and is less expensive and easier to work with than ST or SC connectors.






38. Introduced in 1993 - the most common expansion bus architecture in PCs in the mid 1990s. It transfers data in parallel over a data bus that is either 32- or 64-bits wide.






39. A special terminating stick that must be inserted into the open RIMM sockets.






40. A communication service provided over a telecommunications network or computer network. A VC logically resembles a circuit while passing over a complex routed or switched network - such as the phone company's frame relay network.






41. A connector that is slightly larger than an RJ-11 connector and contains eight wires. RJ-45 connectors most commonly attach twisted-pair cables to Ethernet network cards.






42. A protocol used with WPA wireless encryption that was broken by hackers.






43. The fine copper lines that are the electronic circuits through which power - data - and control signals travel on a circuit board.






44. A portion of a computer's chipset that controls communications between the CPU and such I/O busses as USB - IDE - PS2 - SATA - and others.






45. A video mode with a maximum graphics resolution of 1024






46. The act of writing to two disk drives at the same time - creating identical drives.






47. A type of printer that uses a matrix of pins striking paper through an ink ribbon to create dots on the paper - forming alphanumeric characters and graphic images.






48. In reference to the Windows operating systems - one that can utilize up to 4 GB of address space.






49. A CPU containing four CPU cores.






50. Any video adapter or monitor that exceeds the VGA standard in resolution and color depth with a maximum resolution of 1600