SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia A + Certification
Start Test
Study First
Subjects
:
certifications
,
comptia-a-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A virtual tunnel created between two endpoints over an untrusted network. The tunnel is created by encapsulating the packets within special packets for the tunnel. Other security methods are also usually applied to a VPN - such as encrypting the data
FAT
P1 power connector
virtual private network (VPN)
Standby
2. The classic PC serial port that complies with the Recommended Standard-232 (RS-232) in its circuitry - cabling - and connector design - and transfers data one bit at a time.
lit pixel
primary partition
RS-232 port
HTML
3. Aka thumb drive.
logical block address (LBA)
User State Migration Tool (USMT)
flash drive
fast page mode (FPM)
4. The bus within a CPU that connects the CPU to external components.
DDR2 SDRAM
MSINFO32.EXE
internal bus
pit
5. A data encryption technology used for securing data transmitted over the Internet. TLS succeeded SSL.
transport layer security (TLS)
Intel Corporation
paging file
smart card reader
6. Also called 1000Base-T - this networking standard supports speeds up to 1 Gbps.
asynchronous transfer mode (ATM)
dial-up
Gigabit Ethernet
partition type
7. In networking - this is a set of rules for using network hardware and software. In most discussions about networks - this term is assigned to certain network software components.
discretion
Post Office Protocol (POP)
protocol
FTP
8. Aka distributed denial of service attack.
WPA
DDoS Attack
Fn key
multi-monitor
9. A connector that is slightly larger than an RJ-11 connector and contains eight wires. RJ-45 connectors most commonly attach twisted-pair cables to Ethernet network cards.
floppy disk drive
CPU
RJ-45
cleaning blade
10. A set of technologies that allow voice transmission over an IP network
Voice over IP (VoIP)
single-mode fiber (SMF)
domain
digital video interface (DVI)
11. The type of connector used in the ExpressCard interface.
beam-on-blade connector
EPP
System Monitor
distribution server
12. A square snap coupling for fiber-optic cable - about 2.5 mm wide - used for cable-to-cable connections or to connect cables to network devices. It latches with a push-pull action similar to audio and video jacks.
shortcut
password
digitizing tablet
subscriber connector (SC)
13. A type of switched network used by phone companies.
removable storage
volatile
Static RAM (SRAM)
frame relay
14. A set of rules and practices describing how an organization protects and manages sensitive information. A security policy applies to all employees.
top-level domain (TLD)
security policy
POST card
basic input/output system (BIOS)
15. Aka floating-point unit.
Northbridge
interrupt request line (IRQ)
FPU
UPS
16. An early technology for increasing the performance of DRAM.
fast page mode (FPM)
domain
High-Definition Multimedia Interface (HDMI)
DVD-ROM
17. A type of thermal printer in which a heated print head burns dots into the surface of heat-sensitive paper.
video graphics array (VGA)
DNS
process ID
direct thermal printer
18. A drive that is mapped to an empty folder on an NTFS volume and is assigned a drive path rather than drive letters.
twisted-pair cable
dot matrix printer
thread
mounted drive
19. A file or folder name that breaks the 8.3 file-naming convention used in the FAT file system. This term continues to be used on newer file systems.
long filename (LFN)
Automated System Recovery (ASR)
cache controller
DMZ
20. One or more lights (usually LEDs) on a device that indicate the device's operational status through the color of the light - by blinking or remaining steady or both.
VGA Mode
Temporal Key Integrity Protocol (TKIP)
Start Windows Normally
status light indicator
21. In a CPU - the speed at which it can potentially execute instructions - measured in millions of cycles per second
clock speed
Wireless LAN (WLAN)
key fob
capture card
22. The delivery of electricity (as from a wall outlet) in which the flow of electrons reverses periodically and has alternating positive and negative values.
dialer
double-sided (DS) DVD
alternating current
local area network (LAN)
23. A server containing source files for installing software onto client computers. The shared folder containing these files is a software distribution point.
Level 2 (L2) cache
computer platform
laser printer
distribution server
24. The use of deceit and trickery to persuade someone to hand over money or valuables.
fraud
unidirectional mode
Automatic Private IP Address (APIPA)
password cracker
25. A motherboard form factor introduced in 2003 by Intel as the successor to ATX.
DVI-D
System Management Mode (SMM)
Balanced Technology eXtended
modding
26. A WAN connection that uses existing copper telephone wire for the communication circuit. To accomplish this - a DSL modem splits the existing phone line into two bands; voice transmission uses the frequencies below 4000 Hz - whereas data transmission
digital subscriber line (DSL)
version
heat sink compound
plug and play (PnP)
27. The protocol for connecting optical drives and tape drives to an ATA channel.
DVD-Video
PVC
ATA Packet Interface (ATAPI)
BTX
28. A level of service offered by the telephone companies over a T-carrier circuit that provides full-duplex transmissions at 1.544 Mbps - carrying digital voice - data - or video signals.
mounted drive
T1
Point-to-Point Tunneling Protocol (PPTP)
SXGA
29. Aka lit pixel.
WUXGA
microcode
ACL
stuck pixel
30. A generic reference to a PC's serial communications port - in which the x represents the port number.
active speaking
dynamic disk
subtree
COMx
31. A way to monitor security-related events.
security auditing
NiCD
digital LCD display
capture card
32. A fiber-optic connector that resembles an RJ-45 network connector and is less expensive and easier to work with than ST or SC connectors.
NAT
Mechanical Transfer Registered Jack (MT-RJ) connector
CRT
expansion card
33. A more advanced and more expensive alternative to a port replicator. In addition to the ports normally found on a port replicator - a docking station may include full-size expansion slots and drives.
radio frequency (RF)
Multilingual User Interface (MUI)
docking station
master file table (MFT)
34. A very old expansion bus standard - seen in the early IBM PC.
CSU
industry standard architecture (ISA)
port triggering
jumper
35. A specialized type of scanner that reads bar codes - which are patterns of bars of varying widths printed on labels or directly on items. The bar pattern is converted into a numeric code that is transmitted to a computer as data.
activation
nickel-cadmium (NiCD)
watts
bar code reader
36. The process of informing the software manufacturer who the official owner or user of the product is - and providing contact information such as name - address - company - phone number - e-mail address - and so on - about them. Registration is usually
registration
time to live (TTL)
nickel metal hydride (NiMH) batteries
encryption
37. The original version of the IEEE 1394 standard that supports speeds up to 400 Mbps.
PROM
IEEE 1394a
primary partition
CNR
38. The medium for a laser printer - which is normally packaged within a toner cartridge.
electromagnetic interference (EMI)
multifunction device (MFD)
high-voltage power supply (HVPS)
toner
39. The black box that appears around an image - such as a widescreen video when it is displayed on a screen with a 4:3 aspect ratio.
authorization
letterbox
Microsoft Product Activation (MPA)
thin-film transistor (TFT)
40. A file used with a scripted unattended installation along with an answer file. The UDF file provides settings that are unique for each computer.
system file
uniqueness database file (UDF)
video adapter
CardBus
41. Aka Point-to-Point Tunneling Protocol.
PPTP
High-Definition Multimedia Interface (HDMI)
thin-film transistor (TFT)
Advanced Technology Attachment (ATA)
42. A wireless network standard that defines speeds of up to 600 Mbps. It is downward-compatible with 802.11a - 802.11b - and 802.11g.
compact disc (CD)
low-voltage differential (LVD)
802.11n
emergency repair disk (ERD)
43. A depressed area on an optical disc that is alternated with raised areas to be interpreted as data.
pit
keystroke logger
VRAM
High-Bandwidth Digital Content Protection (HDCP)
44. On a Microsoft Windows network - a resource - such as a file folder or printer - that is available on the network.
DDR3
share
Distributed File System (DFS)
FAT16
45. The act of writing to two disk drives at the same time - creating identical drives.
dead pixel
Windows Internet Naming Service (WINS)
mirroring
compact disc (CD)
46. An icon that represents a link to any object that an icon can represent. Activating a shortcut (by double-clicking it) is a quick way to access an object or to launch a program from the desktop without having to find the actual location of the object
shortcut
transport layer security (TLS)
secondary slave
latency
47. A type of display device that includes a touch-sensitive face to accept input from the user.
uniqueness database file (UDF)
riser card
touch screen
local area network (LAN)
48. A file attribute set by the OS when a file is created or modified. Backup software often removes this attribute when backing up a file in order to mark it as a backed-up file.
Post Office Protocol (POP)
archive attribute
Tablet PC
DLP
49. Aka permanent virtual circuit.
External Serial ATA (eSATA)
PVC
SIMM
IEEE
50. Aka customer premises equipment.
CPE
clock speed
display
LBA