Test your basic knowledge |

Comptia A + Certification

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Unsolicited e-mail.






2. A video mode with a maximum graphics resolution of 1024






3. Aka IEEE 1394.






4. A technology for transferring serial data at high speeds. Also known as low-voltage differential signaling (LVDS).






5. Aka SCSI host adapter.






6. A type of arithmetic logic unit (ALU) that is used to perform specialized functions - such as division and large decimal number operations. Also called a math coprocessor.






7. A specialized device for testing a power supply unit that comes with connectors compatible with the output connectors on a standard power supply.






8. The traditional transmission system for television video signals - which combines the color and brightness information with the synchronization data into one signal. The TV circuitry then separates the two signals from the composite signal.






9. A wireless network standard that uses the 2.4 GHz band at a speed of up to 10 Mbps.






10. In an IP packet - a value field that shows how many routers the packet can cross before being discarded.






11. Aka error-correcting code.






12. A security feature of many Windows versions that allows it to encrypt files on an NTFS volume.






13. A value assigned to a process that controls the order in which the program code is executed in relation to other code.






14. A power-usage level.






15. A hardware device or a program that monitors and records a user's every keystroke - usually without the user's knowledge.






16. A fiber-optic connector that has a snap coupling and - at 1.25 mm - is half the size of the SC connector. Also called a local connector.






17. Aka Address Resolution Protocol.






18. Aka hard disk drive.






19. Aka Extended Video Graphics Array.






20. The former name of the Parallel AT Attachment (PATA) interface standard.






21. Aka systray.






22. Things used for authentication - such as something you know - something you have - or something you are. Authentication involves one or more of these factors and can - therefore - be one-factor - two-factor - or three-factor authentication.






23. The connecting point of a mounted drive to a folder on an NTFS volume.






24. Aka Advanced Technology.






25. A portion of a computer's chipset that controls communications between the CPU and such I/O busses as USB - IDE - PS2 - SATA - and others.






26. A virus that downloads to a user's computer through a pop-up window that appears in a Web browser. It requires an action on the part of a user - such as clicking a button that implies acceptance of something like free information.






27. In reference to the Windows operating systems - one that can utilize up to 4 GB of address space.






28. A magnetic storage device that contains a thin internal plastic disk - capable of receiving magnetic charges contained in the thin magnetic coating on the disk.






29. Slang for motherboard.






30. A utility for migrating data from many computers - or if you need to perform what Microsoft calls a "wipe-and-load migration" from and to the same computer. Available in Windows XP - Vista - and Windows 7.






31. Aka System Information.






32. The EXPLORER.EXE program. This program supports the entire Windows GUI. If EXPLORER.EXE is called up from inside the GUI - it opens a window for browsing your local disks and files.






33. A TPM is a special microchip - installed on a motherboard - that stores passwords - keys - and digital certificates. Various services - such as BitLocker can store such security data in this chip.






34. A cell phone with Personal Digital Assistant (PDA) functions built in.






35. A file attribute assigned to a file by the operating system to identify it as a system file.






36. A power supply that detects the incoming voltage and switches to accept either 120 or 240 VAC.






37. A type of solid-state storage that is commonly used in a variety of devices - such as digital cameras - which often use CompactFlash.






38. Aka distributed denial of service attack.






39. A partition type that can exist on a basic disk and have one or more logical drive letters assigned to it. A Windows operating system cannot boot from an extended partition.






40. Aka microcode.






41. A command-line command - installed with the TCP/IP protocol suite - which provides statistical information about the TCP/IP protocols and network connections involving your computer - depending on the switches you use when you enter the command.






42. In the laser printing process - the step in which the laser beam creates a negative of the image that will eventually appear on the printout. Each place that the laser beam touches loses most of its charge - creating an image - whereas the rest of th






43. Pertaining to a DVD drive or disc that can store data in a single layer of pits on each data side.






44. Aka enhanced capabilities port (ECP) mode.






45. A special terminating stick that must be inserted into the open RIMM sockets.






46. A Windows GUI utility that allows an administrator to view the status of devices and install - remove - and update device drivers.






47. A small cassette containing an ink reservoir used to provide the medium for certain printers. An ink cartridge will only fit a certain model printer.






48. Aka antistatic mat.






49. A special disk used for recovering an OS failure in Windows 2000. It requires that you create the ERD while the system is healthy - and then use it - along with the Windows Setup CD - to repair Windows.






50. A TCP/IP protocol developed as a solution to the dwindling number of IP addresses on the Internet and that also serves to hide IP addresses on a private network from the Internet.