Test your basic knowledge |

Comptia A + Certification

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A chip that keeps track of the date and time on a PC. Set the date and time through your operating system or in the BIOS Setup program.






2. Small text files a Web browser saves on the local hard drive at the request of a Website. Cookies can contain information that will be used the next time the user connects to the Website.






3. A specialized device for testing a power supply unit that comes with connectors compatible with the output connectors on a standard power supply.






4. Aka internal cache memory.






5. One of many low-level instructions built into the control unit of a CPU. Also called a microprogram.






6. A power supply and motherboard feature that allows software to turn off a computer rather than only using a physical switch.






7. The first physical sector on a floppy disk or the first sector on a hard drive partition. The boot record contains information about the OS. The boot record on a primary active partition is used to start the operating system. Also called the boot sec






8. Used to represent the chrominance signal in S-Video.






9. The moving of data from one storage device to another.






10. Software installed on a computer without permission that collects information about a user in order to display targeted advertisements - in the form of either inline banners or pop-ups. Inline banners are advertisements that run within the context of






11. Aka Internet service provider.






12. A type of printer that transfers ink to paper by causing a print head to strike a printer ribbon containing ink against the paper.






13. A VESA standard for power management in display devices.






14. A system resource that certain devices - such as sound cards and hard drives - can use to move data between the device and system RAM without involving the processor.






15. Aka double-data rate (DDR) SDRAM.






16. The IBM branded name for a pointing stick or track point.






17. A CPU containing two CPU cores.






18. In reference to the Windows operating systems - one that can utilize more than 4 GB of address space. Depending on the version - 64-bit Windows can address a maximum of from 8 to 192 GB.






19. A cable medium that transmits light pulses rather than electrical signals - so it is not susceptible to electromagnetic interference (EMI).






20. A heat dissipation device - usually a passive metal object with a flat surface attached to a component - such as a chip.






21. In the Windows registry - the top five folders - each of which is the top of a hierarchical structure. Also called subtrees.






22. A variety of persuasion techniques used for many purposes






23. The second version of the IEEE 1394 standard; it supports speeds up to 3.2 Gbps and distances of up to 100 meters.






24. A value assigned to a process that controls the order in which the program code is executed in relation to other code.






25. Aka electronic KVM switch.






26. A CPU component that manages the CPU cache.






27. In reference to IDE PATA drives - the master drive on the first channel.






28. Aka hacker.






29. A grouping of wires built into a PC that - based on certain protocols - transfers data - control signals - and power to printed circuit boards (adapter cards) that are plugged into connectors in the expansion bus. Technicians often use the termsexpan






30. A remote KVM switch that captures the keyboard - video - and mouse signals - encodes them into IP packets - and sends them over an IP network.






31. A Windows program that launches Internet Explorer and connects to the Windows Update Website.






32. A 20- or 24- pin connector that supplies power from a PC's power supply to the motherboard.






33. Aka electromagnetic pulse.






34. Aka Wired Equivalent Privacy.






35. A wireless network standard that uses the 5 GHz band.






36. A name used by the Windows operating systems to identify any parallel port.






37. Using the same cabling as 10BaseT - Fast Ethernet - or 100Base-T - operates at 100 Mbps and uses different network interface cards.






38. Aka Advanced Communications Riser.






39. A generic reference to a PC's serial communications port - in which the x represents the port number.






40. A type of printer that uses one of several technologies to apply wet ink to paper to create text or graphic printouts. The two most popular inkjet printer models are the InkJet - developed by Hewlett-Packard - and the Bubble Jet - developed by Canon.






41. A T-1 multiplexer or a special LAN bridge that connects to the telephone company's channel service unit (CSU) - which encodes data for transmission over a T-carrier circuit.






42. In networking - the authorization to access a computer or resource on a computer. Specific permission levels include read - change - modify - etc.






43. The act of moving through a neighborhood in a vehicle or on foot - using either a laptop equipped with Wi-Fi wireless network capability or a simple Wi-Fi sensor available for a few dollars from many sources. War drivers are searching for open hotspo






44. A printer that includes one or more other functions - such as a scanner and fax machine.






45. Aka FAT file system.






46. A category of software that runs surreptitiously on a user's computer in order to gather information without the user's permission and then sends that information to the people who requested it.






47. Aka motherboard.






48. Aka systray.






49. The redirection of incoming traffic to the requesting internal hosts that initiated the communication with an external host.






50. A generic term for a collection of information on known malware (not just viruses).