SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia A + Certification
Start Test
Study First
Subjects
:
certifications
,
comptia-a-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A key on a laptop that is combined with the FN key to bring up a small volume control panel on the display. Using the up (?) or right (?) arrow key - the volume will increase. To decrease the volume - press the FN key and the SPEAKER VOLUME key along
Level 1 (L1) cache
Speaker Volume Key
memory bank
volume
2. This occurs when someone collects personal information belonging to another person and uses that information to fraudulently make purchases - open new credit accounts - and even obtain new driver's licenses and other forms of identification in the vi
interrupt request line (IRQ)
process ID
IPCONFIG
identity theft
3. An assigned channel over which a device can send a signal to the processor to get its attention.
DVD-ROM drive
Enable Boot Logging
interrupt request line (IRQ)
WPA2
4. Aka Automatic Private IP Address.
APIPA
amperes (amps)
pop-up blocker
hibernate
5. In networking - this is a set of rules for using network hardware and software. In most discussions about networks - this term is assigned to certain network software components.
MIMO (multiple input/multiple output)
protocol
shadow mask
industry standard architecture (ISA)
6. A firewall service that inspects (or filters) each packet that enters or leaves the network - applying a set of security rules defined by a network administrator - and not allowing packets that fail inspection to pass between networks.
default gateway
second-level domain (SLD)
IP packet filtering
microcode
7. Aka S-Video.
Super Video
logical block address (LBA)
secure socket layer (SSL)
Level 1 (L1) cache
8. One or more chips designed to work closely with the CPU. Two parts of this chipset are the Northbridge and the Southbridge.
chipset
CNR
Disable Automatic Restart
password
9. In a laser printer - the lamp that heats the fusing rollers.
fusing lamp
graphical user interface (GUI)
NTFS permissions
biometric device
10. The act of safely installing/uninstalling or attaching/removing a device while a computer is up and running.
DVD-Video
analog LCD display
hot swapping
APM
11. An installation of Windows that is not automated - where the user is required to pay attention throughout the entire process to provide information and to respond to messages. Also called a manual installation.
low-voltage differential (LVD)
attended installation
display resolution
KVM switch
12. Aka customer premises equipment.
SMTP
CPE
secondary slave
secondary master
13. A modulator/demodulator device that allows computers to communicate with one another over existing phone lines.
math coprocessor
case fan
System File Checker (SFC)
analog modem
14. A set of standards for imaging devices - such as scanners and cameras - that is used in drivers and other software for these devices.
TWAIN
local KVM switch
client/server-based network
floppy disk
15. Aka internal cache memory.
AGP
Level 1 (L1) cache
laser printer
ATX
16. A type of KVM switch that is controlled through a mechanical switch on the box.
Advanced Technology eXtended (ATX)
inactive KVM switch
display
mobo
17. The Internet service that manages access to Internet domain names and the naming system it uses for computers and resources connected to the Internet or in a private network.
cracker
Domain Name Service (DNS)
subscriber connector (SC)
aspect ratio
18. Aka digital versatile disc (DVD).
analog modem
Automated System Recovery (ASR)
RAID 5
DVD
19. The format in which IP addresses are usually shown - with decimal numbers separated by "dots" as in 192.168.100.2.
ATX
cluster
dotted decimal notation
Internet
20. A command-line utility - installed with the TCP/IP protocol suite - that traces the route taken by packets to a destination.
TRACERT
PROM
inverter
encrypted authentication
21. A utility that provides remote terminal emulation for connecting to computers and network devices running server software that can respond - without needing to be concerned with the actual operating system running on either system.
FPU
key fob
CD-RW (CD-rewritable)
Telnet
22. The filename for the System Configuration Utility - which allows you to test various scenarios for Windows startup for troubleshooting purposes.
dial-up modem
TTL
MSCONFIG
local user account
23. A type of solid-state storage that is commonly used in a variety of devices - such as digital cameras - which often use CompactFlash.
flash memory
DVD-R
coaxial cable
Wi-Fi Protected Access 2 (WPA2)
24. A database of all configuration settings in Windows.
time to live (TTL)
RIMM
registry
RIP
25. Personal System/2 - as in PS/2-style mice and keyboards and connectors. Also called mini-DIN connectors.
adware
RAMBUS Inline Memory Module (RIMM)
PS/2
Enhanced IDE (EIDE)
26. A Windows utility that allows you to create tasks that run automatically at the times you select.
process
x86-64
Task Scheduler
Remote Assistance
27. A key on a laptop that - when pressed along with the FN key - changes the laptop display brightness at the hardware level. On some laptops - when this key combination is pressed - a small brightness control panel will display on the screen. Use the u
cracker
APIPA
Display Brightness Key
External Serial ATA (eSATA)
28. A set of skills - behaviors - and attitudes to use when listening to another person.
New Low-profile eXtended (NLX)
active listening
transferring
real-time clock (RTC)
29. Both the connectors on the RDRAM memory modules and the motherboard sockets (or slots) that match them.
drive lock password
material safety data sheet (MSDS)
RAMBUS Inline Memory Module (RIMM)
Infrared (IR)
30. In the domain name system - a name that is registered under a top-level domain - such as mcgraw-hill.com or microsoft.com.
volume
TrackPoint
second-level domain (SLD)
Media Access Control (MAC) address
31. A printer that creates printed output line by line.
line printer
OCR
DVI-I
copy
32. The smallest laptop type - weighing less than 3 pounds. Aka also netbook and mini-notebook.
modem
ultra-portable
thermal printer
broadband WAN
33. A RAM module designed for subcompact and laptop computers. It is half the size of a SoDIMM module.
MicroDIMM
mirrored set
Basic Service Set (BSS)
land-grid array (LGA)
34. One of the two main protocols of the TCP/IP protocol suite - TCP breaks the data into chunks - called datagrams. Each datagram also contains information - stored in a header - which is used by the TCP protocol on the receiving end to reassemble the c
gadget
Microsoft Windows XP Media Center
DIMM
Transmission Control Protocol (TCP)
35. Aka Small Outline RIMM.
SORIMM
primary corona wire
dead pixel
remote KVM switch
36. A group of wires used to identify addresses in main system memory in a computer. The number of wires in an address bus is called the width of the bus and determines the number of unique memory locations that can be addressed using binary math with th
address bus
extending extractor
liquid crystal display (LCD)
mass storage device
37. Aka time to live.
Microsoft Management Console (MMC)
SODIMM
TTL
Type III
38. Aka microcode.
degaussing
EEPROM
x86-64
microprogram
39. Aka internal cache memory.
PS/2
Global System for Mobile communications (GSM)
Start Windows Normally
L1 cache
40. A device found in laptops that monitors and regulates power usage. The features vary by manufacturer - but typically - they provide short-circuit protection - give "low battery" warnings - and can be configured to shut down the computer automatically
EPROM
channel service unit (CSU)
User Datagram Protocol (UDP)
DC Controller
41. A file system used by operating systems for organizing - reading - and writing optical discs.
Ultra DMA (UDMA)
WEP
DMA controller
Compact Disc File System (CDFS)
42. An interconnected network. The Internet is the largest example.
daughter card
horizontal position
internetwork
half-duplex
43. Aka digitizing tablet.
subkey
point-to-point protocol (PPP)
graphics tablet
BIOS settings
44. A memory error-checking method in which the parity bit is used to ensure that the total number of 1s in the data stream is odd.
master file table (MFT)
pin grid array (PGA)
response time
odd parity
45. One of the two prevailing CPU manufacturers.
PVC
peer-to-peer network
Microsoft Management Console (MMC)
Intel Corporation
46. A dark spot on an LCD screen caused when a transistor is permanently off.
grounding mat
dead pixel
auditing
expansion card
47. Aka floating-point unit.
USB
DoS Attack
FPU
Web browser
48. A type of riser card that connects directly into a motherboard and adds no additional functionality of its own - but extends the expansion bus and allows expansion cards to be added in a different physical orientation.
uniqueness database file (UDF)
h-hold
daughter card
processor
49. One or more chips in a computer's chipset that controls communications between the CPU and RAM on the motherboard.
access control
Northbridge
drive-by download
expansion card
50. A service on a laptop that configures a card after socket services has recognized it.
DVI-I
card services
WINS Server
original equipment manufacturer (OEM)