Test your basic knowledge |

Comptia A + Certification

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Aka security auditing.






2. A DVD drive that cannot write to but can read DVD discs.






3. A service of the operating system on a laptop that detects when a card has been inserted.






4. Aka floppy disk drive.






5. In the laser printing process - the stage in which the printer's high-voltage power supply (HVPS) conducts electricity to the primary corona wire so it can pass the voltage on to the printer's electro-photosensitive drum.






6. A device that sits at the connection between networks and routes packets based on their logical destination addresses.






7. The use by the operating system of a portion of hard disk as memory.






8. Traditionally - this term only applied to the type of device described in the definition for analog modem. Now - it is also used for the digital devices in DSL and cable data communications.






9. A program downloaded to a computer without the user's consent. The user unwittingly initiates the download by some simple act - such as browsing to a Website or opening an e-mail message written in HTML. Or a user may initiate a drive-by download by






10. An LCD display that accepts a digital signal. Early LCD displays accepted an analog signal and converted it to digital internally.






11. A fiber-optic connector that has a snap coupling and - at 1.25 mm - is half the size of the SC connector. Also called a local connector.






12. An adapter card used to run a special diagnostic test on a computer as it is powering up. These tests usually go beyond those performed by the system BIOS-based POST.






13. Aka IEEE 1394.






14. A group of wires used to identify addresses in main system memory in a computer. The number of wires in an address bus is called the width of the bus and determines the number of unique memory locations that can be addressed using binary math with th






15. A computer (or dedicated device) that sits between a private network and an untrusted network and examines all traffic in and out of the network it is protecting. It will block any traffic it recognizes as a potential threat - using a variety of tech






16. A group of tests - stored in the BIOS and performed as a PC boots up - to check for the presence and function of system components.






17. Aka lit pixel.






18. A wireless network standard that uses the 2.4 GHz band at a speed of up to 54 Mbps. It is downward-compatible with 802.11b.






19. The protocol used to allow client computers to pick up e-mail from mail servers. The current version is POP3.






20. In networking - the authorization to access a computer or resource on a computer. Specific permission levels include read - change - modify - etc.






21. The Internet service that manages access to Internet domain names and the naming system it uses for computers and resources connected to the Internet or in a private network.






22. A type of printer that uses a film coated with colored wax that melts onto paper. These printers are similar to dye-sublimation printers but differ in two major ways: the film contains wax rather than dye - and these printers do not require special p






23. A computer circuit board that attaches to and controls SCSI devices.






24. Aka motherboard.






25. In the laser printing process - the step at which the heat-sensitive toner is fused to the paper by heated fusing rollers.






26. Software instructions stored in ROM chips. It exists on most PC components and on the motherboard.






27. A virus that gains access to a computer by masquerading as a harmless program that a user innocently installs on the computer.






28. A set of technologies that allow voice transmission over an IP network






29. A set of rules and practices describing how an organization protects and manages sensitive information. A security policy applies to all employees.






30. A Windows display setting that allows you to adjust the number of colors - or color depth - used by the display.






31. Aka FAT file system.






32. A parallel interface standard that supports bidirectional communication and transfer rates of up to 2 MBps.






33. A program that blocks browser pop-ups.






34. Aka musical instrument digital interface.






35. Software that runs on the computers in a network and that receives services from servers.






36. A pointing device built into some laptop keyboards. It appears to be a very tiny joystick-type button that barely protrudes above the level of the keys.






37. The name used by the Windows operating systems to identify the second parallel port.






38. The specific requirements for the level of CPU - amount of memory - and size of the hard disk for the computer on which an operating system can be installed.






39. A small group of computers communicating wirelessly with one another without the use of a centralized wireless access point (WAP).






40. The portion of the chipset that controls communications between the CPU and system RAM.






41. A handheld device used to measure electrical resistance - voltage - and/or current.






42. A processor packaging that uses pads on the processor that come in contact with pins in the socket on the motherboard - permitting a higher density than possible with PGA.






43. A hardware device or a program that monitors and records a user's every keystroke - usually without the user's knowledge.






44. The bus within a CPU that connects the CPU to external components.






45. In a laser printer - a wire that stretches across the printer's drum - not touching it - but positioned very close to the drum's surface so it can pass high voltage to the drum.






46. A network in which all of the computers essentially operate as both servers (providing access to shared resources) and clients (accessing those shared resources).






47. Aka plain-old telephone service.






48. A database of all configuration settings in Windows.






49. The information transfer protocol of the World Wide Web (WWW). Included in HTTP are the commands Web browsers use to request Web pages from Web servers and then display them on the screen of the local computer.






50. A small device containing a microchip used to generate unique passwords for logging on to a computer or a network.