SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia A + Certification
Start Test
Study First
Subjects
:
certifications
,
comptia-a-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The practice of forcing a CPU or other computer component to run at a higher clock rate than the manufacturer intended.
overclocking
memory controller chip (MCC)
TV tuner card
form factor
2. A type of motherboard and its variants most commonly used in recent PC systems.
input/out (I/O)
Advanced Technology eXtended (ATX)
FAT32
WAN connection
3. A security feature of many Windows versions that allows it to encrypt files on an NTFS volume.
mounted drive
local user account
Encrypting File System (EFS)
Type II
4. A cell phone with Personal Digital Assistant (PDA) functions built in.
tape drive
single-sided (SS) DVD
smart phone
thermal wax transfer printer
5. A drive that is mapped to an empty folder on an NTFS volume and is assigned a drive path rather than drive letters.
ATX power supply
ACL
mounted drive
electromagnetic pulse (EMP)
6. A virus that gains access to a computer by masquerading as a harmless program that a user innocently installs on the computer.
Last Known Good Configuration
Type III
system file
Trojan horse
7. Aka Integrated Drive Electronics.
IDE
Type III
POTS
SMTP
8. A system resource that certain devices - such as sound cards and hard drives - can use to move data between the device and system RAM without involving the processor.
direct memory access (DMA) channel
Digital Light Processing (DLP)
pop-up blocker
DNS
9. The PCMCIA standard that succeeds the PC Card.
nickel metal hydride (NiMH) batteries
security policy
CardBus
extending extractor
10. A modulator/demodulator device that allows computers to communicate with one another over existing phone lines.
WPA
analog modem
odd parity
memory
11. Aka point-to-point protocol.
Fn key
terminating resistor
PPP
Wi-Fi
12. This attack occurs when someone sends a large number of requests to a server - overwhelming the server so it stops functioning on the network.
file system
denial of service (DoS) attack
unattended installation
WAN connection
13. A tool used to create and manage a distribution share and various installation images.
BDD Workbench
striping with distributed parity
uniqueness database file (UDF)
IEEE 1394
14. A CPU power-saving mode that allows a CPU to reduce its speed without losing its place so it does not stop working altogether. SMM also allows the CPU to trigger power saving in other components.
FAT12
System Management Mode (SMM)
fiber-optic cable
DVD-ROM
15. A server running the Dynamic Host Configuration Protocol (DHCP) service. This server allocates IP addresses to DHCP client computers.
DHCP Server
primary master
IP packet filtering
emergency repair disk (ERD)
16. A single dot on a display screen. A contraction of "Picture Element."
AGP
pixel
math coprocessor
LVDS
17. A disk type introduced with Windows 2000 that contains space allocated in volumes without the limits imposed on basic disks. On a dynamic disk - the number of volumes are unlimited - and a volume can extend to include available space on any hard disk
memory address
Wi-Fi Protected Access (WPA)
virus
dynamic disk
18. Aka digital linear tape.
motherboard
ultra-portable
DLT
horizontal position
19. Aka denial of service (DoS) attack.
Disable Automatic Restart
DoS Attack
rootkit
Hypertext Markup Language (HTML)
20. To renew a product activation - required when the activation program discovers significant changes in a computer or the activated product has been installed on a second computer.
auditing
reactivate
BDD Workbench
WAN connection
21. A process that places the logical structure of a file system on a partitioned volume.
format
DVD
Advanced Configuration and Power Interface (ACPI)
Safe Mode
22. The high-definition optical disc formatting standard developed by the Blu-ray Disc Association whose members include Sony - 20th Century Fox - Dell - Hewlett-Packard - and many other industry leaders.
EEPROM
proxy server
Blu-ray disc
Start Windows Normally
23. Aka central processing unit.
hot swapping
file
processor
Speaker Volume Key
24. A reading and writing device in a floppy or hard drive that is mounted on an articulated arm that moves back and forth over the floppy disk or metal platter.
mount point
read/write head
ICMP
thin-film transistor (TFT)
25. Aka Serial Attached SCSI.
SAS
Distributed File System (DFS)
logical block address (LBA)
microcode
26. A value assigned to a process that controls the order in which the program code is executed in relation to other code.
DDoS Attack
process priority level
Personal Digital Assistant (PDA)
recently used programs list
27. The default Windows file system that includes many important features - including encryption and permissions.
WPA
Gigabit Ethernet
NTFS
fast page mode (FPM)
28. Aka Wired Equivalent Privacy.
WEP
cache controller
optical character recognition (OCR)
archive attribute
29. Aka software firewall.
x86-64
FAT12
hub
personal firewall
30. A card that fits into the PC Card interface - including both PC Card and CardBus cards. This type measures 85.6 millimeters long by 54 millimeters wide and 5.0 millimeters thick.
horizontal position
base priority level
PROM
Type II
31. Aka RAID 5.
striping with distributed parity
local user account
remote KVM switch
partition
32. This attack occurs when a massive number (up to hundreds of thousands) of computers send DoS attacks to a server - making it unavailable.
secondary master
distributed denial of service (DDoS) attack
peripheral component interconnect (PCI)
system tray
33. An extension of the SATA standard for external SATA devices - with speeds triple that of USB 2.0.
External Serial ATA (eSATA)
extending extractor
dual-core CPU
identity theft
34. A network connection device at the core of a wireless network.
unidirectional mode
inactive KVM switch
wireless access point (WAP)
hidden attribute
35. A portable computer small enough to fit in your hand - also referred to as a "palmtop" computer. Because it is so small - a PDA does not have the functionality of a laptop or desktop computer. In other words - a typical PDA allows you to perform only
chrominance
distributed denial of service (DDoS) attack
Personal Digital Assistant (PDA)
LED
36. In fiber-optics - a single light wave passing down a cable.
ATX
CNR
NiMH
mode
37. The black box that appears around an image - such as a widescreen video when it is displayed on a screen with a 4:3 aspect ratio.
ACPI
letterbox
Dynamic Host Configuration Protocol (DHCP)
IEEE 1394c-2006
38. The use of deceit and trickery to persuade someone to hand over money or valuables.
hyper threading
TCP/IP
fraud
low-voltage differential (LVD)
39. On a circuit board - a small connector that slides down on a pair of pins jutting up from the board. Multiple pins are often side-by-side - and a jumper joins a pair of them.
jumper
slave drive
PCIe Mini Card
Ultra DMA (UDMA)
40. A Windows program that launches Internet Explorer and connects to the Windows Update Website.
Distributed File System (DFS)
RAID 5
ATA Packet Interface (ATAPI)
Windows Update
41. A handheld device used to measure electrical resistance - voltage - and/or current.
fusing
SONET
multimeter
FPM
42. The act of electronically upgrading BIOS.
wide area network (WAN)
Personal Digital Assistant (PDA)
system attribute
flashing
43. A standardized document that contains general information - ingredients - and fire and explosion warnings as well as health - disposal - and safe transportation information about a particular product. Any manufacturer that sells a potentially hazardo
material safety data sheet (MSDS)
analog LCD display
bandwidth
form factor
44. A 25-pin D-shell connector.
device driver
enhanced capability port (ECP) mode
DB-25
ALU
45. Another name for a motherboard in a laptop.
inactive KVM switch
processor board
ACE
digital video discs
46. A type of printer that uses a film coated with colored wax that melts onto paper. These printers are similar to dye-sublimation printers but differ in two major ways: the film contains wax rather than dye - and these printers do not require special p
thermal wax transfer printer
phishing
Level 1 (L1) cache
distribution share
47. An external serial bus standardized by the IEEE. Apple first developed it as FireWire. Other manufacturers call it i.link or Lynx. It can support up to 63 daisy-chained devices. Since the introduction of the faster update - IEEE 1394b - the original
extension magnet
Program Compatibility Wizard
IEEE 1394
mainboard
48. Aka pin grid array.
projector
PGA
redundant array of independent disks (RAID)
DIN connector
49. A single-sided - double-layer digital versatile disc (DVD) that stores 8.54 GB of data - or over four hours of video.
Level 1 (L1) cache
voltage regulator module (VRM)
DVD-9
master file table (MFT)
50. A virtual tunnel created between two endpoints over an untrusted network. The tunnel is created by encapsulating the packets within special packets for the tunnel. Other security methods are also usually applied to a VPN - such as encrypting the data
virtual private network (VPN)
serial ATA (SATA)
IEEE 1394b
radio frequency (RF)