Test your basic knowledge |

Comptia A + Certification

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A special terminating stick that must be inserted into the open RIMM sockets.






2. In Windows - a security account that contains one or more local user accounts - and when a computer is a member of a Windows domain - may also contain domain user or group accounts.






3. Aka denial of service (DoS) attack.






4. Information organized as a unit into a container. The author (creator) of a file controls how much information the file contains.






5. Aka hacker.






6. Aka Hypertext Transfer Protocol (HTTP).






7. An LCD display using an old technology that has a grid of horizontal and vertical wires with a transistor at the end of each wire. When two transistors (one at the x-axis and one at the y-axis) send voltage along their wires - the pixel at the inters






8. The file system component in the FAT file system in which the OS creates a table that serves as a map of where files reside on disk. Also called the FAT table.






9. Aka Fast Ethernet.






10. An area under the pinned items list on the Windows XP Start menu that contains shortcuts to recently run programs.






11. An early method for addressing the disparity between the drive geometry supported by PC BIOSs and the physical geometry of drives.






12. Aka Automatic Private IP Address.






13. A DVD drive that cannot write to but can read DVD discs.






14. A computer (or dedicated device) that sits between a private network and an untrusted network and examines all traffic in and out of the network it is protecting. It will block any traffic it recognizes as a potential threat - using a variety of tech






15. The BIOS configuration settings - also called system settings - accessed via a special BIOS-based menu during system startup.






16. A modulator/demodulator device that allows computers to communicate with one another over existing phone lines.






17. Device that stores digital data on magnetized media - such as floppy disks - the metal platters in hard disk drives - and magnetic tape media used in tape drives.






18. A process applied to digitally signed code to unencrypt the signature data and use the information to verify the program code was not modified since the signature was added.






19. A processor on a graphics adapter used to render graphics images for the display - saving the CPU for other functions.






20. Aka nickel metal hydride.






21. A type of computer firmware that is responsible for informing the CPU of installed devices and how to communicate with them.






22. Aka customer premises equipment.






23. The default Windows file system that includes many important features - including encryption and permissions.






24. Aka radio frequency.






25. Data storage technology with no moving mechanical parts that uses large-capacity - nonvolatile memory - commonly calledflash memory or solid-state drives.






26. The primary input device for a PDA - shaped like a pen and used to press small keys on a keypad - tap the screen to select items - or write data on the screen.






27. Circuitry in a PC on an adapter card - or directly on the motherboard - that controls the output from the PC to the display device.






28. Aka internal cache memory.






29. A type of switched network used by phone companies.






30. A RAID array in which every time data is written to disk - a portion (block) is written to each disk in turn - creating a "stripe" of data across the member disks. RAID 0 uses the total disk space in the array for storage - without protecting the dat






31. An option available in the Windows XP Backup program for recovering from damage that prevents the operating system from starting. It replaced the Emergency Repair Disk (ERD) process in Windows 2000.






32. A chip that keeps track of the date and time on a PC. Set the date and time through your operating system or in the BIOS Setup program.






33. A method of memory error-checking that is more sophisticated than parity checking. Like parity checking - it adds an extra bit per byte. In addition - software in the system memory controller uses an algorithm to both detect and correct errors.






34. The worldwide network that carries traditional voice traffic.






35. The original version of the IEEE 1394 standard that supports speeds up to 400 Mbps.






36. Aka software firewall.






37. In a CPU - special memory that resides outside the CPU's core and is used to temporarily store instructions and data in order to increase the processing speed. Also called Level 2 (L2) cache and Level 3 (L3) cache - depending on the design of the CPU






38. A tool for testing if a cable can connect properly end-to-end and to determine if a cable has a short. These tools are available for a variety of cable types.






39. Aka thread.






40. A string of characters that a user enters - along with an identifier - such as a user name - in order to be authenticated.






41. A program installed and activated on a computer without the user's knowledge or permission. At the least - the intent is mischief - but most often the intent is to cause damage.






42. A bundle of patches or updates released periodically by a software publisher.






43. In a Wi-Fi network - the networking mode that allows peer-to-peer communications without the use of a centralized wireless hub - called a wireless access point (WAP).






44. The portion of the chipset that controls communications between the CPU and system RAM.






45. Specialized hardware used to create and manage a RAID array.






46. A method used by several software manufacturers to combat software piracy. The formal name for Microsoft's activation is Microsoft Product Activation (MPA).






47. An optical disc created and read by a mechanism using a laser.






48. Aka RAID 5.






49. A VESA standard for power management in display devices.






50. Windows run-line utility for testing the DirectX support. Launch this program when experiencing video problems and/or audio problems when running DirectX applications.