Test your basic knowledge |

Comptia A + Certification

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The language of Web pages. Web designers use the HTML language to create Web page code - which your Web browser converts into the pages you view on your screen.






2. Memory chips that provide much slower access than SRAM chips but that can store several megabytes of data on a single chip (or hundreds of megabytes - or even gigabytes - when they are packaged together on a "stick").






3. A DVI mode that supports digital video signals and is partially compatible with HDMI. Aka also digital video interface and High-Definition Multimedia Interface.






4. Aka Rambus Dynamic RAM.






5. Aka parts grabber.






6. A metal plate behind the front of a CRT monitor that focuses the electron beams from the gun.






7. A registry key that exists within another key.






8. A double-sided - single-layer digital versatile disc (DVD) that stores 9.4 GB of data - or over four hours of video.






9. A disc drive that uses laser technology to read and/or write to special discs.






10. Aka digital linear tape.






11. Showing consideration for others.






12. The first physical sector on a hard disk - which contains the initial boot program that the BIOS loads into memory during bootup. It also contains the partition table.






13. A cell phone with Personal Digital Assistant (PDA) functions built in.






14. [1] On computer circuit boards - a very tiny slide that indicates two states.. [2] In a network - a network device - much like a hub - except that a switch takes an incoming signal and sends it to only the destination port - avoiding collisions and m






15. An Advanced Options menu choice that creates a log of the Windows startup in a file named NTBTLOG.TXT and saved in thesystemroot folder (normally C:Windows).






16. The specific requirements for the level of CPU - amount of memory - and size of the hard disk for the computer on which an operating system can be installed.






17. A joke program that produces strange behavior - such as screen distortions - erratic cursor behavior - or strange icons to appear on the screen.






18. A file used by Windows for virtual memory. Also called the swap file. The actual filename in Windows is PAGEFILE.SYS.






19. The BIOS configuration settings - also called system settings - accessed via a special BIOS-based menu during system startup.






20. Aka communication network riser.






21. The memory space - program code - data - and system resources required by a running program.






22. In reference to the Windows operating systems - one that can utilize more than 4 GB of address space. Depending on the version - 64-bit Windows can address a maximum of from 8 to 192 GB.






23. A type of KVM switch that controls computers over a distance that is a function of the cabling and protocols it uses. The two types of switches are local remote KVM switch and KVM over IP.






24. Any type of computer that you can easily transport and that contains an all-in-one component layout.






25. A solid-state storage standard for high-capacity (2 - 4 - and 8 GB) memory cards that are tiny






26. This attack occurs when someone sends a large number of requests to a server - overwhelming the server so it stops functioning on the network.






27. Aka Domain Name Service.






28. A system by which the computer BIOS and operating system recognizes a device and the operating system automatically installs and configures a device driver.






29. The fine copper lines that are the electronic circuits through which power - data - and control signals travel on a circuit board.






30. A program used to discover a password.






31. An EIDE drive setting that has the system select the drive's role (master or slave) based on the drive's position on the cable. If the drive is on the end of the cable - it is the master drive - and if it is in the middle of the cable - it is the sla






32. A card that fits into the PC Card interface - including both PC Card and CardBus cards. This type measures 85.6 millimeters long by 54 millimeters wide and 3.3 millimeters thick.






33. A single dot on a display screen. A contraction of "Picture Element."






34. Aka KVM switch.






35. A standards organization - of which the T10 SCSI committee maintains the SCSI standard.






36. A technology used by hard drives to speed up data transfers by using DMA channels.






37. The top-level folder or directory in the file structure. This appears the same - regardless of the underlying file system.






38. The amount of time it takes a packet to travel from one point to another.






39. A DVI mode that supports both analog and digital video signals.






40. A type of DIMM memory module used in laptops.






41. The type of connector used in the ExpressCard interface.






42. In a CPU - special memory that resides outside the CPU's core and is used to temporarily store instructions and data in order to increase the processing speed. Also called Level 2 (L2) cache and Level 3 (L3) cache - depending on the design of the CPU






43. A network name used to identify a wireless network. Consisting of up to 32 characters - the SSID travels with the messages on the wireless network. All of the wireless devices on a WLAN must use the same SSID in order to communicate.






44. A tool for testing if a cable can connect properly end-to-end and to determine if a cable has a short. These tools are available for a variety of cable types.






45. Threats that are not truly malicious code - but can have indirect negative effects - such as decreasing performance or using up bandwidth. Grayware includes spyware - adware - spam - and spim.






46. Aka Address Resolution Protocol.






47. One of the main protocols of the TCP/IP protocol suite - IP manages logical addressing of network packets so routing protocols can route the packets over the network.






48. Aka Universal Serial Bus.






49. An expansion bus architecture that uses serial communications rather than the parallel communications of PCI. Also called PCI Express and PCI-E.






50. A variety of persuasion techniques used for many purposes