Test your basic knowledge |

Comptia A + Certification

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The worldwide interconnection of networks that can be accessed with various Internet-based software. The World Wide Web is one of the many services of the Internet.






2. A device installed at the end of a SCSI chain to absorb signals so they do not bounce back along the cable.






3. A version of the FAT file system used by hard drives and some flash drives (thumb drives - etc.) - using a 32-bit file allocation table.






4. A set of standards for imaging devices - such as scanners and cameras - that is used in drivers and other software for these devices.






5. One or more lights (usually LEDs) on a device that indicate the device's operational status through the color of the light - by blinking or remaining steady or both.






6. A version of the FAT file system used by MS-DOS for hard drives - using a 16-bit file allocation table.






7. A remote KVM switch that uses either Cat 5 or USB cabling. The distance it can be from the computers it controls is a function of the length limits of the cabling; it normally uses a proprietary protocol and special hardware.






8. Aka process priority level.






9. A version of the FAT file system for very small drives






10. A strap designed to discharge static electricity from your body. One end attaches to the wrist - whereas the other end attaches to a grounded object.






11. Aka communication network riser.






12. A small cassette containing an ink reservoir used to provide the medium for certain printers. An ink cartridge will only fit a certain model printer.






13. The style of partition on a basic disk - which includes primary and extended.






14. Aka RAMBUS Inline Memory Module.






15. The difference in value between a display's brightest white and darkest black. Modern LCD displays have a contrast ratio of 500:1 or greater.






16. A special-purpose computer designed for a certain task and installed within a device.






17. A type of DIMM memory module used in laptops.






18. Aka display power-management signaling.






19. An LCD display that uses a DB-15 connector - which means that it accepts analog signals that it converts to digital.






20. A connector that contains two to four wires and usually attaches phone cables to modems and to wall-mounted phone jacks.






21. The protocol used by DHCP servers and clients. A DHCP server allocates IP addresses within the scope of addresses configured on the server by an administrator. DHCP clients request IP addresses and other IP configuration settings from DHCP Servers.






22. Personal System/2 - as in PS/2-style mice and keyboards and connectors. Also called mini-DIN connectors.






23. A set of wires used by data traveling into and out of a processor.






24. A card that fits into the PC Card interface - including both PC Card and CardBus cards. This type measures 85.6 millimeters long by 54 millimeters wide and 3.3 millimeters thick.






25. Aka lit pixel.






26. The digital versatile disc (DVD) encoding format used for data storage.






27. Dual inline package. A very tiny slide that indicates two states. Motherboard and other circuit cards often have one or more groupings of DIP switches for configuring options.






28. Another name for a motherboard in a laptop.






29. Aka external cache.






30. A set of behaviors for the workplace that includes how you interact with people and how you treat property.






31. Threats that are not truly malicious code - but can have indirect negative effects - such as decreasing performance or using up bandwidth. Grayware includes spyware - adware - spam - and spim.






32. A protocol used with WPA wireless encryption that was broken by hackers.






33. In Microsoft Windows - NTFS permissions are used to specify and control which users and groups can access certain files and folders and what each user or group can do with them.






34. A wireless network standard that uses the 2.4 GHz band at a speed of up to 10 Mbps.






35. The original digital versatile disc (DVD) encoding format used for movies sold at retail.






36. The name used by the Windows operating systems to identify the second parallel port.






37. A T-1 multiplexer or a special LAN bridge that connects to the telephone company's channel service unit (CSU) - which encodes data for transmission over a T-carrier circuit.






38. Aka central processing unit.






39. A misnomer - referring to the BIOS settings that are stored in a CMOS chip.






40. A circuit card in a PC that controls the output to the display device(s).






41. Aka enhanced capabilities port (ECP) mode.






42. A set of skills - behaviors - and attitudes to use when listening to another person.






43. The file system component in the FAT file system in which the OS creates a table that serves as a map of where files reside on disk. Also called the FAT table.






44. The high-definition optical disc formatting standard developed by the Blu-ray Disc Association whose members include Sony - 20th Century Fox - Dell - Hewlett-Packard - and many other industry leaders.






45. Using the same cabling as 10BaseT - Fast Ethernet - or 100Base-T - operates at 100 Mbps and uses different network interface cards.






46. Also called 1000Base-T - this networking standard supports speeds up to 1 Gbps.






47. Aka adapter card.






48. A round connector that gets its name from Deutsche Industrie Norm - a German standards organization. Normally a round connector with a circular or semicircle of pins.






49. A wireless data encryption standard based on the IEEE 802.11i security standard. It issues keys per-user and per-session and includes encryption key integrity checking. It uses Temporal Key Integrity Protocol (TKIP).






50. A simple type of component video signal that sends three separate signals