SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia A + Certification
Start Test
Study First
Subjects
:
certifications
,
comptia-a-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Memory that can only be read and that contains program code. ROM is also called firmware.
read-only memory (ROM)
biometric
broadband WAN
MicroDIMM
2. A RAM standard that replaces the original DDR standard. Using far less power than DDR1 - a stick of DDR2 SDRAM has 240 pins.
DDR2 SDRAM
developing
DC Controller
802.11n
3. An organization that creates standards for laptop computer peripheral devices.
NetBIOS
Enhanced IDE (EIDE)
switching mode power supply
Personal Computer Memory Card International Association (PCMCIA)
4. An area on the top left of the Windows XP Start menu containing shortcuts to Windows Update and programs for browsing the Internet and using e-mail.
SONET
PCI Express
pinned items list
local area network (LAN)
5. A firewall service that inspects (or filters) each packet that enters or leaves the network - applying a set of security rules defined by a network administrator - and not allowing packets that fail inspection to pass between networks.
version
DVD-9
FDD
IP packet filtering
6. An identifier assigned to a process when it starts.
process ID
infrastructure mode
Enhanced IDE (EIDE)
motherboard
7. A cooling fan mounted directly on the case - as opposed to a power supply fan - which is inside the power supply.
protocol
case fan
system tray
mirrored set
8. The oldest of the Wi-Fi encryption standards. It uses 64- or 128-bit encryption that is easily broken. It does not encrypt the actual data in a packet - and it does not perform user authentication on a packet.
Wired Equivalent Privacy (WEP)
process priority level
pinned items list
LPT1
9. The Microsoft Website from which you can download updates to Windows.
Windows Update Website
NiCD
beam-on-blade connector
ATX
10. A virtual communication circuit that is created and remains available between two endpoints - which are normally some form of data terminal equipment (DTE). Telecommunications companies provide PVC service to companies requiring a dedicated circuit b
LPT2
mobo
permanent virtual circuit (PVC)
Internet Message Access Protocol (IMAP)
11. A blanket term used for DVD discs regardless of the type of data they contain.
DVD-Data discs
digitizing tablet
fraud
LPT
12. A set of rules and practices describing how an organization protects and manages sensitive information. A security policy applies to all employees.
New Low-profile eXtended (NLX)
security policy
pinned items list
Encrypting File System (EFS)
13. A device - usually resembling a power strip - that protects equipment from power surges.
asynchronous transfer mode (ATM)
surge protector
DDR3 SDRAM
erasure lamp
14. A DVD drive that cannot write to but can read DVD discs.
DVD-ROM drive
Microsoft Product Activation (MPA)
C
liquid crystal display (LCD)
15. A program file or some special data file that is part of the operating system and is very important to proper operation of the OS.
file
NAT
analog modem
system file
16. A reading and writing device in a floppy or hard drive that is mounted on an articulated arm that moves back and forth over the floppy disk or metal platter.
dual-core CPU
bus
Point-to-Point Tunneling Protocol (PPTP)
read/write head
17. A category of software that runs surreptitiously on a user's computer in order to gather information without the user's permission and then sends that information to the people who requested it.
ad hoc mode
Scalable Link Interface (SLI)
error-correcting code (ECC)
spyware
18. A server running the Dynamic Host Configuration Protocol (DHCP) service. This server allocates IP addresses to DHCP client computers.
dialer
DHCP Server
spyware
ICMP
19. RAM that doubles the rate of speed at which a standard SDRAM can process data. Also called DDR and DDR1. A stick of DDR1 SDRAM has 184 pins.
double-data rate (DDR) SDRAM
plain-old telephone service (POTS)
permanent virtual circuit (PVC)
double-sided (DS) DVD
20. Aka floating-point unit.
share
contrast ratio
FPU
AGP
21. A term applied to a CPU - motherboard - or other components that conform to the newer 64-bit architecture. Also referred to as 64-bit.
local area network (LAN)
x86-64
Program Compatibility Wizard
Integrated Access Device (IAD)
22. The difference in value between a display's brightest white and darkest black. Modern LCD displays have a contrast ratio of 500:1 or greater.
version
expansion bus
contrast ratio
monitor
23. A data encryption technology used for securing data transmitted over the Internet. TLS succeeded SSL.
System Management Mode (SMM)
transport layer security (TLS)
chipset
DisplayPort
24. A server containing source files for installing software onto client computers. The shared folder containing these files is a software distribution point.
POST
distribution server
fiber-optic cable
FAT32
25. Aka Encrypting File System (EFS).
ICMP
EFS
DNS
VGA
26. A standardized document that contains general information - ingredients - and fire and explosion warnings as well as health - disposal - and safe transportation information about a particular product. Any manufacturer that sells a potentially hazardo
driver signing
material safety data sheet (MSDS)
stuck pixel
hot spot
27. Aka direct current.
Enhanced IDE (EIDE)
Service Set ID (SSID)
asymmetrical digital subscriber line (ADSL)
DC
28. The hardware architecture - including the CPU - BIOS - and chipset.
computer platform
value entry
Program Compatibility Wizard
customer premises equipment (CPE)
29. A virus that gains access to a computer by masquerading as a harmless program that a user innocently installs on the computer.
expansion card
rootkit
Trojan horse
T-carrier system
30. A drive that can write either to CD-R discs or to specially designed CD-RW discs. In the case of the CD-RW discs - the drive can write more than once to the same portion of disc - overwriting old data.
redundant array of independent disks (RAID)
DDR
CD-RW (CD-rewritable)
component video
31. A chip that retains system settings such as the time - keyboard settings - and boot sequence.
service pack
complementary metal-oxide semiconductor (CMOS)
volts
spim
32. The successor to the Mini PCI. It has a 64-bit data bus and is half the size of a Mini PCI Card.
Quick Launch bar
magnetic mass storage
PCIe Mini Card
media bay
33. A network service that handles the requests for Internet services - such as Web pages - files on an FTP server - and mail for a proxy client without exposing that client's IP address to the Internet. There is specific proxy server and client software
HDMI
permission
proxy server
bidirectional mode
34. Aka pointing stick.
TrackPoint
point stick
1000Base-T
CD
35. A perpetrator of malicious software attacks against computers and networks. Also called a cracker.
FAT32
input/out (I/O)
hacker
stuck pixel
36. Aka liquid crystal display.
LCD
Distributed File System (DFS)
trusted platform module (TPM)
pop-up blocker
37. A fiber-optic connector that resembles an RJ-45 network connector and is less expensive and easier to work with than ST or SC connectors.
NetBIOS
arithmetic logic unit (ALU)
docking station
Mechanical Transfer Registered Jack (MT-RJ) connector
38. Introduced in 1993 - the most common expansion bus architecture in PCs in the mid 1990s. It transfers data in parallel over a data bus that is either 32- or 64-bits wide.
dial-up modem
code signing
mounted drive
peripheral component interconnect (PCI)
39. A special terminating stick that must be inserted into the open RIMM sockets.
continuity RIMM (CRIMM)
DVI-A
cathode ray tube (CRT) monitor
Enable Boot Logging
40. A communication service provided over a telecommunications network or computer network. A VC logically resembles a circuit while passing over a complex routed or switched network - such as the phone company's frame relay network.
virtual circuit (VC)
password cracker
IP router
service pack
41. A connector that is slightly larger than an RJ-11 connector and contains eight wires. RJ-45 connectors most commonly attach twisted-pair cables to Ethernet network cards.
RJ-45
DVD-ROM
SD Card
DMA controller
42. A protocol used with WPA wireless encryption that was broken by hackers.
mainboard
T1
frame relay
Temporal Key Integrity Protocol (TKIP)
43. The fine copper lines that are the electronic circuits through which power - data - and control signals travel on a circuit board.
jumper
system attribute
traces
Advanced Technology Attachment (ATA)
44. A portion of a computer's chipset that controls communications between the CPU and such I/O busses as USB - IDE - PS2 - SATA - and others.
status light indicator
Wi-Fi Protected Access 2 (WPA2)
Southbridge
patch
45. A video mode with a maximum graphics resolution of 1024
motherboard
dual-core CPU
XGA
SLI
46. The act of writing to two disk drives at the same time - creating identical drives.
local KVM switch
COMx
Super Video
mirroring
47. A type of printer that uses a matrix of pins striking paper through an ink ribbon to create dots on the paper - forming alphanumeric characters and graphic images.
DXDIAG
processor
Tablet PC
dot matrix printer
48. In reference to the Windows operating systems - one that can utilize up to 4 GB of address space.
fraud
long filename (LFN)
32-bit
ALU
49. A CPU containing four CPU cores.
DVD-18
Balanced Technology eXtended
quad-core CPU
PS/2
50. Any video adapter or monitor that exceeds the VGA standard in resolution and color depth with a maximum resolution of 1600
super video graphics array (SVGA)
vertical position
plug and play (PnP)
coaxial cable