SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia A + Certification
Start Test
Study First
Subjects
:
certifications
,
comptia-a-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The appropriate responses that you make during a conversation.
straight-tip (ST) connector
active speaking
double-sided (DS) DVD
monitor
2. The plug at the end of a cable or the port or connection point on a computer or device.
PVC
NTFS
connector
Return To OS Choices menu
3. Things used for authentication - such as something you know - something you have - or something you are. Authentication involves one or more of these factors and can - therefore - be one-factor - two-factor - or three-factor authentication.
mobo
surge suppressor
CompactFlash
authentication factor
4. Aka secure socket layer.
SSL
CMOS
registry
portable computer
5. A computer (or dedicated device) that sits between a private network and an untrusted network and examines all traffic in and out of the network it is protecting. It will block any traffic it recognizes as a potential threat - using a variety of tech
802.11a
UPS
Infrared Data Association (IrDA)
firewall
6. Aka Advanced Technology eXtended.
CSU
ATX
system bus
Integrated Drive Electronics (IDE)
7. The use of a biometric for authentication.
digital video discs
biometric logon
MicroDIMM
ROM
8. A laptop in which the display is an integrated digitizer.
Tablet PC
DC
active listening
drive lock password
9. A Windows Advanced Options menu choice that restores a group of registry keys containing system settings such as services and drivers. These are the last settings that worked - and you have only a narrow window of opportunity to use Last Known Good
MMC
Last Known Good Configuration
universal asynchronous receiver/transmitter (UART)
DDR3
10. A common connector used to connect a power supply to internal peripherals.
VC
molex connector
registry key
synchronous dynamic RAM
11. Aka digital video interface.
DVI
plug and play (PnP)
C
L1 cache
12. In an IP configuration - the address of the local router that acts as a gateway from the local network to other IP networks.
cable select
EPROM
permission
default gateway
13. In reference to computers - the pathways or methods for what goes into a computer in the form of data and instructions and similarly what comes out of the computer in many forms - including an onscreen display - a printout sent to a printer - or data
FAT16
DIP switch
phishing
input/out (I/O)
14. Aka thumb drive.
flash drive
Windows Explorer
electromagnetic interference (EMI)
pin grid array (PGA)
15. Aka Small Outline DIMM.
SODIMM
Hypertext Markup Language (HTML)
IEEE 1394a
Address Resolution Protocol (ARP)
16. Aka capture card.
charging
P412V
TV tuner card
Multilingual User Interface (MUI)
17. Fiber-optic cable in which multiple light waves can pass simultaneously. Usually larger in diameter than single-mode fiber; and each wave uses a certain portion of the fiber cable for transmission.
SCSI ID
network interface card (NIC)
multimode fiber (MMF)
Rambus Dynamic RAM (RDRAM)
18. A computer circuit board that attaches to and controls SCSI devices.
mini-audio connector
SCSI host adapter
enhanced parallel port (EPP) mode
ACL
19. Storage media that is removable - meaning the drive stays in place - while the media (disk - disc - or tape) is removed and replaced with another disk - disc - or tape.
active communication
removable storage
virtual private network (VPN)
port
20. A setting on an LCD display that adjusts the viewable area of the display horizontally.
System File Checker (SFC)
repeater
horizontal position
SONET
21. A type of switched network used by phone companies.
DoS Attack
daughter card
asynchronous transfer mode (ATM)
BTX
22. A wireless network standard that defines speeds of up to 600 Mbps. It is downward-compatible with 802.11a - 802.11b - and 802.11g.
surge protector
mounted drive
update
802.11n
23. Another name for a motherboard in a laptop.
active listening
OCR
cluster
processor board
24. A utility in Windows XP and Windows 2000 for gathering and viewing performance data involving memory - disks - processors - networks - and other objectives.
single inline memory module (SIMM)
HTTP
electronic KVM switch
System Monitor
25. Describes the VGA mode color setting that - although it can produce around 16 million different colors - can only display up to 256 different colors at a time.
DVI
DDR3 SDRAM
8-bit high color
IDE
26. The moving of data from one storage device to another.
ALU
access control entry (ACE)
KVM switch
data migration
27. Aka top-level domain.
DIP switch
EVGA
TLD
Dynamic Host Configuration Protocol (DHCP)
28. Aka external cache.
electromagnetic interference (EMI)
LBA
watts
Level 3 (L3) cache
29. A wireless network standard that uses the 2.4 GHz band at a speed of up to 54 Mbps. It is downward-compatible with 802.11b.
802.11g
real-time clock (RTC)
router
DVI-D
30. A misnomer - referring to the BIOS settings that are stored in a CMOS chip.
DNS Server
DVI-D
CMOS settings
cleaning blade
31. A file attribute that is given to a file to indicate it should not be visible in Windows Explorer unless View settings override the attribute and allow the file to be shown.
hidden attribute
InterNational Committee on Information Technology Standards (INCITS)
gadget
DNS
32. Digital versatile disc (DVD) discs that can be written to once - but data cannot be overwritten. This term also refers to the drives that can write to these discs.
DVD
loopback plug
Compact Disc-Read-Only Memory (CD-ROM)
DVD-R
33. One of the two main protocols of the TCP/IP protocol suite - TCP breaks the data into chunks - called datagrams. Each datagram also contains information - stored in a header - which is used by the TCP protocol on the receiving end to reassemble the c
local KVM switch
flash memory
Transmission Control Protocol (TCP)
LAN
34. A network connection device at the core of a wireless network.
time to live (TTL)
active communication
AMR
wireless access point (WAP)
35. An Advanced Options menu choice that creates a log of the Windows startup in a file named NTBTLOG.TXT and saved in thesystemroot folder (normally C:Windows).
TTL
EVGA
Enable Boot Logging
FireWire
36. Aka hacker.
cracker
SSL
SLI
APIPA
37. Aka video RAM.
local group account
Web browser
VRAM
striping with interleave parity
38. A protocol used to resolve an IP address to a MAC address.
solid-state drive (SSD)
PVC
malware
Address Resolution Protocol (ARP)
39. The utility to use when doing a single data and settings transfer to a new Windows Vista computer from one running Windows XP or Windows Vista.
enhanced capability port (ECP) mode
Windows Easy Transfer (WET)
Li-ion
local area network (LAN)
40. Aka motherboard.
PPTP
password
planar board
IEEE 1284
41. A socket for a PGA CPU that has a retention lever as well as contacts to match the number of pins on the CPU. The lever is used to attach the CPU to the socket in a manner that does not require force to insert or to remove the CPU.
FireWire
solid ink
netbook
zero insertion force (ZIF) socket
42. An external serial bus standardized by the IEEE. Apple first developed it as FireWire. Other manufacturers call it i.link or Lynx. It can support up to 63 daisy-chained devices. Since the introduction of the faster update - IEEE 1394b - the original
Multilingual User Interface (MUI)
C
IEEE 1394
sidebar
43. A portable computer small enough to fit in your hand - also referred to as a "palmtop" computer. Because it is so small - a PDA does not have the functionality of a laptop or desktop computer. In other words - a typical PDA allows you to perform only
Personal Digital Assistant (PDA)
CRIMM
system area
Debugging Mode
44. The traditional wired telephone network.
extending extractor
plain-old telephone service (POTS)
surge suppressor
netbook
45. Aka Wireless Fidelity.
I/O
virtual circuit (VC)
Wi-Fi
SRAM
46. A technology developed in the 1980s for storing data. Variations of this format are in use today.
lithium-ion (Li-ion) battery
spindle
active listening
digital linear tape (DLT)
47. Data storage technology with no moving mechanical parts that uses large-capacity - nonvolatile memory - commonly calledflash memory or solid-state drives.
BitLocker drive encryption
solid-state storage
x86-64
Speaker On/Off key
48. A connector that contains two to four wires and usually attaches phone cables to modems and to wall-mounted phone jacks.
TrackPoint
luminance
radio frequency (RF)
RJ-11
49. Aka central processing unit.
land-grid array (LGA)
CPU
worm
planar board
50. A registry key that exists within another key.
dual inline memory module (DIMM)
composite video
User State Migration Tool (USMT)
subkey