SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia A + Certification
Start Test
Study First
Subjects
:
certifications
,
comptia-a-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A round connector that gets its name from Deutsche Industrie Norm - a German standards organization. Normally a round connector with a circular or semicircle of pins.
transfer corona wire
worm
riser card
DIN connector
2. Aka Domain Name Service.
partition
touch screen
DNS
discretion
3. Circuitry in a PC on an adapter card - or directly on the motherboard - that controls the output from the PC to the display device.
super video graphics array (SVGA)
video adapter
FAT32
DVD-RAM
4. The plug at the end of a cable or the port or connection point on a computer or device.
connector
thermal paste
Advanced Technology Attachment (ATA)
edition
5. A 20- or 24- pin connector that supplies power from a PC's power supply to the motherboard.
P1 power connector
TWAIN
RAMBUS Inline Memory Module (RIMM)
recently used programs list
6. Aka serial ATA.
PCI-E
SATA
Small Outline DIMM (SODIMM)
Transmission Control Protocol (TCP)
7. A WAN connection that uses existing copper telephone wire for the communication circuit. To accomplish this - a DSL modem splits the existing phone line into two bands; voice transmission uses the frequencies below 4000 Hz - whereas data transmission
digital subscriber line (DSL)
accessory bay
multimeter
DDoS Attack
8. Aka complementary metal-oxide semiconductor.
POST card
CMOS
format
ACT
9. A double-sided - double-layer digital versatile disc (DVD) that stores 17.08 GB of data - or over eight hours of video.
DIMM
NETSTAT
DVD-18
DVI
10. A file or folder name that breaks the 8.3 file-naming convention used in the FAT file system. This term continues to be used on newer file systems.
Last Known Good Configuration
software firewall
long filename (LFN)
shared video memory
11. Aka pin grid array.
personal firewall
inactive KVM switch
PGA
LVDS
12. Aka Hypertext Markup Language (HTML).
HTML
domain
peer-to-peer network
netbook
13. The type of battery used in the first portable PCs - which was heavy and inefficient.
Type III
dialer
nickel-cadmium (NiCD)
WPA
14. A slide switch on the exterior of a PC power supply used to switch between two input voltages.
IEC-320 connector
file allocation table (FAT)
interrupt request line (IRQ)
LPT
15. An action - such as the CTRL-ALT-DELETE key combination or the insertion of a smart card - that clears memory of certain types of viruses before a user logs on.
cable select
secure attention sequence (SAS)
NetBIOS
DDR2 SDRAM
16. A parallel port mode that has the same performance as ECP but is used with parallel devices other than printers and scanners.
high-voltage power supply (HVPS)
thumb drive
switch
enhanced parallel port (EPP) mode
17. Aka Serial Attached SCSI.
SAS
100Base-T
MicroDIMM
Debugging Mode
18. Aka Wireless Fidelity.
Reliability and Performance Monitor
reactivate
Wi-Fi
basic disk
19. The former name of the Parallel AT Attachment (PATA) interface standard.
hot swapping
Advanced Technology Attachment (ATA)
real-time clock (RTC)
Windows XP Files and Settings Transfer Wizard
20. Aka digitizing tablet.
DVI
Remote Assistance
digitizer
Parallel AT Attachment (PATA)
21. Aka Hypertext Transfer Protocol (HTTP).
SODIMM
HTTP
TRACERT
docking station
22. The practice of applying a digital signature to device driver code.
analog LCD display
ATX power supply
driver signing
bandwidth
23. A process applied to digitally signed code to unencrypt the signature data and use the information to verify the program code was not modified since the signature was added.
P1 power connector
digital video recorder (DVR)
file signature verification
SDRAM
24. Not revealing information about someone that would be harmful to or embarrass him or her.
redundant array of independent disks (RAID)
discretion
paging file
Secure Digital (SD) Card
25. A command-line command - installed with the TCP/IP protocol suite - which provides statistical information about the TCP/IP protocols and network connections involving your computer - depending on the switches you use when you enter the command.
identity theft
file signature verification
NETSTAT
embedded systems
26. A virtual tunnel created between two endpoints over an untrusted network. The tunnel is created by encapsulating the packets within special packets for the tunnel. Other security methods are also usually applied to a VPN - such as encrypting the data
DRAM
virtual private network (VPN)
ASR
64-bit
27. The format in which IP addresses are usually shown - with decimal numbers separated by "dots" as in 192.168.100.2.
dotted decimal notation
terminating resistor
remote KVM switch
top-level domain (TLD)
28. In an operating system GUI - a tiny graphic representing an application - folder - disk - menu item - or other entity.
icon
Basic Service Set (BSS)
active communication
Gigabit Ethernet
29. This attack occurs when someone sends a large number of requests to a server - overwhelming the server so it stops functioning on the network.
multiplexing
denial of service (DoS) attack
DVD-R
dual inline memory module (DIMM)
30. In Windows - an Advanced Options menu choice that starts Windows without several drivers and components and loads only very basic - non-vendor-specific drivers for mouse - video - keyboard - mass storage - and system services. It also displays in low
Safe Mode With Networking
LPT2
eSATA
High-Bandwidth Digital Content Protection (HDCP)
31. Memory that does not require power to keep stored data intact. Also called flash memory.
discretion
partition
Safe Mode With Networking
nonvolatile memory
32. A CPU containing two CPU cores.
dual-core CPU
complementary metal-oxide semiconductor (CMOS)
portable computer
1000Base-T
33. Using the same cabling as 10BaseT - Fast Ethernet - or 100Base-T - operates at 100 Mbps and uses different network interface cards.
Internet Message Access Protocol (IMAP)
background process
Windows Explorer
Fast Ethernet
34. A TPM is a special microchip - installed on a motherboard - that stores passwords - keys - and digital certificates. Various services - such as BitLocker can store such security data in this chip.
Infrared (IR)
tape drive
trusted platform module (TPM)
mirroring
35. Slang for motherboard.
hot-swappable drive
v-hold
1000Base-T
mobo
36. Sony-Philips digital interface format
S/PDIF
modem
TWAIN
watts
37. An obsolete memory module standard that was produced in 30-pin and 72-pin sizes. Thirty-pin SIMMs are 8-bit - and 72-pin SIMMs are 32-bit.
cellular WAN
full-duplex
single inline memory module (SIMM)
transport layer security (TLS)
38. A type of memory checking in which every eight-bit byte of data is accompanied by a ninth bit (the parity bit) - which is used to determine the presence of errors in the data. The two types of parity are odd and even.
parity
social engineering
drive lock password
dot matrix printer
39. The "activity" status light on a NIC that indicates data is being transmitted.
VESA
MSCONFIG
ACT
Debugging Mode
40. A 9-pin D-shell connector.
DB-9
modding
TCP/IP
System Management Mode (SMM)
41. A file used during an unattended installation of Windows. It provides a script of responses to the questions Setup asks so the user does not have to answer them manually.
answer file
mode
flash ROM
transferring
42. Aka electromagnetic pulse.
DVD-10
system attribute
UXGA
EMP
43. An extension of the SATA standard for external SATA devices - with speeds triple that of USB 2.0.
cellular WAN
FAT32
External Serial ATA (eSATA)
dead pixel
44. The number of colors used by a display.
service pack
color depth
UDF
drive path
45. Aka distributed denial of service attack.
DDoS Attack
troubleshooting
TRACERT
bluesnarfing
46. The delivery of electricity (as from a wall outlet) in which the flow of electrons reverses periodically and has alternating positive and negative values.
plug and play (PnP)
uninterruptible power supply (UPS)
alternating current
Emergency Repair Process
47. A fraudulent method of obtaining personal and financial information through the use of pop-ups or e-mail messages that purport to be from a legitimate organization - such as a bank - credit card company - or retailer.
background process
FAT32
phishing
inverter
48. The second version of the IEEE 1394 standard; it supports speeds up to 3.2 Gbps and distances of up to 100 meters.
IEEE 1394b
radio frequency (RF)
flash ROM
floating-point unit (FPU)
49. The act of moving through a neighborhood in a vehicle or on foot - using either a laptop equipped with Wi-Fi wireless network capability or a simple Wi-Fi sensor available for a few dollars from many sources. War drivers are searching for open hotspo
discretion
war driving
single-mode fiber (SMF)
electronic KVM switch
50. Aka logical block address.
DDR3
dynamic storage
LBA
Tablet PC