Test your basic knowledge |

Comptia A + Certification

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The second version of the IEEE 1394 standard; it supports speeds up to 3.2 Gbps and distances of up to 100 meters.






2. An LCD display using an old technology that has a grid of horizontal and vertical wires with a transistor at the end of each wire. When two transistors (one at the x-axis and one at the y-axis) send voltage along their wires - the pixel at the inters






3. Aka lithium-ion (Li-ion) battery.






4. A new level of an operating system with major changes to the core components.






5. The practice of forcing a CPU or other computer component to run at a higher clock rate than the manufacturer intended.






6. A key on a laptop that - when pressed along with the FN key - changes the laptop display brightness at the hardware level. On some laptops - when this key combination is pressed - a small brightness control panel will display on the screen. Use the u






7. This attack occurs when a massive number (up to hundreds of thousands) of computers send DoS attacks to a server - making it unavailable.






8. A file used during an unattended installation of Windows. It provides a script of responses to the questions Setup asks so the user does not have to answer them manually.






9. A metal plate behind the front of a CRT monitor that focuses the electron beams from the gun.






10. A utility that provides remote terminal emulation for connecting to computers and network devices running server software that can respond - without needing to be concerned with the actual operating system running on either system.






11. In reference to a memory module - how much information the processor can access from or write to memory in a single cycle.






12. Authentication is validation of a user account and password that occurs before the security components of Windows will give the user access to the computer.






13. Aka super video graphics array.






14. Cabling that contains a single copper wire surrounded by several layers of insulating plastic and a woven wire sheath that provides protection.






15. Aka Voice over IP (VoIP).






16. Aka motherboard.






17. A Windows Advanced Options menu choice used to send debugging information about the Windows startup over a serial cable to another computer running a special program called a debugger.






18. A computer display that uses liquid crystal or plasma technology and does not require the bulk of a large picture tube. The screen enclosure can be as thin as one to two inches.






19. A cooling fan located on a CPU.






20. A logical memory address defined in a processor's address bus that allows the system to access physical RAM or ROM memory locations.






21. An action - such as the CTRL-ALT-DELETE key combination or the insertion of a smart card - that clears memory of certain types of viruses before a user logs on.






22. Used to represent the luminance signal in S-Video.






23. Software that runs on the computers in a network and that receives services from servers.






24. An arrangement of pins on a processor in which the pins are offset in a way that allows for a higher pin density than PGA.






25. A cooling fan mounted directly on the case - as opposed to a power supply fan - which is inside the power supply.






26. The protocol used by DHCP servers and clients. A DHCP server allocates IP addresses within the scope of addresses configured on the server by an administrator. DHCP clients request IP addresses and other IP configuration settings from DHCP Servers.






27. A physical area where a Wi-Fi network connects to the Internet.






28. A chip that works with a serial port - converting outgoing data from parallel to serial and incoming data from serial to parallel.






29. A protocol used with WPA wireless encryption that was broken by hackers.






30. RAM that doubles the rate of speed at which a standard SDRAM can process data. Also called DDR and DDR1. A stick of DDR1 SDRAM has 184 pins.






31. Signals broadcast through the air.






32. A network device that is used to extend the range of a network by taking the signals received on a port from one network and regenerating (repeating) those signals to another port to transmit them on a second network.






33. A component that you can install into a system onsite - such as memory modules - heat sinks - and CMOS batteries.






34. A subpackaging of a Windows revision that contains the core OS plus a special set of features that is offered as a separate product targeted to a certain type of end user.






35. A set of behaviors for the workplace that includes how you interact with people and how you treat property.






36. Aka Address Resolution Protocol.






37. A type of computer firmware that is responsible for informing the CPU of installed devices and how to communicate with them.






38. A specialized chip that controls DMA channels.






39. Aka emergency repair disk.






40. Aka adapter card.






41. A database of all configuration settings in Windows.






42. The act of discovering the cause of a problem and correcting it.






43. In regard to Windows operating systems - a version of Windows that is designed to work with a certain manufacturer's equipment.






44. The memory space - program code - data - and system resources required by a running program.






45. A type of KVM switch that controls computers over a distance that is a function of the cabling and protocols it uses. The two types of switches are local remote KVM switch and KVM over IP.






46. In the laser printing process - the step in which the laser beam creates a negative of the image that will eventually appear on the printout. Each place that the laser beam touches loses most of its charge - creating an image - whereas the rest of th






47. The delivery of electricity (as from a wall outlet) in which the flow of electrons reverses periodically and has alternating positive and negative values.






48. A pen-sized tool that has a plunger at one end. When pressed - the plunger causes small - hooked prongs to extend from the other end of the tool for retrieving dropped objects from inside a computer.






49. A coherent and concentrated light beam - also simply called a laser.






50. In Microsoft terminology - software that contains one or more software fixes or changes to the operating system.