SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia A + Certification
Start Test
Study First
Subjects
:
certifications
,
comptia-a-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Aka paging file.
overclocking
swap file
local KVM switch
System Configuration Utility
2. Aka dynamic RAM.
basic input/output system (BIOS)
DRAM
POST
DVD+RW
3. A device - usually resembling a power strip - that protects equipment from power surges.
surge protector
basic storage
mini-DIN-6
auto-switching power supply
4. A Windows service that allows a user to connect remotely to a computer and run the Windows desktop on the remote computer - but have the same access as if logged on to the computer and its local network.
Remote Desktop
S/PDIF
case fan
processor bus
5. A portable computer small enough to fit in your hand - also referred to as a "palmtop" computer. Because it is so small - a PDA does not have the functionality of a laptop or desktop computer. In other words - a typical PDA allows you to perform only
SGRAM
laptop
NLX
Personal Digital Assistant (PDA)
6. Aka accelerated graphics port.
sector translation
central processing unit (CPU)
AGP
internetwork
7. Software created to perform malicious acts. Also called malicious software.
FTP
malware
single-layer (SL)
Serial Attached SCSI (SAS)
8. A firewall consisting of software that you can install on any computer - as opposed to the software built into a hardware firewall. Also called personal firewalls because they are designed to be installed on individual desktop computers.
software firewall
mini-audio connector
CMOS settings
External Serial ATA (eSATA)
9. Aka musical instrument digital interface.
archive attribute
MIDI
IEEE
system resources
10. Aka demilitarized zone.
bit width
Quick Launch bar
Internet Protocol (IP)
DMZ
11. A CRT video setting - also known as vertical hold - that holds the image vertically on the screen.
SONET
Quick Launch bar
v-hold
modding
12. Aka video RAM.
ACR
FPM
VRAM
PCIe (peripheral component interconnect express)
13. Aka Wired Equivalent Privacy.
WEP
power state
FAT16
Serial Attached SCSI (SAS)
14. Another name for a motherboard in a laptop.
processor board
POST card
degaussing
registered jack (RJ)
15. A portion of system memory used by a video adapter built into a motherboard.
peripheral component interconnect (PCI)
multifunction printers (MFDs)
single inline memory module (SIMM)
shared video memory
16. Aka network address translation.
thermal paste
FPM
mirrored set
NAT
17. Aka automated system recovery.
POP
Type I
Serial Attached SCSI (SAS)
ASR
18. When a mount point exists between a partition or volume to a folder on another volume - the drive path is the path (including a drive letter) to that partition or volume.
active matrix display
drive path
process
DRAM
19. An LCD display that uses a DB-15 connector - which means that it accepts analog signals that it converts to digital.
TLD
analog LCD display
SIMM
Program Compatibility Wizard
20. A protocol that transfers e-mail messages between mail servers. Clients also use this protocol to send e-mail to mail servers.
Simple Mail Transfer Protocol (SMTP)
Gigabit Ethernet
chipset
Lucent connector (LC)
21. The disruption of signal transmission caused by the radiation of electrical and magnetic fields. Electric motors are a common source of EMI.
electromagnetic interference (EMI)
Voice over IP (VoIP)
BIOS settings
dot matrix printer
22. In networking - this is a set of rules for using network hardware and software. In most discussions about networks - this term is assigned to certain network software components.
Scalable Link Interface (SLI)
mode
base priority level
protocol
23. Device that stores digital data on magnetized media - such as floppy disks - the metal platters in hard disk drives - and magnetic tape media used in tape drives.
UDF
External Serial ATA (eSATA)
magnetic mass storage
system bus
24. A printer that includes one or more other functions - such as a scanner and fax machine.
ISDN
multifunction printers (MFDs)
proxy server
IEEE
25. An identifier assigned to a process when it starts.
Device Manager
process ID
bidirectional mode
pixel
26. Aka Internet Message Access Protocol (IMAP).
IMAP
DB-25
virtual memory
server
27. A laptop in which the display is an integrated digitizer.
Tablet PC
hot swapping
CMOS
System Management Mode (SMM)
28. Wide-ultra-extended graphics array
American National Standards Institute (ANSI)
WUXGA
plug and play (PnP)
POST
29. The plug at the end of a cable or the port or connection point on a computer or device.
connector
SMTP
socket services
display resolution
30. A communications system now used for data communications via satellite that usually uses microwave radio frequencies and requires a dish antenna - receiver - and transmitter.
satellite communications
flash BIOS
SCSI host adapter
inactive KVM switch
31. A service implemented on Windows Servers that hides the complexity of the network from end users in that it makes files that are distributed across multiple servers appear as if they are in one place.
notification area
Distributed File System (DFS)
thumb drive
pop-up download
32. Aka Domain Name Service.
flash ROM
DNS
single inline memory module (SIMM)
control unit
33. A portion of a program that can run separately from and concurrently with other portions of the program. Also called thread of execution.
CRIMM
partition
PING
thread
34. Aka plain-old telephone service.
POTS
100Base-T
mini-audio connector
Li-ion
35. A data encryption technology used for securing data transmitted over the Internet. TLS succeeded SSL.
attended installation
bandwidth
AMD
transport layer security (TLS)
36. Specialized hardware used to create and manage a RAID array.
PCI
field replaceable unit (FRU)
RAID controller
PROM
37. Program code that provides a way for someone to gain access to a computer while bypassing security. Only a person who knows how the back door works can use it - but once in - that individual has the same access as the host program to all the internal
soft power
back door
multi-monitor
Internet Protocol (IP)
38. The act of covertly obtaining information broadcast from wireless devices using the Bluetooth standard.
DDR SDRAM
liquid cooling system
bluesnarfing
IEEE 1394b
39. In the laser printing process - the step in which the toner on the drum is transferred to the paper.
Blu-ray disc
transferring
DIN connector
Voice over IP (VoIP)
40. A protocol that allows two devices to connect - authenticate - and negotiate what protocols they will use (almost always TCP/IP).
SD Card
analog modem
point-to-point protocol (PPP)
High-Definition Multimedia Interface (HDMI)
41. A type of switched network used by phone companies.
RIP
asynchronous transfer mode (ATM)
Internet
CPE
42. Aka front side bus.
FSB
ad hoc mode
Address Resolution Protocol (ARP)
secondary master
43. The protocol for connecting optical drives and tape drives to an ATA channel.
striping with interleave parity
proxy server
8-bit high color
ATA Packet Interface (ATAPI)
44. A Windows program that launches Internet Explorer and connects to the Windows Update Website.
striping with distributed parity
RJ-11
vertical position
Windows Update
45. A program file or some special data file that is part of the operating system and is very important to proper operation of the OS.
LCD
DVD-18
system file
processor bus
46. A coherent and concentrated light beam - also simply called a laser.
AMR
laser beam
SPGA (staggered pin grid array)
video RAM (VRAM)
47. In computer networking - a network located between a private network and the Internet with a firewall on both sides. A DMZ contains servers offering services to users on the Internet and inside the protected private network.
DDR2 SDRAM
continuity RIMM (CRIMM)
demilitarized zone (DMZ)
security auditing
48. A network connection device that passes traffic between two networks - using the physical address (MAC address) of the destination device.
bridge
low-voltage differential signaling (LVDS)
touch screen
intranet
49. A video interface - also called Super Video - that transmits video using two signals
S-Video
DVD-R
RIP
expansion bus
50. A display device that contains a cathode ray tube and uses an electron gun to activate phosphors behind the screen at the front of the tub.
Service Set ID (SSID)
DVD-Video
cathode ray tube (CRT) monitor
personal firewall