SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia A + Certification
Start Test
Study First
Subjects
:
certifications
,
comptia-a-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The practice of forcing a CPU or other computer component to run at a higher clock rate than the manufacturer intended.
single-mode fiber (SMF)
case fan
overclocking
DVD-5
2. A user interface that takes advantage of the video system's graphics capabilities for manipulated graphic elements that represent objects and tasks.
DVD-ROM
fiber-optic cable
graphical user interface (GUI)
digital signature
3. In reference to the Windows operating systems - one that can utilize more than 4 GB of address space. Depending on the version - 64-bit Windows can address a maximum of from 8 to 192 GB.
vertical position
serial ATA (SATA)
cable tester
64-bit
4. The use by the operating system of a portion of hard disk as memory.
Safe Mode
virtual memory
logical block address (LBA)
TLD
5. A modified version of FAT12 and FAT16 used in Windows since Windows 95.
datagram
identity theft
flat panel display (FPD)
virtual file allocation table (VFAT)
6. A communication service provided over a telecommunications network or computer network. A VC logically resembles a circuit while passing over a complex routed or switched network - such as the phone company's frame relay network.
USB
Task Scheduler
microcode
virtual circuit (VC)
7. A network connection over long distances - traditionally using phone lines or satellite communications.
wide area network (WAN)
luminance
EVGA
SCSI ID
8. A processor packaging that uses pads on the processor that come in contact with pins in the socket on the motherboard - permitting a higher density than possible with PGA.
secondary master
land-grid array (LGA)
permission
Type II
9. A virtual tunnel created between two endpoints over an untrusted network. The tunnel is created by encapsulating the packets within special packets for the tunnel. Other security methods are also usually applied to a VPN - such as encrypting the data
even parity
enhanced parallel port (EPP) mode
composite video
virtual private network (VPN)
10. A command-line utility - installed with the TCP/IP protocol suite - that traces the route taken by packets to a destination.
DVD
TRACERT
line printer
local user account
11. Malware that hides itself from detection by antimalware programs; it is installed on a computer by someone who has privileged access to the computer.
rootkit
vertical position
Task Scheduler
Scalable Link Interface (SLI)
12. The Microsoft Website from which you can download updates to Windows.
second-level domain (SLD)
memory
smart card reader
Windows Update Website
13. The minimum disk space that a file can use - allocated in the file system.
communication network riser (CNR)
Level 3 (L3) cache
cluster
active listening
14. A firewall service that inspects (or filters) each packet that enters or leaves the network - applying a set of security rules defined by a network administrator - and not allowing packets that fail inspection to pass between networks.
dial-up
IP packet filtering
SCSI host adapter
coaxial cable
15. Used to represent the chrominance signal in S-Video.
C
wireless access point (WAP)
cache controller
sector translation
16. Aka alternating current.
DisplayPort
recently used programs list
Telnet
AC
17. A type of printer that uses a matrix of pins striking paper through an ink ribbon to create dots on the paper - forming alphanumeric characters and graphic images.
proxy server
analog LCD display
dot matrix printer
LPT1
18. A service on a laptop that configures a card after socket services has recognized it.
card services
digital versatile disc (DVD)
encryption
FSB
19. Aka taskbar.
long filename (LFN)
Enable Low Resolution Video
Start Bar
Reliability and Performance Monitor
20. A network connection device at the core of a wireless network.
Global System for Mobile communications (GSM)
BTX
wireless access point (WAP)
backup media
21. An address that a DHCP client will assign to itself after requesting an address and failing to receive one from a DHCP server. The address it will assign is in the 169.254 /16 network - which is the range of addresses from 169.254.0.1 to 169.254.255.
virtual circuit (VC)
IEEE
Automatic Private IP Address (APIPA)
even parity
22. A technology for transferring serial data at high speeds. Also known as low-voltage differential signaling (LVDS).
low-voltage differential (LVD)
share
IRQ
bit width
23. Software that takes a scanned image and interprets the patterns in the image into alphanumeric characters.
RIP
Small Outline RIMM (SORIMM)
optical character recognition (OCR)
Mini PCI
24. A memory error-checking method in which the parity bit is used to ensure that the total number of 1s in the data stream is even.
charging
even parity
root directory
virtual circuit (VC)
25. A measurement of the volume of electrons - also called current. It is calculated with the formula amps = watts / volts.
address bus
amperes (amps)
ATX
DVD
26. One of many low-level instructions built into the control unit of a CPU. Also called a microprogram.
BIOS
FAT table
power state
microcode
27. Windows run-line utility for testing the DirectX support. Launch this program when experiencing video problems and/or audio problems when running DirectX applications.
flash ROM
DXDIAG
mainboard
HD-DVD
28. The use of a biometric for authentication.
biometric logon
Basic Service Set (BSS)
horizontal position
laptop
29. A power management standard - introduced by Intel in 1992 - that defines four power-usage operating levels.
Advanced Power Management (APM)
repeater
embedded systems
DVD+RW
30. Aka time to live.
TTL
cable tester
computer platform
traces
31. A program installed and activated on a computer without the user's knowledge or permission. At the least - the intent is mischief - but most often the intent is to cause damage.
virus
peripheral component interconnect (PCI)
Trojan horse
expansion card
32. Things used for authentication - such as something you know - something you have - or something you are. Authentication involves one or more of these factors and can - therefore - be one-factor - two-factor - or three-factor authentication.
adware
digital LCD display
authentication factor
proxy server
33. Also called striping with distributed parity or striping with interleave parity - this RAID method involves a set of disks in which every time data is written to disk - a portion is written to each disk in turn - creating a "stripe" of data across th
electrostatic discharge (ESD)
CPU
troubleshooting
RAID 5
34. Aka antistatic mat.
key fob
WPA2
grounding mat
Multimedia Terminal Adapter (MTA)
35. In the Windows GUI - a horizontal bar normally positioned across the bottom of the desktop containing a Start button - the Quick Launch toolbar - buttons for running programs - and at the far right - the notification area. Sometimes called the Start
RGB video
taskbar
File Transfer Protocol (FTP)
contrast ratio
36. A type of riser card that connects directly into a motherboard and adds no additional functionality of its own - but extends the expansion bus and allows expansion cards to be added in a different physical orientation.
read/write head
Southbridge
daughter card
RJ-45
37. An Advanced Options menu choice that simply causes Windows to restart normally (if it can).
wireless access point (WAP)
heat sink compound
Start Windows Normally
Internet service provider (ISP)
38. A CPU containing four CPU cores.
Windows Easy Transfer (WET)
quad-core CPU
archive attribute
IDE
39. A protocol that allows two devices to connect - authenticate - and negotiate what protocols they will use (almost always TCP/IP).
point-to-point protocol (PPP)
DMZ
RIMM
dial-up modem
40. A technology developed in the 1980s for storing data. Variations of this format are in use today.
Ethernet
pit
digital linear tape (DLT)
transfer corona wire
41. A cooling system that uses liquid to transfer heat away from components.
cache controller
liquid cooling system
POP
patch
42. A straight - round connector used to connect fiber-optic cabling to a network device. It has a twist-type coupling.
straight-tip (ST) connector
LBA
pinned items list
address bus
43. Aka low-voltage differential.
surge suppressor
low-voltage differential signaling (LVDS)
shadow mask
IEEE 1284
44. An input device that uses a stylus. Available as an external device - it uses touch screen technology and is usually at least the size of a sheet of paper. Also called a digitizer.
auditing
MSINFO32.EXE
Universal Serial Bus (USB)
digitizing tablet
45. Memory locations within a CPU that is used as a scratch pad for calculations. Modern CPUs have dedicated registers for specific functions and general-purpose registers for multiple purposes.
CSU
register
capacity
Wi-Fi Protected Access (WPA)
46. Unsolicited messages sent over an instant messaging service - such as Windows Messenger.
Blu-ray disc
Post Office Protocol (POP)
Spam over Instant Messaging (spim)
copy
47. Aka enhanced parallel port (EPP) mode.
EPP
Level 2 (L2) cache
bus
uninterruptible power supply (UPS)
48. A communications network made up of personal computing devices - such as computers - telephones - and personal digital assistants.
Advanced Technology eXtended (ATX)
registry
internetwork
personal area network (PAN)
49. The logical structure on disk that allows the operating system to save and retrieve files. Examples of file systems are FAT and NTFS. Both of these file system have different versions - such as FAT12 - FAT16 - FAT32 - and NTFS 4.0 and NTFS 5.0.
P1 power connector
file system
social engineering
lit pixel
50. Aka accelerated graphics port.
Enable Boot Logging
Video Electronics Standards Organization (VESA)
AGP
fraud