Test your basic knowledge |

Comptia A + Certification

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Aka Serial Attached SCSI.






2. A virus that gains access to a computer by masquerading as a harmless program that a user innocently installs on the computer.






3. A type of RIMM memory module used in laptops.






4. Aka Encrypting File System (EFS).






5. Aka security auditing.






6. A special terminating stick that must be inserted into the open RIMM sockets.






7. An Intel standard for starting up a computer over the network - without relying on a disk-based operating system. Used to install a new operating system or run diagnostics software.






8. Aka thumb drive.






9. A generic reference to a PC's serial communications port - in which the x represents the port number.






10. Aka Sony/Philips Digital Interface.






11. A technology for transferring serial data at high speeds. Also known as low-voltage differential signaling (LVDS).






12. The second version of the IEEE 1394 standard; it supports speeds up to 3.2 Gbps and distances of up to 100 meters.






13. A process that places the logical structure of a file system on a partitioned volume.






14. A diagram showing the purpose of each wire in a connector.






15. Aka microcode.






16. A drive that can write either to CD-R discs or to specially designed CD-RW discs. In the case of the CD-RW discs - the drive can write more than once to the same portion of disc - overwriting old data.






17. A sleep mode that is available on any computer that supports ACPI power management. It conserves power while saving the desktop in RAM memory in a work state. To resume - you simply press the power button - and the desktop is quickly displayed.






18. The chunks into which the TCP protocol packages data. In addition to the data - each datagram contains information - stored in a header - which is used by the TCP protocol on the receiving end to reassemble the chunks of data into the original messag






19. Aka radio frequency.






20. Using the same cabling as 10BaseT - Fast Ethernet - or 100Base-T - operates at 100 Mbps and uses different network interface cards.






21. A Windows folder that contains numerous applets you can use to adjust the configuration of many different aspects of the OS.






22. Aka Internet service provider.






23. A partition type that can exist on a basic disk and have one or more logical drive letters assigned to it. A Windows operating system cannot boot from an extended partition.






24. Aka audio modem riser.






25. The former name of the Parallel AT Attachment (PATA) interface standard.






26. Aka Address Resolution Protocol.






27. A device that converts DC current to AC. An inverter is required in a laptop to provide the AC current required by the display.






28. A private internetwork.






29. Aka Small Outline DIMM.






30. A measurement of the pressure of electrons - the electromotive force. It is calculated by the formula volts = watts / amps.






31. Slang for motherboard.






32. A TPM is a special microchip - installed on a motherboard - that stores passwords - keys - and digital certificates. Various services - such as BitLocker can store such security data in this chip.






33. In a CPU - special memory that resides within the CPU's core and is used to temporarily store instructions and data in order to increase the processing speed. Also called L1 cache.






34. Aka Wired Equivalent Privacy.






35. Aka electromagnetic pulse.






36. An interface standard developed by the American National Standards Institute (ANSI) - it is used for both internal and external hard drives and optical drives as well as devices such as printers - modems - scanners - and many other peripherals.






37. Aka Wireless Fidelity.






38. Operating system interface settings - such as the language used and the date - time - and currency formats.






39. Aka paging file.






40. The first physical sector on a hard disk - which contains the initial boot program that the BIOS loads into memory during bootup. It also contains the partition table.






41. A device that sits at the connection between networks and routes packets based on their logical destination addresses.






42. The order in which the BIOS will search devices for an operating system to start.






43. An adapter card used to run a special diagnostic test on a computer as it is powering up. These tests usually go beyond those performed by the system BIOS-based POST.






44. In a Microsoft Windows network - an administrative organization with a centralized security accounts database maintained on one or more special servers called domain controllers. This centralized database contains accounts for users - groups - and co






45. A plug designed for testing a specific port type (e.g. - serial - parallel - or USB). The plug does not connect to a cable but reroutes the sending pins to the receiving pins. Using special software on the computer - a loopback test is performed in w






46. A dedicated computer that stores data and provides print services or other capabilities to network clients.






47. In networking - the authorization to access a computer or resource on a computer. Specific permission levels include read - change - modify - etc.






48. A single dot on a display screen. A contraction of "Picture Element."






49. Aka access control entry.






50. A firewall service that inspects (or filters) each packet that enters or leaves the network - applying a set of security rules defined by a network administrator - and not allowing packets that fail inspection to pass between networks.