Test your basic knowledge |

Comptia A + Certification

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An improved version of WPA that does not support older network cards and offers both secure authentication and data encryption. It uses EAP for a variety of authentication methods






2. An early PC hard drive interface.






3. In Windows Vista - a vertical bar found by default on the right side of the desktop. Here - you will find gadgets and mini-programs.






4. Aka lit pixel.






5. A program file or some special data file that is part of the operating system and is very important to proper operation of the OS.






6. In Windows - one or more settings found in the Local Security Settings console.






7. A 3/32-inch audio connector.






8. An EIDE drive setting that has the system select the drive's role (master or slave) based on the drive's position on the cable. If the drive is on the end of the cable - it is the master drive - and if it is in the middle of the cable - it is the sla






9. A portion of a program that can run separately from and concurrently with other portions of the program. Also called thread of execution.






10. Aka Internet service provider.






11. A protocol developed in the 1980s by IBM for managing names on a network. Also used by Microsoft in early networking. Replaced by DNS on TCP/IP networks.






12. The delivery of electricity (as from a wall outlet) in which the flow of electrons reverses periodically and has alternating positive and negative values.






13. A technology that makes 802.11n speeds possible - using multiple antennas to send and receive digital data in simultaneous radio streams that increases performance.






14. This attack occurs when a massive number (up to hundreds of thousands) of computers send DoS attacks to a server - making it unavailable.






15. In the laser printing process - a blade that removes residual toner from the drum.






16. In regard to Windows operating systems - a version of Windows that is designed to work with a certain manufacturer's equipment.






17. One or more chips designed to work closely with the CPU. Two parts of this chipset are the Northbridge and the Southbridge.






18. Things used for authentication - such as something you know - something you have - or something you are. Authentication involves one or more of these factors and can - therefore - be one-factor - two-factor - or three-factor authentication.






19. A computer circuit board that attaches to and controls SCSI devices.






20. A tool used to create and manage a distribution share and various installation images.






21. In the laser printing process - the step in which the laser beam creates a negative of the image that will eventually appear on the printout. Each place that the laser beam touches loses most of its charge - creating an image - whereas the rest of th






22. Using the same cabling as 10BaseT - Fast Ethernet - or 100Base-T - operates at 100 Mbps and uses different network interface cards.






23. A type of printer that uses a film coated with colored wax that melts onto paper. These printers are similar to dye-sublimation printers but differ in two major ways: the film contains wax rather than dye - and these printers do not require special p






24. A wide area network (WAN) connection that allows a large amount of data to be transmitted. Broadband WANs includes cellular - ISDN - DSL - cable - T-carrier - satellite - and fiber.






25. A processor packaging that uses pads on the processor that come in contact with pins in the socket on the motherboard - permitting a higher density than possible with PGA.






26. A device required at both ends of a T-carrier system connection.






27. Aka optical character recognition.






28. Ultra extended graphics array - a video graphics mode with a maximum resolution of 1600






29. A communication service provided over a telecommunications network or computer network. A VC logically resembles a circuit while passing over a complex routed or switched network - such as the phone company's frame relay network.






30. A pen-sized tool that has a plunger at one end. When pressed - the plunger causes small - hooked prongs to extend from the other end of the tool for retrieving dropped objects from inside a computer.






31. In the laser printing process - the step in which the toner on the drum is transferred to the paper.






32. A specialized type of scanner that reads bar codes - which are patterns of bars of varying widths printed on labels or directly on items. The bar pattern is converted into a numeric code that is transmitted to a computer as data.






33. A memory module (stick) that installs into matching DIMM sockets found on many motherboards. The word "dual" refers to the separate pins or connections on both sides of the module and socket.






34. A process applied to digitally signed code to unencrypt the signature data and use the information to verify the program code was not modified since the signature was added.






35. A file system in which one of the basic structures is a table used for allocating space. This table is called the file allocation table (FAT).






36. A term applied to a CPU - motherboard - or other components that conform to the Intel 32-bit x86 specification. Also referred to as 32-bit.






37. Storage media that is removable - meaning the drive stays in place - while the media (disk - disc - or tape) is removed and replaced with another disk - disc - or tape.






38. Aka Internet Message Access Protocol (IMAP).






39. A part of the NTFS file system used to store a transaction-based database - with all file accesses treated as transactions - and if a transaction is not complete - NTFS will roll back to the last successful transaction.






40. A parallel port mode that has the same performance as ECP but is used with parallel devices other than printers and scanners.






41. A fiber-optic connector that has a snap coupling and - at 1.25 mm - is half the size of the SC connector. Also called a local connector.






42. A technical standards organization.






43. Any power supply that provides high voltage - such as those in laser printers and CRTs.






44. A virus that gains access to a computer by masquerading as a harmless program that a user innocently installs on the computer.






45. A registry key that exists within another key.






46. In Windows Vista and Windows 7 - an Advanced Options menu choice that starts Windows normally - except that the video mode is changed to the lowest resolution - using the currently installed video driver. This option does not switch to the basic Wind






47. Aka Advanced Power Management.






48. Aka secure socket layer.






49. An area of the Windows taskbar used by programs and some hardware devices to display status icons. Also called thenotification area or system tray.






50. A user interface that takes advantage of the video system's graphics capabilities for manipulated graphic elements that represent objects and tasks.