Test your basic knowledge |

Comptia A + Certification

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Aka High-Definition Multimedia Interface.






2. Aka digital versatile disc (DVD).






3. A connector used to attach coaxial cables to computers and network equipment. Origin of the term may be "Bayonet-Neill-Concelman" or "British Naval Connector."






4. In Windows - an Advanced Option that is only available in Windows Servers in the role of domain controllers - although it appears on the menu in non-domain controllers.






5. The read-only DVD discs sold at retail stores - containing video or software and having a maximum capacity of 15.9 GB of data. This term also applies to the drives that can only read DVDs.






6. Aka antistatic mat.






7. A DVI mode that supports downward compatibility with analog displays.






8. In Windows XP - this replaces the Emergency Repair process of Windows NT and Windows 2000. ASR is available from the Windows Backup program (NTBACKUP.EXE).






9. Aka thumb drive.






10. A power-usage level.






11. The chunks into which the TCP protocol packages data. In addition to the data - each datagram contains information - stored in a header - which is used by the TCP protocol on the receiving end to reassemble the chunks of data into the original messag






12. A version of the FAT file system used by hard drives and some flash drives (thumb drives - etc.) - using a 32-bit file allocation table.






13. Aka input/output.






14. A slide switch on the exterior of a PC power supply used to switch between two input voltages.






15. Any power supply that provides high voltage - such as those in laser printers and CRTs.






16. Aka Wi-Fi Protected Access 2.






17. Aka distributed denial of service attack.






18. A dark spot on an LCD screen caused when a transistor is permanently off.






19. A software fix for a single problem.






20. A password that meets certain criteria in order to be difficult to crack. One definition of a strong password is one that contains at least eight characters - includes a combination of letters - numbers - and other symbols ( _ - - - $ - and so on) an






21. In Windows - an Advanced Options menu choice that will start Windows without the Windows GUI (EXPLORER.EXE) and with only a simple Command Prompt window from which you can launch Windows administrative utilities.






22. The first physical sector on a floppy disk or the first sector on a hard drive partition. The boot record contains information about the OS. The boot record on a primary active partition is used to start the operating system. Also called the boot sec






23. A device required at both ends of a T-carrier system connection.






24. Aka zero insertion force (ZIF) socket.






25. A computer circuit board that attaches to and controls SCSI devices.






26. A service of the operating system on a laptop that detects when a card has been inserted.






27. A protocol for computer-to-computer (host-to-host) transfer of files over a TCP/IP network - regardless of the operating system in use.






28. One of the two prevailing CPU manufacturers.






29. [1] A device that is the central connecting point of a LAN. A hub is little more than a multiport repeater taking incoming signals on one port and repeating them to all other ports. Ethernet hubs have been largely replaced by Ethernet switches.. [2]






30. Aka pin grid array.






31. Another name for a motherboard in a laptop.






32. A virtual tunnel created between two endpoints over an untrusted network. The tunnel is created by encapsulating the packets within special packets for the tunnel. Other security methods are also usually applied to a VPN - such as encrypting the data






33. This occurs when someone collects personal information belonging to another person and uses that information to fraudulently make purchases - open new credit accounts - and even obtain new driver's licenses and other forms of identification in the vi






34. Aka Media Access Control (MAC) address.






35. A standard used in laptops that is based on PCI. The biggest difference is that Mini PCI is much smaller than PCI






36. A firewall service that inspects (or filters) each packet that enters or leaves the network - applying a set of security rules defined by a network administrator - and not allowing packets that fail inspection to pass between networks.






37. A device that in its traditional configuration as a local KVM switch connects a single keyboard - video display - and mouse to two or more computer systems - allowing the user to switch control from one computer to another.






38. Operating system interface settings - such as the language used and the date - time - and currency formats.






39. A type of switched network used by phone companies.






40. In Windows - an Advanced Options menu choice that starts Windows without several drivers and components and loads only very basic - non-vendor-specific drivers for mouse - video - keyboard - mass storage - and system services. It also displays in low






41. A CPU containing two CPU cores.






42. Authentication is validation of a user account and password that occurs before the security components of Windows will give the user access to the computer.






43. A power management standard - introduced by Intel in 1992 - that defines four power-usage operating levels.






44. A sleep mode that is available on any computer that supports ACPI power management. It conserves power while saving the desktop in RAM memory in a work state. To resume - you simply press the power button - and the desktop is quickly displayed.






45. In a disk drive - the rotating shaft used to spin the disks.






46. An input device that uses a stylus. Available as an external device - it uses touch screen technology and is usually at least the size of a sheet of paper. Also called a digitizer.






47. A Windows sleep mode that uses hard drive space to save all the programs and data that are in memory at the time you choose this mode. The computer then completely shuts down and requires no power while it is hibernating.






48. Memory chips that provide much slower access than SRAM chips but that can store several megabytes of data on a single chip (or hundreds of megabytes - or even gigabytes - when they are packaged together on a "stick").






49. A TCP/IP protocol developed as a solution to the dwindling number of IP addresses on the Internet and that also serves to hide IP addresses on a private network from the Internet.






50. The displayable number of pixels - expressed as x and y numbers - such as 1024







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests