SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia A + Certification
Start Test
Study First
Subjects
:
certifications
,
comptia-a-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A portion of system memory used by a video adapter built into a motherboard.
expansion bus
multimode fiber (MMF)
power supply unit (PSU)
shared video memory
2. A single-pin RCA phone jack for transferring digital audio from CD and DVD players to amplifiers and speakers.
Internet Message Access Protocol (IMAP)
Sony/Philips Digital Interface (S/PDIF)
BIOS
frame relay
3. Aka Microsoft Management Console.
MMC
patch
troubleshooting
simultaneous multithreading (SMT)
4. Not revealing information about someone that would be harmful to or embarrass him or her.
Directory Services Restore Mode
discretion
Hypertext Markup Language (HTML)
aspect ratio
5. This occurs when someone collects personal information belonging to another person and uses that information to fraudulently make purchases - open new credit accounts - and even obtain new driver's licenses and other forms of identification in the vi
cookies
identity theft
T1
graphical processing unit (GPU)
6. A drive that can write once to a special CD-R disc.
Safe Mode With Networking
slave drive
attended installation
CD-R (CD-Record)
7. Aka Spam over Instant Messaging.
UDF
InterNational Committee on Information Technology Standards (INCITS)
spim
system resources
8. Aka low-voltage differential signaling (LVDS).
professionalism
LVDS
power supply tester
copy
9. Local area networking using radio waves that includes several implementations based on the IEEE 802.11 group of standards.
system attribute
Wireless Fidelity (Wi-Fi)
Display Mode Key
status light indicator
10. A magnetic storage device that stores data on metal platters that have a coating that holds data in the form of changes to small magnetic particles in the coating. Also called HDD.
network client
odd parity
hard disk drive
motherboard
11. A RAID array in which every time data is written to disk - a portion (block) is written to each disk in turn - creating a "stripe" of data across the member disks. RAID 0 uses the total disk space in the array for storage - without protecting the dat
Parallel AT Attachment (PATA)
RAID 0
32-bit
Start Windows Normally
12. The name used by the Windows operating systems to identify the second parallel port.
LPT2
System Management Mode (SMM)
SONET
cookies
13. Aka File Transfer Protocol (FTP).
PROM
lithium-ion (Li-ion) battery
SLD
FTP
14. An LCD display characteristic that indicates the amount of time in milliseconds (ms) it takes for a single pixel to go from the active to the inactive state and back again.
RS-232 port
volume
response time
laser beam
15. Aka Windows Internet Naming Service.
thread of execution
BIOS settings
systray
WINS
16. A special-purpose computer designed for a certain task and installed within a device.
RAMBUS Inline Memory Module (RIMM)
Level 3 (L3) cache
BTX
embedded systems
17. Aka display power-management signaling.
IEC-320 connector
boot sector
RJ-45
DPMS
18. A string of characters that a user enters - along with an identifier - such as a user name - in order to be authenticated.
FPU
password
recently used programs list
AT
19. Aka Gigabit Ethernet.
internal cache memory
1000Base-T
ATA Packet Interface (ATAPI)
DMA controller
20. A file used with a scripted unattended installation along with an answer file. The UDF file provides settings that are unique for each computer.
EIDE
uniqueness database file (UDF)
802.11g
floating-point unit (FPU)
21. A category of software that runs surreptitiously on a user's computer in order to gather information without the user's permission and then sends that information to the people who requested it.
expansion card
volts
spyware
access control list (ACL)
22. This GUI utility will display a system summary of the hardware - operating system - and other software.
Tablet PC
subkey
process ID
System Information (MSINFO32.EXE)
23. On a circuit board - a small connector that slides down on a pair of pins jutting up from the board. Multiple pins are often side-by-side - and a jumper joins a pair of them.
internetwork
jumper
ExpressCard
single inline memory module (SIMM)
24. An operating system that runs on a network server and provides file sharing and access to other resources - account management - authentication - and authorization services.
distribution share
CRIMM
continuity RIMM (CRIMM)
network operating system (NOS)
25. A type of riser card that connects directly into a motherboard and adds no additional functionality of its own - but extends the expansion bus and allows expansion cards to be added in a different physical orientation.
Advanced Micro Devices (AMD)
daughter card
display resolution
security auditing
26. A local bus designed for video only - it provides a direct link between the processor and the video card - giving the video card direct access to main memory.
accelerated graphics port (AGP)
input/out (I/O)
routing information protocol (RIP)
keystroke logger
27. Aka RAID 5.
striping with interleave parity
pop-up blocker
refresh rate
Safe Mode
28. The wireless nodes (including the WAP) communicating together in infrastructure mode.
Web browser
real-time clock (RTC)
Basic Service Set (BSS)
Rambus Dynamic RAM (RDRAM)
29. A type of solid-state storage that is commonly used in a variety of devices - such as digital cameras - which often use CompactFlash.
HTML
power supply unit (PSU)
flash memory
Media Access Control (MAC) address
30. Managing access to resources. Access control to computers and network resources involves authentication and authorization.
access control
microcode
active communication
modding
31. Aka Small Outline DIMM.
Safe Mode
SODIMM
logical block address (LBA)
local area network (LAN)
32. A printer that includes one or more other functions - such as a scanner and fax machine.
multifunction printers (MFDs)
ACE
modding
rootkit
33. A small group of computers communicating wirelessly with one another without the use of a centralized wireless access point (WAP).
drive lock password
Independent Basic Service Set (IBSS)
ECP
electrostatic discharge (ESD)
34. A set of wires used by data traveling into and out of a processor.
FAT12
system requirements
parallel port
processor bus
35. Aka software firewall.
electronic KVM switch
smart card reader
IP packet filtering
personal firewall
36. The process of using an oscillating magnetic field to reduce and randomize the magnetic field that builds up on the shadow mask of a CRT monitor.
front side bus (FSB)
degaussing
stand-alone computer
mounted drive
37. An interface on a PC that originally was unidirectional and operated at a speed of 150 KBps - but now has several operation modes.
User State Migration Tool (USMT)
WAP
parallel port
root key
38. An assigned channel over which a device can send a signal to the processor to get its attention.
User State Migration Tool (USMT)
interrupt request line (IRQ)
BDD Workbench
electro-photosensitive drum
39. The BIOS configuration settings - also called system settings - accessed via a special BIOS-based menu during system startup.
basic input/output system (BIOS)
icon
mini-DIN-6
BIOS settings
40. Synchronous graphics random access memory is a type of RAM used on video adapters.
touch screen
biometric device
SGRAM
CMOS settings
41. A command-line utility - installed with the TCP/IP protocol suite - that traces the route taken by packets to a destination.
workgroup
universal asynchronous receiver/transmitter (UART)
MBR
TRACERT
42. A cooling fan located on a CPU.
CPU fan
RJ-45
CNR
Compact Disc-Read-Only Memory (CD-ROM)
43. A protocol used with WPA wireless encryption that was broken by hackers.
thermal printer
Temporal Key Integrity Protocol (TKIP)
coaxial cable
mount point
44. A term applied to a CPU - motherboard - or other components that conform to the newer 64-bit architecture. Also referred to as 64-bit.
protocol
laser beam
x86-64
central processing unit (CPU)
45. A finite set of resources controlled by the operating system and critical to the use of all computer components.
network interface card (NIC)
Simple Mail Transfer Protocol (SMTP)
straight-tip (ST) connector
system resources
46. A registry key that exists within another key.
subkey
network operating system (NOS)
card services
POST
47. The circuit board in a computer to which all other components directly or indirectly connect. Also called a mainboard - system board - mobo - or planar board.
CPU
direct current (DC)
flashing
motherboard
48. An installation of Windows that is not automated - where the user is required to pay attention throughout the entire process to provide information and to respond to messages. Also called a manual installation.
Advanced Technology eXtended (ATX)
attended installation
Advanced Power Management (APM)
war chalking
49. A reading and writing device in a floppy or hard drive that is mounted on an articulated arm that moves back and forth over the floppy disk or metal platter.
netbook
read/write head
WPA
Extended Video Graphics Array (EVGA)
50. The connecting point of a mounted drive to a folder on an NTFS volume.
System Configuration Utility
mount point
XGA
degaussing