Test your basic knowledge |

Comptia A + Certification

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The traditional transmission system for television video signals - which combines the color and brightness information with the synchronization data into one signal. The TV circuitry then separates the two signals from the composite signal.






2. A protocol that allows two devices to connect - authenticate - and negotiate what protocols they will use (almost always TCP/IP).






3. A network in which all of the computers essentially operate as both servers (providing access to shared resources) and clients (accessing those shared resources).






4. A type of DIMM memory module used in laptops.






5. A key on a laptop that is pressed along with the FN key to change display modes so the output will be only to the laptop's display - only to an external display - or simultaneously to both displays. The DISPLAY MODE key is normally a function key - s






6. Memory that can only be read and that contains program code. ROM is also called firmware.






7. A solid-state storage standard for high-capacity (2 - 4 - and 8 GB) memory cards that are tiny






8. Aka interrupt request line.






9. Software installed on a computer without permission that collects information about a user in order to display targeted advertisements - in the form of either inline banners or pop-ups. Inline banners are advertisements that run within the context of






10. Aka Advanced Power Management.






11. A firewall service that inspects (or filters) each packet that enters or leaves the network - applying a set of security rules defined by a network administrator - and not allowing packets that fail inspection to pass between networks.






12. In Windows - an Advanced Options menu choice that will start Windows without the Windows GUI (EXPLORER.EXE) and with only a simple Command Prompt window from which you can launch Windows administrative utilities.






13. A Windows Advanced Options menu choice used to send debugging information about the Windows startup over a serial cable to another computer running a special program called a debugger.






14. Aka Dynamic Host Configuration Protocol.






15. A connection over a wide area network.






16. Unsolicited e-mail.






17. Program code that provides a way for someone to gain access to a computer while bypassing security. Only a person who knows how the back door works can use it - but once in - that individual has the same access as the host program to all the internal






18. An interface standard developed by the American National Standards Institute (ANSI) - it is used for both internal and external hard drives and optical drives as well as devices such as printers - modems - scanners - and many other peripherals.






19. The chunks into which the TCP protocol packages data. In addition to the data - each datagram contains information - stored in a header - which is used by the TCP protocol on the receiving end to reassemble the chunks of data into the original messag






20. The settings within a registry key.






21. A type of solid-state storage that is portable - about the size of a flattened thumb - and usually has a USB interface. Also called a flash drive or jump drive.






22. A software fix for a single problem.






23. Aka Advanced Technology eXtended.






24. An operating system that runs on a network server and provides file sharing and access to other resources - account management - authentication - and authorization services.






25. A wireless data encryption standard based on the IEEE 802.11i security standard. It issues keys per-user and per-session and includes encryption key integrity checking. It uses Temporal Key Integrity Protocol (TKIP).






26. A program that causes a modem to dial phone numbers surreptitiously.






27. Aka complementary metal-oxide semiconductor.






28. A joke program that produces strange behavior - such as screen distortions - erratic cursor behavior - or strange icons to appear on the screen.






29. In an IP configuration - the address of the local router that acts as a gateway from the local network to other IP networks.






30. Electrically erasable programmable ROM. A ROM chip that is erasable using an electrical charge.






31. Aka systray.






32. A utility in Windows XP and Windows 2000 for gathering and viewing performance data involving memory - disks - processors - networks - and other objectives.






33. The type of connector used in the ExpressCard interface.






34. Aka video RAM.






35. Erasable programmable read-only memory. A ROM chip that is erasable and reprogrammable through the use of specialized software.






36. Software that runs on the computers in a network and that receives services from servers.






37. A technical standards organization.






38. A wireless network standard that uses the 5 GHz band.






39. The act of moving through a neighborhood in a vehicle or on foot - using either a laptop equipped with Wi-Fi wireless network capability or a simple Wi-Fi sensor available for a few dollars from many sources. War drivers are searching for open hotspo






40. The PCMCIA standard that succeeds the PC Card.






41. Software created to perform malicious acts. Also called malicious software.






42. A Windows folder that contains numerous applets you can use to adjust the configuration of many different aspects of the OS.






43. The language of Web pages. Web designers use the HTML language to create Web page code - which your Web browser converts into the pages you view on your screen.






44. Aka dual inline memory module (DIMM).






45. A service on a laptop that configures a card after socket services has recognized it.






46. A Windows wizard that sets options for starting and running a specific old program that will not otherwise run properly in Windows.






47. A local bus designed for video only - it provides a direct link between the processor and the video card - giving the video card direct access to main memory.






48. In Windows - a security account that contains one or more local user accounts - and when a computer is a member of a Windows domain - may also contain domain user or group accounts.






49. A Web browser created by Microsoft.






50. A DVD of any type that can store data on both sides of the disc.