SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia A + Certification
Start Test
Study First
Subjects
:
certifications
,
comptia-a-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A type of display device that includes a touch-sensitive face to accept input from the user.
Hypertext Markup Language (HTML)
volatile
war driving
touch screen
2. Digital versatile disc (DVD) discs that can be written to - but data cannot be overwritten. This standard is newer than DVD-R. This term also refers to the drives that can write to these discs.
Video Electronics Standards Organization (VESA)
CardBus
inverter
DVD+R
3. Program code that allows an operating system to control the use of a physical device.
device driver
DHCP Server
solid ink
WPA
4. A key on a laptop that is combined with the FN key to toggle the laptop's speaker on and off. The SPEAKER ON/OFF key is usually one of the standard function keys - such as F3 - that displays a speaker symbol.
Speaker On/Off key
personal area network (PAN)
APIPA
Global System for Mobile communications (GSM)
5. An Advanced Options choice that will temporarily disable the Automatically Restart option on the Advanced page of System Properties.
Return To OS Choices menu
CardBus
terminating resistor
Disable Automatic Restart
6. The process of using an oscillating magnetic field to reduce and randomize the magnetic field that builds up on the shadow mask of a CRT monitor.
laptop
digital versatile disc (DVD)
distribution share
degaussing
7. Aka serial ATA.
developing
DVD-18
SATA
RF
8. Aka customer premises equipment.
Reliability and Performance Monitor
CPE
flash memory
parallel port
9. In fiber-optics - a single light wave passing down a cable.
DoS Attack
mode
virtual private network (VPN)
Type III
10. A wireless network standard that defines speeds of up to 600 Mbps. It is downward-compatible with 802.11a - 802.11b - and 802.11g.
registry key
802.11n
modem
WEP
11. A program used to discover a password.
DIN connector
drive-by download
password cracker
I/O address
12. Aka network interface card.
VESA
RS-232 port
NIC
Advanced Micro Devices (AMD)
13. Aka interrupt request line.
IRQ
keystroke logger
personal area network (PAN)
time to live (TTL)
14. An early international standard for sending voice and data over digital telephone wires. ISDN uses existing telephone circuits or higher-speed conditioned lines to get speeds of either 64 Kbps or 128 Kbps. ISDN lines also have the ability to carry vo
DVI
lit pixel
input/out (I/O)
Integrated Service Digital Network (ISDN)
15. The fine copper lines that are the electronic circuits through which power - data - and control signals travel on a circuit board.
local group account
traces
infrastructure mode
trusted platform module (TPM)
16. A file operation in which the file or folder remains in the source location - and a duplicate is created in the target (destination) location.
vertical position
cracker
802.11g
copy
17. A generic reference to a PC's serial communications port - in which the x represents the port number.
COMx
Windows Update
power state
fusing
18. The signal in a television transmission that contains the color of the image.
long filename (LFN)
CPU
chrominance
thread of execution
19. The conversion of data into a special format that cannot be read by anyone unless they have a software key to convert it back into its usable form.
distribution share
AC adapter
DVD-9
encryption
20. A raised area on an optical disc that is alternated with depressed areas to be interpreted as data.
dynamic storage
SIMM
access control entry (ACE)
land
21. A device used with a laptop. The port replicator remains on the desktop with external devices connected to ports on it. A laptop then needs only one connection to the port replicator to have access to the peripherals.
degaussing
port replicator
S/PDIF
hyper threading
22. Another name for a motherboard in a laptop.
Lucent connector (LC)
Super Video
processor board
DNS
23. In a low-profile PC case - a card that plugs into a motherboard to allow other cards to be inserted at a right angle to the riser card and parallel to the motherboard. Also - a single expansion card containing multiple functions - such as modem - sou
riser card
exception
firewall
activation
24. A setting on an LCD display that adjusts the viewable area of the display horizontally.
horizontal position
active speaking
toner
memory bank
25. A connection over a wide area network.
VFAT
war driving
Advanced Technology eXtended (ATX)
WAN connection
26. In networking - the authorization to access a computer or resource on a computer. Specific permission levels include read - change - modify - etc.
Lucent connector (LC)
root folder
Internet service provider (ISP)
permission
27. A single-sided - single-layer digital versatile disc (DVD) that stores 4.7 GB of data - or over two hours of video.
electronic KVM switch
CD
DVI-A
DVD-5
28. A tool for testing if a cable can connect properly end-to-end and to determine if a cable has a short. These tools are available for a variety of cable types.
subscription channel (SC)
virtual circuit (VC)
security auditing
cable tester
29. Used to represent the chrominance signal in S-Video.
real-time clock (RTC)
power-on self-test (POST)
C
SDRAM
30. A set of technologies that allow voice transmission over an IP network
EEPROM
Voice over IP (VoIP)
address bus
POST card
31. Program code that provides a way for someone to gain access to a computer while bypassing security. Only a person who knows how the back door works can use it - but once in - that individual has the same access as the host program to all the internal
back door
authorization
adapter card
accelerated graphics port (AGP)
32. The use of deceit and trickery to persuade someone to hand over money or valuables.
cleaning
RJ-11
fraud
denial of service (DoS) attack
33. A DVI mode that supports both analog and digital video signals.
DVI-I
sector translation
audio modem riser (AMR)
beam-on-blade connector
34. Aka continuity RIMM.
IMAP
update
socket
CRIMM
35. Aka digital video interface.
error-correcting code (ECC)
100Base-T
DVI
activation
36. A standard used in laptops that is based on PCI. The biggest difference is that Mini PCI is much smaller than PCI
Mini PCI
register
security policy
CNR
37. A server that manages DNS names.
spindle
denial of service (DoS) attack
firewall
DNS Server
38. A network connection over long distances - traditionally using phone lines or satellite communications.
Foreign
wide area network (WAN)
logical block address (LBA)
control unit
39. In the domain name system - a name that is registered under a top-level domain - such as mcgraw-hill.com or microsoft.com.
register
second-level domain (SLD)
x86
dual-core CPU
40. A special terminating stick that must be inserted into the open RIMM sockets.
continuity RIMM (CRIMM)
Display Mode Key
malware
biometric device
41. The protocol for connecting optical drives and tape drives to an ATA channel.
Fn key
socket
ATA Packet Interface (ATAPI)
key fob
42. A process that runs "behind the scenes" with a low priority - does not require input - and rarely creates output.
hacker
background process
multiplexing
impact printer
43. A wireless mode requiring a wireless access point (WAP).
BIOS settings
Parallel AT Attachment (PATA)
infrastructure mode
DDR SDRAM
44. At first - a terminal was not much more than a display - a keyboard - and the minimal circuitry for connecting to the mainframe. Now - a terminal can be a computer running Windows or other operating system - plus terminal client emulation software th
ALU
pop-up download
terminal
laser printer
45. This attack occurs when a massive number (up to hundreds of thousands) of computers send DoS attacks to a server - making it unavailable.
public switched telephone network (PSTN)
denial of service (DoS) attack
distributed denial of service (DDoS) attack
New Low-profile eXtended (NLX)
46. The graphical Internet consisting of a vast array of documents located on millions of specialized servers worldwide. The documents are created using HTML and other specialized languages - and transferred from servers to client computers using HTTP an
64-bit
graphical processing unit (GPU)
activation
World Wide Web
47. Aka refresh rate.
hot-swappable drive
vertical refresh rate
Wired Equivalent Privacy (WEP)
ATV12V
48. A drive interface for EIDE drives that transfers data serially at speeds between 150 MBps and 300 MBps and 6 Gbps - depending on the version of the standard.
Web browser
serial ATA (SATA)
dynamic RAM (DRAM)
DisplayPort
49. Aka liquid crystal display.
cellular WAN
LCD
DVD-ROM
direct current (DC)
50. Aka Enhanced IDE.
Centronics
Microsoft Windows Vista Home Premium
NetBIOS
EIDE