SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia A + Certification
Start Test
Study First
Subjects
:
certifications
,
comptia-a-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An area of the Windows taskbar used by programs and some hardware devices to display status icons. Also called thenotification area or system tray.
RGB video
encryption
systray
Performance Monitor
2. The process that authenticates a user and verifies the user account's level of access to a resource.
authorization
plug and play (PnP)
microcode
activation
3. An area on the top left of the Windows XP Start menu containing shortcuts to Windows Update and programs for browsing the Internet and using e-mail.
cable tester
pinned items list
swap file
Advanced Technology (AT)
4. Aka Enhanced IDE.
EIDE
adapter card
mirroring
RF
5. A chip that works with a serial port - converting outgoing data from parallel to serial and incoming data from serial to parallel.
universal asynchronous receiver/transmitter (UART)
Gigabit Ethernet
wide area network (WAN)
address bus
6. A network service that handles the requests for Internet services - such as Web pages - files on an FTP server - and mail for a proxy client without exposing that client's IP address to the Internet. There is specific proxy server and client software
slot cover
access control list (ACL)
proxy server
network interface card (NIC)
7. In the laser printing process - the step in which the laser beam creates a negative of the image that will eventually appear on the printout. Each place that the laser beam touches loses most of its charge - creating an image - whereas the rest of th
client/server-based network
writing
mode
port triggering
8. A remote KVM switch that uses either Cat 5 or USB cabling. The distance it can be from the computers it controls is a function of the length limits of the cabling; it normally uses a proprietary protocol and special hardware.
slave drive
SSL
zero insertion force (ZIF) socket
local remote KVM switch
9. Aka input/output.
response time
I/O
video adapter card
ROM
10. A specialized type of memory used only with video adapters.
video RAM (VRAM)
nonvolatile memory
microcode
SATA
11. An obsolete video standard introduced with IBM PS/2 computers in the late 1980s. VGA had a maximum resolution of 720
floating-point unit (FPU)
SCSI
server
video graphics array (VGA)
12. Encrypted data placed in a file to guard against tampering.
router
basic storage
ACPI
digital signature
13. A communication service provided over a telecommunications network or computer network. A VC logically resembles a circuit while passing over a complex routed or switched network - such as the phone company's frame relay network.
bus
secondary master
virtual circuit (VC)
domain
14. A method for allocating disk space on hard disks in which configuration information for each dynamic disk is located on the disk space beyond the first physical sector. This configuration information is stored outside of any volume on the hard disk.
uniqueness database file (UDF)
dynamic storage
802.11a
adapter card
15. An organization that created several PC standards - including the VGA connector.
public switched telephone network (PSTN)
Video Electronics Standards Organization (VESA)
Task Scheduler
registry key
16. Software instructions stored in ROM chips. It exists on most PC components and on the motherboard.
floppy disk
amperes (amps)
firmware
bluesnarfing
17. A feature of HDMI that prevents people from illegally copying HD DVDs. Aka also High-Definition Multimedia Interface (HDMI).
DDR RAM
High-Bandwidth Digital Content Protection (HDCP)
IEEE 1394b
soft power
18. A measurement of a body part - such as a fingerprint or retina scan.
watts
original equipment manufacturer (OEM)
biometric
spim
19. An LCD display that uses a DB-15 connector - which means that it accepts analog signals that it converts to digital.
USB
v-hold
analog LCD display
process
20. A power supply standard that has both the 20-pin connector for the motherboard and a 4-pin 12 V connector.
domain
Multimedia Terminal Adapter (MTA)
Advanced Power Management (APM)
ATV12V
21. Aka External Serial ATA.
WPA
lit pixel
eSATA
Trojan horse
22. A 9-pin D-shell connector.
inactive KVM switch
DB-9
LPT1
thin-film transistor (TFT)
23. A device that in its traditional configuration as a local KVM switch connects a single keyboard - video display - and mouse to two or more computer systems - allowing the user to switch control from one computer to another.
KVM switch
error-correcting code (ECC)
bus
Infrared (IR)
24. Aka denial of service (DoS) attack.
removable storage
process
DVD+RW
DoS Attack
25. The process of informing the software manufacturer who the official owner or user of the product is - and providing contact information such as name - address - company - phone number - e-mail address - and so on - about them. Registration is usually
DVD-ROM drive
chipset
registration
Wired Equivalent Privacy (WEP)
26. A device - usually resembling a power strip - that protects equipment from power surges.
communication network riser (CNR)
surge protector
IP packet filtering
DIP switch
27. A circuit on a motherboard through which incoming power passes. Several voltage regulators maintain a steady voltage as demand goes up and down - with one or more voltage regulators for the various voltages required (5 volts - 12 volts - 3.3 volts -
permanent virtual circuit (PVC)
bluesnarfing
voltage regulator module (VRM)
WPA
28. A sleep mode that is available on any computer that supports ACPI power management. It conserves power while saving the desktop in RAM memory in a work state. To resume - you simply press the power button - and the desktop is quickly displayed.
active listening
DVD+R
Standby
authentication factor
29. The order in which the BIOS will search devices for an operating system to start.
fixed input power supply
FPU
bar code reader
boot sequence
30. Threats that are not truly malicious code - but can have indirect negative effects - such as decreasing performance or using up bandwidth. Grayware includes spyware - adware - spam - and spim.
grayware
master drive
Safe Mode With Networking
S/PDIF
31. Aka thermal compound.
Balanced Technology eXtended
heat sink compound
sidebar
Windows Update Website
32. Memory locations within a CPU that is used as a scratch pad for calculations. Modern CPUs have dedicated registers for specific functions and general-purpose registers for multiple purposes.
32-bit
Integrated Service Digital Network (ISDN)
register
system bus
33. A perpetrator of malicious software attacks against computers and networks. Also called a cracker.
peripheral component interconnect (PCI)
hacker
drive path
WINS
34. A modified version of FAT12 and FAT16 used in Windows since Windows 95.
virtual file allocation table (VFAT)
auditing
OCR
DLT
35. A protocol developed in the 1980s by IBM for managing names on a network. Also used by Microsoft in early networking. Replaced by DNS on TCP/IP networks.
simultaneous multithreading (SMT)
NetBIOS
RAID 1
display power-management signaling (DPMS)
36. Aka thumb drive.
boot sector
flash drive
secondary slave
FPU
37. In the domain name system - a first-level domain - which is a suffix added to a registered domain name and separated from the domain name with a "dot" (.). Among the TLDs are .com - .gov - .edu - .org - .mil - .net - .biz - many two-lettered country
DVD-Data discs
bandwidth
router
top-level domain (TLD)
38. Aka paging file.
DoS Attack
Simple Mail Transfer Protocol (SMTP)
PAGEFILE.SYS
transport layer security (TLS)
39. A power supply form factor that pairs with an ATX motherboard and case.
redundant array of independent disks (RAID)
hacker
boot record
ATX power supply
40. A type of printer that transfers ink to paper by causing a print head to strike a printer ribbon containing ink against the paper.
impact printer
inactive KVM switch
reactivate
RDRAM
41. An Advanced Options menu choice that creates a log of the Windows startup in a file named NTBTLOG.TXT and saved in thesystemroot folder (normally C:Windows).
SORIMM
Enable Boot Logging
systray
Display Brightness Key
42. Used to represent the chrominance signal in S-Video.
C
even parity
virus encyclopedia
stand-alone computer
43. A protocol used to resolve an IP address to a MAC address.
read-only memory (ROM)
System Monitor
PGA
Address Resolution Protocol (ARP)
44. Aka System Information.
MSINFO32.EXE
dual-core CPU
unidirectional mode
partition
45. A motherboard form factor introduced in 2003 by Intel as the successor to ATX.
heat sink compound
Blu-ray disc
mini-audio connector
Balanced Technology eXtended
46. Aka compact disc.
shadow mask
Integrated Drive Electronics (IDE)
WAN connection
CD
47. A file or folder name that breaks the 8.3 file-naming convention used in the FAT file system. This term continues to be used on newer file systems.
long filename (LFN)
FDD
TTL
registry
48. A parallel interface standard that supports bidirectional communication and transfer rates of up to 2 MBps.
World Wide Web
dialer
IEEE 1284
RIMM
49. A version of the FAT file system for very small drives
flash drive
twisted-pair cable
FAT12
PCIe (peripheral component interconnect express)
50. A special-purpose computer designed for a certain task and installed within a device.
regional settings
embedded systems
bluesnarfing
mobo