Test your basic knowledge |

Comptia A + Certification

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Aka paging file.






2. Aka dynamic RAM.






3. A device - usually resembling a power strip - that protects equipment from power surges.






4. A Windows service that allows a user to connect remotely to a computer and run the Windows desktop on the remote computer - but have the same access as if logged on to the computer and its local network.






5. A portable computer small enough to fit in your hand - also referred to as a "palmtop" computer. Because it is so small - a PDA does not have the functionality of a laptop or desktop computer. In other words - a typical PDA allows you to perform only






6. Aka accelerated graphics port.






7. Software created to perform malicious acts. Also called malicious software.






8. A firewall consisting of software that you can install on any computer - as opposed to the software built into a hardware firewall. Also called personal firewalls because they are designed to be installed on individual desktop computers.






9. Aka musical instrument digital interface.






10. Aka demilitarized zone.






11. A CRT video setting - also known as vertical hold - that holds the image vertically on the screen.






12. Aka video RAM.






13. Aka Wired Equivalent Privacy.






14. Another name for a motherboard in a laptop.






15. A portion of system memory used by a video adapter built into a motherboard.






16. Aka network address translation.






17. Aka automated system recovery.






18. When a mount point exists between a partition or volume to a folder on another volume - the drive path is the path (including a drive letter) to that partition or volume.






19. An LCD display that uses a DB-15 connector - which means that it accepts analog signals that it converts to digital.






20. A protocol that transfers e-mail messages between mail servers. Clients also use this protocol to send e-mail to mail servers.






21. The disruption of signal transmission caused by the radiation of electrical and magnetic fields. Electric motors are a common source of EMI.






22. In networking - this is a set of rules for using network hardware and software. In most discussions about networks - this term is assigned to certain network software components.






23. Device that stores digital data on magnetized media - such as floppy disks - the metal platters in hard disk drives - and magnetic tape media used in tape drives.






24. A printer that includes one or more other functions - such as a scanner and fax machine.






25. An identifier assigned to a process when it starts.






26. Aka Internet Message Access Protocol (IMAP).






27. A laptop in which the display is an integrated digitizer.






28. Wide-ultra-extended graphics array






29. The plug at the end of a cable or the port or connection point on a computer or device.






30. A communications system now used for data communications via satellite that usually uses microwave radio frequencies and requires a dish antenna - receiver - and transmitter.






31. A service implemented on Windows Servers that hides the complexity of the network from end users in that it makes files that are distributed across multiple servers appear as if they are in one place.






32. Aka Domain Name Service.






33. A portion of a program that can run separately from and concurrently with other portions of the program. Also called thread of execution.






34. Aka plain-old telephone service.






35. A data encryption technology used for securing data transmitted over the Internet. TLS succeeded SSL.






36. Specialized hardware used to create and manage a RAID array.






37. Program code that provides a way for someone to gain access to a computer while bypassing security. Only a person who knows how the back door works can use it - but once in - that individual has the same access as the host program to all the internal






38. The act of covertly obtaining information broadcast from wireless devices using the Bluetooth standard.






39. In the laser printing process - the step in which the toner on the drum is transferred to the paper.






40. A protocol that allows two devices to connect - authenticate - and negotiate what protocols they will use (almost always TCP/IP).






41. A type of switched network used by phone companies.






42. Aka front side bus.






43. The protocol for connecting optical drives and tape drives to an ATA channel.






44. A Windows program that launches Internet Explorer and connects to the Windows Update Website.






45. A program file or some special data file that is part of the operating system and is very important to proper operation of the OS.






46. A coherent and concentrated light beam - also simply called a laser.






47. In computer networking - a network located between a private network and the Internet with a firewall on both sides. A DMZ contains servers offering services to users on the Internet and inside the protected private network.






48. A network connection device that passes traffic between two networks - using the physical address (MAC address) of the destination device.






49. A video interface - also called Super Video - that transmits video using two signals






50. A display device that contains a cathode ray tube and uses an electron gun to activate phosphors behind the screen at the front of the tub.