*This was taken from the CompTIA A+ Complete Study Guide.
Assessment Test
- Which of the following is not considered a system component that can found inside a computer?
- CPU
- RAM
- PCIe graphics adapter
- Motherboard
- Which of the following is not a physical memory format used in desktop computer systems?
- DRAM
- DIMM
- SIMM
- RIMM
- Which of the following is a chip that is integrated into PATA drives, as opposed to being mounted on a daughter card?
- Controller
- CPU
- Host adapter
- IDE
- What is the name of the power connector that is larger than the connector used for floppy diskette drives and that is commonly used with PATA drives?
- AT system connector
- Berg
- Molex
- ATX system connector
- The _____ is the measurement of the number of pixels an LCD monitor can display without the image appearing distorted.
- Native resolution
- Contrast ratio
- Pixelation
- Base frequency
- You are installing a new graphics adapter in a Windows Vista system. Which of the following expansion slots are designed for high-speed, 3D graphics adapters? (Choose two.)
- USB
- AGP
- PCI
- ISA
- PCIe
- What is the legacy term for PC Card?
- CardBus
- PCMCIA
- Express Card
- CardBay
- Which of the following sleep modes is also known as Standby?
- S1
- S2
- S3
- S4
- What is the function of the laser in a laser printer?
- It heats up the toner so it adheres to the page.
- It charges the paper so it will attract toner.
- It creates an image of the page on the drum.
- It cleans the drum before a page is printed.
- What is the component called that stores the material that ends up printed to the page in a laser printer?
- Toner cartridge
- Ink cartridge
- Laser module
- Laser cartridge
- In Windows XP, how can you start a search for files and folders?
- Click Start => All Programs => Search.
- Run search.exe at the command prompt.
- Left-click a directory and choose Find.
- Click Start => Search.
- Which of the following is not a hive in the Windows Registry?
- HKEY_CLASSES_ROOT
- HKEY_LOCAL_MACHINE
- HKEY_USERS
- HKEY_RESOURCES
- Which of the following upgrade paths is not possible?
- Windows 95 to Windows XP
- Windows NT to Windows 2000
- Windows Me to Windows XP
- Windows 98 to Windows XP
- The program that performs an upgrade from Windows NT to Windows XP is called_____.
- INSTALL.BAT
- SETUP.EXE
- WINNT.EXE
- WINNT32.EXE
- You are troubleshooting a computer, and you have just established a theory of probable cause. What is your next step?
- Document findings
- Identify the problem
- Test the theory
- Verify functionality
- You performed a normal backup on your Windows Vista computer two weeks ago and a differential backup one week ago. If you were to run an incremental backup today, which of the following is true about the files it would back up?
- All files on your computer
- All files that have been modified in the last two weeks
- All files that have been modified in the last week
- All files that have been modified today
- When a Windows-based application attempts to access memory another program is using, what is the error that will be generated?
- Windows protection error
- General protection fault
- Illegal operation
- System lock-up
- You are sending print jobs to the printer, but nothing is printing. The printer is connected properly and online. What should you do?
- Delete and reinstall the printer.
- Delete and reinstall Windows.
- Open Printer Troubleshooting and have it diagnose the problem.
- Stop and restart the print spooler.
- Which of the following topologies allows for network expansion with the least amount of disruption for the current network users?
- Star
- Bus
- Ring
- Mesh
- Which layer of the OSI model has the important role of providing error checking?
- Session layer
- Presentation layer
- Application layer
- Transport layer
- Which authentication protocol depends on a "secret" known only to the authenticator and that peer?
- PAP
- SLIP
- CHAP
- PPP
- Which wireless protocol is an improvement on WEP?
- WAP
- WPA
- PAW
- PWA
- Which of the following computer components can retain a lethal electrical charge even after the device is unplugged? (Choose all that apply.)
- Monitor
- Processor
- Power supply
- RAM
- Roughly how much time spent communicating should be devoted to listening?
- 23 percent
- 40 percent
- 50 percent
- 80 percent
- After SATA was introduced, what was the retroactive term used for the original ATA specification?
- EIDE
- IDE
- PATA
- SCSI
- When retrieving small metallic parts dropped onto a motherboard, which of the following is the best tool to use?
- An extension magnet
- A magnetic screwdriver
- Gravity
- A parts grabber
- What type of connector does a Mini PCI type IIB card have?
- 52-pin card edge
- 100-pin card edge
- 124-pin card edge
- 1440 pin card edge
- Which LCD component is responsible for providing the right kind of power to the backlight?
- HVPS
- Inverter
- Power supply
- Power converter
- Your laser printer has recently started printing vertical white lines on documents it prints. What is the most likely cause of the problem?
- The print driver is faulty.
- The fuser is not heating properly.
- There is toner on the transfer corona wire.
- There is a scratch on the EP drum.
- After upgrading to a new printer, you find that the text is coming out garbled and not readable. Which of the following might you suspect?
- Corrupt data input
- Incorrect print drivers
- Wrong DMA channel
- Unsupported printer
- Which command-line utility enables you to verify entries on a DNS server?
- NET
- NSLOOKUP
- PING
- NETHELP
- You are at a command prompt. A file called WORD1.DOC has been hidden by another user, and you want to unhide it. Which command should you use to accomplish this?
- ATTRIB +H WORD1.DOC
- ATTRIB -H WORD1.DOC
- ATTRIB -U WORD1.DOC
- ATTRIB +U WORD1.DOC
- Which of the following Safe Mode options appears only with Windows Vista?
- Directory Services Restore Mode
- Repair Mode
- Repair Your Computer
- Enable Boot Logging
- When you configure a task in Task Scheduler, a trigger must occur before the task is executed. An additional _____ can be configured that, along with the trigger, will determine if the task will run.
- Action
- Condition
- Charge
- Duty
- Which of the following is a company that provides direct access to the Internet for home and business computer users?
- ASP
- ISP
- DNS
- DNP
- Which of the following protocols can be used by a client to access email on a server?
- DNS
- FTP
- SMTP
- IMAP
- What process involves making an application more difficult for unauthorized individuals to access, exploit, and so on?
- Application hardening
- Bulletproofing
- Pharprotecting
- EAL'ing
- Which group should you make your mobile users a member of if they need to be able to install, delete, and modify their environment?
- Administrators
- Power Users
- Guests
- Travelers
No comments:
Post a Comment