CompTIA tests are designed to test how knowledgeable one is when it comes to computer knowledge and applications. A+ supports the ability to connect users to the data they need to do their jobs regardless of the devices being used. The quiz below is designed specifically for a person who is studying for the IT technician exam. Give it a try and better be prepared for the certification exam.
IE 1392
IEE 1391
IEEE 1394
IE 6.0
I don't know
A hard drive
A bus
A USB port
A network card
I don't know
Formatting a hard drive, tape, or floppy disk permanently erases the information that was stored on that storage device.
Formatting a hard drive, tape, or floppy disk several times or bulk erasing it first permanently erases the information that was stored on that storage device.
There are many recovery tools that can reconstruct data from the electronic remnants of deleted files or formatted disks.
It is more secure to destroy the media.
I don't know
True
False
Port blocking
Security log
Application access
Global security level
True
False
Device documentation
Manufacturer's websites
Error logs
User blogs
Client-server network
Centralized network
Peer-to-peer network
Mode network
Verify that the microphone is connected to the correct port on the sound card.
Test the microphone on a computer with a properly functioning sound card and microphone.
Connect a known good microphone to the computer.
Install or reinstall the most current drivers for the display adapter.
True
False
True
False
Over the phone
By using a thumb drive
In person
Through email
True
False
True
False
So that speakers can be plugged into them.
To enable video conferencing.
For connecting to the game port.
For optimal display image.
External monitor does not display.
Battery life is too short.
The device gets very warm.
Device can use an external keyboard.
Correct boot problems.
Manage files and disks.
Boot the computer into Safe Mode.
Enable and disable services.
True
False
Yellow wire
Blue wire
Red wire
White wire
Black wire
True
False
IMAP4
SMTP
POP3
HTTP
Through a local network connection
Through a domain controller
Through an Internet Service Provider (ISP)
Through workgroup membership
Complex instruction set computer (CISC)
Reduced instruction set computer (RISC)
Explicitly parallel instruction computing (EPIC)
Expanded instruction set computing (EISC)
True
False
Ink dispersion print process
Laser printing process
Thermal inkjet print process
Solid ink print process
USB devices
Data cards
SD memory cards
Flash memory cards
True
False
System State data
Backup set
Rotation method
Backup schedule
Ipconfig
Ping
Nslookup
Tracert
2 GB
6 GB
1 GB
4 GB
True
False
True
False
Monitor display properties
Stapling
Collation
Color rendition
True
False
Category
User
Computer
Type
True
False
Wireless protocol access
Wireless protected account
Wi-Fi protected account
Wi-Fi protected access
Your motherboard is broken.
Your processor has overheated.
The system board has a short.
Memory is not correct for the system.
It is stored in the ROM and used to start the most basic services of a computer system.
Every computer has a system BIOS that sets the computer's configuration and environment when the system is powered on.
Computers can have more than one BIOS to control other system functions.
On all computer models, you must press the F12 key at startup to enter into the system BIOS.
System unit
Display device
Input devices
External devices
Software
True
False
Install the new operating system.
Restart the computer.
Download the update files.
Back up existing data files.
True
False
Northbridge
Southbridge
Graphics and AGP Memory Controller Hub (GMCH)
I/O Controller Hub (ICH)
True
False
True
False
True
False
LDAP
EDirectory or NDS
SAM
Active Directory
Fingerprint collection is simple and inexpensive.
Fingerprint scanners are common.
Fingerprint scanners are accurate and stable.
Fingerprint scanners work regardless of the cleanliness of the user's hands.
Electromagnetic radiation
Noise
Repetitive strain
Office environments
Antivirus software should be deployed on individual computers but not on network servers.
Antivirus software is an application that scans files for common viruses.
Antivirus software can also monitor boot sector access.
Antivirus software does not usually protect against spam.
Locate the monitor port on the computer.
Turn off the computer.
Align the pins on the monitor cable with the adapter port.
Plug in the monitor power cord.
Verify that you have reconnected everything properly.
Test the computer logged in as a user.
Restart the computer.
Document your findings.
Memory
Modem
Miniature hard drive
Wireless network adapter
Visual and audio inspection
Ensuring proper airflow
Driver/firmware updates
Keeping them clean
Internet uniform resource locator
Graphics device interface (GDI)
Print processor
Universal Naming Convention path
True
False