CompTIA A+ Preparation Part 2

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Dogma1029
D
Dogma1029
Community Contributor
Quizzes Created: 2 | Total Attempts: 5,555
| Attempts: 2,099 | Questions: 51
Please wait...
Question 1 / 51
0 %
0/100
Score 0/100
1. WUXGA has a maximum resolution of......?

Explanation

WUXGA stands for Wide Ultra Extended Graphics Array, and it has a maximum resolution of 1900 x 1200. This resolution refers to the number of pixels displayed horizontally and vertically on a screen. Therefore, WUXGA can display a maximum of 1900 pixels horizontally and 1200 pixels vertically, resulting in a high-quality and detailed image.

Submit
Please wait...
About This Quiz
A+ Quizzes & Trivia

Here is part two of the quizzes based on the 220-701 and the 220-702.

Personalize your quiz and earn a certificate with your name on it!
2. Carol calls the helpdesk because she is having a problem with her Windows Vista computer. However she cannot tell you anything about an error message because her computer automatically reboots  every time it crashes. What do you need to do to enable her to see the error message next time it crashes?

Explanation

Disabling automatic restart on system failure will prevent the computer from automatically rebooting when it crashes. This will allow Carol to see the error message that appears on the screen, which can help in diagnosing and resolving the problem with her Windows Vista computer.

Submit
3. Rebooting a computer after a software error is usually done for what reason?

Explanation

Rebooting a computer after a software error is done to clear the memory and start fresh. When a software error occurs, it can cause the computer's memory to become corrupted or overloaded. By rebooting, the computer clears out any lingering issues in the memory and restarts with a clean slate. This can help resolve the software error and allow the computer to function properly again.

Submit
4. You suspect that a recurring error is a hardware problem. What utility will check the hard drive for physical errors?

Explanation

Chkdsk is a utility that can be used to check the hard drive for physical errors. It scans the file system and the physical disk surface to detect and fix any errors that may be present. It is commonly used to diagnose and repair issues related to the hard drive, such as bad sectors or corrupted files. Disk Search, Fixboot, and Disk Defragmenter are not specifically designed to check for physical errors on the hard drive.

Submit
5. The utility that returns all your files to contiguous blocks is called?

Explanation

Disk Defragmenter is the correct answer because it is the utility that rearranges fragmented files on a disk to make them contiguous. Fragmentation occurs when files are broken up into smaller pieces and stored in non-contiguous blocks on the disk. This can slow down the computer's performance as it takes longer to access the fragmented files. Disk Defragmenter helps to optimize disk performance by rearranging the files and placing them in contiguous blocks, making them easier and faster to access.

Submit
6. The built in pointing device on most laptops is called a ________?

Explanation

A touchpad is a built-in pointing device on most laptops that allows users to control the cursor by moving their finger across a flat surface. It is an alternative to a traditional mouse and provides a convenient and compact solution for navigating and interacting with the computer. The touchpad is sensitive to touch and gestures, allowing users to perform various actions such as clicking, scrolling, and zooming without the need for an external mouse.

Submit
7. SATA stands for?

Explanation

SATA stands for Serial Advanced Technology Attachment. This is a computer bus interface that connects host bus adapters to mass storage devices such as hard disk drives and solid-state drives. It is used to transfer data between the computer's motherboard and storage devices.

Submit
8. When you first power on a computer it runs a diagnostic program that is built into BIOS this is known as what?

Explanation

When you first power on a computer, it runs a diagnostic program called POST (Power-On Self Test) that is built into the BIOS (Basic Input/Output System). This test checks the hardware components of the computer to ensure they are functioning properly before the operating system is loaded. POST helps identify any potential issues or errors that may prevent the computer from starting up correctly.

Submit
9. The correct connector that plugs into a Network Interface Card (NIC) is?

Explanation

The correct connector that plugs into a Network Interface Card (NIC) is RJ-45. RJ-45 connectors are commonly used for Ethernet connections and are designed to connect network cables to devices such as computers, routers, and switches. They have eight pins and are larger than RJ-11 connectors, which are used for telephone connections. USB connectors are used for connecting peripheral devices to computers, and STP (Shielded Twisted Pair) refers to a type of cable used for network connections, not a connector itself.

Submit
10. Your computer is up and running but the mouse is not responding. Further investigation reveals that the USB mouse is unplugged. What should you do?

Explanation

USB mice are designed to be hot-swappable, which means they can be plugged and unplugged while the computer is running without causing any damage or requiring a restart. Therefore, the correct action to take in this situation is to simply plug the mouse back in.

Submit
11. If Plug and play doesn't recognize a new device plugged into the system what Control Panel utility can you use to install it?

Explanation

If Plug and play doesn't recognize a new device plugged into the system, the Control Panel utility that can be used to install it is Add/Remove Hardware. This utility allows the user to manually add or remove hardware devices from the system. It helps in detecting and installing new devices that may not be recognized by the Plug and Play feature. The Administrative Tools, Security Center, and Power Options do not have the specific functionality to install new hardware devices.

Submit
12. Mary in accounting calls you to report that her computer has locked up while she was in the middle of a big spreadsheet. It comes to light that she was also using a word processing program, her email and streaming a radio station to her desktop.  What can you tell her while on the phone to do?

Explanation

Rebooting the computer can help resolve the issue of the computer being locked up. Having multiple programs running simultaneously, such as the spreadsheet, word processing program, email, and streaming a radio station, can overload the computer's resources and cause it to freeze. By rebooting the computer, it clears the memory and allows the computer to start fresh, potentially resolving the issue.

Submit
13. A screens resolution is referring to how many _______ are used to draw the screen.

Explanation

The correct answer is "Pixels". The screen's resolution refers to how many pixels are used to draw the screen. Pixels are the smallest units of color and light that make up an image on a screen. The more pixels there are, the higher the resolution and the sharper and more detailed the image will appear.

Submit
14. What is a common cause of paper jams in a laser printer?

Explanation

Worn pick up rollers can be a common cause of paper jams in a laser printer. Over time, the pick up rollers can become smooth and lose their grip, making it difficult for them to properly feed the paper into the printer. This can result in the paper getting stuck or jammed in the printer.

Submit
15. This command prompt tool sends out four 32-byte packets to a specified destination  and waits for a reply.

Explanation

The given correct answer is PING. PING is a command prompt tool that sends out four 32-byte packets to a specified destination and waits for a reply. It is commonly used to test the connectivity between two devices on a network.

Submit
16. You need to set up a workstation that will have three computers all being operated from the same keyboard and mouse configuration. Also, only one monitor is available for this set up. What piece of equipment will allow this type of set-up to work?

Explanation

A KVM switch is the correct piece of equipment that will allow the set-up to work. A KVM switch stands for Keyboard, Video, and Mouse switch. It allows multiple computers to be controlled using a single keyboard, mouse, and monitor. By connecting the computers to the KVM switch and then connecting the switch to the monitor, users can easily switch between the computers and control them using the same peripherals. This is a convenient solution for managing multiple computers with limited space and resources.

Submit
17. Advanced startup options in Windows XP are accessed by?

Explanation

During the startup process in Windows XP, pressing the F8 key allows access to the advanced startup options. These options include Safe Mode, Last Known Good Configuration, Debugging Mode, and other troubleshooting options. Pressing the spacebar when prompted or entering the ASR (Automated System Recovery) are not correct ways to access the advanced startup options in Windows XP. Administrative tools are a separate set of tools and settings in Windows XP, and they are not directly related to the advanced startup options.

Submit
18. Which of the following can be used on a file or folder?

Explanation

Both compression and encryption can be used on a file or folder. Compression is the process of reducing the size of a file or folder, making it easier to store or transfer. Encryption, on the other hand, is the process of converting data into a code, making it unreadable to unauthorized users. Both techniques can be applied to files or folders to enhance security and efficiency.

Submit
19. What command can you type at the command prompt to test connectivity to another destination?

Explanation

The correct answer is "Ping". The Ping command is used to test connectivity between two devices on a network. It sends a small packet of data to the specified destination and waits for a response. If a response is received, it indicates that there is connectivity between the two devices. This command is commonly used to troubleshoot network connectivity issues and to measure the round-trip time (RTT) between devices.

Submit
20. File names are case-sensitive. True or False.

Explanation

File names are not case-sensitive in most operating systems. This means that whether a file name is written in uppercase or lowercase letters does not affect the ability to access or open the file. For example, a file named "document.txt" can be accessed by typing "document.txt" or "DOCUMENT.TXT". However, it is important to note that some operating systems, such as Linux, do treat file names as case-sensitive.

Submit
21. While explaining to some co-workers that MAC filtering on the router is only one way to protect your wireless network your boss walks over and asks you to explain it to him. How would you explain MAC filtering?

Explanation

MAC filtering is a security feature that allows the router to only allow access to devices whose MAC addresses have been registered. MAC addresses are unique identifiers assigned to each network device. By enabling MAC filtering, the router will only grant network access to devices whose MAC addresses have been pre-approved. This helps to prevent unauthorized devices from connecting to the wireless network.

Submit
22. If you can see monitor flicker on a CRT monitor you can fix this by doing what?

Explanation

The flickering on a CRT monitor is usually caused by a low refresh rate. By increasing the refresh rate to a higher value (Hz), the monitor will update the image more frequently, reducing or eliminating the flickering effect.

Submit
23. You are working in a school environment and need to block access to the internet. Which port number are you going to block?

Explanation

In a school environment, blocking access to the internet is important to ensure that students do not get distracted or access inappropriate content. Port number 80 is the default port for HTTP, which is used for accessing websites. By blocking port 80, all web traffic will be blocked, effectively preventing access to the internet.

Submit
24. The process of slowing down the processor to conserve power is called__________?

Explanation

Throttling refers to the process of slowing down the processor in order to conserve power. This technique is commonly used in electronic devices to reduce power consumption and extend battery life. By reducing the processing speed, the device can operate at a lower power level, resulting in energy savings. Throttling is a useful feature in devices such as smartphones and laptops, where power efficiency is crucial. It helps to balance performance and power consumption, allowing users to get the most out of their devices while optimizing battery life.

Submit
25. This type of firewall is normally used to protect companies from public networks.

Explanation

Network-based firewalls are typically used to protect companies from public networks. These firewalls are installed at the network perimeter and monitor incoming and outgoing traffic. They can filter and block specific types of traffic based on predefined rules, such as blocking certain IP addresses or ports. Network-based firewalls provide an additional layer of security by controlling access to the company's internal network and preventing unauthorized access from external sources.

Submit
26. Which component is based on flash memory and is set to replace conventional hard disk drives?

Explanation

Solid-state drives (SSDs) are based on flash memory and are set to replace conventional hard disk drives (HDDs). SSDs offer faster access times, lower power consumption, and higher durability compared to HDDs. They have no moving parts, making them more resistant to physical damage and less prone to failure. SSDs are increasingly being used in laptops, desktops, and servers due to their improved performance and reliability.

Submit
27. The maximum speed of 1000BaseT is?

Explanation

The correct answer is 1Gbps because 1000BaseT is a type of Ethernet technology that supports a maximum data transfer rate of 1 gigabit per second (Gbps). This means that it can transmit data at a speed of 1 billion bits per second, which is significantly faster than the other options listed (100Mbps, 10Mbps, and 1024KBPS).

Submit
28. One of the associates at your company has a large report that they must print for a meeting. When they try to print it they receive a "Print Over run" error. What must they do to fix it?

Explanation

The "Print Over run" error indicates that the printer's buffer memory, which temporarily stores the data to be printed, is not sufficient to handle the large report. Increasing the RAM memory installed in the computer will provide more space for the printer's buffer, allowing the large report to be printed without encountering the error. Installing a bigger hard drive or using bigger sheets of paper will not address the issue of insufficient buffer memory. Reinstalling a corrupted driver may resolve other printing issues, but it will not specifically fix the "Print Over run" error.

Submit
29. In the services console you can see what dependencies a service has as well as what services depend on the particular service. True or False?

Explanation

In the services console, you can indeed see what dependencies a service has as well as what services depend on the particular service. This allows users to understand the relationships and connections between different services, providing a comprehensive view of the dependencies within the system.

Submit
30. You are installing Windows from CD and network resources on several computers located in different parts of your facility. To make the process quicker you decide to use an unattended installation method . After starting the last computer you return to the first computer only to find it sitting at the first user interaction prompt. Others loaded successfully. What went wrong?

Explanation

The correct answer is that the computer was not hooked up to the network and did not receive the answer file. This means that the computer was unable to access the necessary resources and instructions for the unattended installation process. As a result, it was unable to progress beyond the first user interaction prompt.

Submit
31. What is the sequence of the laser printing process?

Explanation

The correct answer is "Cleaning, Charging, Writing, Developing, Transferring, Fusing." In the laser printing process, the first step is cleaning the drum or the imaging surface to remove any residual toner or debris. Then, the drum is charged with an electrostatic charge. After that, the laser beam writes the image or text onto the drum by selectively removing the charge. Next, the developing unit applies toner to the charged areas on the drum, creating a visible image. The image is then transferred onto the paper through a combination of heat and pressure in the fusing process.

Submit
32. A User reports that their system seems to be running extremely slow and that the hard drive is constantly being accessed. It seems to affect the computer more when multiple programs are being run. You make sure that it is not a virus related issue first. What could cause this type of behavior in the User's computer?

Explanation

A small paging file size can cause the system to run extremely slow and constantly access the hard drive. The paging file, also known as the virtual memory, is used by the computer to temporarily store data that cannot fit in the RAM. When multiple programs are being run, the system may need to constantly swap data between the RAM and the paging file, leading to increased hard drive activity and slower performance. Increasing the paging file size can help alleviate this issue.

Submit
33. What kind of printer prints on a special, waxy paper that comes on a roll?

Explanation

A thermal printer is the correct answer because it uses heat to transfer an image or text onto special waxy paper that comes on a roll. This type of printer is commonly used in industries such as retail and logistics for printing labels, receipts, and barcodes. The heat from the printer's thermal head causes the special paper to react and produce the desired printout. Unlike other printers, a thermal printer does not require ink or toner cartridges, making it a cost-effective and low-maintenance option for certain printing needs.

Submit
34. What are the two standards of laptop memory form factors?

Explanation

The two standards of laptop memory form factors are SoDIMM and MicroDIMM. SoDIMM stands for Small Outline Dual In-Line Memory Module and is a smaller version of the DIMM form factor used in desktop computers. MicroDIMM, on the other hand, is an even smaller form factor primarily used in ultra-compact laptops and other small form factor devices. These form factors allow for the installation of memory modules in laptops, providing the necessary storage and performance capabilities.

Submit
35. Your boss dropped his laptop and now the keyboard is not functioning correctly. The mouse still works. Most of the keys don't respond at all and the ones that do only change the volume settings, dim and brighten the screen and change his screen to an external display. What has happened to the laptop.

Explanation

The correct answer is that the function key is stuck on. This is indicated by the fact that most of the keys don't respond at all and the ones that do only change the volume settings, dim and brighten the screen, and change the screen to an external display. When the function key is stuck on, it can cause the keyboard to behave in this way, as the function key is designed to modify the behavior of other keys when pressed in combination with them.

Submit
36. What is the purpose of using a thermal compound?

Explanation

The purpose of using a thermal compound is to create a contact surface between the processor and the heatsink. This helps to improve heat transfer by filling in any microscopic gaps or imperfections on the surfaces of the processor and heatsink. By ensuring better contact, the thermal compound helps to dissipate heat more efficiently, preventing the processor from overheating.

Submit
37. The 802.xx standard for wireless networks is________?

Explanation

The correct answer is 802.11. The 802.11 standard is used for wireless local area networks (WLANs). It specifies the protocols and technologies for wireless communication, including data transfer rates, frequency bands, and security measures. This standard is commonly known as Wi-Fi and is widely used for wireless internet access in homes, offices, and public spaces.

Submit
38. What is the maximum distance for the 10baseT standard?

Explanation

The correct answer is 100m. The 10baseT standard, which is a type of Ethernet networking, has a maximum distance limit of 100 meters. This means that the cable used for this standard can transmit data effectively up to a distance of 100 meters. Beyond this distance, the signal may weaken and cause data transmission issues.

Submit
39. Windows file naming conventions allow for names up to what size?

Explanation

Windows file naming conventions allow for names up to 255 characters in size. This means that when naming a file in Windows, you can use up to 255 characters for the file name, including letters, numbers, spaces, and special characters. This allows for more descriptive and detailed file names, making it easier to organize and find files on a Windows system.

Submit
40. What is the difference between a docking station and a port replicator?

Explanation

Docking stations are different from port replicators because they have the capability to include permanent components such as hard drives and act as an extension of the motherboard. This means that docking stations not only provide additional ports for connecting peripherals, but also have the ability to enhance the functionality and storage capacity of the device they are connected to. In contrast, port replicators are primarily used to replace damaged or non-working ports on a device, without offering any additional features or components.

Submit
41. The default size Windows sets for virtual memory is?

Explanation

The correct answer is one and a half times the amount of RAM in the system. Windows sets the default size for virtual memory to be 1.5 times the amount of RAM in the system. This is done to ensure that there is enough virtual memory available for the system to use when the physical RAM is fully utilized. By setting the virtual memory size to be larger than the physical RAM, it allows the system to use the hard drive space as additional memory when needed.

Submit
42. Which three options are on the Windows XP main setup screen?

Explanation

The three options on the Windows XP main setup screen are Repair a Windows XP installation, Quit setup, and Set up Windows XP. These options allow the user to either repair an existing installation, exit the setup process, or proceed with setting up a new installation of Windows XP.

Submit
43. A DHCP server provides what information to a computer? Choose four.

Explanation

A DHCP server provides the IP address, DNS server address, subnet mask, and default gateway address to a computer. These pieces of information are necessary for the computer to establish a network connection and communicate with other devices on the network. The IP address is the unique identifier assigned to the computer, the DNS server address is used for domain name resolution, the subnet mask determines the network boundaries, and the default gateway address is the IP address of the router that connects the local network to the internet.

Submit
44. A virus that is designed to make itself difficult to detect or analyze and covers itself in protective code is a _______?

Explanation

An armored virus is a type of virus that is specifically designed to make it difficult for antivirus software to detect or analyze. It achieves this by employing various techniques such as encrypting its code, using self-modifying code, or disguising itself within legitimate files. By doing so, it can evade detection and continue to infect systems. Therefore, an armored virus is a virus that covers itself in protective code to avoid detection and analysis.

Submit
45. To prevent the UAC from prompting you when opening a specific program every time what must you do?

Explanation

To prevent the UAC from prompting you when opening a specific program every time, you need to right-click the program icon, choose properties, go to the compatibility tab, and click on "Run this program as an administrator". This will allow the program to run with administrative privileges, bypassing the UAC prompt.

Submit
46. Which is the correct format for a MAC address?

Explanation

A MAC address is a unique identifier assigned to network interfaces for communication on a network. The correct format for a MAC address is usually six groups of two hexadecimal digits separated by hyphens or colons. In this case, the correct format is 45-67-70-C8-4G-DE.

Submit
47. What is the minimum processor speed for all versions of Vista?

Explanation

The minimum processor speed for all versions of Vista is 800 Mhz. This means that any computer running Vista must have a processor that is at least 800 Mhz in speed.

Submit
48. This type of backup backs up selected files and clears the archive bit.

Explanation

Normal backup is a type of backup that backs up selected files and clears the archive bit. This means that after performing a normal backup, the archive bit is reset for all the files that were backed up, indicating that they have been successfully backed up. This type of backup is commonly used as a baseline backup and is typically performed on a regular basis to ensure that all selected files are backed up and can be restored if needed.

Submit
49.  Which network topologies can be both logical and physical? Choose three.

Explanation

Bus, Ring, and Mesh network topologies can be both logical and physical. In a Bus topology, all devices are connected to a single cable, creating a logical and physical connection. In a Ring topology, devices are connected in a circular manner, forming a logical and physical loop. In a Mesh topology, devices are connected to each other directly, creating both logical and physical connections between them.

Submit
50. Which is the correct format for a MAC address?

Explanation

not-available-via-ai

Submit
51. Joel from shipping calls you because the Dot-Matrix printer he uses to print out orders is not working correctly. Instead of shipping addresses and order information all it prints out is unintelligible characters.  What are possible causes for this kind of error?

Explanation

Possible causes for the error of the Dot-Matrix printer printing unintelligible characters could be that the cable has become partially unhooked, the wrong driver has been selected, or the printer control board has gone bad. These issues can disrupt the communication between the printer and the computer, leading to the incorrect printing of characters.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 04, 2010
    Quiz Created by
    Dogma1029
Cancel
  • All
    All (51)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
WUXGA has a maximum resolution of......?
Carol ...
Rebooting ...
You suspect that a recurring error is a hardware problem. What...
The utility that returns all your files to contiguous blocks is ...
The built in pointing device on most laptops is called a ________?
SATA stands for?
When ...
The ...
Your ...
If ...
Mary ...
A ...
What is a common cause of paper jams in a laser printer?
This ...
You ...
Advanced startup options in Windows XP are accessed by?
Which of the following can be used on a file or folder?
What ...
File names are case-sensitive. True or False.
While ...
If ...
You ...
The process of slowing down the processor to ...
This ...
Which ...
The maximum speed of 1000BaseT is?
One of the associates at your company has a ...
In ...
You ...
What is the sequence of the laser printing process?
A ...
What kind of printer prints on a special, waxy ...
What are the two standards of laptop memory form factors?
Your ...
What is the purpose of using a thermal compound?
The 802.xx standard for wireless networks is________?
What is the maximum distance for the 10baseT standard?
Windows file naming conventions allow for names up to what size?
What is the difference between a docking station ...
The default size Windows sets for virtual memory is?
Which three options are on the Windows XP main setup screen?
A DHCP server provides what information to a computer? Choose four.
A ...
To ...
Which is the correct format for a MAC address?
What is the minimum processor speed for all versions of Vista?
This type of backup backs up selected files and clears the archive...
 Which network topologies can be both logical ...
Which is the correct format for a MAC address?
Joel ...
Alert!

Advertisement