Busy. Please wait.
or

show password
Forgot Password?

Don't have an account?  Sign up 
or

Username is available taken
show password

why


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove Ads
Don't know
Know
remaining cards
Save
0:01
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
Retries:
restart all cards




share
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

CompTIA A+

CompTIA A+ 701 and 702

QuestionAnswer
Acronym: POST Power On Self Test
What hardware (6) does the POST check? Power supply CPU BIOS BIOS memory Memory I/O bus or controller
USB Standards for USB 1.1 (speed/length) Speed: Up to 12 Mbps Max Cable Length: 3 meters (9 feet)
USB Standards for USB 2.0 (speed/length) Speed: Up to 480 Mbps Max Cable Length: 5 meters (15 feet)
USB Standards for USB 3.0 (speed) Speed: Up to 5.0 Gbps
How many devices can one USB port support? Up to 127 devices (using hubs)
Are 64-bit operating systems backwards compatible with 32-bit applications? Yes.
What is the Sidebar? A Windows Vista feature that displays different gadgets (mini-applications) that perform information tasks, like displaying date and time.
What is Windows Aero? User interface available in Windows Vista. Glossy, transparent,dynamic and animation are all terms used to describe it.
What is the UAC? The Windows User Access Control (UAC)is an "enhanced" security featured that limits standard user privileges unless admin decides otherwise.
Windows Command line tool: Dir Windows tool that lists content of directory (folder). dir [path] [switches]
Windows Command line tool: Cd or ChDir Windows tool that changes to another directory. [cd drive:path]
Windows Command line tool: Copy Windows tool that copy files [copy source destination]
Windows Command line tool: Del or Erase Windows tool that deletes files [del filename] [del foldername]
Windows Command line tool: Md or MkDir Windows tool that creates a directory [md foldername] [mkdir foldername]
Windows Command line tool: Rd or RmDir Windows tool that deletes a directory [rd foldername] [rmdir foldername]
Windows Command line tool: Rename or Ren Windows tool that renames a file [rename drive:path oldfilename newfilename] [ren drive:path oldfilename newfilename]
Windows Command line tool: Type Windows tool that displays the contents of a text file [type drive:path filename]
Windows Command line tool: Ver Windows tool that displays operating system version [ver]
What type of file is a .txt? A plain text file with no formatting.
What type of file is a .rtf? For Rich Text Format, a text file that can include a limited amount of formatting.
What type of file is a .doc? A data file created in a word-processing program such as Microsoft® Word or WordPad. .docx is the Office 2007 format.
What type of file is a .bat? A batch file; a small text file containing a list of system commands that execute in a “batch.”
What type of file is a .bin? A binary file, containing only binary data (1s and 0s), which cannot typically be opened and read by a user application.
What type of file is a .com? A command file or compiled application file.
What type of file is a .exe? Executable files that launch programs and applications.
What type of file is a .dll? A Dynamic Link Library file, containing additional application settings or functions that are loaded by executable files as needed.
What type of file is a .hlp, .chm? Help files.
What type of file is a .htm, html? HyperText Markup Language files, used to create web pages.
What type of file is a .inf? Setup configuration settings for operating systems and applications.
What type of file is a .ini? Configuration settings for software and hardware components.
What type of file is a .msi? A Windows Installer package; a file that can specify installation parameters for an application.
What type of file is a .sys? System files. System files are typically hidden, as their deletion can prevent the computer from working properly.
What type of file is a .tif, .jpg, .jpeg, .gif, .bmp, .png? Graphic image files in various formats.
What type of file is a .xls, .ppt, .mdb? Data files created in Microsoft® Excel®, Microsoft® PowerPoint®, and Microsoft® Access™, respectively. Office 2007 uses .xlsx, .pptx, and .mdbx files.
What is the purpose of the Event Viewer? This Computer Management Tool monitors system events, such as logon times and application errors.
What is the purpose of the Shared Folders? This Computer Management Tool creates and manages shared resources. You can view a list of users who are connected to a local or remote computer.
What is the purpose of the Task Scheduler (Vista Only)? This Computer Management Tool creates and manages certain system tasks that will be automatically carried out by your computer at predetermined times.
What is the purpose of the Local Users and Groups? This Computer Management Tool manages user accounts on the local system.
What is the purpose of the Performance logs and alerts? This Computer Management Tool documents system performance in real time or on a scheduled basis.
What is the purpose of the Device Manager? This Computer Management Tool views device configurations and adds device drivers.
What is the purpose of the Disk Management? This Computer Management Tool sets properties for storage devices. Sets properties for storage devices.
What is the purpose of the Services? This Computer Management Tool starts and stops system services.
What is the purpose of the WMI Control? This Computer Management Tool manages the Windows Management Instrumentation (WMI) interface. WMI is a way to use script files to gather management information about a computer system from a remote network location.
What is the purpose of the Indexing Service? This Computer Management Tool manages the system indexing service. This option has been replaced in Windows Vista by the Windows Search indexer.
What does the registry subtree HKEY_CLASSES_ROOT contain? This registry subtree contains all the file association information. Windows uses this information to determine which application it should open whenever you double-click a file with a specific extension.
What does the registry subtree HKEY_CURRENT_USER contain? This registry subtree contains the user-specific configuration information for the user currently logged on to the computer.
What does the registry subtree HKEY_LOCAL_MACHINE contain? This registry subtree contains all the configuration information for the computer’s hardware.
What does the registry subtree HKEY_USERS contain? This registry subtree contains user-specific configuration information for all users who have ever logged on at the computer.
What does the registry subtree HKEY_CURRENT_CONFIG contain? This registry subtree contains information about the current configuration of the computer’s hardware.
What are the 6 general troubleshooting steps (in order)? 1. Identify the problem. 2. Establish a theory. 3. Test the theory. 4. Plan your actions. 5. Verify functionality. 6. Document your findings, actions, and the outcomes.
What is the PCI bus speed and width? This common internal bus architecture has 133 Mbps and while is 64-bit it is often implemented as 32-bit.
What is the AGP 1X bus speed and width? This internal bus architecture has 266 Mbps and is 32-bit.
What is the AGP 2X bus speed and width (bits)? This internal bus architecture has 533 Mbps and is 32-bit.
What is the AGP 4X bus speed and width (bits)? This internal bus architecture has 1.07 Gbps and is 32-bit.
What is the AGP 8X bus speed and width (bits)? This internal bus architecture has 2.1 Gbps and is 32-bit.
What is the PCI-E bus speed per lane? This internal bus architecture has a serial connection with 1+ lanes. Each lane has up to 250 Mbps troughput. An x16 slot (16 lanes) would have 4 Gbps.
What is the PC Card Type I width (bits) and thickness? This internal bus architecture for a laptop peripheral interface is 3.3mm thick with a 16-bit interface.
What is the PC Card Type II width (bits) and thickness? This internal bus architecture for a laptop peripheral interface is 5.0/5.5mm thick with a 16-bit or 32-bit interface.
What is the PC Card Type III width (bits) and thickness? This internal bus architecture for a laptop peripheral interface is 10.5mm thick with a 16-bit or 32-bit interface.
What is the PC Card Type IV thickness? This internal bus architecture for a laptop peripheral interface is 16mm thick--not approved by PCMCIA.
How many devices can a parallel ATA hard drive controller support? (also known as IDE, EIDE, UDMA, PATA, and ATA) This hard drive controller supports up to 4 devices; it is limited to two channels, each with up to two devices.
How many devices can a SCSI (Small Computer Systems Interface)hard drive controller support? This hard drive controller supports up to 8 devices; the host bus adapter(HBA) card counts as one.
How many devices can a Serial ATA (SATA) hard drive controller support per channel? This hard drive controller supports up to 1 device per channel.
What type of RAID is RAID level 0? This type of RAID is striping. Can dramatically improve performance but provides no fault tolerance.
What type of RAID is RAID level 1? This type of RAID is mirroring or duplexing. Allows data from an entire partition is duplicated on two identical drives. Redundancy provides fault tolerance and provides for quick failure recovery. Storage overhead consumes half the available space.
What type of RAID is RAID level 5? This type of RAID is striping with parity. Spreads data and parity information byte by byte across multiple drives. Needs at least 3 drives with same capacity/type. If one drive fails, replace and the parity info on others can reconstruct the lost data.
What is the bit path on a SIMM? This memory form factor has a 32-bit data path.
What is the bit path on a DIMM? This memory form factor has a 62-bit data path.
What is the bit path on a SODIMM? This memory form factor has 16 or 32 memory chips per module and is most often seen in devices with smaller system boards.
What aren't RIMMs interchangeable with DIMMs and SDRAM? This memory form factor has has different pin settings and is not interchangeable with DIMMs and SDRAM. They can only be installed in their own kind of slot on a system. board.
What is SRAM used for? This type of memory is used for cache memory. Does not need to be refreshed to retain data. Does not use assigned memory addresses.
How often does DRAM need to be refreshed? This type of memory needs to be refreshed every few milliseconds. Uses assigned memory addresses.
Which type of memory module is DRDRAM packaged on? This type of memory is packaged on a RIMM memory module. It is a type of synchronous, dynamic RAM.
What kind of memory module was SDRAM originally packaged on? This type of memory was originally packaged on a 168-pin DIMM. It runs at high clock speeds and is synchronized with the CPU bus.
What kind of memory module is Double Data Rate SDRAM packaged on? This kind of memory is packaged on a 184-pin DIMM module.
How often does DDR SDRAM packaged on? This kind of memory transfers data twice per clock cycle. Uses additional power and ground lines.
What kind of memory module is DDR2 SDRAM packaged on? This kind of memory is packaged on a 240-pin DIMM.
What kind of connection DDR3 SDRAM use? This kind of memory uses 240-pin connections, but is not compatible with a previous versions slot.
What standard clock speed and bus width for PC100? The memory standard spec is... Clock speed: 100 MHz Bus width: 8 bytes
What is the standard memory form factor and transfer rate for PC100? The memory standard spec is... 168-pin DIMM and 144-pin SODIMM Transfer rate: 763 MBps
What standard clock speed and bus width for PC133? The memory standard spec is... Clock speed: 133 MHz Bus width: 8 bytes
What is the standard memory form factor and transfer rate for PC133? The memory standard spec is... 168-pin DIMM and 144-pin SODIMM Transfer rate: 1,015 MBps
What standard clock speed and bus width for DDR-333 or PC2700? The memory standard spec is... Clock speed: 166 MHz Bus width: 8 bytes
What is the standard memory form factor and transfer rate for DDR-333 or PC2700? The memory standard spec is... 184-pin DIMM Transfer rate: 2,533 MBps
What standard clock speed and bus width for DDR-400 or PC3200? The memory standard spec is... Clock speed: 200 MHz Bus width: 8 bytes
What is the standard memory form factor and transfer rate for DDR-400 or PC3200? The memory standard spec is... 184-pin DIMM Transfer rate: 3,052 MBps
What standard clock speed, bus width and voltage for DDR2-667, PC2-5300, or PC2-5400? The memory standard spec is... Clock speed: 166 MHz Bus width: 8 bytes
What standard clock speed and bus width for DDR2-667, PC2-5300, or PC2-5400? The memory standard spec is... 240-pin DIMM Transfer rate: 5,066 MBps
What standard clock speed, bus width and voltage for DDR3-1600 or PC3-12800? The memory standard spec is... Clock speed: 200 MHz Bus width: 8 bytes
What standard clock speed and bus width for DDR3-1600 or PC3-12800? The memory standard spec is... 240-pin DIMM Transfer rate: 12,207 MBps
What is the Device Manager (devmgmt.msc) for? This system management tool is the primary tool you will use to manage and configure system devices in a hardware profile.
What is the Reliability and Performance Monitor (perfmon.exe) for? This system management tool is a software tool that monitors the state of services or daemons, processes, and resources on a system.
What is the Task Manager (taskmgr.exe) for? This system management tool is a basic system-diagnostic and performance monitoring tool.
What is the System Configuration (msconfig.exe) for? This system management tool is a graphical tool intended to help automate some routine troubleshooting steps.
What is the System Information (msinfo32.exe) for? This system management tool displays info about the current system config, including a summary of the system components, hardware resource assignments by category, installed hardware devices, the software environment, and Internet Explorer® settings.
What is the Event Viewer (eventvwr.exe) for? This system management tool is used to view the contents of event logs, which are files that contain information about significant events that occur on your computer.
What is the Registry Editor (regedit.exe) for? This system management tool is used to view or modify the contents of the Registry.
What is the Computer Management (compmgmt.msc) for? This 0system management tool is a pre-configured MMC console that serves as a veritable Swiss Army knife of major system administration and information tools.
What is the DxDiag (dxdiag.exe) (DirectX Diagnostic) for? This system management tool displays hardware specifications; use to test that hardware’s suitability for use with DirectX software.
What is difference between throughput and bandwidth? While bandwidth is a theoretical rating of the capabilities of a network channel, throughput is a measurement of how much data can actually pass through the channel in a given time period.
What is the speed, radio frequency and range of 802.11a? This wireless standard has speeds up to 54 Mbps in the 5 GHz band. Range is roughly 20 meters.
What is the speed, radio frequency and range of 802.11b? This wireless standard has speeds up to 11 Mbps, a radio frequency of 2.4 GHz and a range of 100 meters.
What are the main features of 802.11e? This standard is an enhancement of the two wireless standards before it. It adds Quality of Service (QoS) features and multimedia support. It prioritizes data, voice and video transmissions.
What is the speed, radio frequency and range of 802.11g? This wireless standard has speeds up to 54 Mbps, a radio frequency of 2.4 GHz and a range of 100 meters.
What is the speed, radio frequency and range of 802.11n? This wireless standard has speeds up to 600 Mbps, frequency of 2.4 GHz and/or 5 GHz and range is 70 meters. This standard has not yet been finalized.
What is range for the "Well-known ports" block? This block of ports has a range of 0 to 1,023. Pre-assigned for use by common services.
What is range for the "Registered ports" block? This block of ports has a range of1,024 to 49,151. Used by software makers for specific applications.
What is range for the "Dynamic or private ports" block? This block of ports has a range of49,152 to 65,535. Set aside for use by unregistered services, and by services needing a temporary connection.
What is the port number for Ping (echo)? Port 7 is used for this service.
What is the port number for ftp-data? Port 20 is used for this service.
What is the port number for ftp? Port 21 is used for this service.
What is the port number for ssh? Port 22 is used for this service.
What is the port number for telnet? Port 23 is used for this service.
What is the port number for smtp? Port 25 is used for this service.
What is the port number for dns? Port 53 is used for this service.
What is the port number for http? Port 80 is used for this service.
What is the port number for pop3? Port 110 is used for this service.
What is the port number for imap? Port 143 is used for this service.
What is the port number for snmp? Port 161 is used for this service.
What is the port number for ldap? Port 389 is used for this service.
What is the port number for https? Port 443 is used for this service.
What is the port number for dhcpv6-client? Port 546 is used for this service.
What is the port number for dhcpv6-server? Port 547 is used for this service.
What is ipconfig used for? This networking tool is used to verify the configuration of TCP/IP and release or renew DHCP IP address leases.
What is ping used for? This networking tool is test TCP/IP communications.
What is nslookup used for? This networking tool is used to verify that the computer can connect to a DNS server and successfully find an IP address for a given computer name.
What is tracert used for? This networking tool is used to determine and test all points along the route the computer uses to send a packet to a destination.
What is netstat used for? This networking tool is used to show the status of each active network connection.
What is net used for? This networking tool is used to manage Microsoft network resources from a command line.
What is Local Area Connection status used for? This networking tool is used to verify that the LAN is connected to the network and able to send and receive data.
What is Network used for? This networking tool is used to walk through resolutions to various common network problems.
What is the size and pin count of a SODIMM? This type of memory measures about 2 inches x 1 inch and has 144 pins.
What is the size and pin count of a MicroDIMM? This type of memory measures about 1.5 inches long and has 144 pins.
What are the bit encryptions that Wired Equivalent Privacy (WEP) supports? This wireless security method provides 64-bit,128-bit, and 256-bit encryption for wireless communication that uses the 802.11a and 802.11b protocols.
The Wireless Transport Layer Security (WTLS) is the security layer for which protocol? This wireless security method is the security layer for the Wireless Application Protocol (WAP)which is used on mobile devices over long distances. It uses public-key cryptography for mutual authentication and data encryption.
802.1x allows a client to pass which protocol over a LAN to an authentication server? This wireless security method allows the client to pass the Extensible Authentication Protocol (EAP). It is an IEEE standard used to provide a port-based authentication mechanism for wireless communications.
The Wi-Fi Protected Access (WPA) developed in response to which wireless security method's flaw? This wireless security method was introduced to address some of the shortcomings of WEP. It uses strong authentication and data encryption mechanisms.
The WPA2 implements the standards of which 802.X standard? This wireless security method implements the 802.11i standards to provide a complete wireless standard that adds strong encryption and authentication security to 802.11 and relies on 802.1x as the authentication mechanism.
Created by: wyldlily