Try our new practice tests feature: configure your own test including the number of questions, objectives and time limits
This is a practice exam for IT professionals studying for the CompTIA A+ 220-801. A+ covers the fundamentals of computer technology, installation and configuration of PCs, laptops and related hardware, and basic networking.
Dots per Inch (DPI) is the standard measurement used for printers. It refers to the amount of dots that are placed by the printer in a one inch space. This is similar to Pixels Per Inch (PPI), which is used to measure how many pixels are placed in an inch by a monitor or screen. Aspect/Contrast Ratios are used to compare height and width of paper, monitors, etc. For example 4x1 would be 4 height for every 1 width - this could be 400x100 or 800x200.
Dots per inch (DPI, or dpi) is a measure of spatial printing, video or image scanner dot density, in particular the number of individual dots that can be placed in a line within the span of 1 inch (2.54 cm). Similarly, dots per centimetre (d/cm or dpcm) refers to the number of individual dots that can be placed within a line of 1 centimetre (0.394 in).
Dots_per_inch - Wikipedia, the free encyclopediaA customer is not able to connect to any websites. Which of the following commands should a technician run FIRST to identify the issue?
The IPCONFIG command will return a computer's network information such as IP Addresses. Using this tool you can determine if the computer has a proper IP Address.
ipconfig (standing for "Internet Protocol configuration") is a console application program of some computer operating systems that displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings.
Ipconfig - Wikipedia, the free encyclopediaYou are a technician in a computer repair shop. A customer has brought in an old (broken) laptop and has asked you to extract the data for use on a new computer. Assuming the hard drive is fully functioning, which of the following methods would most easily allow this?
Removing the hard drive from the laptop and using a USB hard drive enclosure would be the easiest solution. The customer can then easily extract the data and use the hard drive as an external USB drive when needed.
Amanda, a user, has a laptop running Windows Xp Professional. She has asked the IT Department to update her laptop to run Windows 7. Which of the following should be done first?
Windows Xp and Windows 7 were released 8 years apart. It is possible her laptop does not meet the minimum requirements for Windows 7 and the laptop's specs should be verified first.
To be used efficiently, all computer software needs certain hardware components or other software resources to be present on a computer. These prerequisites are known as (computer) system requirements and are often used as a guideline as opposed to an absolute rule. Most software defines two sets of system requirements: minimum and recommended. With increasing demand for higher processing power and resources in newer versions of software, system requirements tend to increase over time. Industry analysts suggest that this trend plays a bigger part in driving upgrades to existing computer systems than technological advancements. A second meaning of the term of system requirements, is a generalisation of this first definition, giving the requirements to be met in the design of a system or sub-system.
System_requirements - Wikipedia, the free encyclopediaPreboot Execution Environment (PXE) is a computer standard that allows a BIOS to boot from a remote computer located on the same network.
In computing, the Preboot eXecution Environment, PXE (most often pronounced as pixie, often called PXE Boot/pixie boot.) specification describes a standardized client–server environment that boots a software assembly, retrieved from a network, on PXE-enabled clients. On the client side it requires only a PXE-capable network interface controller (NIC), and uses a small set of industry-standard network protocols such as DHCP and TFTP. The concept behind the PXE originated in the early days of protocols like BOOTP/DHCP/TFTP, and as of 2015 it forms part of the Unified Extensible Firmware Interface (UEFI) standard. In modern data centers, PXE is the most frequent choice for operating system booting, installation and deployment.
Preboot_Execution_Environment - Wikipedia, the free encyclopediaYou have been assigned to configure a new enterprise wireless router for your employer's network. Which of the following settings should be changed first?
Networking equipment typically ships with a default password or no password at all. Changing the password should be step one, before any other configurations.
Where a device needs a username and/or password to log in, a default password is usually provided to access the device during its initial setup, or after resetting to factory defaults. Manufacturers of such equipment typically use a simple password, such as admin or password on all equipment they ship, expecting users to change the password during configuration. The default username and password are usually found in the instruction manual (common for all devices) or on the device itself. Default passwords are one of the major contributing factors to large-scale compromises of home routers. Leaving such a password on devices available to the public is a major security risk.Some devices (such as wireless routers) will have unique default router usernames and passwords printed on a sticker, which is more secure than a common default password. Some vendors will however derive the password from the device's MAC address using a known algorithm, in which case the password can also be easily reproduced by attackers.
Default_password - Wikipedia, the free encyclopediaRaid 0 stripes data across multiple hard drives, which improves performance but provides no data recovery after a failure.
RAID (; "redundant array of inexpensive disks" or "redundant array of independent disks") is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both. This is in contrast to the previous concept of highly reliable mainframe disk drives referred to as "single large expensive disk" (SLED).Data is distributed across the drives in one of several ways, referred to as RAID levels, depending on the required level of redundancy and performance. The different schemes, or data distribution layouts, are named by the word "RAID" followed by a number, for example RAID 0 or RAID 1. Each scheme, or RAID level, provides a different balance among the key goals: reliability, availability, performance, and capacity. RAID levels greater than RAID 0 provide protection against unrecoverable sector read errors, as well as against failures of whole physical drives.
RAID - Wikipedia, the free encyclopediaYour employer is in the middle of a remodel and the IT Department is responsible for moving RJ-45 wall jacks to new locations. Which tool can be used verify connectivity of a RJ-45 port after it has been moved?
Loopback plugs are inexpensive tools used to create a loop in wiring. For networking, RJ-45 loopback plugs are great tools for quickly checking if data is being properly transmitted.
Loopback (also written loop-back) is the routing of electronic signals or digital data streams back to their source without intentional processing or modification. It is primarily a means of testing the communications infrastructure.
Loopback - Wikipedia, the free encyclopediaA user reports that their printouts contain a shadow of the previous image. Which of the following is MOST likely the cause?
After a printer applies toner to paper the fuser assembly rolls over the paper and applies heat to fuse the toner to the paper. Occasionally, the toner can stick to the fuser assembly and will be applied to the next sheet of paper passed through the printer.
Laser printing is an electrostatic digital printing process. It produces high-quality text and graphics (and moderate-quality photographs) by repeatedly passing a laser beam back and forth over a negatively charged cylinder called a "drum" to define a differentially charged image. The drum then selectively collects electrically charged powdered ink (toner), and transfers the image to paper, which is then heated to permanently fuse the text, imagery, or both, to the paper. As with digital photocopiers, laser printers employ a xerographic printing process. Laser printing differs from traditional xerography as implemented in analog photocopiers in that in the latter, the image is formed by reflecting light off an existing document onto the exposed drum. Invented at Xerox PARC in the 1970s, laser printers were introduced for the office and then home markets in subsequent years by IBM, Canon, Xerox, Apple, Hewlett-Packard and many others. Over the decades, quality and speed have increased as prices have decreased, and the once cutting-edge printing devices are now ubiquitous.
Laser_printing - Wikipedia, the free encyclopediaQuality of Service is a networking technique where certain types of traffic are given higher priority than less important traffic. Just like emergency vehicles are given priority on roads, business critical traffic is given higher priority than non-critical traffic.
Quality of service (QoS) is the description or measurement of the overall performance of a service, such as a telephony or computer network, or a cloud computing service, particularly the performance seen by the users of the network. To quantitatively measure quality of service, several related aspects of the network service are often considered, such as packet loss, bit rate, throughput, transmission delay, availability, jitter, etc. In the field of computer networking and other packet-switched telecommunication networks, quality of service refers to traffic prioritization and resource reservation control mechanisms rather than the achieved service quality. Quality of service is the ability to provide different priorities to different applications, users, or data flows, or to guarantee a certain level of performance to a data flow. Quality of service is particularly important for the transport of traffic with special requirements. In particular, developers have introduced Voice over IP technology to allow computer networks to become as useful as telephone networks for audio conversations, as well as supporting new applications with even stricter network performance requirements.
Quality_of_service - Wikipedia, the free encyclopediaA technician is working on a PC that utilizes a RAID array for operation. The user of the system has reported that random files are becoming corrupted on creation with no pattern to the activity. One drive in the array is likely failing and causing the read/write failures. Which of the following types of RAID is MOST likely in use?
RAID 0 uses striping, but does not use a mirror or parity disk. This means corrupted data cannot be recovered, and that an issue on one disk could cause information on other disks to be unreadable.
RAID (; "redundant array of inexpensive disks" or "redundant array of independent disks") is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both. This is in contrast to the previous concept of highly reliable mainframe disk drives referred to as "single large expensive disk" (SLED).Data is distributed across the drives in one of several ways, referred to as RAID levels, depending on the required level of redundancy and performance. The different schemes, or data distribution layouts, are named by the word "RAID" followed by a number, for example RAID 0 or RAID 1. Each scheme, or RAID level, provides a different balance among the key goals: reliability, availability, performance, and capacity. RAID levels greater than RAID 0 provide protection against unrecoverable sector read errors, as well as against failures of whole physical drives.
RAID - Wikipedia, the free encyclopediaWhich of the following technologies allows a PC to boot an operating system from a separate network location?
Preboot Execution Environment (PXE) is an industry standard protocol that allows a computer to boot an operating system from a network server. It is typically used to configure new PC's, often in bulk.
In computing, the Preboot eXecution Environment, PXE (most often pronounced as pixie, often called PXE Boot/pixie boot.) specification describes a standardized client–server environment that boots a software assembly, retrieved from a network, on PXE-enabled clients. On the client side it requires only a PXE-capable network interface controller (NIC), and uses a small set of industry-standard network protocols such as DHCP and TFTP. The concept behind the PXE originated in the early days of protocols like BOOTP/DHCP/TFTP, and as of 2015 it forms part of the Unified Extensible Firmware Interface (UEFI) standard. In modern data centers, PXE is the most frequent choice for operating system booting, installation and deployment.
Preboot_Execution_Environment - Wikipedia, the free encyclopediaPower over Ethernet (PoE) allows devices to use an ethernet connection as a power source, most commonly found in IP phones. The ethernet cable provides the power for the device to operate as well as network connectivity.
Power over Ethernet, or PoE, describes any of several standards or ad hoc systems that pass electric power along with data on twisted-pair Ethernet cabling. This allows a single cable to provide both a data connection and enough electricity to power devices such as wireless access points (WAPs), Internet Protocol (IP) cameras and voice over Internet Protocol (VoIP) phones. There are several common techniques for transmitting power over Ethernet cabling. Three of them have been standardized by the Institute of Electrical and Electronics Engineers (IEEE) standard IEEE 802.3 since 2003. These standards are known as alternative A, alternative B, and 4PPoE. Alternative A uses the same two of the four signal pairs that 10BASE-T and 100BASE-TX use for data in typical Cat 5 cabling. Alternative B separates the data and the power conductors, making troubleshooting easier. 4PPoE uses all four twisted pairs in parallel, increasing the achievable power. Alternative A transports power on the same wires as data for 10 and 100 Mbit/s Ethernet variants. This is similar to the phantom power technique commonly used for powering condenser microphones. Power is transmitted on the data conductors by applying a common voltage to each pair. Because twisted-pair Ethernet uses differential signaling, this does not interfere with data transmission. The common-mode voltage is easily extracted using the center tap of the standard Ethernet pulse transformer. For Gigabit Ethernet and faster, both alternatives A and B transport power on wire pairs also used for data since all four pairs are used for data transmission at
Power_over_Ethernet - Wikipedia, the free encyclopediaPartitioning is the act of logically separating a single physical disk. Allowing an Operating System to perceive a hard drive as multiple hard drives.
Disk partitioning or disk slicing is the creation of one or more regions on secondary storage, so that each region can be managed separately. These regions are called partitions. It is typically the first step of preparing a newly installed disk, before any file system is created. The disk stores the information about the partitions' locations and sizes in an area known as the partition table that the operating system reads before any other part of the disk. Each partition then appears to the operating system as a distinct "logical" disk that uses part of the actual disk. System administrators use a program called a partition editor to create, resize, delete, and manipulate the partitions. Partitioning allows the use of different filesystems to be installed for different kinds of files. Separating user data from system data can prevent the system partition from becoming full and rendering the system unusable. Partitioning can also make backing up easier. A disadvantage is that it can be difficult to properly size partitions, resulting in having one partition with too much free space and another nearly totally allocated.
Disk_partitioning - Wikipedia, the free encyclopediaWhich of the following should be regularly performed to prevent data loss in the event of data corruption or drive failure?
Of the options, only Scheduled Backups will prevent data loss after corruption or drive failure.
In information technology, a backup, or data backup is a copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event. The verb form, referring to the process of doing so, is "back up", whereas the noun and adjective form is "backup". Backups can be used to recover data after its loss from data deletion or corruption, or to recover data from an earlier time. Backups provide a simple form of disaster recovery; however not all backup systems are able to reconstitute a computer system or other complex configuration such as a computer cluster, active directory server, or database server.A backup system contains at least one copy of all data considered worth saving. The data storage requirements can be large. An information repository model may be used to provide structure to this storage. There are different types of data storage devices used for copying backups of data that is already in secondary storage onto archive files. There are also different ways these devices can be arranged to provide geographic dispersion, data security, and portability. Data is selected, extracted, and manipulated for storage. The process can include methods for dealing with live data, including open files, as well as compression, encryption, and de-duplication. Additional techniques apply to enterprise client-server backup. Backup schemes may include dry runs that validate the reliability of the data being backed up. There are limitations and human factors involved in any backup scheme.
Backup - Wikipedia, the free encyclopediaWhile working for a IT Consulting firm, you have been tasked with setting up several SOHO wireless networks. Which of the following will ensure the security of confidential data?
Encrypting data before transmitting wirelessly is the best method to ensure data security.
Wi-Fi Protected Access (WPA), Wi-Fi Protected Access 2 (WPA2), and Wi-Fi Protected Access 3 (WPA3) are the three security certification programs developed after 2000 by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined these in response to serious weaknesses researchers had found in the previous system, Wired Equivalent Privacy (WEP).WPA (sometimes referred to as the TKIP standard) became available in 2003. The Wi-Fi Alliance intended it as an intermediate measure in anticipation of the availability of the more secure and complex WPA2, which became available in 2004 and is a common shorthand for the full IEEE 802.11i (or IEEE 802.11i-2004) standard. In January 2018, the Wi-Fi Alliance announced the release of WPA3, which has several security improvements over WPA2.As of 2023, most computers that connect to a wireless network have support for using WPA, WPA2, or WPA3.
Wi-Fi_Protected_Access - Wikipedia, the free encyclopediaAn office of 25 computers is interested in employing a file server, network shares, and print server functionality. Which of the following network setups would be BEST suited for this situation?
Only a domain will give you a centralized, controlled network and allow for file servers, print servers, and network shares. These are possible in a workgroup, but will not provide the network control that a business would require.
A computer network is a set of computers sharing resources located on or provided by network nodes. Computers use common communication protocols over digital interconnections to communicate with each other. These interconnections are made up of telecommunication network technologies based on physically wired, optical, and wireless radio-frequency methods that may be arranged in a variety of network topologies. The nodes of a computer network can include personal computers, servers, networking hardware, or other specialized or general-purpose hosts. They are identified by network addresses and may have hostnames. Hostnames serve as memorable labels for the nodes and are rarely changed after initial assignment. Network addresses serve for locating and identifying the nodes by communication protocols such as the Internet Protocol. Computer networks may be classified by many criteria, including the transmission medium used to carry signals, bandwidth, communications protocols to organize network traffic, the network size, the topology, traffic control mechanisms, and organizational intent.Computer networks support many applications and services, such as access to the World Wide Web, digital video and audio, shared use of application and storage servers, printers and fax machines, and use of email and instant messaging applications.
Computer network - Wikipedia, the free encyclopediaAn unknown device has been found on a SOHO wireless router. Which of the following is BEST to perform to keep this device off the network?
Configuring MAC Filtering will only allow approved MAC Addresses to connect to the router. In addition, proper encryption and security settings should be verified.
In computer networking, MAC address filtering is a security access control method whereby the MAC address assigned to each network interface controller is used to determine access to the network. MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and whitelists. While the restriction of network access through the use of lists is straightforward, an individual person is not identified by a MAC address, rather a device only, so an authorized person will need to have a whitelist entry for each device that they would like to access the network. While giving a network some additional protection, MAC filtering can be circumvented by using a packet analyzer to find a valid MAC and then using MAC spoofing to access the network using that address. MAC address filtering can be considered as security through obscurity because the effectiveness is based on "the secrecy of the implementation or its components".
MAC_filtering - Wikipedia, the free encyclopediaA customer is complaining that their laptop often restarts with no warning, most often when they are playing video games or have several programs running at once. What is most likely the issue?
Any computer can overheat, but laptops are compact and can easily overheat when the processor is stressed for long periods of time. Typically when a computer becomes to hot, it will simply shut off without warning to prevent any physical damage to the computer.
Overheating may refer to: Overheating (economics), a rapid, very big growth of production that is thought to have a negative influence Overheating (electricity), unexpected rise of temperature in a portion of electrical circuit, that can cause harm to the circuit, and accidents Overheating (combinatorial game theory), an operation on combinatorial games that approximately reverses the effect of chilling Hyperthermia, also called sunstroke, an elevated body temperature due to failed thermoregulation Thermal shock, the overheating of a device leading to reduced efficiency, damage or even destruction
Overheating - Wikipedia, the free encyclopediaRaid 1 uses disk mirroring to ensure every piece of data can also be found on another hard drive. This means if a single disk fails, another disk will still have the necessary data.
RAID (; "redundant array of inexpensive disks" or "redundant array of independent disks") is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both. This is in contrast to the previous concept of highly reliable mainframe disk drives referred to as "single large expensive disk" (SLED).Data is distributed across the drives in one of several ways, referred to as RAID levels, depending on the required level of redundancy and performance. The different schemes, or data distribution layouts, are named by the word "RAID" followed by a number, for example RAID 0 or RAID 1. Each scheme, or RAID level, provides a different balance among the key goals: reliability, availability, performance, and capacity. RAID levels greater than RAID 0 provide protection against unrecoverable sector read errors, as well as against failures of whole physical drives.
RAID - Wikipedia, the free encyclopediaLooks like thats it! You can go back and review your answers or click the button below to grade your test.