Try our new practice tests feature: configure your own test including the number of questions, objectives and time limits
This is a practice exam for IT professionals studying for the CompTIA A+ 220-802. A+ covers the fundamentals of computer technology, installation and configuration of PCs, laptops and related hardware, and basic networking.
Tablets and other mobile devices do not use Hard Disk Drives (HDD). HDD's use magnetic storage and constantly moving parts, which makes them poor candidates when durability is necessary. Most mobile devices will use flash memory based storage mediums like Solid State Drives (SSD).
A hard disk drive (HDD), hard disk, hard drive, or fixed disk, is an electro-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating platters coated with magnetic material. The platters are paired with magnetic heads, usually arranged on a moving actuator arm, which read and write data to the platter surfaces. Data is accessed in a random-access manner, meaning that individual blocks of data can be stored and retrieved in any order. HDDs are a type of non-volatile storage, retaining stored data when powered off. Modern HDDs are typically in the form of a small rectangular box. Introduced by IBM in 1956, HDDs were the dominant secondary storage device for general-purpose computers beginning in the early 1960s. HDDs maintained this position into the modern era of servers and personal computers, though personal computing devices produced in large volume, like mobile phones and tablets, rely on flash memory storage devices. More than 224 companies have produced HDDs historically, though after extensive industry consolidation most units are manufactured by Seagate, Toshiba, and Western Digital. HDDs dominate the volume of storage produced (exabytes per year) for servers. Though production is growing slowly (by exabytes shipped), sales revenues and unit shipments are declining because solid-state drives (SSDs) have higher data-transfer rates, higher areal storage density, somewhat better reliability, and much lower latency and access times.The revenues for SSDs, most of which use NAND flash memory, slightly exceeded those for HDDs in 2018. Flash storage
Hard disk drive - Wikipedia, the free encyclopediaWhich command will force a PC to contact a DHCP server to request a new IP Address or extend the lease on it's current IP Address?
IPCONFIG /renew will attempt to get an IP Address if it has none, or will renew the lease on the PC's current IP Address.
ipconfig (standing for "Internet Protocol configuration") is a console application program of some computer operating systems that displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings.
Ipconfig - Wikipedia, the free encyclopediaGlobal Positioning System (GPS) is a satellite based tracking system used to determine a device's physical location. Code Division Multiple Access (CDMA) and Global System for Mobile communication (GSM) are wireless technologies used by access points and devices to communicate. Both are used widely between cell phones and cell phone towers. A Geotag is a digital tag that identifies a files location at the time it was created - typically used in photos and videos.
The Global Positioning System (GPS), originally Navstar GPS, is a satellite-based radio navigation system owned by the United States government and operated by the United States Space Force. It is one of the global navigation satellite systems (GNSS) that provides geolocation and time information to a GPS receiver anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites. It does not require the user to transmit any data, and operates independently of any telephonic or Internet reception, though these technologies can enhance the usefulness of the GPS positioning information. It provides critical positioning capabilities to military, civil, and commercial users around the world. Although the United States government created, controls and maintains the GPS system, it is freely accessible to anyone with a GPS receiver.The GPS project was started by the U.S. Department of Defense in 1973. The first prototype spacecraft was launched in 1978 and the full constellation of 24 satellites became operational in 1993. Originally limited to use by the United States military, civilian use was allowed from the 1980s following an executive order from President Ronald Reagan after the Korean Air Lines Flight 007 disaster. Advances in technology and new demands on the existing system have now led to efforts to modernize the GPS and implement the next generation of GPS Block IIIA satellites and Next Generation Operational Control System (OCX). which was authorized by the U.S. Congress in 2000. From the early 1990s, GPS positional accuracy was
Global_Positioning_System - Wikipedia, the free encyclopediaWhich of the following encryption software provides the HIGHEST level of security for PCs running Windows 7?
Of the choices, the only true encryption softwares are EFS and Bitlocker. EFS is a file level encryption that works in coordination with NTFS, while Bitlocker is a much stronger encryption that encrypts the entire hard drive, not just single files.
BitLocker is a full volume encryption feature included with Microsoft Windows versions starting with Windows Vista. It is designed to protect data by providing encryption for entire volumes. By default, it uses the AES encryption algorithm in cipher block chaining (CBC) or XTS mode with a 128-bit or 256-bit key. CBC is not used over the whole disk; it is applied to each individual sector.
BitLocker - Wikipedia, the free encyclopediaWhich of the following options is a Microsoft Windows API for creating graphic and multimedia effects in Windows Programs?
Microsoft DirectX is a application program interface (API) used by software developers to create images, animations, and other multimedia effects for video animations and games for Windows Operating Systems. Open Graphics Library (OpenGL) is a similar open source API that is usable on most Apple/Macintosh, Linux, Unix, and Microsoft Operating Systems.
Microsoft DirectX is a collection of application programming interfaces (APIs) for handling tasks related to multimedia, especially game programming and video, on Microsoft platforms. Originally, the names of these APIs all began with "Direct", such as Direct3D, DirectDraw, DirectMusic, DirectPlay, DirectSound, and so forth. The name DirectX was coined as a shorthand term for all of these APIs (the X standing in for the particular API names) and soon became the name of the collection. When Microsoft later set out to develop a gaming console, the X was used as the basis of the name Xbox to indicate that the console was based on DirectX technology. The X initial has been carried forward in the naming of APIs designed for the Xbox such as XInput and the Cross-platform Audio Creation Tool (XACT), while the DirectX pattern has been continued for Windows APIs such as Direct2D and DirectWrite. Direct3D (the 3D graphics API within DirectX) is widely used in the development of video games for Microsoft Windows and the Xbox line of consoles. Direct3D is also used by other software applications for visualization and graphics tasks such as CAD/CAM engineering. As Direct3D is the most widely publicized component of DirectX, it is common to see the names "DirectX" and "Direct3D" used interchangeably. The DirectX software development kit (SDK) consists of runtime libraries in redistributable binary form, along with accompanying documentation and headers for use in coding. Originally, the runtimes were only installed by games or explicitly by the user. Windows 95 did not
DirectX - Wikipedia, the free encyclopediaYou work as an IT Consultant for a small business. The business uses several Windows based servers to store data used between company employees. After a power outage and UPS failure, one of the servers has rebooted and users are unable to communicate with the server. After running the IPCONFIG command line tool, you find the server has an IP Address of 169.254.20.1. Which of the following is likely the issue?
Dynamic Host Configuration Protocol (DHCP) provides network devices with IP configurations. When a Windows based PC or Server does not have a statically assigned IP and cannot connect to a DHCP server it will assign an Automatic Private IP Address (APIPA) and attempt to use it to communicate on the network. The APIPA address range is 169.254.0.0 to 169.254.255.255.
The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on Internet Protocol (IP) networks for automatically assigning IP addresses and other communication parameters to devices connected to the network using a client–server architecture.The technology eliminates the need for individually configuring network devices manually, and consists of two network components, a centrally installed network DHCP server and client instances of the protocol stack on each computer or device. When connected to the network, and periodically thereafter, a client requests a set of parameters from the server using DHCP. DHCP can be implemented on networks ranging in size from residential networks to large campus networks and regional ISP networks. Many routers and residential gateways have DHCP server capability. Most residential network routers receive a unique IP address within the ISP network. Within a local network, a DHCP server assigns a local IP address to each device. DHCP services exist for networks running Internet Protocol version 4 (IPv4), as well as version 6 (IPv6). The IPv6 version of the DHCP protocol is commonly called DHCPv6.
Dynamic Host Configuration Protocol - Wikipedia, the free encyclopediaAfter installing a popular Windows security suite, a PC can no longer access the internet. Which component is likely causing the issue?
It is most likely the new security suite's firewall settings that has caused the sudden issue. The firewall will need to be reconfigured to allow for internet access.
In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet.
Firewall_(computing) - Wikipedia, the free encyclopediaEXT2 (Extended File System 2 or Second Extended File System) is the default file system for most Linux distributions. FAT32 (File Allocation Table - 32 bit) and NTFS (New Technology File System) are used in Windows environments, and HFS+ (Hierarchical File System Plus) is used by Mac OSX.
ext2, or second extended file system, is a file system for the Linux kernel. It was initially designed by French software developer Rémy Card as a replacement for the extended file system (ext). Having been designed according to the same principles as the Berkeley Fast File System from BSD, it was the first commercial-grade filesystem for Linux.The canonical implementation of ext2 is the "ext2fs" filesystem driver in the Linux kernel. Other implementations (of varying quality and completeness) exist in GNU Hurd, MINIX 3, some BSD kernels, in MiNT, Haiku and as third-party Microsoft Windows and macOS drivers.ext2 was the default filesystem in several Linux distributions, including Debian and Red Hat Linux, until supplanted by ext3, which is almost completely compatible with ext2 and is a journaling file system. ext2 is still the filesystem of choice for flash-based storage media (such as SD cards and USB flash drives) because its lack of a journal increases performance and minimizes the number of writes, and flash devices can endure a limited number of write cycles. Since 2009, the Linux kernel supports a journal-less mode of ext4 which provides benefits not found with ext2, such as larger file and volume sizes.
Ext2 - Wikipedia, the free encyclopediaCheck Disk (CHKDSK) verifies the file system integrity of a volume and fixes logical errors. FSCK is the Unix/Linux equivalent of CHKDSK.
In computing, CHKDSK (short for "check disk") is a system tool and command in DOS, Digital Research FlexOS, IBM/Toshiba 4690 OS, IBM OS/2, Microsoft Windows and related operating systems. It verifies the file system integrity of a volume and attempts to fix logical file system errors. It is similar to the fsck command in Unix and similar to Microsoft ScanDisk, which co-existed with CHKDSK in Windows 9x and MS-DOS 6.x.
CHKDSK - Wikipedia, the free encyclopediaYour supervisor has asked you to provide a list of IP addresses assigned to a server. The server is running Windows Server 2008 R2 and has 3 NICs, one physical and two virtual. What command can you use to obtain this information?
IPCONFIG (IP Configuration) is the Windows Command Line Tool used to list IP addresses, MAC Addresses, Subnet Masks and lots of more IP related configuration data. IPCONFIG --virtual will fail, there is no virtual switch. IFCONFIG is the Linux/Unix equivalent of IPCONFIG. IPCONFIG will show both virtual and physical Network Access Cards (NIC) by default.
ipconfig (standing for "Internet Protocol configuration") is a console application program of some computer operating systems that displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings.
Ipconfig - Wikipedia, the free encyclopediaThe Troubleshooting Theory is as follows: 1. Identify the problem, 2. Establish a theory of probable cause, 3. Test the theory, 4. Establish a plan of action to resolve the problem, 5. Verify full system functionality and implement preventative measures (if necessary), and 6. Document findings, actions, and outcomes.
Explorer (located in C:\Windows\Explorer.exe by default) is the Windows System program used to view files and folders. Internet Explorer (IE) is used to view website, it is possible to use IE to view folders but this is not common and must be manually implemented.
File Explorer, previously known as Windows Explorer, is a file manager application and default desktop environment that is included with releases of the Microsoft Windows operating system from Windows 95 onwards. It provides a graphical user interface for accessing the file systems. It is also the component of the operating system that presents many user interface items on the screen such as the taskbar and desktop. Controlling the computer is possible without File Explorer running (for example, the File ▸ Run command in Task Manager on NT-derived versions of Windows will function without it, as will commands typed in a command prompt window).
File_Explorer - Wikipedia, the free encyclopediaIn both Windows Vista and Windows 7, user files are located in the C:\users\ directory by default. The Documents and Settings directory does not exist In windows Vista or Windows 7.
User Account Control (UAC) is a mandatory access control enforcement feature introduced with Microsoft's Windows Vista and Windows Server 2008 operating systems, with a more relaxed version also present in Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, Windows 8.1, Windows Server 2012 R2, Windows 10, and Windows 11. It aims to improve the security of Microsoft Windows by limiting application software to standard user privileges until an administrator authorises an increase or elevation. In this way, only applications trusted by the user may receive administrative privileges and malware are kept from compromising the operating system. In other words, a user account may have administrator privileges assigned to it, but applications that the user runs do not inherit those privileges unless they are approved beforehand or the user explicitly authorises it. UAC uses Mandatory Integrity Control to isolate running processes with different privileges. To reduce the possibility of lower-privilege applications communicating with higher-privilege ones, another new technology, User Interface Privilege Isolation, is used in conjunction with User Account Control to isolate these processes from each other. One prominent use of this is Internet Explorer 7's "Protected Mode".Operating systems on mainframes and on servers have differentiated between superusers and userland for decades. This had an obvious security component, but also an administrative component, in that it prevented users from accidentally changing system settings. Early Microsoft home operating-systems (such as MS-DOS, Windows 95-98 and Windows Me) did not have a concept of different user-accounts on the same machine. Subsequent versions of
User_Account_Control - Wikipedia, the free encyclopediaThe Intel Core i7 processors are simply too powerful and too resource intensive to be used in most mobile devices, especially phones. ARM 7 and Snapdragon processors use specific mobile friendly architectures, which makes them more common in mobile phones. You may however find Intel Core products in larger tablets and laptops.
Intel Core is a line of streamlined midrange consumer, workstation and enthusiast computer central processing units (CPUs) marketed by Intel Corporation. These processors displaced the existing mid- to high-end Pentium processors at the time of their introduction, moving the Pentium to the entry level. Identical or more capable versions of Core processors are also sold as Xeon processors for the server and workstation markets. The lineup of Core processors includes the Intel Core i3, Intel Core i5, Intel Core i7, and Intel Core i9, along with the X-series of Intel Core CPUs.
Intel Core - Wikipedia, the free encyclopediaA user has contacted the IT department stating their company Android device will not rotate it's screen orientation, even when auto-rotate is enabled. Which of the following sensors is likely malfunctioning?
In mobile devices, the Gyroscope is a sensor that uses gravity to detect a devices orientation. The gyroscope provides the mobile operating system with data to determine how the screen should be displayed.
A gyroscope (from Ancient Greek γῦρος gŷros, "round" and σκοπέω skopéō, "to look") is a device used for measuring or maintaining orientation and angular velocity. It is a spinning wheel or disc in which the axis of rotation (spin axis) is free to assume any orientation by itself. When rotating, the orientation of this axis is unaffected by tilting or rotation of the mounting, according to the conservation of angular momentum. Gyroscopes based on other operating principles also exist, such as the microchip-packaged MEMS gyroscopes found in electronic devices (sometimes called gyrometers), solid-state ring lasers, fibre optic gyroscopes, and the extremely sensitive quantum gyroscope.Applications of gyroscopes include inertial navigation systems, such as in the Hubble Space Telescope, or inside the steel hull of a submerged submarine. Due to their precision, gyroscopes are also used in gyrotheodolites to maintain direction in tunnel mining. Gyroscopes can be used to construct gyrocompasses, which complement or replace magnetic compasses (in ships, aircraft and spacecraft, vehicles in general), to assist in stability (bicycles, motorcycles, and ships) or be used as part of an inertial guidance system. MEMS gyroscopes are popular in some consumer electronics, such as smartphones.
Gyroscope - Wikipedia, the free encyclopediaWhen using the ping command line tool in a Windows environment, which of the following switches will resolve an IP Addresses hostname before pinging?
Using "Ping -a" will tell the ping tool to resolve an IP Address to a hostname before beginning to ping the IP Address. If a hostname is not resolved, ping will not provide a hostname and instead show the IP address. For example, if a PC has a hostname of SERVER1 and an IP of 192.168.1.101, using Ping -a 192.168.1.101 will produce "Pinging SERVER1 [192.168.1.101] with 32 bytes of data:" at the start of output.
ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network. It is available for virtually all operating systems that have networking capability, including most embedded network administration software. Ping measures the round-trip time for messages sent from the originating host to a destination computer that are echoed back to the source. The name comes from active sonar terminology that sends a pulse of sound and listens for the echo to detect objects under water.Ping operates by means of Internet Control Message Protocol (ICMP) packets. Pinging involves sending an ICMP echo request to the target host and waiting for an ICMP echo reply. The program reports errors, packet loss, and a statistical summary of the results, typically including the minimum, maximum, the mean round-trip times, and standard deviation of the mean. The command-line options of the ping utility and its output vary between the numerous implementations. Options may include the size of the payload, count of tests, limits for the number of network hops (TTL) that probes traverse, interval between the requests and time to wait for a response. Many systems provide a companion utility ping6, for testing on Internet Protocol version 6 (IPv6) networks, which implement ICMPv6.
Ping_(networking_utility) - Wikipedia, the free encyclopediaRadio Frequency Identification (RFID) devices are physical devices used to identify and track objects. Typically, each user is given a unique RFID (in the form of a key fob or badge) which is used to obtain access to restricted areas. Firewalls, Antiviruses and Network/Host Intrusion Protection Systems (NIPS/HIPS) are used to protect software, operating system and computer networks.
Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID system consists of a tiny radio transponder, a radio receiver and transmitter. When triggered by an electromagnetic interrogation pulse from a nearby RFID reader device, the tag transmits digital data, usually an identifying inventory number, back to the reader. This number can be used to track inventory goods.Passive tags are powered by energy from the RFID reader's interrogating radio waves. Active tags are powered by a battery and thus can be read at a greater range from the RFID reader, up to hundreds of meters. Unlike a barcode, the tag does not need to be within the line of sight of the reader, so it may be embedded in the tracked object. RFID is one method of automatic identification and data capture (AIDC).RFID tags are used in many industries. For example, an RFID tag attached to an automobile during production can be used to track its progress through the assembly line, RFID-tagged pharmaceuticals can be tracked through warehouses, and implanting RFID microchips in livestock and pets enables positive identification of animals. Tags can also be used in shops to expedite checkout, and to prevent theft by customers and employees.Since RFID tags can be attached to physical money, clothing, and possessions, or implanted in animals and people, the possibility of reading personally-linked information without consent has raised serious privacy concerns. These concerns resulted in standard specifications development addressing privacy and security issues. In 2014, the world
Radio-frequency_identification - Wikipedia, the free encyclopediaMicrosoft Windows 7 64 bit requires a minimum of 2 Gigabytes of RAM. Windows 7 32 bit requires 1 Gigabyte of RAM.
Windows 7 is a major release of the Windows NT operating system developed by Microsoft. It was released to manufacturing on July 22, 2009, and became generally available on October 22, 2009. It is the successor to Windows Vista, released nearly three years earlier. It remained an operating system for use on personal computers, including home and business desktops, laptops, tablet PCs and media center PCs, and itself was replaced in November 2012 by Windows 8, the name spanning more than three years of the product. Until April 9, 2013, Windows 7 original release included updates and technical support, after which installation of Service Pack 1 was required for users to receive support and updates. Windows 7's server counterpart, Windows Server 2008 R2, was released at the same time. Extended support ended on January 14, 2020, over ten years after the release of Windows 7, after which the operating system ceased receiving further updates. A paid support program was available for enterprises, providing security updates for Windows 7 for up to three years since the official end of life.Windows 7 was intended to be an incremental upgrade to Microsoft Windows, addressing Windows Vista's poor critical reception while maintaining hardware and software compatibility. Windows 7 continued improvements on the Windows Aero user interface with the addition of a redesigned taskbar that allows pinned applications, and new window management features. Other new features were added to the operating system, including libraries, the new file-sharing system HomeGroup, and support for multitouch input. A new
Windows_7#System_requirements - Wikipedia, the free encyclopediaThis question could be tricky if you're not an avid iOS user. Firewire, 30 Pin, and Lightning cables are all Apple cable/connector types. However, new iOS devices use Lightning cables which replaced the 30 Pin connector type.
Lightning is a proprietary computer bus and power connector created and designed by Apple Inc. and introduced on September 12, 2012 (2012-09-12), to replace its predecessor, the 30-pin dock connector. The Lightning connector is used to connect Apple mobile devices like iPhones, iPads, and iPods to host computers, external monitors, cameras, USB battery chargers, and other peripherals. Using 8 pins instead of 30, Lightning is much smaller than its predecessor, which was integrated with devices like the iPhone 4 and the iPad 2. The Lightning plug is symmetrical (same pins on either side), so it can be inserted into a Lightning receptacle in either orientation. The plug is indented on each side to match up with corresponding points inside the receptacle to retain the connection.
Lightning_(connector) - Wikipedia, the free encyclopediaLooks like thats it! You can go back and review your answers or click the button below to grade your test.