Comptia A+ 901: Part 2 Flashcards Preview

Technology > Comptia A+ 901: Part 2 > Flashcards

Flashcards in Comptia A+ 901: Part 2 Deck (99)
Loading flashcards...
1

Which is not correct about laptop components?
a. Laptops only work from battery power.
b. The motherboard of a laptop is the backbone of the system.
c. Motherboards are designed along with the laptop case.
d. Hardware devices are smaller and not quite as powerful.

a. Laptops only work from battery power.

EXPLANATION:

Laptops don’t need to be connected to a power source all the time, but most laptop processors
run in a lower power state when on battery power. This is known as power throttling.

2

Which of the following statements is not correct about laptops?
a. The video card in a laptop is responsible for generating and managing
the image sent to the screen.
b. Fluorescent lighting and LCD backlights require fairly high-voltage and
high-frequency energy.
c. Laptops use USB ports for expansion.
d. Laptops never come with a built-in keyboard or mouse.

d. Laptops never come with a built-in keyboard or mouse.

EXPLANATION:

Laptops come with a built-in keyboard and mouse. Some laptops come with a combination
keyboard/mouse port that allows you to connect either an external keyboard or an
external mouse.

3

In a laptop you cannot replace Mini PCIe card.

True
False

FALSE

EXPLANATION:

You can replace the Mini PCIe card in your laptop. The PCI cards that you use include network
cards, sound cards, modems, extra ports such as USB or serial, TV tuner cards and disk controllers.

4

Which of the following statements is not correct about display devices?
a. LCD screens are known to have a longer life and retain color for
years.
b. OLED displays have a better battery life, are much brighter, and
have more colors.
c. A fluorescent display emits a very bright light with high contrast
and can support display elements of various colors.
d. None of these

d. None of these

EXPLANATION:

All of these things are correct about laptops.

5

Which of the following statements is not correct about CCD?

a. A charge-coupled device (CCD) is a light-sensitive integrated
circuit that stores and displays the data for an image.
b. CCDs are now commonly included in digital still and video
cameras.
c. CCDs move charge between capacitive bins in the device.
d. A good CCD can’t produce an image in extremely dim light.

d. A good CCD can’t produce an image in extremely dim light.

EXPLANATION:


A good CCD can produce an image in extremely dim light, and its resolution does not
deteriorate when the illumination intensity is low, as is the case with conventional
cameras.

6

A digitizer converts analog signals to digital.


True
False

TRUE

EXPLANATION:

A digitizer is a device used to convert analog signals into digital signals. In cell phones,
this device would be the glass that covers the LCD. Digitizing is turning any analog
source anything you write on a screen using finger or stylus, audio, video, slides and
photographs into a binary bit stream. As an input device, a digitizer or digitizing
tablet takes pen strokes and turns them into a digital rendering through the software
controlling the digitizer.

7

Which of the following statements is correct about screen brightness?
a. The brightness and contrast buttons are on the front of the
monitor.
b. You can find it on the on-screen menu.
c. Laptop displays don’t have brightness buttons.
d. All of these

d. All of these

EXPLANATION:

Brightness and contrast buttons are on the front of the monitor. Some monitors have
brightness and contrast controls on the front and use the standard symbols.
You can change the brightness and contrast settings for some displays by using an onscreen
menu, and then setting the brightness and contrast in the resulting menu.
Laptop displays don’t have brightness or contrast buttons on the front. For a majority of
laptops, there isn’t a control for setting the contrast.

8

Which of the following statements is correct about GPS? (choose all
that apply)
a. A laptop GPS tracking system is just an extended version of GPS.
b. All you need is a laptop GPS receiver and a GPS
mapping software.
c. The Bluetooth option has to be disabled.
d. None of these

A and B

a. A laptop GPS tracking system is just an extended version of GPS.
b. All you need is a laptop GPS receiver and a GPS mapping software.

EXPLANATION:

A laptop GPS tracking system is just an extended version of GPS where you extend the
receiver to the laptop. This enables you to view things on a large screen.
All you need is a laptop GPS receiver and a GPS mapping software to use GPS on a
laptop. The best thing about laptop GPS is that you do not need any wiring, unless you
are using an extension for the receiver’s antenna.

9

Which of the following is not correct about tablets?
a. A tablet is a wireless, portable personal computer.
b. The most common type of tablet is the slate.
c. Hybrid tablets are sometimes called convertible or
hybrid notebooks.
d. A tablet is larger than a notebook.

d. A tablet is larger than a notebook.

EXPLANATION:

The tablet is typically smaller than a notebook computer but larger than a smartphone

10

A smartphone is a cellular phone with an operating system.

True
False

TRUE

EXPLANATION:

A smartphone is a cellular phone with an operating system. It also with other features
like web browsing and the ability to run software applications.

11

Which of the following statements is correct about a phablet?
a. A phablet is a mobile device with the features of a smartphone
and tablet.
b. It is smaller than a smartphone.
c. A smartphone does not support 3G and 4G.
d. None of these

a. A phablet is a mobile device with the features of a smartphone and tablet.


EXPLANATION:

A phablet is a mobile device with the features of both a smartphone and tablet.

12

Which of the following are open source mobile phone operating systems?
(choose all that apply)
a. Android
b. Sailfish OS
c. iOS
d. None of these

A and B

a. Android
b. Sailfish OS

EXPLANATION:

Google’s Android is clearly the king of mobile operating systems. It is an open source
model, meaning anyone can take Android code and create their own customized
operating system.
Sailfish OS was created by a team of Nokia developers who came together to create a
company called Jolla after ex-Microsoft executive Stephen Elop joined the company as a CEO.

13

Which of the following functionality links apps between different devices?
a. Optimize displayed data
b. File synchronization
c. Email, Calendar, Contacts
d. Launcher

b. File synchronization

EXPLANATION:

Besides providing continuity of functionality over two different types of devices, apps
may also be capable of file synchronization between two dissimilar devices.

14

Which of the following frees the user from having to learn complex
commands?
a. GUI
b. Command driven interface
c. MS-DOS
d. GPU

a. GUI

EXPLANATION:

Graphical user interfaces can free the user from having to learn complex
command languages.

15

Which of the following operating systems uses APK?
a. Windows
b. Android
c. iOS
d. None of these

b. Android

EXPLANATION:

Android application package (APK) is the package file format used by the
Android operating system for distribution and installation of application software
and middleware.

16

Which tool is used to synchronize Android devices?
a. iTunes/iCloud
b. Google Sync
c. OneDrive
d. None of these

b. Google Sync

EXPLANATION:


Google Sync is a file synchronization service from Google. It uses Microsoft Exchange
ActiveSync to provide services for users to synchronize Android devices.

17

When does a decrypt email issue occur?
a. Then the certificate has expired
b. After you’ve cleared unwanted apps and files
c. When there are too many heavier apps
d. None of these

a. Then the certificate has expired

EXPLANATION:

The “unable to decrypt email” issue occurs due to the expiration of the certificates or
configuration settings in your device.

18

Which of the following are ways to reset a mobile device after you’ve been
locked out?
a. Synchronize your device with iTunes/iCloud
b. Google recovery account
c. Hard reset
d. All of these

d. All of these

EXPLANATION:


If you had previously synchronized your iPhone with iTunes, you can restore your device.
If it is an Android device, reset your password by using your Google recovery account.
Hard reset is setting your device to factory settings.

19

Which of the following statements is correct about fiber optics? (choose
all that apply)
a. Fibers are not made of plastic.
b. In fiber optics, each glass strand passes signals in both
directions.
c. Fiber optic cables transmit signals in the form of light.
d. To transmit data at a very high speed over long distances and in
a secure way, fiber optic cable is best.

C and D

c. Fiber optic cables transmit signals in the form of light.
d. To transmit data at a very high speed over long distances and in
a secure way, fiber optic cable is best.

EXPLANATION:

Fiber optic cables transmit signals in the form of light. The fiber-optic cable transmissions
are not subject to electrical interference. They are extremely fast. They can transmit
about 100 Mbps with demonstrated rates of up to 1 gigabit per second.
If you have to transmit data at a very high speed over long distances and in a secure way,
fiber optic cable is best. Don’t use fiber optic cable if your budget is small.

20

Multimeter is used for measuring: (choose all that apply)
a. voltage
b. current
c. resistance
d. connectors

A, B and C

a. voltage
b. current
c. resistance

EXPLANATION:

You can use a multimeter to test the power outlets. You can measure voltage, current,
and resistance on a wire.

21

Limited connectivity or no connectivity problems can occur due to what?
(choose all that apply)
a. The ISP
b. Network adapter
c. DHCP server being down
d. None of these

A and B

a. The ISP
b. Network adapter

EXPLANATION:

It is possible that you aren’t able to connect to the Internet, for various reasons. The issue
could with the ISP or network adapter.

22

Which TCP/IP protocol uses port 80?
a. HTTPS
b. HTTP
c. POP3
d. FTP

b. HTTP

EXPLANATION:


HTTP uses port number 80. HTTPS uses port number 443. POP3 uses port number 110.
FTP uses port 20.

23

RDP allows communication through a maximum of 64,000 channels.

True
False

TRUE

EXPLANATION:


RDP protocol allows communication through a maximum of 64,000 channels. Use port
3389 for RDP protocol

24

What are the two advantages that TCP has over UDP?
a. Lower overhead
b. Acknowledged delivery
c. Faster delivery
d. None of these

b. Acknowledged delivery

EXPLANATION:

In TCP, the delivery is generally guaranteed and you have receipt acknowledgements

25

Which of the following is correct about 802.11? (choose all that apply)
a. Supports maximum bandwidth of 4 Mbps
b. Is the first WLAN standard
c. Does not support complementary code keying
d. Network standards cover the physical layer technology
specifications from Ethernet to wireless

B and D

b. Is the first WLAN standard
d. Network standards cover the physical layer technology
specifications from Ethernet to wireless

In 1997, the Institute of Electrical and Electronics Engineers created the first WLAN
standard called 802.11. It supported a maximum bandwidth of 2 Mbps which was too
slow for most applications.
Network standards also cover the physical layer technology specifications from Ethernet
to wireless. 802.11 is subdivided into 22 parts, which covers the physical and data-link
aspects of networking. Some of the better known specifications include 802.3 Ethernet,
802.11 WiFi, 802.15 Bluetooth/ZigBee, and 802.16.

26

How many types of wireless networking modes are there?
a. 4
b. 3
c. 2
d. 1

c. 2

EXPLANATION:


Ad hoc and infrastructure modes.

27

Which of the following statements is correct about WPA2? (choose all that apply)

a. WPA2 is a security technology commonly used for WiFi
networks.
b. WPA2 stands for WiFi Protected Access 2.
c. To encrypt a network with WPA2 you have to provide a router
with an encryption key.
d. The encryption key should not be complicated.

A, B, and C

a. WPA2 is a security technology commonly used for WiFi
networks.
b. WPA2 stands for WiFi Protected Access 2.
c. To encrypt a network with WPA2 you have to provide a router
with an encryption key.

EXPLANATION:


WPA2 is a security technology that you commonly use for WiFi networks or
wireless networks.
WPA2 is WiFi Protected Access 2 and is mainly designed for home users.
If you want to encrypt a network with WPA2, you have to provide a router with an
encryption key.

28

Satellite Internet connection requires a dish to receive and transmit signals to an orbiting satellite.

True
False

TRUE


EXPLANATION:


A satellite Internet connection requires a dish to receive and transmit signals to an
orbiting satellite. The satellites are geostationary and the position will not change.

29

Which of the following statements is correct about LAN? (choose all that apply)

a. LAN stands for local area network.
b. LAN uses expensive hardware.
c. You can print a file from any system on the LAN server.
d. None of these.

A and C

a. LAN stands for local area network.
c. You can print a file from any system on the LAN server.

EXPLANATION:

LAN stands for local area network. A LAN is a small network and works within a small area
like a school, hospital, office building or a floor within an office building.
You can print a file from any system on the LAN server. A user can share files with others
on the LAN server. Read and write access is maintained by a network administrator.

30

Which of the following statements is correct about port forwarding?
(choose all that apply)
a. It is an application of network address translation.
b. Port forwarding is the only way to open ports on a firewall.
c. Services residing on a protected internal network are available
to hosts on the other side of the external gateway.
d. None of these

A and C

a. It is an application of network address translation.

c. Services residing on a protected internal network are available

EXPLANATION:

Port mapping or port forwarding is an application of network address translation that
redirects a communication request from one address and port number combination to
another, while data packets traverse a network gateway such as a router or firewall.
This technique is used to make services on a host residing on a protected internal
network available to hosts on the other side of the external gateway. This is done by
remapping the destination IP address and port number to an internal host.