This is a practice exam for IT professionals studying for the CompTIA A+ 220-802. A+ covers the fundamentals of computer technology, installation and configuration of PCs, laptops and related hardware, and basic networking.
In mobile devices, the Gyroscope is a sensor that uses gravity to detect a devices orientation. The gyroscope provides the mobile operating system with data to determine how the screen should be displayed.
This question is filed under objective 3, Mobile Devices
IPCONFIG /renew will attempt to get an IP Address if it has none, or will renew the lease on the PC's current IP Address.
This question is filed under objective 4, Troubleshooting
Using "Ping -a" will tell the ping tool to resolve an IP Address to a hostname before beginning to ping the IP Address. If a hostname is not resolved, ping will not provide a hostname and instead show the IP address. For example, if a PC has a hostname of SERVER1 and an IP of 192.168.1.101, using Ping -a 192.168.1.101 will produce "Pinging SERVER1 [192.168.1.101] with 32 bytes of data:" at the start of output.
This question is filed under objective 4, Troubleshooting
Dynamic Host Configuration Protocol (DHCP) provides network devices with IP configurations. When a Windows based PC or Server does not have a statically assigned IP and cannot connect to a DHCP server it will assign an Automatic Private IP Address (APIPA) and attempt to use it to communicate on the network. The APIPA address range is 169.254.0.0 to 169.254.255.255.
This question is filed under objective 4, Troubleshooting
In both Windows Vista and Windows 7, user files are located in the C:\users\ directory by default. The Documents and Settings directory does not exist In windows Vista or Windows 7.
This question is filed under objective 1, Operating Systems
Radio Frequency Identification (RFID) devices are physical devices used to identify and track objects. Typically, each user is given a unique RFID (in the form of a key fob or badge) which is used to obtain access to restricted areas. Firewalls, Antiviruses and Network/Host Intrusion Protection Systems (NIPS/HIPS) are used to protect software, operating system and computer networks.
This question is filed under objective 2, Security
Microsoft Windows 7 64 bit requires a minimum of 2 Gigabytes of RAM. Windows 7 32 bit requires 1 Gigabyte of RAM.
This question is filed under objective 1, Operating Systems
It is most likely the new security suite's firewall settings that has caused the sudden issue. The firewall will need to be reconfigured to allow for internet access.
This question is filed under objective 2, Security
Microsoft DirectX is a application program interface (API) used by software developers to create images, animations, and other multimedia effects for video animations and games for Windows Operating Systems. Open Graphics Library (OpenGL) is a similar open source API that is usable on most Apple/Macintosh, Linux, Unix, and Microsoft Operating Systems.
This question is filed under objective 1, Operating Systems
Explorer (located in C:\Windows\Explorer.exe by default) is the Windows System program used to view files and folders. Internet Explorer (IE) is used to view website, it is possible to use IE to view folders but this is not common and must be manually implemented.
This question is filed under objective 1, Operating Systems
EXT2 (Extended File System 2 or Second Extended File System) is the default file system for most Linux distributions. FAT32 (File Allocation Table - 32 bit) and NTFS (New Technology File System) are used in Windows environments, and HFS+ (Hierarchical File System Plus) is used by Mac OSX.
This question is filed under objective 1, Operating Systems
Check Disk (CHKDSK) verifies the file system integrity of a volume and fixes logical errors. FSCK is the Unix/Linux equivalent of CHKDSK.
This question is filed under objective 4, Troubleshooting
The Troubleshooting Theory is as follows: 1. Identify the problem, 2. Establish a theory of probable cause, 3. Test the theory, 4. Establish a plan of action to resolve the problem, 5. Verify full system functionality and implement preventative measures (if necessary), and 6. Document findings, actions, and outcomes.
This question is filed under objective 4, Troubleshooting
The Intel Core i7 processors are simply too powerful and too resource intensive to be used in most mobile devices, especially phones. ARM 7 and Snapdragon processors use specific mobile friendly architectures, which makes them more common in mobile phones. You may however find Intel Core products in larger tablets and laptops.
This question is filed under objective 3, Mobile Devices
Of the choices, the only true encryption softwares are EFS and Bitlocker. EFS is a file level encryption that works in coordination with NTFS, while Bitlocker is a much stronger encryption that encrypts the entire hard drive, not just single files.
This question is filed under objective 2, Security
User Profiles are located in C:\Users\ in Windows Vista and Windows 7
This question is filed under objective 1, Operating Systems
IPCONFIG (IP Configuration) is the Windows Command Line Tool used to list IP addresses, MAC Addresses, Subnet Masks and lots of more IP related configuration data. IPCONFIG --virtual will fail, there is no virtual switch. IFCONFIG is the Linux/Unix equivalent of IPCONFIG. IPCONFIG will show both virtual and physical Network Access Cards (NIC) by default.
This question is filed under objective 1, Operating Systems
Global Positioning System (GPS) is a satellite based tracking system used to determine a device's physical location. Code Division Multiple Access (CDMA) and Global System for Mobile communication (GSM) are wireless technologies used by access points and devices to communicate. Both are used widely between cell phones and cell phone towers. A Geotag is a digital tag that identifies a files location at the time it was created - typically used in photos and videos.
This question is filed under objective 3, Mobile Devices
This question could be tricky if you're not an avid iOS user. Firewire, 30 Pin, and Lightning cables are all Apple cable/connector types. However, new iOS devices use Lightning cables which replaced the 30 Pin connector type.
This question is filed under objective 3, Mobile Devices
Tablets and other mobile devices do not use Hard Disk Drives (HDD). HDD's use magnetic storage and constantly moving parts, which makes them poor candidates when durability is necessary. Most mobile devices will use flash memory based storage mediums like Solid State Drives (SSD).
This question is filed under objective 3, Mobile Devices
You can go back and review your answers or grade your test.