Prepare for the CompTIA A+ 220-802 exam with our free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.
Which of the following options is a Microsoft Windows API for creating graphic and multimedia effects in Windows Programs?
Unity
OpenGL
DXDiag
DirectX
Microsoft DirectX is a application program interface (API) used by software developers to create images, animations, and other multimedia effects for video animations and games for Windows Operating Systems. Open Graphics Library (OpenGL) is a similar open source API that is usable on most Apple/Macintosh, Linux, Unix, and Microsoft Operating Systems.
Microsoft DirectX is a collection of application programming interfaces (APIs) for handling tasks related to multimedia, especially game programming and video, on Microsoft platforms. Originally, the names of these APIs all began with "Direct", such as Direct3D, DirectDraw, DirectMusic, DirectPlay, DirectSound, and so forth. The name DirectX was coined as a shorthand term for all of these APIs (the X standing in for the particular API names) and soon became the name of the collection. When Microsoft later set out to develop a gaming console, the X was used as the basis of the name Xbox to indicate that the console was based on DirectX technology. The X initial has been carried forward in the naming of APIs designed for the Xbox such as XInput and the Cross-platform Audio Creation Tool (XACT), while the DirectX pattern has been continued for Windows APIs such as Direct2D and DirectWrite. Direct3D (the 3D graphics API within DirectX) is widely used in the development of video games for Microsoft Windows and the Xbox line of consoles. Direct3D is also used by other software applications for visualization and graphics tasks such as CAD/CAM engineering. As Direct3D is the most widely publicized component of DirectX, it is common to see the names "DirectX" and "Direct3D" used interchangeably. The DirectX software development kit (SDK) consists of runtime libraries in redistributable binary form, along with accompanying documentation and headers for use in coding. Originally, the runtimes were only installed by games or explicitly by the user. Windows 95 did not
DirectX - Wikipedia, the free encyclopediaWhich of the following is the default location of user files in Windows Vista and Windows 7?
c:\users\USERNAME\
C:\Documents and Settings\USERNAME\
C:\Documents and Settings\users\USERNAME\
c:\home\USERNAME\
In both Windows Vista and Windows 7, user files are located in the C:\users\ directory by default. The Documents and Settings directory does not exist In windows Vista or Windows 7.
User Account Control (UAC) is a mandatory access control enforcement feature introduced with Microsoft's Windows Vista and Windows Server 2008 operating systems, with a more relaxed version also present in Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, Windows 8.1, Windows Server 2012 R2, Windows 10, and Windows 11. It aims to improve the security of Microsoft Windows by limiting application software to standard user privileges until an administrator authorises an increase or elevation. In this way, only applications trusted by the user may receive administrative privileges and malware are kept from compromising the operating system. In other words, a user account may have administrator privileges assigned to it, but applications that the user runs do not inherit those privileges unless they are approved beforehand or the user explicitly authorises it. UAC uses Mandatory Integrity Control to isolate running processes with different privileges. To reduce the possibility of lower-privilege applications communicating with higher-privilege ones, another new technology, User Interface Privilege Isolation, is used in conjunction with User Account Control to isolate these processes from each other. One prominent use of this is Internet Explorer 7's "Protected Mode".Operating systems on mainframes and on servers have differentiated between superusers and userland for decades. This had an obvious security component, but also an administrative component, in that it prevented users from accidentally changing system settings. Early Microsoft home operating-systems (such as MS-DOS, Windows 95-98 and Windows Me) did not have a concept of different user-accounts on the same machine. Subsequent versions of
User_Account_Control - Wikipedia, the free encyclopediaWhich of the following terms describes a folder's permissions defaulting to match the permissions of it's parents folder?
Inheritance
SSO
Permission Propagation
Provisioning
Inheritance is when an computer object, like a file or folder inherits settings from it's parent. For example, if a use does not have read access to a folder, they also cannot read any files or sub folders of that directory.
In computer science, an object can be a variable, a data structure, a function, or a method. As regions of memory, objects contain a value and are referenced by identifiers. In the object-oriented programming paradigm, an object can be a combination of variables, functions, and data structures; in particular in class-based variations of the paradigm, an object refers to a particular instance of a class. In the relational model of database management, an object can be a table or column, or an association between data and a database entity (such as relating a person's age to a specific person).
Object (computer science) - Wikipedia, the free encyclopediaA friend has come to you for help with a laptop, which has been regularly experiencing the BSOD and is making a faint clicking noise. What is most likely the issue with this laptop?
Corrupt MBR
SSD Failure
None of the above
Incorrect driver or driver failure
The key bit of information for this question is the faint clicking noise. The only moving component in a computer is a Hard disk drive, and the first sign of a physical hard drive failure is a clicking noise. SSD's do not have any moving parts and will not make clicking noises, while a Hard Disk Drive (HDD) will. HDD is not an answer, so None of the Above is correct.
A hard disk drive (HDD), hard disk, hard drive, or fixed disk, is an electro-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating platters coated with magnetic material. The platters are paired with magnetic heads, usually arranged on a moving actuator arm, which read and write data to the platter surfaces. Data is accessed in a random-access manner, meaning that individual blocks of data can be stored and retrieved in any order. HDDs are a type of non-volatile storage, retaining stored data when powered off. Modern HDDs are typically in the form of a small rectangular box. Introduced by IBM in 1956, HDDs were the dominant secondary storage device for general-purpose computers beginning in the early 1960s. HDDs maintained this position into the modern era of servers and personal computers, though personal computing devices produced in large volume, like mobile phones and tablets, rely on flash memory storage devices. More than 224 companies have produced HDDs historically, though after extensive industry consolidation, most units are manufactured by Seagate, Toshiba, and Western Digital. HDDs dominate the volume of storage produced (exabytes per year) for servers. Though production is growing slowly (by exabytes shipped), sales revenues and unit shipments are declining, because solid-state drives (SSDs) have higher data-transfer rates, higher areal storage density, somewhat better reliability, and much lower latency and access times.The revenues for SSDs, most of which use NAND flash memory, slightly exceeded those for HDDs in 2018. Flash storage
Hard_disk_drive - Wikipedia, the free encyclopediaWhich of the following is a command line tool that will translate between a domain name and an IP Address?
NSLOOKUP
IPCONFIG
TRACERT
VERIFY
NSLOOKUP will return the IP Address of a domain name by querying a computers assigned DNS Servers for the information.
nslookup (from "name server lookup") is a network administration command-line tool for querying the Domain Name System (DNS) to obtain the mapping between domain name and IP address, or other DNS records.
Nslookup - Wikipedia, the free encyclopediaA user has called the IT Department and states that their computer does not work. Which of the following would be the BEST question to obtain further information?
Are you able to sign on?
Can you get to the Internet?
What exactly does not work?
Does the PC turn on?
You should always try to get as much relevant information as possible before beginning to troubleshoot. But remember to start with basic information first, most users are not IT's or tech savvy.
Troubleshooting is a form of problem solving, often applied to repair failed products or processes on a machine or a system. It is a logical, systematic search for the source of a problem in order to solve it, and make the product or process operational again. Troubleshooting is needed to identify the symptoms. Determining the most likely cause is a process of elimination—eliminating potential causes of a problem. Finally, troubleshooting requires confirmation that the solution restores the product or process to its working state.
Troubleshooting - Wikipedia, the free encyclopediaWhich of the following allows an Android device to track movements, such as a tilt or shake?
Multi-touch
Accelerometer
A trackball
Micro USB port
Accelerometers are used in many mobile devices (Android included) to track a device's motion and orientation. For example, an Android app that can be used to find a level surface is using the accelerometer to determine the devices orientation.
An accelerometer is a tool that measures proper acceleration. Proper acceleration is the acceleration (the rate of change of velocity) of a body in its own instantaneous rest frame; this is different from coordinate acceleration, which is acceleration in a fixed coordinate system. For example, an accelerometer at rest on the surface of the Earth will measure an acceleration due to Earth's gravity, straight upwards (by definition) of g ≈ 9.81 m/s2. By contrast, accelerometers in free fall (falling toward the center of the Earth at a rate of about 9.81 m/s2) will measure zero. Accelerometers have many uses in industry and science. Highly sensitive accelerometers are used in inertial navigation systems for aircraft and missiles. Vibration in rotating machines is monitored by accelerometers. They are used in tablet computers and digital cameras so that images on screens are always displayed upright. In unmanned aerial vehicles, accelerometers help to stabilise flight. When two or more accelerometers are coordinated with one another, they can measure differences in proper acceleration, particularly gravity, over their separation in space—that is, the gradient of the gravitational field. Gravity gradiometry is useful because absolute gravity is a weak effect and depends on the local density of the Earth, which is quite variable. A single-axis accelerometer measures acceleration along a specified axis. A multi-axis accelerometer detects both the magnitude and the direction of the proper acceleration, as a vector quantity, and is usually implemented as several single-axis accelerometers oriented along different axes. Multi-axis accelerometers can be be used to sense orientation (because
Accelerometer - Wikipedia, the free encyclopediaA friend has come to you seeking help with a gaming PC he uses at home. He has replaced his monitor with a very large 1080p TV, but when he runs any games on the PC they appear much smaller and do not fit the entire TV screen. Which answer is most likely the problem?
The PC games cannot be run to an external display.
The LCD TV response rate is not fast enough for gaming.
The LCD TV driver is not supported by the Windows operating system.
The games do not support a 1920×1080 resolution.
Because your friend did not mention having issues until the games were opened, we can safely assume they are the culprit. Many games (especially older ones) cannot support large resolutions - but it really depends on the game.
Which Windows tool can prevent programs from automatically opening upon start up?
MSCONFIG
CHKDSK
DXDIAG
DEVMGMT.MSC
The MSCONFIG tool, officially called the System Configuration tool has several features for troubleshooting and modifying the start up process.
MSConfig (officially called System Configuration in Windows Vista, Windows 7, Windows 8, Windows 10, or Windows 11 and Microsoft System Configuration Utility in previous operating systems) is a system utility to troubleshoot the Microsoft Windows startup process. It can disable or re-enable software, device drivers and Windows services that run at startup, or change boot parameters. It is bundled with all versions of Microsoft Windows operating systems since Windows 98 except Windows 2000. Windows 95 and Windows 2000 users can download the utility as well, although it was not designed for them.
MSConfig - Wikipedia, the free encyclopediaA technician is trying to setup a non-domain user account on a workstation, but receives the following error message "Password does not meet the complexity requirements." Which of the following utilities should the technician use to identify the criteria?
Local Security Policy
MSCONFIG
Users and Groups
Performance Monitor
Because this is a non-domain (local) user account the Local Security Policy is the cause of the issue. Accessing the policy to determine account requirements will solve the problem.
Group Policy is a feature of the Microsoft Windows NT family of operating systems (including Windows 7, Windows 8.1, Windows 10, Windows 11, and Windows Server 2003+) that controls the working environment of user accounts and computer accounts. Group Policy provides centralized management and configuration of operating systems, applications, and users' settings in an Active Directory environment. A set of Group Policy configurations is called a Group Policy Object (GPO). A version of Group Policy called Local Group Policy (LGPO or LocalGPO) allows Group Policy Object management without Active Directory on standalone computers.Active Directory servers disseminate group policies by listing them in their LDAP directory under objects of class groupPolicyContainer. These refer to fileserver paths (attribute gPCFileSysPath) that store the actual group policy objects, typically in an SMB share \\domain.com\SYSVOL shared by the Active Directory server. If a group policy has registry settings, the associated file share will have a file registry.pol with the registry settings that the client needs to apply.The Policy Editor (gpedit.msc) is not provided on Home versions of Windows XP/Vista/7/8/8.1/10/11.
Group_Policy - Wikipedia, the free encyclopediaA technician is installing a webcam in a nursery for a user to monitor their baby. The user wants to ensure that the webcam is not broadcasting externally. Which of the following would the technician implement on the SOHO router to prevent the broadcast?
Enable MAC filtering
Block the outbound port
Enable static IPs
Change the default SSID
The outbound port should be blocked to ensure no one can connect to the webcam outside of the LAN. This is probably the default setting for the router, but you should still check to be sure.
In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet.
Firewall_(computing) - Wikipedia, the free encyclopediaWhich of the following commands may be used on a computer, running Windows 7, to stop a single process from the command line?
DEL
SHUTDOWN
TASKKILL
ERASE
The TASKKILL command in Windows is used to manually stop a process from running. Example: TASKKILL /IM notepad.exe, will stop the notepad.exe process.
In computing, kill is a command that is used in several popular operating systems to send signals to running processes.
Kill_(command) - Wikipedia, the free encyclopediaA user has contacted the IT department stating their company Android device will not rotate it's screen orientation, even when auto-rotate is enabled. Which of the following sensors is likely malfunctioning?
Screen Calibrator
Magnetometer
Accelorator
Gyroscope
In mobile devices, the Gyroscope is a sensor that uses gravity to detect a devices orientation. The gyroscope provides the mobile operating system with data to determine how the screen should be displayed.
A gyroscope (from Ancient Greek γῦρος gŷros, "round" and σκοπέω skopéō, "to look") is a device used for measuring or maintaining orientation and angular velocity. It is a spinning wheel or disc in which the axis of rotation (spin axis) is free to assume any orientation by itself. When rotating, the orientation of this axis is unaffected by tilting or rotation of the mounting, according to the conservation of angular momentum. Gyroscopes based on other operating principles also exist, such as the microchip-packaged MEMS gyroscopes found in electronic devices (sometimes called gyrometers), solid-state ring lasers, fibre optic gyroscopes, and the extremely sensitive quantum gyroscope.Applications of gyroscopes include inertial navigation systems, such as in the Hubble Space Telescope, or inside the steel hull of a submerged submarine. Due to their precision, gyroscopes are also used in gyrotheodolites to maintain direction in tunnel mining. Gyroscopes can be used to construct gyrocompasses, which complement or replace magnetic compasses (in ships, aircraft and spacecraft, vehicles in general), to assist in stability (bicycles, motorcycles, and ships) or be used as part of an inertial guidance system. MEMS gyroscopes are popular in some consumer electronics, such as smartphones.
Gyroscope - Wikipedia, the free encyclopediaA small business owner is setting up their wireless network in their office, which is in a building shared with several other businesses. The owner does not want to disable the SSID broadcasting due to visiting customers needing to use the network but wants to minimize the visibility of the network as much as possible. Which of the following would BEST accomplish this?
Enable MAC filtering and restrict access to other company
Configure the access point encryption from unsecured access to WEP
Change the SSID to reflect the business name instead of a public access point
Adjust the radio power so that coverage is restricted to the business
Reducing the radio power to help keep wireless signals from traveling farther than necessary can help hide the network's existence. Keep in mind this isn't a security feature and that there are other steps that should be taken to secure the network that are outside the scope of the question.
In computer networking, a wireless access point, or more generally just access point (AP), is a networking hardware device that allows other Wi-Fi devices to connect to a wired network or wireless network. As a standalone device, the AP may have a wired connection to a router, but, in a wireless router, it can also be an integral component of the router itself. An AP is differentiated from a hotspot, which is a physical location where Wi-Fi access is available. Although WAP has been used incorrectly to describe an Access Point, the clear definition is Wireless Application Protocol which describes a protocol rather than a physical device.
Wireless_access_point - Wikipedia, the free encyclopediaLooks like thats it! You can go back and review your answers or click the button below to grade your test.