CompTIA A+ 1101

studied byStudied by 4 people
5.0(1)
Get a hint
Hint

SODIMM

1 / 381

flashcard set

Earn XP

Description and Tags

Full practice questions for Core 1

382 Terms

1

SODIMM

Small Outline Dual In-Line Memory Module

New cards
2

SODIMM

New cards
3

2.5” SSD

New cards
4

Magnetic Disk Drive (L) and M.2 SSD (R)

New cards
5

2 options for migrating from HDD to SSD

  1. Install an OS on the SSD and moved documents between the drives.

  2. Image/clone the HDD. Moves everything

New cards
6

What does Mini PCI(E) do?

Enables 802.11 LAN or PAN for Bluetooth.

New cards
7

NFC is _ cm or less and used for x and y

4, data transfers, authentication

New cards
8

fingerprint sensor

New cards
9

The outlet for electricity is x power and the laptop jack is y power.

AC, DC

New cards
10

DDR

Double Data Rate

New cards
11

SODIMM DDR3 has how many pins

204

New cards
12

Are different versions of SODIMM compatible?

NO

New cards
13

Laptop storage drives include X, Y, and Z. They have either a X or Y inch form factor.

SSD, magnetic disk, hybrid. 2.5, 1.8

New cards
14

What is the module format for a stick of SODIMM DDR4 RAM

DDR4 SODIMM modules have 260 pins. DDR3 is 204-pin. 1.8-inch is the size associated with smaller storage drives used in some laptops. 2.5-inch is the standard size for SSD storage drives.

New cards
15

You just added a second memory module to a laptop. However, after rebooting the system, the OS reports the same amount of memory as before. What should you do next?

The next step you should take is to reseat the memory. SODIMMs can be a bit tricky to install. They must be firmly installed, but you don’t want to press too hard and damage any components. If the laptop worked fine before the upgrade, you shouldn’t have to replace the modules or the motherboard.

New cards
16

What are ways that a laptop can communicate with other computers?

Some of the methods that laptops use to communicate with other computers include Bluetooth, WLAN, and cellular WAN wireless connections, plus wired connections like Ethernet (RJ45) and, for older laptops, dial-up (RJ11). The DC jack is the input on the laptop that accepts power from the AC adapter.

New cards
17

A user doesn’t see anything on his laptop’s screen. He tries to use AC power and thinks that the laptop is not receiving any. Which of the following are two possible reasons for this?

An incorrect adapter will usually not power a laptop. The adapter used must be exact. And, of course, if the laptop is not properly plugged in to the adapter, it won’t get power. Windows doesn’t play into this scenario. And if the battery were dead, it could cause the laptop to fail to power up, but only if the AC adapter were also disconnected; the scenario states that the user is trying to use AC power.

New cards
18

What are possible reasons that a laptop’s keyboard might fail completely?

A laptop’s keyboard could fail due to a disconnected or loose keyboard ribbon cable. It could also fail if a user spilled coffee on the laptop, dropped it on the ground, and so on. One stuck key will not cause the entire keyboard to fail, and on most laptops, the keyboard cannot be disabled in the Device Manager. It can be uninstalled but not disabled.

New cards
19

One of your customers reports that she walked away from her laptop for 30 minutes, and when she returned, the display was very dim. She increased the brightness setting and moved the mouse but to no effect. What should you do first?

It could be that the laptop is now on battery power and is set to a dimmer display and shorter sleep configuration while on battery. The laptop may not be getting AC power from the AC outlet for some reason. The battery power setting is the first thing you should check; afterward, start troubleshooting the AC adapter, cable, AC outlet, and so on. It’s too early to try replacing the display; try not to replace something until you have ruled out all other possibilities. A dim screen is not caused by OS corruption. There’s no need to plug in an external monitor; you know the video adapter is working, it’s just dim.

New cards
20

You are helping a customer with a laptop issue. The customer says that two days ago the laptop was accidentally dropped while it was charging. You observe that the laptop will not turn on and that it is connected to the correct power adapter. Which of the following is the most likely cause?

The DC jack was probably damaged when the laptop was dropped. It may have been plugged in (charging) and fallen on the plug that connects to the DC jack (which is easily damaged on many laptops). The customer probably used the laptop until the battery became discharged before noticing that the laptop wouldn’t take a charge anymore—and now it won’t turn on at all. So the battery is probably not the issue. A power adapter can be damaged, but the DC-in jack is more easily damaged. The storage drive and the BIOS/UEFI normally will not affect whether the laptop will turn on

New cards
21

You want to reduce the risk of your laptop being stolen. Which of the following is the best option?

To best reduce the chance of theft, use a cable lock. This is a physical cable that can be wrapped around a sturdy object and locked to the laptop, keeping it relatively secure from theft. Incorporating biometrics means implementing a thumbprint scan or other physical characteristic scan into the authentication process. Disabling NFC means that near-field communications will be turned off, and data can’t be “beamed” to other devices. Enabling MFA means that you are implementing multi-factor authentication —for example, combining a password and biometrics.

New cards
22

A user cannot make contactless payments using NFC, connect to the Internet, or send/receive calls from their mobile device. The user is able to boot the device and sign on. Which of the following is most likely the cause of the problem?

Turning on airplane mode (the most likely cause of the problem) will disable wireless transmissions, including NFC. This is great for security purposes, but it can also disable the ability to connect to Wi-Fi networks or send/receive calls. A failed power state would render the entire device unusable; however, the question says the user was able to boot and sign on to the device. Biometric authentication is most likely not the cause of the problem in this scenario because the user is not having problems signing on to the device. Electrostatic discharge (ESD) can occur when two objects with different voltages come into contact with each other. ESD can wreak havoc with electronic components, but it is not the most likely problem here because the device appears to be working normally in all other regards—plus it’s somewhat uncommon for mobile devices. The real issue here is user error: The user did not remember that the device was in airplane mode. When you troubleshoot problems, remember that they are often user related!

New cards
23

A screen inverter’s job is to convert x from the x into x to be sent to the x

DC voltage, motherboard, AC voltage, backlight

New cards
24

Before handling an inverter you must:

turn off and unplug the laptop. remove the battery

New cards
25

Which kind of video technology do most laptop LCDs use?

TFT active-matrix displays are the most common in laptops that use LCDs. Passive-matrix screens have been discontinued, but you might see an older laptop that utilizes this technology. OLED technology is a newer and different technology that is not based on TFT displays but instead uses emissive display technology, meaning that each dot on the screen is illuminated by a separate diode. OLED displays can, however, be passive-matrix or active-matrix controlled. The MAC ID is the hexadecimal address associated with a network adapter, such as a Wi-Fi adapter or network card.

New cards
26

Which of the following uses an organic compound that emits light?

A. TFT active matrix

B. IPS

C. OLED

D. LCD

E. LED

C. OLED (organic light-emitting diode) displays use an organic compound or film that emits light. TFT active matrix implies LCD, and neither TFT nor LCD uses organic compounds the way OLED does. In-plane switching (IPS) is a type of LCD technology that increases the available viewing angle compared to older technologies, such as twisted nematic (TN) matrix LCDs. However, IPS is generally considered inferior to OLED screens when it comes to brightness and contrast ratio when viewed from an angle. LED screens use a film and diode, but not organically in the way that OLED does, and not at such a small size.

New cards
27

Which of the following are possible reasons a laptop’s LCD suddenly went blank with no user intervention? (Select the two best answers.)

A. Damaged inverter

B. Damaged LCD

C. Burned-out backlight

D. Incorrect resolution setting

A and C. A damaged inverter or burned-out bulb could cause a laptop’s display to go blank. You can verify whether the LCD is still getting a signal by shining a flashlight at the screen. A damaged LCD usually works to a certain extent and will either be cracked, have areas of the Windows interface missing, or show other signs of damage. An incorrect resolution setting can indeed make the screen suddenly go blank (or look garbled), but that scenario will most likely occur only if the user has changed the resolution setting—and this question specifies “with no user intervention.”

New cards
28

Which of the following allows you to access a WLAN?

A. LED

B. Webcam

C. Digitizer

D. Stylus

E. Wi-Fi card

E. A Wi-Fi card, also known as a Wi-Fi network adapter, allows you to connect to a WLAN (wireless local area network), which is essentially another name for a Wi-Fi network. LED is a type of display. A webcam is used to communicate visually and audibly with others or to record oneself. A digitizer is a device that converts tapped or written impulses on a screen into digital information that the operating system can use. A stylus is a writing device used with a digitizer or touchscreen.

New cards
29

You have been tasked with replacing a Wi-Fi/Bluetooth card in a laptop. You open the laptop and find a card that uses the 2230 standard. What type of card is this?

A. Mini PCIe

B. M.2

C. Digitizer

D. RJ45

B. The 2230 standard is a kind of M.2 size measuring 22x30 mm. It is common in laptops for use with Wi-Fi and Bluetooth. In comparison, a PC often uses a 2280 M.2 card. Mini PCle is an older type of card slot that might be used for Wi-Fi cards, but it does not use measurements such as 2230 or 2280 the way that M.2 does. A digitizer is not a port at all but a device that converts tapped impulses into digital information. An RJ45 port is a networking port that allows a laptop to communicate with the rest of the network in a wired fashion—that is, if the laptop has such a port!

New cards
30
term image
knowt flashcard image
New cards
31
term image
knowt flashcard image
New cards
32
term image
knowt flashcard image
New cards
33
term image
knowt flashcard image
New cards
34

Android devices generally use x (older ones using x), iOS devices use x or y

USB-C, Micro-USB, USB-C, lightning

New cards
35

A laptop is placed, or “x,” into a docking station. In contrast, a port replicator is connected to a laptop simply to x.

docked, provide additional ports

New cards
36

Which type of charging connector would you find on an iPad?

A. Micro-USB

B. Lightning

C. Thunderbolt

D. IP68

B. The Lightning connector is one of Apple’s proprietary charging and synchronization connectors used by iPads and iPhones, although Apple also uses USB-C. Micro-USB is used by older Android-based mobile devices, and USB-C is more common on newer Android-based devices. Thunderbolt is a high-speed hardware interface used in desktop computers. IP68 deals with ingress protection against dust and water.

New cards
37

You are required to add long-term storage to a smartphone. Which type would you most likely add?

A. DDR4

B. microSD

C. LPDDR4

D. SSD

E. SIM

B. You would most likely add a microSD card (if the smartphone has a slot available for add-ons or upgrading). This is the most common method for adding long-term storage. DDR4 is a type of RAM; it is not used for adding long-term memory storage. Some smartphones use LPDDR4 as their main memory, but this is part of the system on a chip (SoC) and not accessible to the typical user. An SSD is a solid-state drive, which generally means a hard drive that is installed to a PC or laptop, connected either as SATA or M.2. SSDs are too large for smartphones and tablets. A SIM is a subscriber identity module, usually represented as a small card (mini-SIM) used in smartphones that securely stores authentication information about the user and device, such as the International Mobile Subscriber Identity (IMSI).

New cards
38

The organization you work for allows employees to work using their own mobile devices in a BYOD manner. You have been tasked with setting up the devices so that they can “beam” information back and forth between each other. What is this known as?

A. Mobile hotspot

B. IoT

C. CYOD

D. IR

E. NFC

E. “Beaming” the information back and forth can be accomplished in a couple of ways, primarily by using near-field communication (NFC). This can only be done if the devices are in close proximity to each other. NFC is commonly used for contactless payment systems. Another potential option would be Apple’s AirDrop, but this relies on Bluetooth (for finding devices) and Wi-Fi (for transmitting data), and of course relies on using Apple-based devices. A mobile hotspot enables a smartphone or tablet to act as an Internet gateway for other mobile devices and computers. IoT stands for the Internet of Things. The question says that employees can use their mobile devices in a BYOD manner, but CYOD is a bit different. This means that employees can choose a device to use for work purposes (most likely whichever type they are more familiar with). Whether the employees can use those devices for personal purposes usually depends on company policy. IR stands for infrared, which is not commonly found on smartphones.

New cards
39

Which of the following can be useful in areas where a smartphone has cellular access but a PC (or laptop) cannot connect to the Internet?

A. Proprietary vendor-specific connector

B. Accessories

C. IP codes

D. Tethering

D. Tethering can allow a desktop computer or laptop to share the mobile device’s Internet connection. Tethering functionality can be very useful in areas where a smartphone has cellular access but a PC/laptop cannot connect to the Internet. Mobile device accessories such as headsets, speakers, game pads, extra battery packs, and protective covers are useful, but they are not used to connect to the Internet. IP codes (for example, IP68) are used to classify and rate the degree of protection against dust and water.

New cards
40

A user has asked you to provide her with a more accurate way of manipulating her smartphone screen. She is part of a mobile sales force and needs to be able to work quickly and efficiently. Which of the following is the easiest and best solution?

A. Connect an external monitor so that the images on the screen will be bigger.

B. Configure a drawing pad to work with the smartphone.

C. Set up a touch pen to access the screen directly.

D. Add an external touchpad to the device.

C. The best option is to set up a touch pen to access the smartphone’s screen directly. A smartphone may come with a touch pen (also known as a stylus pen or simply a stylus); or it may be able to have a touch pen added later. A touch pen enables a person to input information to the screen more accurately. The other devices listed will make mobility more difficult (if not impossible). The next best answer would be an external touchpad, but it isn’t the easiest solution. If the user finds that she needs the touchpad more often, then a better, more permanent solution might be to use a tablet computer instead of a smartphone.

New cards
41

5G can transmit at x Gbps

20

New cards
42

PRL updates help you get x by keeping your device on x

better coverage, preferred networks

New cards
43

x is software that is used to update and secure mobile devices from a central location

MDM

New cards
44

x focuses on managing specific corporate mobile applications

MAM

New cards
45

Which of the following connections require a username, password, and SMTP server? (Select the two best answers.)

A. Bluetooth connection

B. Wi-Fi connection

C. POP3 connection

D. Exchange connection

E. IMAP connection

C and E. POP3 and IMAP email connections require an incoming mail server (either POP3 or IMAP) and an outgoing mail server (SMTP). Bluetooth and Wi-Fi connections do not require a username or SMTP server. Bluetooth might require a PIN, and WiFi will almost always require a passcode. Exchange connections require a username and password but no SMTP server. Exchange Server acts as the incoming and outgoing mail server.

New cards
46

When manually configuring a Wi-Fi connection, which step occurs after successfully entering the SSID?

A. Select POP3.

B. Check whether the device is within range of the WAP.

C. Enter a passcode for the network.

D. Scan for networks

C. After you enter the correct SSID, you enter the passcode (or passphrase) for the network. POP3 has to do with configuring an email account. If you have already entered the SSID, then you should be within range of the wireless access point (WAP). Scanning for networks is the first thing you do when setting up a Wi-Fi connection

New cards
47

Which of the following allows other mobile devices to wirelessly share a mobile device’s Internet connection?

A. NFC

B. Airplane mode

C. IMAP

D. Mobile hotspot

D. Mobile hotspot technology (sometimes referred to as Wi-Fi tethering) allows a mobile device to share its Internet connection with other Wi-Fi-capable devices. Another possibility would be USB tethering, but that is done in a wired fashion. NFC, which stands for near-field communication, is a technology that allows two mobile devices to send information to each other when they are in close proximity. Airplane mode disables all wireless connectivity, including (but not limited to) cellular, Wi-Fi, and Bluetooth. IMAP is another email protocol similar to POP3.

New cards
48

Which of the following identifies the user of a device?

A. IMSI ID

B. IMEI ID

C. S/MIME

D. VPN

A. International Mobile Subscriber Identity (IMSI) or an IMSI ID is used to identify the user of a device. IMEI, which stands for International Mobile Equipment Identity, identifies the phone used. In other words, the IMEI ID identifies the device itself. STIMIME (Secure/Multipurpose Internet Mail Extensions) is used for authentication and message integrity and is built into some email clients. In other words, it is used to encrypt email. Virtual private network (VPN) technology is used to make secure connections by tunneling through the provider’s radio network.

New cards
49

Which of the following is used to synchronize contacts from an iPad to a PC? (Select the best answer.)

A. Gmail

B. Google Play

C. iTunes

D. Sync Center

C. PC users need iTunes to synchronize contacts and other data from an iPad to a PC. While Gmail can work to synchronize contacts, it is completely based on web storage; nothing is actually stored on the iPad. Google Play is a place to get applications and other items for Android. Sync Center is a Control Panel utility that enables synchronization across Windows devices.

New cards
50

You oversee a midsized enterprise and are supporting 300 smartphones. Which of the following would best allow you to configure them from a centralized location?

A. GPS

B. MDM

C. Location services

D. PRL

B. Mobile device management (MDM) allows a person to centrally administer many mobile devices from a single workstation. Global Positioning System (GPS) is a satellite-based navigation system that allows a mobile device to help you find your way to wherever it is you want to go. Location services is a more generic term that means any and all services that help to locate a mobile device and provide mapping information to apps. Preferred roaming list (PRL) is a database (used by CDMA-based phones) that contains telecommunication provider data.

New cards
51

What should you do after you have found a Bluetooth device for pairing? (Select two.)

A. Enter the appropriate PIN code

B. Enable Bluetooth

C. Disable pairing

D. Test connectivity

A and D. CompTIA lists the Bluetooth connection process in the following order: Enable Bluetooth, enable pairing, find a device for pairing, enter the appropriate PIN code, and finally, test connectivity.

New cards
52

What is the secure port for POP3 email connections that make use of SSL/TLS?

A. 110

B. 465 or 587

C.993

D. 995

D. The secure port for POP3 email connections that make use of SSL/TLS is 995. Port 110 is the POP3 default non-encrypted port. Ports 465 and 587 are the secure port numbers for SMTP. Port 993 is the secure port number for IMAP.

New cards
53

Network sessions on an IP network are normally either x or y sessions

TCP, UDP

New cards
54

TCP

Transmission Control Protocol

New cards
55

TCP sessions are x-oriented

connection. This means that every packet that is sent is checked for delivery

New cards
56

Step 1: of the TCP three-way handshake:

SYN: The client computer attempts to initiate a session to a server with a synchronize packet of information. (This is known as a SYN packet.)

New cards
57

Step 2: of the TCP three-way handshake:

SYN + ACK: The server responds to the client request by sending a synchronization/acknowledgment packet. (This is known as a SYNACK packet.)

New cards
58

Step 3: of the TCP three-way handshake:

ACK: The client sends an acknowledgment packet to the server. (This is known as an ACK packet.)

New cards
59

TCP socket connection:

Once the server receives that ACK packet, it acknowledges the session, and the network connection is established.

New cards
60

With TCP, the synchronization, acknowledgment, and sequencing of packets guarantees x

delivery

New cards
61

TCP uses a method known as x, which prevents a sender from overwhelming a server by sending too many packets too quickly.

flow control

New cards
62

UDP

User Datagram Protocol

New cards
63

User Datagram Protocol (UDP) sessions are known as x sessions.

connectionless

New cards
64

One example of UDP usage is with x. With UDP, if a packet is dropped, it is x

streaming media sessions, not asked for again.

New cards
65

HTTP

Hypertext Transfer Protocol

New cards
66

HTTPS

Hypertext Transfer Protocol Secure

New cards
67

The outbound server for email is generally x and the inbound server will use either x or y

SMTP, POP3, IMAP

New cards
68

SMTP

Simple Mail Transfer Protocol (Send Mail To People). Sends email. Email client > SMTP server > destination

New cards
69

POP3

Post Office Protocol Version 3. Used by email clients to retrieve incoming mail from a mail server

New cards
70

IMAP

Internet Message Access Protocol. Enables messages to remain on the email server so they can be retrieved from any location.

New cards
71

FTP

File Transfer Protocol. Allows computers to transfer files back and forth. Connect to an FTP server on port 21, then a client uses port 20 for the data transfer.

New cards
72

SSH

Secure Shell. Enables the remote control of computers and enables data to be exchanged between computers on a secured channel. More secure than FTP and Telnet. Port 22 must be open to access an SSH server.

New cards
73

Telnet

Telecommunication network. Provides remote access to other hosts using the command-line interface (CLI). Uses port 23 but is insecure.

New cards
74

DHCP

Dynamic Host Configuration Protocol. Automatically assigns IP addresses to hosts. Uses port 67 and 68. Connectionless since it uses UDP.

New cards
75

DNS

Domain Name System. Group of servers on the internet that translates domain names to IP addresses. Has inbound port 53 open by default.

New cards
76

LDAP

Lightweight Directory Access Protocol. Accesses and maintains distributed directories of information.

New cards
77

RDP

Remote Desktop Connection.

New cards
78

SMB

Server Message Block. Provides access to shared items such as files and printers.

New cards
79

SNMP.

Simple Network Management Protocol. Used as the standard for managing and monitoring devices on a network.

New cards
80

Which of these would be used for streaming media?

A. TCP

B. RDP

C. UDP

D. DHCP

C. User Datagram Protocol (UDP) is used for streaming media. It is connectionless, whereas TCP is connection oriented and not a good choice for streaming media. RDP, which stands for Remote Desktop Protocol, is used to make connections to other computers. DHCP, which stands for Dynamic Host Configuration Protocol, is used to assign IP addresses to clients automatically. Don’t forget: DHCP is connectionless and uses UDP, too!

New cards
81

A user can receive email but cannot send any. Which protocol is not configured properly?

A. POP3

B. FTP

C. SMTP

D. SNMP

C. Simple Mail Transfer Protocol (SMTP) is probably not configured properly. It deals with sending mail. POP3 receives mail. FTP sends files to remote computers. SNMP is used to manage networks.

New cards
82

FTP PORT

20/21

New cards
83

SSH PORT

22

New cards
84

TELNET PORT

23

New cards
85

SMTP PORT

25

New cards
86

DNS PORT

53

New cards
87

DHCP PORT

67/68

New cards
88

HTTP PORT

80

New cards
89

POP3 PORT

110

New cards
90

NETBIOS PORT

137/139

New cards
91

IMAP PORT

143

New cards
92

SNMP PORT

161/162

New cards
93

LDAP PORT

389

New cards
94

HTTPS PORT

443

New cards
95

SMB/CIFS PORT

445

New cards
96

RDP PORT

3389

New cards
97

A x is a central connecting device that computers connect to in a wired fashion

switch

New cards
98

MAC

Media Access Control

New cards
99

A switch is responsible for transmitting data from x. It often works at data transfer rates of x-y

two or more wired computers. 1000 Mbps or 10 Gbps

New cards
100

Each computer is connected to its own x on a switch

physical port

New cards

Explore top notes

note Note
studied byStudied by 82 people
... ago
5.0(1)
note Note
studied byStudied by 8 people
... ago
5.0(1)
note Note
studied byStudied by 22 people
... ago
5.0(1)
note Note
studied byStudied by 14 people
... ago
5.0(2)
note Note
studied byStudied by 5 people
... ago
5.0(1)
note Note
studied byStudied by 2 people
... ago
5.0(1)
note Note
studied byStudied by 18 people
... ago
5.0(1)
note Note
studied byStudied by 12 people
... ago
5.0(1)

Explore top flashcards

flashcards Flashcard (134)
studied byStudied by 8 people
... ago
5.0(1)
flashcards Flashcard (156)
studied byStudied by 12 people
... ago
5.0(1)
flashcards Flashcard (120)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (119)
studied byStudied by 42 people
... ago
4.5(2)
flashcards Flashcard (92)
studied byStudied by 4 people
... ago
5.0(1)
flashcards Flashcard (93)
studied byStudied by 40 people
... ago
5.0(1)
flashcards Flashcard (32)
studied byStudied by 22 people
... ago
5.0(3)
flashcards Flashcard (100)
studied byStudied by 82 people
... ago
5.0(4)
robot