CompTIA A+ Core 1

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 97

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

98 Terms

1

What is Random Access Memory (RAM)?

RAM is the memory bank currently in use by a computer or device; it is temporary storage.

New cards
2

What is Virtual RAM?

Virtual RAM is space on a hard drive allocated for additional memory when requested by an application, also known as a swap file or paging file.

New cards
3

What is a Small Outline Dual Inline Memory Module (SODIMM)?

SODIMM is a type of RAM commonly found in laptops, characterized by its compact size and various pin configurations.

New cards
4

What are the benefits of Double Data Rate 3 (DDR3) RAM?

DDR3 is faster than DDR2 and has 30% less power consumption, available in different DIMM and SODIMM pin configurations.

New cards
5

What does Double Data Rate 4 (DDR4) offer over DDR3?

DDR4 is faster than DDR3 with improved power consumption, coming in 288-pin DIMM and 260-pin SODIMM.

New cards
6

How does Double Data Rate 5 (DDR5) improve memory performance?

DDR5 doubles the speed of DDR4 to 6.4 Gbps with better power efficiency at 1.1 volts and up to 128 GB modules.

New cards
7

What is Error-Correcting Code (ECC) RAM?

ECC RAM has logic built to detect and correct single-bit memory errors, improving data integrity.

New cards
8

What is the difference between Single Channel and Dual Channel memory?

Single channel transfers data in chunks the size of the system bus' bandwidth, while dual channel coordinates two memory banks to double data transfer size.

New cards
9

What are the characteristics of SSDs?

SSDs use flash memory technology with no moving parts, providing high speed and smaller form factors than HDDs.

New cards
10

What are the main types of communications interfaces for SSDs?

The main types are NVMe (fastest), PCIe (faster than SATA), and SATA (slowest).

New cards
11

What is the M.2 form factor?

M.2 is a compact SSD form factor measuring 22mm wide and is similar to a stick of gum.

New cards
12

What are RAID levels and their purposes?

RAID configurations like 0, 1, 5, and 10 provide different levels of data protection and performance through methods like striping and mirroring.

New cards
13

What does BIOS/UEFI refer to?

BIOS is the basic firmware that initializes hardware; UEFI is the updated version that offers faster boot and larger drive support.

New cards
14

How does Secure Boot enhance system security?

Secure Boot ensures only authorized operating system and driver versions are loaded, protecting against malicious code.

New cards
15

What is multithreading in CPU architecture?

Multithreading allows a CPU to run multiple threads of instructions simultaneously, enhancing performance.

New cards
16

What are the advantages of liquid cooling systems?

Liquid cooling is more effective at heat transfer than air cooling, making it suitable for high-performance computers.

New cards
17

Coaxial Cable

A cable with a single copper core contained within insulation, typically used for cable and satellite devices.

New cards
18

Twisted Pair Cable

A type of network cable made up of pairs of twisted copper wires used primarily for Ethernet.

New cards
19

Fiber Optic Cable

A cable made of flexible glass strands used for high-speed data transmission via light pulses.

New cards
20

RJ45 Connector

A standard connector used for twisted pair cables, commonly known as an Ethernet cable.

New cards
21

USB 3.0

A standard for universal serial bus with a maximum speed of 5 Gbps, known as SuperSpeed.

New cards
22

DVI

A digital visual interface cable designed to carry digital video signals.

New cards
23

SATA

Serial Advanced Technology Attachment, the most common type of drive interface for internal connections.

New cards
24

Plenum

A Teflon-type covering used for network cables that may be exposed to extreme heat.

New cards
25

T568A and T568B

Standards for color-coding twisted-pair wires in RJ-45 wiring connectors.

New cards
26

Error-Correcting Code (ECC) RAM

RAM that includes logic to detect and correct single-bit memory errors.

New cards
27

Single-mode Fiber

Fiber optic type that carries a single light path, typically sourced by a laser.

New cards
28

Multimode Fiber

Fiber optic type that carries multiple light paths, typically sourced by an LED.

New cards
29

Ethernet Cable

A twisted pair cable that uses RJ45 connectors for network communications.

New cards
30

Direct Burial Cable

STP cables that are suitable for burial underground and designed with waterproof sheathing.

New cards
31

HDMI

High-definition multimedia interface cable capable of transmitting digital audio and video.

New cards
32

Micro USB

The smallest USB connector type, commonly used for mobile devices.

New cards
33

Dual-Channel RAM

Memory configuration that coordinates two memory banks for synchronized data transfer.

New cards
34

GBPS

Gigabits per second, a unit of measurement for data transmission speed.

New cards
35

Cable Types

Categories describing different network cables, including coaxial, twisted pair, and fiber.

New cards
36

Storage Devices

Non-volatile devices designed for data storage, such as HDD and SSD.

New cards
37

Peripheral Cable

Cables used to connect peripherals, such as USB and serial cables.

New cards
38

VGA

Video Graphics Array cable, used as an analog video standard.

New cards
39

20/21 - File Transfer Protocol (FTP)

Used to manipulate files, remotely copy files, list and manipulate directories, and view file contents. Runs on ports 20 (data transfer) and 21 (file management). Not secure and transmits in plain text.

New cards
40

22 - Secure Shell (SSH)

A connection-oriented protocol that sets up secure Telnet connections for remote logins. Secure and runs on port 22.

New cards
41

25 - Simple Mail Transfer Protocol (SMTP)

Used to send email only and is a push protocol. SMTP uses port 25.

New cards
42

53 - Domain Name System (DNS)

Resolves hostnames to IP addresses and uses port 53.

New cards
43

67/68 - Dynamic Host Configuration Protocol (DHCP)

Dynamically assigns IP addresses to network clients, using port 67 for the server and port 68 for the client.

New cards
44

80 - Hypertext Transfer Protocol (HTTP)

Manages communication between a web server and a client for viewing internet content. Not secure and transmits in plain text on port 80.

New cards
45

110 - Post Office Protocol 3 (POP3)

Used for downloading email and operates over port 110.

New cards
46

137/139 - Network Basic Input/Output System (NetBIOS)

API for communication between computers over a network; operates on ports 137/139.

New cards
47

143 - Internet Message Access Protocol (IMAP)

Used for retrieving email messages.

New cards
48

161/162 - Simple Network Management Protocol (SNMP)

Used for network management. SNMP uses port 161 for requests and port 162 for receiving transmissions.

New cards
49

389 - Lightweight Directory Access Protocol (LDAP)

Used for accessing information stored in an information directory, operates on port 389.

New cards
50

443 - Hypertext Transfer Protocol Secure (HTTPS)

Secure version of HTTP, operates on port 443.

New cards
51

445 - Server Message Block (SMB) / Common Internet File System (CIFS)

Primarily a Microsoft protocol for shared file access, operates on port 445.

New cards
52

3389 - Remote Desktop Protocol

Allows remote connections to computers, operates on port 3389.

New cards
53

TCP - Transmission Control Protocol

A connection-oriented protocol considered reliable because the host acknowledges receipt of data.

New cards
54

UDP - User Datagram Protocol

A connectionless protocol where data is sent without assurance that it is received, making it faster but less reliable.

New cards
55

TFTP - Trivial File Transfer Protocol

A faster version of FTP that uses UDP instead of TCP, operates on port 69.

New cards
56

DHCP - Dynamic Host Configuration Protocol

Dynamically assigns IP configuration, operates on ports 67/68 using UDP.

New cards
57

Common Networking Hardware - Routers

Devices that connect multiple networking devices and determine optimal pathways using routing tables.

New cards
58

Common Networking Hardware - Switches

Layer 2 devices that examine packet headers and forward packets based on MAC addresses.

New cards
59

Common Networking Hardware - Access Points (APs)

Devices that allow wireless devices to connect to a wired network.

New cards
60

Common Networking Hardware - Firewalls

Security appliances that filter network traffic based on rules.

New cards
61

PoE - Power over Ethernet

Delivers power to devices over data lines, eliminating the need for separate power cords.

New cards
62

Hub

A layer 1 device that broadcasts incoming data to all connected devices.

New cards
63

DSL - Digital Subscriber Line

Provides connectivity via a telephone line.

New cards
64

NIC - Network Interface Card

Provides the physical interface between a computer and network cabling.

New cards
65

NFC - Near-Field Communication

A short-range wireless technology used for contactless payment.

New cards
66

IoT Devices - Internet of Things

Devices that connect to networks through a central controller, such as smart home devices.

New cards
67

IPv4

A 32-bit hierarchical address written in dotted-decimal notation, which identifies a host on a network.

New cards
68

Private Addresses

Addresses not routable on the Internet, with Class A ranges from 10.0.0.0 to 10.255.255.255.

New cards
69

What should you do before attempting a laptop repair?

Always check the manufacturer's documentation before attempting a repair.

New cards
70

What types of batteries are commonly used in laptops?

Laptop batteries are usually Nickel-cadmium (NiCd), Lithium ion (Li-ion), Nickel-metal hydride (NiMh), or Lithium-polymer (Li-poly).

New cards
71

How do you replace an external laptop battery?

Remove the battery pack and replace it.

New cards
72

How do you replace an internal laptop battery?

Remove the bottom cover, locate the battery, disconnect it from the motherboard, remove any screws, remove the old battery, insert the new battery, replace the screws and back cover.

New cards
73

What is the industry standard for RAM in laptops?

The industry standard for RAM in laptops is the smallest outline inline memory module (SODIMM).

New cards
74

What should you ensure when replacing a SODIMM?

Ensure that the new SODIMM is compatible with the motherboard.

New cards
75

What are the sizes of SSDs used in laptops?

SSD’s come in three sizes: 2.5”, 1.8”, and M.2.

New cards
76

How do you replace the SSD in a laptop?

Remove the bottom cover, locate the drive, remove any screws, disconnect the SATA cable, and replace the SSD.

New cards
77

What does a wireless network interface card (NIC) do?

It allows for wireless communication between the laptop and wireless access points.

New cards
78

What are common biometric features used for laptop security?

Facial recognition and fingerprint scanners.

New cards
79

What is Near-Field Communication (NFC)?

NFC is a wireless communication method that sends signals between compatible devices in close proximity, up to 10 cm.

New cards
80

What are the variants of Liquid Crystal Display (LCD)?

In-plane switching (IPS), Twisted nematic (TN), and Vertical Alignment (VA).

New cards
81

What are the advantages of OLED displays compared to LCDs?

OLED displays have less power consumption, a higher contrast ratio, and produce sharper images.

New cards
82

What components are included in mobile display components?

Backlight, inverter, screen, webcam, microphone, and WiFi antenna.

New cards
83

What types of USB connections are common?

USB types include USB-C, micro USB, or mini USB.

New cards
84

What are the steps to enable Bluetooth on a device?

Step 1: Enable Bluetooth; Step 2: Enable Pairing; Step 3: Find Device for Pairing; Step 4: Enter the Appropriate PIN Code; Step 5: Test Connectivity.

New cards
85

What does Global Positioning System (GPS) use for location determination?

GPS uses triangulation between receivers and satellites.

New cards
86

What is Mobile Device Management (MDM)?

MDM is a software package used to enroll corporate devices for oversight and security.

New cards
87

What is Two Factor Authentication (2FA)?

2FA increases device security by requiring an additional piece of information for access, such as a PIN from a token or authentication application.

New cards
88

What is a data cap?

A data cap is a limit placed on the amount of data that can be stored in a synchronization location such as the cloud.

New cards
89

What is cloud computing?

Cloud computing is the delivery of computing services over the internet, allowing users to access and store data and applications remotely.

New cards
90

What are some common examples of cloud computing?

Examples include online file storage services like Dropbox and iCloud, which allow users to store documents, photos, and videos.

New cards
91

What is a private cloud?

A private cloud is a cloud model where the virtualization resources are dedicated solely to a single user, ensuring greater security at a higher cost and less flexibility.

New cards
92

What is a public cloud?

A public cloud is a virtualized resource that is shared over the open internet, allowing multiple users to store their data in a common infrastructure.

New cards
93

What is a hybrid cloud?

A hybrid cloud combines both private and public clouds, offering security for sensitive data while providing the flexibility and scalability of public cloud resources.

New cards
94

What is Infrastructure as a Service (IaaS)?

IaaS is a cloud computing service that provides virtualized computing resources over the internet, allowing clients to build their entire infrastructure in the cloud.

New cards
95

What is Platform as a Service (PaaS)?

PaaS provides a platform for developers to build applications, handling the backend infrastructure while allowing developers to focus on application management.

New cards
96

What is metered utilization in cloud services?

Metered utilization refers to tracking and billing users only for the amount of cloud resources they actually use.

New cards
97

What is virtual desktop infrastructure (VDI)?

VDI is a technology that allows users to manage virtual desktops from a central location, replacing physical hardware with virtual hardware.

New cards
98

What is sandbox in virtualization?

A sandbox is a temporary, isolated virtual environment where data does not persist once the sandbox is terminated.

New cards

Explore top notes

note Note
studied byStudied by 38 people
910 days ago
4.0(1)
note Note
studied byStudied by 4 people
58 days ago
5.0(1)
note Note
studied byStudied by 72 people
199 days ago
5.0(1)
note Note
studied byStudied by 8 people
954 days ago
5.0(1)
note Note
studied byStudied by 20 people
1006 days ago
4.0(1)
note Note
studied byStudied by 13 people
890 days ago
5.0(1)
note Note
studied byStudied by 34 people
848 days ago
5.0(1)
note Note
studied byStudied by 767 people
708 days ago
4.0(4)

Explore top flashcards

flashcards Flashcard (71)
studied byStudied by 2 people
747 days ago
5.0(1)
flashcards Flashcard (49)
studied byStudied by 3 people
302 days ago
5.0(2)
flashcards Flashcard (27)
studied byStudied by 4 people
828 days ago
5.0(1)
flashcards Flashcard (57)
studied byStudied by 40 people
465 days ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 34 people
497 days ago
5.0(1)
flashcards Flashcard (25)
studied byStudied by 62 people
793 days ago
5.0(2)
flashcards Flashcard (82)
studied byStudied by 100 people
515 days ago
5.0(1)
flashcards Flashcard (68)
studied byStudied by 97 people
23 days ago
5.0(1)
robot