Contact Us:
Phone: (888) 265-4301
Email: Customer Service

 
 


Included in the Course You will Receive:

The A+ Exam Simulator with 3,500 Total Questions and Rationale 

See Screenshots


 

220-701
17 Full Length 220-701 Practice exams (1,700 220-701 exam questions)

220-702
17 Full Length 220-702 Practice exams (1,700 220-702 exam questions)

 

100 mixed bonus Questions Included.

1,700 + 1,700 + 100 = 3,500 Total Questions in the simulation software

 

Simulator Features:


"Two Timers®" with on/off functions! You have a choice of "per question" timer to track your time usage per question and a "per exam" timer which displays time left for the entire exam. Learn to manage your exam time.

Answer Display Functions. Display the answers after each question OR all answers at the end of the exam. Real time practice exam results help reduce study time and effort.
Explanations: The rationale of the correct answer is explained to help you understand why the answer is correct.

Mark for Review Feature. Just like the real exam. Not sure about an answer? Don't let it take up all your time. "Mark it for review" (skip it) and it will display again at the end of the exam.

Results Review. When you have completed the exam your percentage score will be calculated and you will be told whether you passed or failed, just like on exam day. A score of 675 or higher is required to pass the exam.

Print. Print out your results showing the questions and correct answer and study on the go.

Not Online only. This is installable software. No internet connection required to access exams.

Strategically laser targeting your study efforts by studying exactly the way it will be on the exam. Practicing on the computer in a similar way it will officially be presented.

Our software can be used on multiple computers. Study on your laptop, at work, at home at the library, etc.

Our Software never expires. Once you are a customer, you own the program for life! Relax, you can take your time and study on your schedule without worrying about the program expiring.

 

Sample Questions Included :



1. Wide Area Networks (WANs) utilize the same technology of Local Area Networks (LAN) for network technology. What is true about the range of this network technology?
A. A short geographical range.
B. Over long distances.
C. Within one building.
D. Within some rooms.
Answer: B
Explanation: Area Networks are those networks which cover a number of computers within a self-contained network. Local Area Networks (LAN) are a set of computers, connected within a short geographical range, usually within one building. Most LANs use Ethernet for connection, wireless or wired. Wide Area Networks (WANs) utilize the same technology but over long distances. An internet service provider is a kind of WAN.

2. Various status indicators on the NIC provide information useful for diagnosing and troubleshooting wired and wireless network connections. An amber light usually indicates what?
A. The connection is idle.
B. A link is established and good.
C. Limited or no connectivity.
D. One or more services necessary for Internet connectivity is working properly.
Answer: C
Explanation: The connection light is perhaps the most important. A solid green connection indicates that the connection is idle, but a link is established and good. An amber light usually indicates a “limited or no connectivity” status, which means that one or more services necessary for Internet connectivity is not working properly. If the light is off, then there is no connection.

3. Viruses are designed to not only propagate themselves within a system, as the name implies, but usually to sap system resources or corrupt system files and spread themselves to other systems. Which from the following tracks a user’s web use and history to “tailor” the advertisements?
A. Spam.
B. Trojans.
C. Worms.
D. Spyware.
Answer: D
Explanation: Viruses are designed to not only propagate themselves within a system, as the name implies, but usually to sap system resources or corrupt system files and spread themselves to other systems. They require the execution of the program which they infect to become active. Spyware is similar to adware, in that it is a program and is used for advertisement. In addition, spyware tracks a user’s web use and history to “tailor” the advertisements.

4. Wireless Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) are the two encryption key formats for wireless networks. Which one utilizes longer keys?
A. Wireless Equivalent Privacy (WEP)
B. Wi-Fi Protected Access (WPA)
C. Both of the use shorter keys.
D. No one use shorter keys.
Answer: B
Explanation: Wireless Equivalent Privacy (WEP) – basic security standard included in the 801.11 standard; possesses a 128-bit encryption, entered as a string of 26 hexadecimal characters. Limited key size expresses some security concerns.
Wi-Fi Protected Access (WPA) – the other standard, developed in response to the weaknesses of WEP. Utilizes longer keys and error-checking suites to maintain a higher level security

5. This allows the user to access network resources for troubleshooting, such as uncorrupted restore files or Internet access for research” which one is mentioned here?

A. Safe Mode with Command Prompt.
B. Safe Mode with Networking.
C. Last Known Good Configuration.
D. Safe Mode with Admin control.
Answer: B
Explanation: Safe Mode with Networking. This allows the user to access network resources for troubleshooting, such as uncorrupted restore files or Internet access for research.

6. There is a layer from seven-layer of OSI Stack where all the electrical and physical specifications are contained; it defines cable specifications; networking hardware operates at this level. What is the name of this layer?
A. Data Link Layer.
B. Application Layer.
C. Networking Layer.
D. Physical Layer.
Answer: D
Explanation: Protocols
Protocols are the life-blood of any network system. Much like device drivers, they provide the means of translating the raw information sent over data lines across the network, into a language understandable to the computer and, eventually, to the user. As with most computer components, protocols are subject to a standard. The OSI Stack is the standard by which protocols are created, and it defines a seven-layer stack that describes the process of information translation from hardware to software:

7. A port replicator is a device which provides serial, parallel, extra USB and/or KVM connections, what is the suitable purpose of providing all these ports?
A. For extra port communication to laptop
B. For manual communication to laptop
C. For saving battery power
D. For improving processing capability

Answer: A
Explanation: A port replicator is a device which provides extra communications ports to the laptop. These will typically be serial, parallel, extra USB and/or KVM connections.

8. Preferred active matrix has a sharper, better image than passive display. What are the other criteria that makes active matrix better?

A. Higher response time and color resolution.
B. Lower response time and color resolution.
C. Higher response time and lower color resolution.
D. Higher response time and no color resolution
Answer: A
Explanation: Preferred active matrix – sharper, better image than passive display. Higher response time and color resolution.

9. Power is divided into different states for a working device. What is true for the D3 state?

A. Full Power Working
B. Mid power use
C. Off
D. Less than mid power
Answer: D
Explanation: Device states – D3 – off

10. I need to reset the supervisor/user security password set in the system. This can be done by:
A. clearing the CMOS jumper by removing battery
B. clearing the BIOS Chip
C. clearing the RAM
D. clearing the Cache memory

Answer: A
Explanation: CMOS – It contains supervisor/user access security passwords. To reset the password – clear the CMOS jumper (remove battery)

11. Newer, high-resolution LCD screens use active-matrix addressing, which one of the following statement is suitable for this type of addressing?
E. A thin layer of crystals added to color filters
F. An array of solid crystals is added to color filters
G. Synthetic materials added to color filters
H. A thin layer of transistors is added to color filters
Answer: D
Explanation: Newer, high-resolution LCD screens use active-matrix addressing. In active-matrix addressing, a thin layer of transistors is added to color filters, allowing each pixel to be connected to its own transistor, which, in turn, allows the display to access one pixel at a time, increasing both the sharpness and brightness of the display.

12. I was working on the PC with some data, but due to power outage the data was lost. This means that the data was residing in:
A. Cache Memory
B. Random Access Memory
C. Hard Drive
D. Read Only Memory

Answer: B
Explanation: Dynamic random access memory in bytes is fast volatile memory, where power off causes loss.

13. While installing a SCSI device, which of the following step is NOT required:
A. Partition Drive
B. Master/Slave connector
C. Verify CMOS configuration
D. CMOS set-up

Answer: B
Explanation: SCSI Devices Install
Verify CMOS Configuration for larger hard drives may need upgrade to support
Partition Drive
Start High level format
Power off
Connect signal cable
Insert to bay
Attach power
CMOS Setup
Drive will auto detect in CMOS, no master/slave connector required.

14. User XYZ called up the technician to report a problem with his PC. After checking the technician found that the motherboard had been totally corrupted. What suggestion should he give to the user?
A. The entire system needs to be replaced
B. Re-booting the system will resolve the problem
C. Running the recovery disk will resolve the problem
D. The motherboard needs to be replaced

Answer: D
Explanation: Motherboard CPU problems – if motherboard damaged, must be completely replaced.

15. Using the Function key if I have to mute my speakers, the option that I need to use is:
A. Fn + End
B. Fn + Esc
C. Fn + Ins
D. Fn + Del

Answer: A
Explanation: Fn+End: Mute speakers

16. Latest computers use a technique where it stores the frequently used disk data in a pre-determined memory location so that the data, once accessed, can be fetched faster when accessed for subsequent times. This technique can be implemented using the following:
A. Cache Memory
B. Random Access Memory
C. Hard Drive
D. Read Only Memory

Answer: B
Explanation: Disc cache – portion of RAM reserved to speed up access to the disc data.


17. During installation of OS on the PC, after I formatted the hard drive, the boot sector got changed automatically. This can be avoided by:
A. Disabling CMOS virus warning.
B. Disabling sector allocation.
C. Re-formatting the hard drive.
D. Re-booting the system.

Answer: A
Explanation: Disable CMOS virus warning because boot sector will change.

18. My PC shutdown on its own when I entered a command. It showed the message ‘Illegal Operation – terminating the session’. What does this mean?
A. OS is not properly installed.
B. OS detected a request it does not recognize
C. Driver conflict
D. System is unresponsive

Answer: B
Explanation: Illegal operation – OS detects request it does not recognize

19. When I switch on my PC I get an error message showing ‘No operating system found’. What does this mean?
A. Boot sector is corrupted.
B. Error in BIOS
C. No NTLDR
D. Both A and C
E. Both A and B

Answer: D
Explanation: No operating system found – NO OS, corrupt boot sector or files, No NTLDR. (replace missing from setup disc)

20. I have three computers in my office. I want to connect all three computers for data import or export. Which network system I have to use?

A. WAN
B. MAN
C. LAN
D. Internet

Answer: C
Explanation: Local Area Network are connecting several computer at one place

21. Some of the computer vendors artificially increase the speed of data flow in order to show that the configuration which they are offering is having a better performance. Can you identify what technique are they essentially applying?

A. Hyper threading
B. Throttling
C. Multicore
D. Over clocking

Answer: D
Explanation: Over clocking means operating the processor at a clock frequency higher than specified by the manufacturer.


22. I have a machine with an OS which was working fine till yesterday. Today when I switched on my computer, it displays 'no operating system found’ message on the screen. Also found that the OS is not running because it searches for NTLDR file. What should I do to rectify this problem?

A. Reboot the system with booting files.
B. Reinstall the OS from setup disc
C. Replace the missing file from setup disc
D. Replace the missing file from Booting Disc.

Answer: C
Explanation: No operating system found – NO OS, corrupt boot sector or files, No NTLDR.
(replace missing from setup disc)"

23. The machine has the following properties.
Processor : Pentium 2
MegaHz : 133 MHZ
RAM : 64 MB
Disk Space : 650 MB
I have experienced a severe error when I tried to install Windows XP. Can you explain me why the error has occurred?

A. RAM should be at least 128 MB to install Windows XP.
B. Pentium 3 is the minimum system requirement to install Windows XP.
C. 300 MHZ is the minimum system requirement to install Windows XP.
D. Pentium 4 is the minimum system requirement to install Windows XP.

Answer: C
Explanation: XP system requirements – p2, 300mhz, 64mb ram, 650 mb space

24. The Motherboard has a component to control the input/output operations for slower devices like hard disc drive and PCI Bus. What is the name of the component?

A. Northbridge
B. Southbridge
C. Northwest Bridge
D. Memory Bridge

Answer: B
Explanation: “Southbridge – i/o controller for slower devices (hard drive), PCI bus”

25. 8) My computer has Windows XP as operating system. But it is taking time when I am opening many programs. One of my friend suggested to increase the virtual memory. Can you tell me the path for Virtual Memory Adjustment?

A. Start -> Control Panel -> System -> Advanced -> Performance -> Virtual Memory
B. Start -> All Programs -> Graphics -> Memory -> Virtual Memory
C. Start -> Run -> VM -> Adjust Virtual Memory
D. Right Click On Desktop -> Graphics Properties -> Display Settings -> Virtual Memory Adjustment

Answer: A
Explanation: The virtual Memory can be adjusted from the Path mentioned.