100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Compiled CompTIA A+ Exam 220-1001 and 220-1002 Revised and Solved Correctly *Q&A* 2025/2026 |VERIFIED|

Rating
-
Sold
-
Pages
78
Grade
A+
Uploaded on
02-09-2025
Written in
2025/2026

Compiled CompTIA A+ Exam 220-1001 and 220-1002 Revised and Solved Correctly *Q&A* 2025/2026 |VERIFIED| What type of memory implementation requires two paired standard memory modules to read from or write to simultaneously? Channel memory What feature of DVDs and BDs allows for two media layers on one or both sides of the disc? Dual-layer What is the purpose of dual-rail power in modern power supplies? It provides multiple 12V rails to supply more power overall to components that require 12VDC, but with the possibility of undersupplying each individual rail. What does dual-voltage option in a power supply allow? It allows the selection of different AC input voltages, for example, the lower voltages common in North America or the higher voltages common in Europe. What term describes the act of digging through the trash to collect sensitive information? Dumpster diving What is the function of a duplexing assembly in a printer? It is responsible for turning the paper over so that it can be printed on both sides. What does a DVD-ROM represent? It is a non-writeable and inerasable DVD permanently pressed with digital data. What is the purpose of a DVI to HDMI adapter? 1 It allows a DVI monitor to be connected to an HDMI output port on a graphics adapter. How does a DVI to VGA adapter function? It interconnects a DVI-A interface with a VGA interface to allow interconnection between different graphics adapters and monitors. What is a Dynamic disk used for in the Windows operating system? It is used for creating RAID groups between volumes in the Microsoft proprietary partitioning scheme. Which protocol automatically configures network clients with IP information when they join the network? Dynamic Host Configuration Protocol (DHCP) What is dynamic network address translation (DNAT)? It allows for a resource on a private computer to be available for consumption on a public network. What does it mean for variables to be dynamically typed? It means the type of the variable is automatically set as a value. What does electromagnetic interference (EMI) refer to? It refers to electromagnetic radiation released by an electronic device that disrupts the operation of other devices. What role does an electronic stepper motor play in a printer? It accurately moves in small increments, powering paper transport and fuser rollers. What is electrostatic discharge (ESD)? 2 It occurs when two objects of dissimilar electrical charge come into contact, potentially damaging electronic components. What is an embedded system? It is a computer system upon which other systems depend to complete processes. What is an emulator in the context of virtualization? It is another term for a hypervisor, a program that allows the creation of virtual machines. What is the Encrypting File System (EFS) in NTFS? It is a technology that allows for the encryption and decryption of individual files and folders. What does encryption do? It scrambles a signal or message to make it unreadable by normal means, or encodes a file with a key that only select individuals can access. What is an end-user license agreement (EULA)? It is a contract between a software company and an end user that specifies the legal use of an application. What does end-of-life refer to in hardware or software products? It is the point at which a product is no longer supported. What does an endpoint management server do? It manages the configuration of workstations and servers on a network and deploys security policies, operating systems, software, patches, and more. What is the method of end-user acceptance in software changes? It is the process by which changes to a program or process are tested by users. 3 What is an enterprise license? It is a software license issued for use across an entire enterprise, regardless of license count. What is an entry control roster used for? It is a list of people authorized in an area, typically controlled by a security guard. What is an envelope feeder in a printer? It is a device for feeding envelopes into a printer. What are environment variables? They are placeholders for strings of data used by the operating system. What does the Environmental Protection Agency (EPA) oversee? It oversees environmental protection regulations in the United States. What is an EP cartridge in a laser printer? It is a component that forms images on paper. What is the EP imaging process in a laser printer? It is the process by which a laser printer forms images on paper. What type of device is an e-reader? It is a mobile device designed for reading books, newspapers, and magazines, typically using electrophoretic ink (E Ink). What is an error-correcting code (ECC)? It is an error-checking scheme that can detect and correct single-bit errors in data. 4 What does eSATA stand for and what is its use? It refers to a SATA interface with an external port used for external storage devices. What is Ethernet over power technology? It allows network signals to be sent via electrical power outlets, requiring devices to be on the same electrical circuit. What is the purpose of the Event Viewer in Microsoft operating systems? It allows an administrator to view system, security, and application events. What is an evil twin in wireless networking? It is a wireless attack that uses a duplicate SSID to trick victims into associating with it. What is Exchange Online? It is an internet-based email service operated by Microsoft. What is executable machine code? It is code that has been compiled and is directly executable by the CPU. What is the executive kernel in Windows? It is the portion of the kernel that handles core processes such as security, access, and logging. What is the exFAT file system used for? It is a proprietary Microsoft filesystem primarily created for flash drives over 32 GB. What does an expansion card do in a computer? It is an adapter card inserted into a motherboard’s bus slot to expand the computer’s capabilities. 5 What is an expansion slot? It is an insertion point in the bus that allows for the installation of expansion cards like PCI or PCIe. What is an exploit in the context of security? It is a method of exposing a security vulnerability to gain unauthorized access. 32-bit operating system memory locations. 3D printing An operating system based on 32-bit commands that can address 32-bit A fabrication process, also known as additive manufacturing, in which three dimensional products are created by adding thin layers of material on top of each other. 3G (third generation) early 2000s; replaced by 4G. 4G (fourth generation) An old cellular networking technology that was popular in the 1990s and A generation of cellular technology that was popular throughout the 2010s. It was the first standard that offered LTE. 5G (5th Generation) The most current generation of cellular communications; supports gigabit speeds over cellular links. 64-bit operating system An operating system based on 64-bit commands that can address 64-bit memory locations. 8.3 naming convention The naming convention used with DOS that requires the format of eight letters for the name, a period, and then a three-letter file identifier. 802.11 The IEEE specification that defines the family of wireless network communications. 6 802.11a 54 Mbps. 802.11ac A wireless standard that operates at 5 GHz and provides wireless speeds up to A wireless standard that operates at 5 GHz and claims to provide wireless speeds of 1 Gbps or higher. 802.11b 11 Mbps. 802.11g A wireless standard that operates at 2.4 GHz and provides wireless speeds up to A wireless standard that operates at 2.4 GHz, is backward compatible with 802.11b, and provides data transmissions up to 54 Mbps. 802.11n A wireless standard that can operate at 5 GHz or 2.4 GHz, is backward compatible with earlier standards, and provides data transmissions up to 600 Mbps. 802.1x A switch port control protocol used to authenticate devices and users on Ethernet and wireless connections. AC adapter A power adapter that plugs into a standard wall outlet and provides alternating current. acceptable use policy (AUP) An internal policy that establishes the acceptable use of an organization's resources for employees. access control list (ACL) A set of rules or list of conditions that determines which traffic is allowed through a firewall and which traffic is denied. 7 access point A device that allows wireless devices to talk to each other and the network. It provides the functions of the network access as well as security monitoring. access token The access token, in Windows, contains a user's login information, including their groups and privileges. account lockout When an incorrect password has been entered too many times, an account will disallow future logins and lock out the user. accounting Action Center An audit trail of user logins and logouts used with RADIUS. A feature in Windows 7 and Windows 8/8.1 that allows for viewing of Security and Maintenance-related settings of the operating system. Active Directory (AD) A directory service that Microsoft clients use for centralized authentication, authorization, and accounting. Active Directory Recycle Bin A feature in Active Directory that allows an Active Directory object to be recovered from deletion. active hub A type of hub that uses electronics to amplify and clean up the signal before it is broadcast to the other ports. Active Server Pages (ASP) backend scripting with VBScript. Web pages that serve interactive content through the use of Address Resolution Protocol (ARP) MAC addresses. A TCP/IP protocol used to resolve IP addresses to 8 administrative privileges administrative tasks. administrative shares An elevated level of privileges that allow a user to perform Network shares that are automatically created by the operating system for administrative access. Administrator account modify the operating system. Administrators group An account on the operating system that has elevated privileges to A group on the Windows operating system that, when joined, elevates members privileges to allow modification of the operating system. Advanced Encryption Standard (AES) WPA2 security standard. A very strong security algorithm used by the Advanced Encryption Standard (AES) encryption A symmetric block cipher encryption standard used by the U.S. government and defined as a standard by NIST. Advanced Technology Extended (ATX) A motherboard form factor that followed the AT motherboard and that has given rise to many modern motherboard form factors, such as micro ATX. The ATX motherboard was the first to feature the 20-pin power supply connector on which today's 24-pin connector is based. Aero windows. The Desktop interface introduced with Windows 7 that creates a glass effect on Airplane mode A mode on a mobile device that disables all wireless connections. It was 9 originally designed to comply with air travel laws. AirPlay AirPrint A screen-mirroring technology used exclusively by Apple devices. A technology developed by Apple to allow iPhones and iPads to print wirelessly to printers without the need to install a printer driver. alkaline batteries A type of battery that uses an alkaline electrolyte of potassium hydroxide to produce electrical current. Android A mobile operating system created by Google; one of the most popular smartphone operating systems in the world. Android Recovery A maintenance mode in the Android mobile device operating system that can factory-reset the operating system. antistatic bag A special bag for electrical components that has a semi-conductive surface, to both dissipate a charge as well as to keep the bag's surface at an even potential of voltage. antistatic mat An electrically conductive mat used as a work surface in which the potential of electrical static discharge is eliminated by draining static voltage with a 1-megaohm resistor. antistatic wrist strap A special strap that is fastened to your wrist and in which the potential of electrical static discharge is eliminated by draining static voltage with a 1-megaohm resistor. anycast An IPv6 address that has been assigned to multiple nodes. 10 App Store from the cloud. An application that allows users to download applications for Apple devices Apple Filing Protocol (AFP) A protocol developed by Apple to facilitate file transfers between computers. It uses port 549. Apple iTunes application crash system. Apple's online store for iOS-compatible apps. Compare to Google Play. The action of an application that quits unexpectantly on an operating application programming interface (API) programs to support various functions. APT (Advanced Package Tool) A set of libraries that programmers use in their A package-management system used with many popular Linux distributions. Archive attribute backed up. ARM The attribute or flag that defines whether a file or folder should be The term used to describe the Advanced RISC Machine processor instruction set. aspect ratio The relationship between the horizontal and vertical pixel counts that a monitor can display. assembly language A low-level language used to program CPU instructions. 11 asset tag A tag associated with equipment in an organization to identify ownership and assist in inventory management. attributes A command-line tool for setting file and folder attributes. File properties that allow a limited characterizing of file and folders based on their functionality and use. audio/video editing workstation A computer system optimized for editing the audio and video tracks of video files. A/V workstations should have specialized audio and video cards, large, fast hard drives, and dual monitors. augmented reality (AR) When a user wears a device such as Google Glass, which adds information to the user's reality. authentication multiple factors. authentication server The process of verifying a user's or computer's credentials using one or A computer that analyzes user credentials and then grants or denies access to resources on the network. authorization on a ruleset. The process of permitting or denying a user's or computer's actions based automatic document feeder (ADF) An attachment on a printer or copier that allows it to load multiple pieces of paper at once, instead of individually. Automatic Private IP Addressing (APIPA) IP addressing system that automatically 12 configures a host with a non-routable, private IP address, in the event the host is unable to reach the DHCP server. autorun A feature on Windows operating systems that allows programs to start automatically when media is inserted. B channel channel. backlight light. An ISDN channel that carries 64 Kbps of data; also known as a bearer A small fluorescent lamp placed behind or below an LCD display to provide back-side bus (BSB) The optional communications pathway between the northbridge and the cache controller. When the backside bus is absent, the cache controller communicates with the northbridge over the frontside bus. barcode scanner A peripheral device designed to read computerized barcodes; often used in retail environments at checkout. barcodes lines. An optical (image-based) representation of data using a special formatting of bare-metal backup failure. baseband OS communication. An image backup that allows a server to be restored in the event of The operating system on a mobile device that handles all wireless 13 baseband update An update to a mobile phone's baseband OS, which manages all wireless communication. Bash (an acronym for Bourne Again Shell) on Linux operating systems. basic input/output system (BIOS) An extremely popular shell that is installed Legacy firmware that is used with motherboards to instruct with boot up and set motherboard features. basic loop A programming technique that allows for a routine to run over and over again until a condition is met. Basic Rate Interface (BRI) An ISDN line with two B channels; each channel can be used separately for voice and/or data transmissions. basis weight A measurement of the "heaviness" of paper. The number is the weight, in pounds, of 500 17" × 22" sheets of that type of paper. .bat The file extension used with Microsoft batch scripts. battery calibration A software process in which a lithium-ion battery is completely drained so that it can be fully recharged. beep code A series of beeps from the computer's speakers to indicate a problem. The number, duration, and pattern of the beeps can sometimes tell you which component is causing the problem. best practice methodology Troubleshooting steps used to diagnose and resolve computer 14 problems. The steps are: 1. Identify the problem: a. Question the user, identify user changes to the computer, and perform backups before making changes. b. Inquire regarding environmental or infrastructure changes. c. Review system and application logs. 2. Establish a theory of probable cause (question the obvious): a. If necessary, conduct external or internal research based on symptoms. 3. Test the theory to determine cause: a. Once the theory is confirmed, determine the next steps to resolve the problem. b. If the theory is not confirmed, reestablish a new theory or escalate the problem. 4. Establish a plan of action to resolve the problem and implement the solution. 5. Verify full system functionality and, if applicable, implement preventive measures. 6. Document findings, actions, and outcomes. bias voltage power supply. The -600VDC charge that the developing roller acquires from a high-voltage biometric authentication An authentication method based on human characteristics, such as fingerprints, retinal patterns, and any other biological uniqueness. biometric locks blacklist Lock mechanisms that are controlled by biometric authentication. A firewall security scheme in which all computers are allowed to access the network except for those on the blacklist. blackout An electrical event when there is a total loss of power. 15 Bluetooth A popular standard for wireless communication. Blu-ray Disc (BD) DVD. BNC connector bonding An optical disc format that holds more information than a standard A type of coaxial connector used to attach stations to a thinnet network. When communications channels are combined to increase throughput. Bonjour Wireless printing technology introduced by Apple to allow for the sharing of networked printers. Boolean Boot Camp hardware. A value that can be either true or false. Allows for the installation of 64-bit Windows operating systems on Mac Boot Configuration Data (BCD) The boot configuration used by the Windows boot loader; first introduced in Windows Vista. boot partition The partition that contains the operating system kernel and files used to boot the operating system. botnet Bourne shell brick A group of computers that are organized and controlled for a malicious purpose. The original Linux/UNIX command shell upon which Bash is based. To render a mobile phone (or other device) non-operational—hence, giving it the 16 usefulness of a brick. bridge A type of connectivity device that operates in the Data Link layer of the OSI model. It is used to join similar topologies (Ethernet to Ethernet, token ring to token ring) and to divide traffic on network segments. This device passes information destined for one particular workstation to that segment, but it does not pass broadcast traffic. bring your own device (BYOD) The practice of allowing employees to use their personal mobile devices to access corporate electronic resources, such as email and cloud services. brownout A drop in power, but not a total loss of power. browser redirection The action of redirecting a user visiting a website to a malicious site in order to harvest their credentials. burner An optical drive so named because it employs a laser capable of intensities stronger than what is used to read discs. It uses the laser to write, or "burn," content to the disc. burn-in An artifact on the screen. No matter what is on your screen, you can still see the outlines of a different image. That image has been "burned" into the monitor. bus A set of signal pathways that allow information and signals to travel between components inside or outside of a computer. A computer contains three types of buses: the external bus, the address bus, and the data bus. bus topology A network topology in which all computers are connected in a serial fashion. A bus typically uses coaxial cable. 17 button cell A special battery in the form of a coin and about the size of a quarter. C/C++ A mid-level object-oriented language that requires compilation to machine execution code. cable lock A physical lock designed to secure a laptop to a desk or other non-movable object, to deter theft. cable management A method of controlling cabling so that it is easy to manage when cables need to be added, removed, or replaced. cable modem lines. cable stripper a cable. cable tester functionality. cable tie cache memory calibration A device that provides broadband Internet access using cable television A hardware tool that removes the plastic coating from the copper wires in A device used to identify problems with cables or to confirm their A plastic fastener that can be used to bundle cabling together. A storage area for frequently used data and instructions. The process by which a device, such as a printer or a scanner, is brought within functional specifications. caliper The thickness measurement of a given sheet of paper, which can affect a printer's 18 feed mechanism. captive portal A web page that prevents a user from using a wired or wireless connection until an acceptable use policy (AUP) is accepted or login credentials are provided. carriage belt The printer belt placed around two small wheels or pulleys and attached to the printhead carriage. The carriage belt is driven by the carriage motor and moves the printhead back and forth across the page during printing. carriage motor A stepper motor used to move the printhead back and forth on a dotmatrix printer. Also called a carriage stepper motor. Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) method used by IEEE 802.11 wireless networking. Carrier Sense Multiple Access/Collision Detection (CSMA/CD) The Ethernet access A network access method in which computers listen on the line and transmit when the line is empty. In the event of a packet collision, each sender will wait a random amount of time, and then resend. Cascading Style Sheets (CSS) web page elements. cathode-ray tube (CRT) A sheet or file that determines the placement and style of A legacy computer monitor that uses a large vacuum tube and a high-voltage electron gun to draw on a phosphorus-coated screen. cd A Linux and DOS command that changes the focus directory. CD-Recordable (CD-R) A CD that can be written to one time. 19 CD-Rewritable (CD-RW) t imes. CD-ROM A CD that can be written to, erased, and rewritten to multiple A non-writeable and inerasable CD permanently pressed with digital data. CentOS A community-supported Linux operating system that is compatible with Red Hat packages and functionality. central processing unit (CPU) The main integrated circuit of a computer system, consisting of an array of millions of integrated circuits, that interfaces with almost all other components and runs application and system processes. Its purpose is to accept, perform calculations on, and eject numeric data. It's considered the "brain" of the computer because it's the part that performs the mathematical operations required for all other activity. Intel and AMD are the most common CPU manufacturers for personal computers. centralized processing A network-processing scheme in which all "intelligence" is found in one computer and all other computers send requests to the central computer to be processed. Mainframe networks use centralized processing. CERT University. An organization dedicated to cybersecurity based out of Carnegie Mellon certificate authority (CA) and computers. chain of custody A server that issues public/private key pairs on behalf of users A method to document evidence as it's moved or control is transferred to other individuals, so that it remains valid evidence. 20 change advisory board management control process. change management A group of people in an organization who oversee the change A process to standardize the methods and procedures used to handle changes in a company. channels In wireless communications, sub-divisions within a frequency. characters per second (cps) charging corona A rating of how fast dot-matrix printers can produce output. The wire or roller that is used to put a uniform charge on the EP drum inside a toner cartridge. charging step The second step in EP printing, during which a special wire or roller in the toner cartridge gets a high voltage from the HVPS. It uses this high voltage to apply a strong, uniform negative charge (around -600VDC) to the surface of the photosensitive drum. Charms A set of common tasks displayed as large icons on a pop-out menu on the right side of the Windows 8 Desktop or Start screen. chief information officer (CIO) technology for an organization. chip reader The executive officer that oversees the information A peripheral device that can read information from a chip integrated into a plastic card or device. 21 chipset The set of controller chips that monitors and directs the traffic on the motherboard between the buses and components. See northbridge and southbridge. chkdsk chmod chown Chrome OS web browser. Chromecast A Windows command-line tool used to check the filesystem of a disk for errors. A Linux command that changes permissions on a file or folder. A Linux command that changes the ownership of a file or folder. A cloud-based operating system created by Google and based on the Chrome A screen-mirroring technology designed and mainly used by Google applications, such as the Chrome web browser. cipher lock A physical lock for a door that is unlocked through a combination or sequence of buttons. classless inter-domain routing (CIDR) IP address spaces that do not correspond directly to class A, B, or C networks. CIDR can be described as a "slash x" network, where x represents the number of bits in the network address. clean upgrade An upgrade that involves formatting the disk and reinstalling a newer version of the operating system. cleaning cycle A set of steps that a bubble-jet printer goes through in order to purge the printheads of any dried ink. 22 cleaning step The seventh and last step in the EP imaging process, during which excess toner is scraped from the EP drum with a rubber blade. client computer a workstation. client software A computer that requests resources from a network; often referred to as Software that allows a device to request resources from a network. client-side virtualization A configuration in which multiple OSs are managed on the client machine and can be run simultaneously with the use of a hypervisor or virtual machine manager (VMM). closed source source. cloud computing Describes software with code that is proprietary. Contrast with open Using the Internet to provide computing resources, such as hardware and other infrastructure, development platforms, and software applications. cloud-based network controller internetworking devices. CMOS battery An app that allows an administrator to manage cloudbased A battery that provides power to the CMOS (or BIOS) chip that stores CMOS settings. A PC must retain certain settings when it's turned off and its power cord is unplugged. coaxial cable A medium for connecting computer components that contains a center conductor, made of copper, surrounded by a plastic jacket, with a braided shield over the jacket. 23 cold cathode fluorescent lamp (CCFL) computers. collision A common type of backlight used in laptop When two or more stations transmit onto a shared medium simultaneously, invalidating the data sent from each station. command prompt executed in Windows. commercial license The interactive prompt that allows commands to be interpreted and A software license that is granted or used for commercial purposes. Common Internet File System (CIFS) TCP/IP protocol that uses port 445. Designed by Microsoft and used to share files and printers between computers, regardless of the operating system that they run. Common Language Runtime (CLR) An intermediate code to which the .NET Framework is compiled. The CLR then is just-in-time compiled to executable machine code. community cloud objectives. compact disc (CD) A cloud that is shared by several clients with similar interests or A digital optical-disc medium commonly capable of holding from 650 MB to 700 MB of data, corresponding to 74 to 80 minutes of CD-quality audio, which is of higher quality than MP3 files. Compact Disc File System (CDFS) as ISO 9660. A filesystem used on compact disc media; also known 24 CompactFlash 36 mm × 43 mm. compatibility mode compiler A solid-state memory-card format, introduced in 1994, which measures A method of providing backward compatibility for applications. A program that compiles high-level and mid-level languages into low-level executable machine code. complementary metal oxide semiconductor (CMOS) The extremely small storage space that holds user settings and dynamically discovered parameters for the BIOS. compliance The act of complying with regulations and policies. Component Object Model (COM) An interface standard that supports object-oriented programming and allows processes to communicate with objects that are created from application libraries. composition When referring to printer paper, it's what the paper is made of. Paper can be made of cotton fibers, wood pulp, or a combination of the two. computer vacuum A special vacuum that electronically dissipates electrostatic discharge (ESD) potential so that computer components are not damaged. computer-aided design/computer-aided manufacturing (CAD/CAM) workstation computer system used to design engineering documents, which are then used to drive A manufacturing equipment in the fabrication of the design. These workstations should have SSDs, high-end video, and maximum RAM. 25 connectivity device Any device that facilitates connections between network devices. Examples include hubs, routers, switches, and bridges. contention-based bandwidth. cooperative multitasking Competition between two or more network devices for the same A process scheduling in which each process depends on another to free resources for the next process. core An embedded CPU die in a processor package. More than one core is often found in a single package corona roller charge to the paper. corona wire A type of transfer corona assembly that uses a charged roller to apply A type of transfer corona assembly. Also, the wire in that assembly that is charged by the high-voltage supply. It is narrow in diameter and located in a special notch under the EP print cartridge. cp A Linux command that copies a file or folder from a source to a destination. credentials crimper A username and password used for access to a system or application. A tool that attaches the connector ends onto a network cable. Crimpers also typically act as cable cutters and cable strippers. crossover cable A twisted-pair network cable used to connect computers directly to each 26 other. One end has pins 1 and 3 and 2 and 6 reversed—hence, the term crossover. current directory D channel daisy-wheel printer The directory that commands will be run in from the shell. The signaling channel of an ISDN circuit; also referred to as the Delta channel. An impact printer that uses a plastic or metal print mechanism with a different character on the end of each spoke of the wheel. As the print mechanism rotates to the correct letter, a small hammer strikes the character against the ribbon, transferring the image onto the paper. database driver A driver specifically used to connect and operate with a database technology, such as Oracle or Microsoft SQL. daughterboard expansion cards. DB-9 A thin circuit board attached to the motherboard, used to attach A connector type used with older serial cables. DC adapter A power adapter that plus into a car's cigarette lighter or airplane power source and provides direct current. DC jack A power plug used to connect a DC adapter. Most commonly found in airplanes and automobiles, and may be labeled auxiliary power. dd DDR A Linux command that provides block-level copying of devices. Double data rate. A type of SDRAM that doubles the data rate of single data rate 27 SDRAM by transmitting 8 bytes on both the rising edge and the falling edge of each FSB clock cycle. DDR2 Double data rate version 2. A type of SDRAM that doubles the data rate of DDR SDRAM by transmitting 16 bytes on both the rising edge and the falling edge of each FSB clock cycle. DDR3 Double data rate version 3. A type of SDRAM that doubles the data rate of DDR2 SDRAM by transmitting 32 bytes on both the rising edge and the falling edge of each FSB clock cycle. DDR4 Double data rate version 4. A type of SDRAM that doubles the data rate of DDR3 SDRAM by transmitting 64 bytes on both the rising edge and the falling edge of each FSB clock cycle. Debian A Linux operating system upon which many different Linux distributions have been based, such as Ubuntu. dedicated server A server that is assigned to perform a specific application or service. default username/password initial management. defragmenting The default credentials on a network device that allows The process of consolidating data in order to create contiguous files on a mechanical disk drive. degaussing image quality. Removing an unwanted magnetic field. Used in CRT monitors to improve 28 demilitarized zone (DMZ) A semi-public network segment located between a perimeter router and an internal router on a network. Used for web servers, FTP servers, and email relay servers. demineralized water Water that has had minerals and impurities removed; it does not leave residue and is recommended for cleaning keyboards and other non-metal computer parts. denatured isopropyl alcohol Isopropyl alcohol that is mixed with methanol or another additive, so that is not humanly consumable and does not leave a film when it dries. denial-of-service (DOS) attack An attack for the purposes of disrupting the service(s) a company receives or provides via the Internet. Department of Defense (DOD) model A four-layer networking model loosely corresponding to the OSI model, upon which the basis for the TCP/IP protocol suite was developed. Desktop The element of the GUI that contains icons, the Start menu, and the taskbar. developing roller The roller inside a toner cartridge that presents a uniform line of toner to help apply the toner to the image written on the EP drum. developing step The fourth step in the EP imaging process, during which the image written on the EP drum by the laser is developed—that is, it has toner stuck to it. DHCP relay agent A server that is configured to forward DHCP broadcasts from clients 29 to the DHCP server, which resides on a different subnet. DHCP server A centralized server that assigns IP addresses, subnet masks, and options to hosts via the DHCP protocol. digital certificate An electronic certificate used to validate or authenticate credentials for users, computers, and applications. digital rights management (DRM) A digital form of copyright protection that protects digital forms of media and allows for the management of rights. digital subscriber line (DSL) A broadband Internet-access technology that uses the existing phone line from your home to the phone company to carry digital signals at higher speeds. digital subscriber line (DSL) modem A device that allows broadband Internet access using the existing phone line from your home to the phone company to carry digital signals at high speeds. digital versatile disc (DVD) A digital optical disc medium commonly capable of holding from 4.7 GB to 8.5 GB of data per side, corresponding to 2 to 4 hours of uncompressed DVD-quality video. digital versatile disc read-only-memory (DVD-ROM) An optical storage format used for video and data with a capacity of 4.7 GB (single layer) or 8.5 GB (double layer). Digital Visual Interface (DVI) A digital video interface standard that includes support for analog monitor interfaces in the DVI-A standard or one or two links of digital transmission 30 in the DVI-D standard. There is also a DVI-I (the I stands for integrated), which has the ability to support both standards. digitizer A device that takes input from a stylus pen, such as drawings or writing, and turns it into digital form on a computer. DirectX The graphics technology and programming language used by Microsoft operating systems. disaster recovery A plan or system that assists an organization in recovering services from an incident or failure. disk mirroring Another name for RAID-1; a hardware or software solution in which exact copies of data are written to two hard drives simultaneously as a form of data redundancy. Requires at least two hard drives. disk striping Another name for RAID-0; a hardware or software solution in which data is written across multiple drives, similar to a stripe. Improves data read and write performance. Requires at least two hard drives. DisplayPort A royalty-free digital display pushbutton-release interface from VESA that uses less power than other digital interfaces and VGA, and that can interconnect with HDMI and DVI with a simple adapter. distended capacitor A capacitor is an electronic device used to store electricity. A distended capacitor is a capacitor that has failed and has bulged from its normal size. Some also leak brownish-red electrolyte residue. 31 distributed denial-of service (DDoS) attack A distributed attack by thousands of hosts for the purpose of disrupting the service(s) a company receives or provides via the Internet. distributed processing A computer system in which processing is performed by several separate computers linked by a communications network. The term often refers to any computer system supported by a network, but more properly refers to a system in which each computer is chosen to handle a specific workload and the network supports the system as a whole. DNS poisoning of redirecting users. DNS server The act of sending malicious DNS results to a DNS server for the purpose A server that resolves hostnames to IP addresses; typically associated with Internet name resolution. Do Not Disturb (DND) mode A mode on mobile devices that turns all audio off; normally used when users are in meetings or asleep. Dock The component of the Apple macOS interface that allows for convenient access to frequently used apps, documents, and any running apps. It is similar to the Microsoft Windows taskbar. docking station Provides a full range of ports and often a full-sized keyboard and monitor for laptop computers. domain controller A server that provides centralized authentication for client computers in a domain authentication model. 32 Domain Name System (DNS) A TCP/IP name-resolution system that resolves hostnames to IP addresses. DNS uses port 53. domain Also referred to as a client-server networking model, a domain is a network in which security is managed by a centralized server, often known as a domain controller. dot-matrix printer An impact printer that has a print head containing a row of pins (short, sturdy stalks of hard wire) that are used to strike the ink ribbon to create an image. double-sided memory Dr. Watson A memory module that comprises two modules in one. A Windows XP utility that collected crash events on applications. draft quality The poorest quality standard of output from a dot-matrix printer, suitable only for early document review. drive interface connect. driver The connection on the motherboard or expansion card where hard drives A software file that allows an operating system to communicate with a hardware device; also called a device driver. driver signing A method of mitigating the risk of installing malware with third-party drivers by authenticating the author through certificate signing. dual in-line memory module (DIMM) A memory module packaging style that features a circuit board with independent pins on both sides of the module's card edge. 33 dual-booting A computer with two operating systems that can be booted to either operating system via a boot loader menu. dual exposing step The third step in the EP imaging process, during which the items being printed are exposed (written) to the EP drum. In this step, the laser is flashed on and off as it scans across the surface of the drum. The area on which the laser shines is discharged to almost ground (-100V). ext4 A filesystem that is commonly used with Linux distributions. Extensible Authentication Protocol (EAP) An authentication protocol used to extend the authentication methods for wired and wireless connections; often used with certificate services, smartcards, and pre-shared keys (PSKs). face lock factory reset A biometric-type lock that allows someone to use their face to unlock a device. A process in which a device is reset back to when it came from the factory; this process wipes all user settings. Family Educational Rights and Privacy Act (FERPA) A regulation imposed by the Department of Education that protects family and student educational records. FAT FAT32 A 16-bit filesystem that was originally used with MS-DOS. A 32-bit filesystem that was introduced with Windows 95 (OSR2). 34 F-connector The type of network cable connector that is found on the end of cable television coaxial cables. feature update feed roller feeder An update that adds functionality to an operating system. The rubber roller in a laser printer that feeds the paper into the printer. A device that feeds paper or other media into a printer. f iber-optic cabling Network cable that is made with a glass or fiberglass core and transmits light instead of electrical pulses. f iber-to-the-home (FTTH) f iber-to-the-node (FTTN) Fiber-optic broadband service delivered directly to a residence. Fiber-optic broadband service delivered to the telco box in front of the house, not directly to the home. f ield-replaceable unit (FRU) A component that is not serviceable in the field and is only replaceable, such as a power supply. f ile locking A feature of many network operating systems that "locks" a file to prevent more than one person from updating the file at the same time. f ile server network. f ilesystem A computer used primarily for the storage and management of files on a An organizational scheme that governs how files are stored and retrieved from a disk. Examples include FAT, NTFS, HFS, and ext4. 35 File Transfer Protocol (FTP) A protocol in the TCP/IP protocol suite that is optimized for f ile transfers. It uses ports 20 and 21. f ile-level backup backed up to media. Finder A backup method in which the files on a filesystem are individually The default file manager on Apple macOS that allows for file organization and access. f ingerprint lock f inish diagram implementation. f inisher A biometric-type lock that uses a fingerprint to unlock a device. A formal documentation of network systems, usually created at the end of A device on a printer that performs such final functions as folding, stapling, hole punching, sorting, or collating the documents being printed. f ire rating A rating that defines how long a container can be exposed to fire before its contents can no longer be protected from heat. f ireproof container at a safe temperature. f irewall A container that is impervious to fire, allowing its contents to remain A software program or hardware device used to limit network traffic based on a set of rules, usually called an access control list. 36 f irmware The name given to any software that is encoded in hardware, usually a readonly memory (ROM) chip; it can be run without extra instructions from the operating system. One example is a hardware-based network operating system installed on switches, routers, firewalls, and other hardware-type appliances. f irst responder scene. f itness monitor A person designated to respond to incidents and be the first person on the A mobile device worn on the wrist that tracks user movements such as steps taken and stairs climbed, and possibly tracks heart rate and sleep patterns. f ixed tangible assets An organization's assets that have a fixed monetary value, such as furniture, computers, and network equipment. f lash memory Computer memory that is easily altered using electricity to alter its contents instantly, but which will store the data in a persistent fashion when power is removed. f lat-blade screwdriver f loating-point A screwdriver that is used for slotted screws. A numeric value or math that has the precision of a decimal point. Force Quit form factor A method of closing an unresponsive application on Apple macOS. The size and shape of a component. For example, ATX and mini-ITX are two form factors for motherboards. format The action of preparing a disk for storage using a given filesystem. Also, a 37 Windows command-line tool for preparing a disk for storage. frame The Data Link layer product that includes a portion of the original user data, upper-layer headers, and the Data Link header and trailer. frame Freeware frequency Another name for the plastics (or external case) of a laptop computer. Software that is written and distributed for free usage. The audio range in which a technology sends and receives broadcasts. frontside bus (FSB) The high-speed bus controlled by the northbridge on which RAM, cache (in the absence of the backside bus), PCIe slots used for high-speed graphics, and other local-bus components are interconnected with the CPU and, in some cases, each other. full-duplex communication Communications that occur when both entities can transmit or receive at the same time without interference from each other. fully qualified domain name (FQDN) 1) A domain name that is registered with an Internet name provider and contains a resource record that can resolved to an IP address. 2) Technically, a website name that includes the dot at the end, such as ".". function (Fn) key Key marked with the letters Fn that produces particular functions when pressed and held while pressing one of the function keys. Examples include dual displays, wireless network settings, screen brightness, and volume. fuser A device on an EP printer that uses two rollers to heat the toner particles and melt them to the paper. The fuser is made up of a halogen heating lamp, a Teflon-coated 38 aluminum fusing roller, and a rubberized pressure roller. The lamp heats the aluminum roller. As the paper passes between the two rollers, the rubber roller presses the paper against the heated roller. This causes the toner to melt and become a permanent image on the paper. fusing step The sixth step in the EP printing process, during which the toner image on the paper is fused to the paper using heat and pressure. The heat melts the toner, and the pressure helps to fuse the image permanently to the paper. Gadgets Mini programs that can be placed on the Windows Desktop that allow for personalization and extend functionality. Examples include Weather, Clock, and New Headlines. game controller gaming PC A peripheral device designed specifically for playing games. A multimedia computer system exhibiting higher performance and responsiveness than standard machines, making it ideal for fast-paced games of skill. These computers should have SSDs, high-end video/specialized GPUs, high-definition sound cards, and high-end cooling. gesture-based interaction device movements. ghost cursor Using a mobile device through a series of finger gestures and On a laptop computer, when the cursor apparently jumps around the screen by itself. It's usually caused by the user's hand inadvertently touching the trackpad or touch stick. Global Positioning System (GPS) A satellite-based navigation system that provides 39 location and time services. globally unique identifier (GUID) all systems. Google/Inbox (Gmail) An identifying number that is globally unique across An Internet-based email service provider operated by Google. Gramm-Leach-Bliley Act (GLBA) A regulation imposed by the Federal Trade Commission (FTC) that protects consumer information. graphic design workstation A computer system used in desktop publishing to create specialized documentation with high-quality graphics and text. These workstations should have SSDs, high-end video, and maximized RAM. grep A Linux command that finds patterns of text in the output and contents of textbased files. group ID (GID) Group Policy The identification mechanism for groups in Linux operating systems. The Microsoft technology used with corporate domain structures for applying policies to users and computers. Guest account An account automatically created and disabled on Windows operating systems for the express use of guests. GUID Partition Table (GPT) A 64-bit partition table specification used with Unified Extensible Firmware Interface (UEFI) BIOS. half-duplex communication Communications that occur when only one entity can 40 transmit or receive at any one instant. hard disk drive (HDD) A disk drive that contains magnetically coated platters in a sealed case and is often used as the main secondary-storage medium. hard drive caching job is completed. When the print job is stored on the print server's hard drive after the hardware compatibility list (HCL) A list provided by the vendor of the operating system that details the hardware that is compatible with the operating system. hardware token A small device that displays a rotating number keyed to a specific user account. It is used for multifactor authentication in which a user must supply their username and password along with the number currently displayed on the hardware token. hash algorithm A one-way computation that produces a unique numerical result, often used with files or data. hazardous waste Any waste that is deemed hazardous to the environment or people; this waste is always regulated by a government entity. header Information attached to the beginning of a network data frame. Health Insurance Portability and Accountability Act (HIPAA) A regulation imposed by the Department of Health & Human Services (HHS) that protects patient information. helpdesk software associated solutions. Software that is used to document helpdesk requests and their 41 High-Definition Multimedia Interface (HDMI) An interface designed specifically to support digital video and which can also transmit digital audio. high-voltage probe A tool with a very large needle, a gauge that indicates volts, and a wire with an alligator clip, used to discharge electricity from electronic devices. hoax A malicious deceptive email or social media post that creates undo panic or concern. home directory storage. home folder HomeGroup The directory on Linux operating systems that is used for personal file The folder used to store user-specific files and personal files. A simple password protected file and printer sharing feature used by Windows 7, Windows 8, and Windows 10 (prior to version 1803). host Any computer or device on a TCP/IP network that has an IP address. host-based firewall hotfix A software-based firewall located on a computer. A patch that fixes a problem in the operating system. hotspot The use of a cellular connection to allow other non-cellular devices to get on the Internet; or, an expansion card with cellular capabilities that allows laptop computers and other mobile devices to access cellular networks. Sometimes called a mobile hotspot. hot-swappable A device that can be inserted and removed without removing power from 42 the host component. hub A basic connectivity device used to link several computers together into a physical star topology. A hub repeats any signal that comes in on one port and copies it to the other ports. hybrid cloud cloud. hybrid drive A cloud that combines the features of a public cloud with those of a private A secondary storage solution comprising a traditional magnetic hard drive and modern solid-state drive, whether as a single device or as two separate devices. hybrid hard disk drive (H-HDD) A hard disk drive (HDD) that includes a limited amount of flash memory integrated into a conventional spinning hard drive, increasing performance while not sacrificing overall size. hybrid topology mesh. A physical network topology that is a combination of a bus, star, and Hypertext Markup Language (HTML) A standardized markup language for the transfer and rendering of web pages with their associated elements. Hypertext Transfer Protocol (HTTP) A protocol in the TCP/IP protocol suite that is the backbone for Internet (web) traffic, used to request and receive web pages. It operates on port 80. Hypertext Transfer Protocol Secure (HTTPS) HTTPS uses TCP port 443. A secure version of the HTTP protocol. 43 hyperthreading A CPU feature that allows a single CPU core to be treated by an operating system that supports simultaneous multithreading (SMT) as if it were two CPUs. Hyper-V A Microsoft technology used for operating system virtualization inside of the Microsoft Windows operating system. hypervisor Software that allows for the creation of virtual machines on a computer. That is, it enables the computer to simultaneously run multiple operating systems or multiple instances of the same operating system. iCloud Apple's Internet-based cloud storage solution, commonly used to sync iPhones and other mobile devices as well as to provide Internet-based email. identification badge authorization of a person. ifconfig A physical badge used to provide positive identification and A Linux/UNIX and macOS command-line tool used to verify and configure a network interface card's IP address settings. image deployment A process in which a reference operating system installation is made and then duplicated to other physical computers. image drum to a page of paper. image-level backup media. The component inside an EP cartridge that is responsible for applying toner A backup in which an image of the operating system is backed up to 44 impact paper Paper that is used to produce multipart forms without the use of carbon paper. Used in impact printers (such as dot-matrix) but not in inkjet or laser printers. impact printer Any printer that forms an image on paper by forcing a character image against an inked ribbon. Dot-matrix, daisy-wheel, and line printers are all impact printers, whereas laser printers are not. incident A notable event or occurrence that is unusual or outside of the normal processes. incident documentation A document that is used to identify the root cause of a problem that resulted in an outage of services. incident response The approach used by a company or organization to address and manage situations involving security breaches or attacks, or other improper activity on computers or a network. indexing service search purposes. A Microsoft Windows service that allows the cataloging of files for Information Technology eXtended (ITX) smaller systems, such as a home theater PC. infrared (IR) A family of motherboard form factors used in A type of wireless transmission between devices that uses radiation in the infrared range of the electromagnetic spectrum. Infrastructure as a Service (IaaS) A type of cloud service that provides the client with extra network capacity, including processing power, storage, and networking services (such 45 as firewalls). inheritance The property of a permission that allows subfolders and files to inherit the parent folder's permissions. ink cartridge inkjet printer A reservoir of ink and a print head, in a removable package. A type of sprayed-ink printer. It uses an electrical signal that energizes a heating element, causing ink to vaporize and be pushed out of the pinhole and onto the paper. in-place upgrade An upgrade in which the current operating system is upgraded and all of the user's application and files are kept. input device device. input/output card A peripheral device designed to enter information into a computer or other An expansion card that allows for other input or output devices to connect to it. Examples include USB expansion cards and eSATA expansion cards. integer A numeric value or math that uses both positive and negative whole numbers. integrated development environment (IDE) A programming environment that typically contains a GUI-style editor and a compiled execution environment. Integrated Drive Electronics (IDE) A nickname for the original ATA standard, known as parallel ATA (PATA) since the advent of serial ATA (SATA). An internal 40-pin connector used for hard drives and optical drives. 46 integrated GPU integrated print server A graphics processing unit that is integrated into the CPU die. Software installed on a printer that allows the device to receive and manage print jobs without the need for a separate computer host. integrated scripting environment (ISE) A scripting environment that typically contains a GUI-style editor and an execution environment. Integrated Services Digital Network (ISDN) A worldwide digital communications network emerging from existing telephone services. interface The port or connection through which a device attaches to an external component, such as a printer's parallel or USB port for connection to a computer, as well as the software that enables the port to communicate with the external component, such as a Windows XP driver for an HP LaserJet. interface software The operating system-specific driver that enables communication between a computer and a peripheral. international mobile equipment identity (IMEI) mobile phone. international mobile subscriber identity (IMSI) A 15-digit serial number, unique to each A unique, 15-digit identifier that describes a specific mobile user and their network. It comprises three elements: the mobile country code (MCC), the mobile network code (MNC), and the mobile station identifier number (MSIN), a sequential serial number. 47 Internet appliance A network device specifically designed to ease Internet access. Internet Control Message Protocol (ICMP) A network protocol, part of the TCP/IP suite, used for checking basic network connectivity, managing network traffic, and transmitting error messages and network statistics. Internet Engineering Task Force (IETF) standards for the TCP/IP protocol suite. Internet Message Access Protocol (IMAP) A group of engineers who develop and promote A protocol used for downloading email. The most current version is IMAPv4 (IMAP4). IMAP uses port 143 Internet Protocol (IP) The underlying communications protocol on which the Internet is based. IP provides addressing on a TCP/IP network and allows a data packet to travel across many networks before reaching its final destination. Internet service provider (ISP) intrusion detection system (IDS) A company that provides Internet access. A network device that monitors network traffic and looks for suspicious activity that might be the sign of a network-based attack. An IDS is a passive device that logs the activity and can send

Show more Read less
Institution
CompTIA
Course
CompTIA











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CompTIA
Course
CompTIA

Document information

Uploaded on
September 2, 2025
Number of pages
78
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Compiled CompTIA A+ Exam 220-1001
and 220-1002 Revised and Solved
Correctly *Q&A* 2025/2026 |VERIFIED|
What type of memory implementation requires two paired standard memory modules to read from or
write to simultaneously?

Channel memory



What feature of DVDs and BDs allows for two media layers on one or both sides of the disc?

Dual-layer



What is the purpose of dual-rail power in modern power supplies?

It provides multiple 12V rails to supply more power overall to components that require 12VDC,
but with the possibility of undersupplying each individual rail.



What does dual-voltage option in a power supply allow?

It allows the selection of different AC input voltages, for example, the lower voltages common in
North America or the higher voltages common in Europe.



What term describes the act of digging through the trash to collect sensitive information?

Dumpster diving



What is the function of a duplexing assembly in a printer?

It is responsible for turning the paper over so that it can be printed on both sides.



What does a DVD-ROM represent?

It is a non-writeable and inerasable DVD permanently pressed with digital data.



What is the purpose of a DVI to HDMI adapter?

1

, It allows a DVI monitor to be connected to an HDMI output port on a graphics adapter.



How does a DVI to VGA adapter function?

It interconnects a DVI-A interface with a VGA interface to allow interconnection between different
graphics adapters and monitors.



What is a Dynamic disk used for in the Windows operating system?

It is used for creating RAID groups between volumes in the Microsoft proprietary partitioning
scheme.



Which protocol automatically configures network clients with IP information when they join the
network?

Dynamic Host Configuration Protocol (DHCP)



What is dynamic network address translation (DNAT)?

It allows for a resource on a private computer to be available for consumption on a public
network.



What does it mean for variables to be dynamically typed?

It means the type of the variable is automatically set as a value.



What does electromagnetic interference (EMI) refer to?

It refers to electromagnetic radiation released by an electronic device that disrupts the operation
of other devices.



What role does an electronic stepper motor play in a printer?

It accurately moves in small increments, powering paper transport and fuser rollers.



What is electrostatic discharge (ESD)?




2

, It occurs when two objects of dissimilar electrical charge come into contact, potentially damaging
electronic components.



What is an embedded system?

It is a computer system upon which other systems depend to complete processes.



What is an emulator in the context of virtualization?

It is another term for a hypervisor, a program that allows the creation of virtual machines.



What is the Encrypting File System (EFS) in NTFS?

It is a technology that allows for the encryption and decryption of individual files and folders.



What does encryption do?

It scrambles a signal or message to make it unreadable by normal means, or encodes a file with a
key that only select individuals can access.



What is an end-user license agreement (EULA)?

It is a contract between a software company and an end user that specifies the legal use of an
application.



What does end-of-life refer to in hardware or software products?

It is the point at which a product is no longer supported.



What does an endpoint management server do?

It manages the configuration of workstations and servers on a network and deploys security
policies, operating systems, software, patches, and more.



What is the method of end-user acceptance in software changes?

It is the process by which changes to a program or process are tested by users.



3

, What is an enterprise license?

It is a software license issued for use across an entire enterprise, regardless of license count.



What is an entry control roster used for?

It is a list of people authorized in an area, typically controlled by a security guard.



What is an envelope feeder in a printer?

It is a device for feeding envelopes into a printer.



What are environment variables?

They are placeholders for strings of data used by the operating system.



What does the Environmental Protection Agency (EPA) oversee?

It oversees environmental protection regulations in the United States.



What is an EP cartridge in a laser printer?

It is a component that forms images on paper.



What is the EP imaging process in a laser printer?

It is the process by which a laser printer forms images on paper.



What type of device is an e-reader?

It is a mobile device designed for reading books, newspapers, and magazines, typically using
electrophoretic ink (E Ink).



What is an error-correcting code (ECC)?

It is an error-checking scheme that can detect and correct single-bit errors in data.




4
$9.79
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
AcademicPlug

Get to know the seller

Seller avatar
AcademicPlug Yale School Of Medicine
View profile
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
7 months
Number of followers
0
Documents
327
Last sold
2 months ago
⚡ACADEMIC PLUG- Your Ultimate Exam Resource Center⚡

Welcome to Academic Plug, your one-stop shop for all things academic success! We specialize in providing high-quality, curated exam resources to help students, professionals, and lifelong learners excel in their studies and certification goals. Whether you're preparing for high school finals, university exams, or global certifications like IELTS, CPA, or SATs — Academic Plug connects you with the documents that matter most: ✅ Past papers ✅ Model answers ✅ Marking schemes ✅ Study guides ✅ Revision notes ✅ Certification prep kits We believe in smarter study, not harder. That’s why Academic Plug is more than a store — it’s your academic ally. With verified documents, organized by subject and exam board, you’ll save time and stay ahead. Plug in. Power up. Pass with confidence.

Read more Read less
0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions