Premium Essay

It220

In: Computers and Technology

Submitted By colts193e
Words 447
Pages 2
Exam Details
In order to become CompTIA A+ certified, you must pass two exams: the Essentials Exam (number 220-701) and the Practical Application exam (number 220-702).

← Number of questions: 100 for each exam

← The exams each consist of 100 questions and are known as "linear exams". This means that you can go backward or forward within the exam, mark items, and change answers if necessary. It differs from an "adaptive exam" in that it has more questions, and the exam does not adapt to previous answers that the examinee has given.

← Type of questions: Primarily multiple-choice

← The exams consist primarily of multiple-choice questions, but you might see an occasional matching question. CompTIA reserves the right to change the bank of questions, while still adhering to the objectives. The tests are administered on a computer within a very easy-to-use program. The majority of the time, you will simply click the letter of the corresponding correct answer. The exams can be taken in many languages including English, Spanish, German, and Japanese. The new exams (220-801 and 220-802) due out in October 2012 will include Performance Based Questions where the test taker will be asked to do a task in a simulated environment, but the 701/702 exams won’t have those types of questions added to their bank of questions. Also note that the 701/702 series of exams will be retired as of August 31, 2013, but between now and then you can choose to take either series of exams.

← Passing scores: 675 for 220-701, and 700 for 220-702

← The passing scores are 675 (Essentials) and 700 (Practical Application) and are graded on a scale of 100-900. This equates roughly to 72% and 75% respectively, though it is difficult to compute exactly. Many candidates will prepare with practice exams and attempt to score 85% or higher in order to be ready for the…...

Similar Documents

Premium Essay

It220 Chapter 7and8

...1. What is a routing table? Routing tables consist of being used to route data to a specific path and also keeps track of the routes for where the data can travel to. 2. What is the most common static route used in a host computer? The most common static route used in a host computer is the default gateway. 3. What command is used to view a PC computers routing table? The command to used to view a pc computer routing table is netstat –r. 4. What is meant by a 0.0.0.0 network address entry with a subnet mask of 0.0.0.0 in a PC’s routing table? It’s the default routing table path for data. 5. What is the 127.0.0.1 IP address and what is it used for? It is known as a loopback to the host computer. This mean the data is routed directly back to the source which is known as the network interface card. 7. What is the difference between a routers running configuration and startup configuration? The difference between running configuration and startup is that in config doesn’t show what is currently saved in the routers nonvolatile memory whereas startup shows the saved configuration in the nonvolatile memory. 8. What is the router command used to view the routes entered into the router’s routing table? The command to use in order to see the routes entered into the routers routing table is show ip route. 9. What is the router command used to configure a static route for a router? The command you would use is ip route in order to configure the router. 14.......

Words: 2495 - Pages: 10

Premium Essay

Hw 1 It220

...Erick Dinzey ITT-220 Mr. Falaise HW 1 Pgs. 43-47 All Questions Questions and Problems: Section 1-1: 1. State whether the following network descriptions are describing a MAN, WAN, or LAN: a. LAN b. MAN c. WAN 2. Expand the acronym NIC. Network Interface Card 3. Expand the acronym MAC. Media Access Control 4. Expand the acronym LAN. Local Area Network 5. Expand the acronym WAN. Wide Area Network Section 1-2: 6. Define the term protocol. Set of rules established for users to exchange information. 7. Define the term topology. Architecture of a network. 8. Define the term deterministic. Access to the network is provided at fixed time intervals 9. A disadvantage of the token-ring system is that if an error changes the token pattern, it can cause the token to stop circulating. This can be eliminated by adding a Token-ring hub (A hub that manages the passing of the token in a Token-Ring network.) 10. State the network topology being used in the following figures (Bus, Star, Ring, or Mesh). a. Mesh b. Bus c. Ring d. Star 11. What is the difference between a hub and a switch? Hub – Broadcasts data it receives to all devices connected to its ports. Switch – Establishes a direct connection from the sender to the destination without passing the data traffic to other networking devices. Section 1-3: 12. Define the acronym CSMA/CD and the protocol that uses CSMA/CD. ...

Words: 1934 - Pages: 8

Free Essay

It220- Assignment 9

...Assignment 9.1: Chapter 12 1. List five advantages of an optical communications link. • Enormous Bandwidths • Low transmission loss • Immunity to cross talk • Electrical Isolation • Small size and weight 2. Define refractive index • Ratio of the speed of light in free space to its speed in a given material. 3. What are the commonly used wavelengths in fiber optic systems? • Dense Wavelength division Multiplexing. 4. What are the typical core/cladding sizes (in microns) for multimode fiber? • The two types of fiber are multimode and single mode. Within these categories, fibers are identified by their core and cladding diameters expressed in microns (one millionth of a meter), e.g. 50/125 micron multimode fiber. • Most fibers are 125 microns in outside diameter - a micron is one one-millionth of a meter and 125 microns is 0.005 inches- a bit larger than the typical human hair. 5. Define mode field diameter. • The Diameter base protocol is intended to provide an Authentication, Authorization and Accounting (AAA) framework for applications such as network access or IP mobility. 6. What are the four factors that contribute to attenuation? • Scattering • Absorption • Macrobending • Microbending 7. What are the three types of dispersion? • Modal dispersion • Chromatic dispersion • Polarization mode dispersion 8. What is a dispersion compensating fiber? • A fiber that acts like an equalizer, negative dispersion canceling positive dispersion. 9. What is......

Words: 877 - Pages: 4

Free Essay

It220 Unit 2-1

...1. What are the layers of the TCP/IP model? Application Layer Transport Layer Network Layer Network Access Layer 2. Which layer of the TCP/IP model processes requests from hosts to make sure a connection is made to the appropriate port? Application Layer 3. What are well – known ports? Ports reserved by ICANN 4. Identify the port numbers for the following applications. a. Telnet: 23 b. HTTP: 80 c. FTP: 20, 21 d. DNS: 25 e. DHCP: 67, 68 5. Define the purpose of a connection oriented protocol. Establishes a network connection, manages the delivery of data, and terminates the connection. (TCP) 6. What three packets are exchanged between two hosts when establishing a TCP connection? SYN SYN ACK ACK 7. What is the purpose of a sequence number (SEQ=) in TCP data packets? To initiate the TCP handshake 8. Explain how a host knows whether a data packet was not received. Host responds with ACK packet 9. Describe how TCP connection is terminated? Host A sends Host B a FIN packet indicating the connection has been terminated. 10. What is a connectionless protocol? UDP(User Datagram Protocol) 11. What is the purpose of the Internet layer in the TCP/IP protocol suite? Used for addressing and routing the data packets. 12. What is the purpose of an ARP request? Asking which network has an IP address 13. What is the purpose of an ARP reply? The protocol that contains the hardware address for a destination host 14. What important......

Words: 524 - Pages: 3

Premium Essay

It220 Assignment 2.1

...Assignment 2.1 Chapter 5 1-37 odd | | | | * What are the four layers of the TCP/IP model? Application layer, Transport layer, Internet layer, and Network Interface layer. * What are well-known ports? Ports reserved by ICANN (1 – 1023) * Define the purpose of a connection oriented protocol. It establishes a connection, manages the delivery of data, and terminates the connection. * What is the purpose of a sequence number (SEQ=) in TCP data packets? The sequence number is used to keep track of the data packets being transferred from host A to host B. * Describe how a TCP connection is terminated. The Host B sends a FIN (finish) packet to host A. Host A then sends an ACK packet acknowledging the reception of the FIN packet. Host A sends a FIN packet, then Host B responds with an ACK packet. * What is the purpose of the Internet layer in the TCP/IP protocol suite? Defines the protocol used for addressing and routing data packets. * What is the purpose of an ARP reply? The protocol that contains the hardware address for the destination host. * When is IGMP used? It’s used to control the flow of data in the network, for reporting errors, and for preforming diagnostics. * Convert the following 8-bit binary number to decimal: 10010011. 147. * Convert the following 8-bit number to decimal: 1111100. 252. * Convert the number 192 to its binary equivalent. 11000000. * Convert the number 96 to its binary equivalent.......

Words: 343 - Pages: 2

Premium Essay

It220 Lab 5.2

...Lab 5.2 5.2.1 A MAC address is unique to every NIC because it is a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are used as a network address for most IEEE 802 network technologies. The effect of two different manufactures with the same LAST 24 bits of their MAC address would be nothing. The reason for this is because the first 24 bit would be specific for each individual manufacture and even if the last bits are the same the MAC address will still be different because the first 24 bits are going to be different. 5.2.2 This tab breaks down all the different Network Connection Details. The information that is given in this window is connection specific, description, physical address, DHCP enabled, IPv4 Address, IPv4 Sub Lease obtain, Lease Expires, IPv4 default gateway, DHCP server, DNS server, IPv4 WINS, IPv6 Default gateway, IPv6 DNS server. 5.2.3 The MAC Address for this NIC card is B8-AC-6F-21-E9-EF 5.2.4 B8-AC-6F Dell Inc, Dell Inc One Dell Way, MS RR5-45 Round Rock TX 78748 United States. 5.2.5 IPv4 Address - 10.18.108.103 IPv4 Default Gateway - 10.18.110.1 IPv4 Sub Mask - 255.255.252 5.2.6 The ARP Request and an ARP Replay, these messages allow a simple enchant, with the Request as a question and the Replay as the answer. "Hey if your IP address is X, tell me your MAC address' "I am IP address X, and this is my MAC address" 5.2.7 Interface: 10.18.108.103 ......

Words: 407 - Pages: 2

Premium Essay

It220

...ITT Networking Standards & Protocols Midterm | Term First     Both Sides How many bits are in a gigabyte?1 billion | Click to flip | | 50 terms Terms | Definitions | How many bits are in a gigabyte? | 1 billion | How many bits are in a megabyte? | 1 million | Convert 00101010 to decimal. | 42 | What is the difference between a sector and a track? | A sector is part of a track | How many bits are in one hexadecimal digit? | 4 | How are voice communications converted to digital signals? | Audio is sampled at a high rate which is converted to binary numbers | What does it mean to compress a video file? | To decrease file size | In this url, http://www.example.com/page2, which part is the web page, which part is the server name and which part is the protocol? | web page: page2 server: www.example.com protocol: http | What makes up the internet core? | Many separate small and large networks | What manages computer peripherals devices? | Device Drivers | What physical network topology has the inherent weakness of a single point failure? | Star Network | What is a networking standard? | Details of what a networking technology does, and how it does it | What is a de facto standard and what stanards-setting body creates them? | An informal standard, no company governs them | What are some reasons TCP/IP model is divided into layers? | Troubleshooting, Creation of network standards and protocols | Why is the TCP/IP model considered an "open"...

Words: 772 - Pages: 4

Free Essay

It220

...Network Solutions, Inc. 1134 Owings Mills Road Owings Mills, Md. 21117 410-555-4466 – Phone 410-555-4467 – Fax Network Solutions, Inc. 897 Getty Road Gettysburg, PA 17325 717-555-3344 - Phone 717-555-3345 – Fax Retail/Wholesale Sales P.O. Box 555 Atlanta, Georgia 27462-555 Dear Prospective Client, Network Solutions, Inc. was founded in 2000 with their first location starting in Owings Mills Maryland. Our company serves many businesses including, schools, nonprofit agencies, municipalities, counties and other businesses in almost every sector. As the demand for technology increased Network Solutions, Inc. decided to expand their services into Pennsylvania. In 2006 Network Solutions, Inc. opened another location in Gettysburg Pennsylvania. Now serving two states with over 75 employees Network Solutions, Inc. is becoming one of the biggest IT Companies around. Network Solutions, Inc. is committed to providing complete technology solutions to help organizations define and maintain an information management system that will allow them to operate more efficiently. The staff at Network Solutions, Inc. is specifically trained to evaluate technology challenges and develop efficient and effective solutions that also support a client's new or existing process. The staff at Network solutions, Inc. will build upon their experience and expertise by developing relationships and partnerships with organizations to accomplish this goal. Network Solutions, Inc. offers a wide variety......

Words: 311 - Pages: 2

Free Essay

It220

...Unit 3 Lab 3.1 3.1.1 Unless everyone had the same of everything there wouldn’t be a way to connect all of them together. It would be difficult to send information to others or to stay in contact with family and friends. There wouldn’t be pictures you could share, it would change everything drastically. 3.1.2 Microscope. It allows us to study a variety of things that we cannot see with our naked eyes. Without the microscope we wouldn’t be knowledgeable about diseases or anything else you can’t see with your eyes. 3.1.3 The Transport and Network layer would be necessary for communication to be mapped. 3.1.4 If a model was to general it would be to basic to understand more advanced communications and it wouldn’t have good detail. However if it was too focused on individual detail it would be running more actions than necessary and would run slower. Lab 3.3 3.3.1 The OSI is the perfect model and adds an extra 2 layers the TCP/IP doesn’t do by itself. 3.3.2 Layers in TCP/IP * Application * Transport * Network * Data Link * Physical 3.3.3 * IP-Internet Protocol (Routes data packets form any host to any other host. Any device to another device) * TCP-Transmission Control Protocol (It segments large data into smaller chunks and it guarantees delivery of data using error recovery) * UDP-User Datagram Protocol (Connectionless, faster but less secure than TCP/IP and does not guarantee delivery) Lab 3.4 3.4.1 It works because it’s a......

Words: 280 - Pages: 2

Premium Essay

It220

...How many bits are in a gigabyte? 1 billion How many bits are in a megabyte? 1 million Convert 00101010 to decimal. 42 What is the difference between a sector and a track? A sector is part of a track How many bits are in one hexadecimal digit? 4 How are voice communications converted to digital signals? Audio is sampled at a high rate which is converted to binary numbers What does it mean to compress a video file? To decrease file size In this url, http://www.example.com/page2, which part is the web page, which part is the server name and which part is the protocol? web page: page2 server: www.example.com protocol: http What makes up the internet core? Many separate small and large networks What manages computer peripherals devices? Device Drivers What physical network topology has the inherent weakness of a single point failure? Star Network What is a networking standard? Details of what a networking technology does, and how it does it What is a de facto standard and what stanards-setting body creates them? An informal standard, no company governs them What are some reasons TCP/IP model is divided into layers? Troubleshooting, Creation of network standards and protocols Why is the TCP/IP model considered an "open" networking model? It's not owned by any specific organization what do routers in a network do? Mave data between LANs by linking them to WANs What is encapsulation? A way to cross data over a any network link In a...

Words: 745 - Pages: 3

Premium Essay

Lab 5 It220

...LAB 5 IT220 Exercise 5.1.1 * The 802.1 standard defines the 802 family of standards, describes the local area network, and defines the LAN address format. Exercise 5.1.2 * The 802.3af standard originally defined PoE functionality. The standard was enhanced in the year 2009, the name of it is 802.3at. Exercise 5.1.3 * 500 meters * 185 meters * 100 meters * Fiber Optic * UTP, 100 Meters * UTP, 100 Meters * Multi-Mode-Fiber Optic, 550 Meters * Single Mode- Fiber Optic * UTP 4 Pairs, 100 Meters Exercise 5.1.4 * The numeric prefix before BASE means the speed in Mbps. The inclusion of a postfix of -T means that the cable is a twisted pair standard. Lab 5.1 Review 1. The maximum speed of traffic would be between 10Mbps, and 100Mbps because they would have to negotiate the amount of bandwidth to send the node in between the two different network standards. 2. It is possible by also using a negotiation to uphold the maximum speed of the lesser UTP wire for example if Cat3 and Cat5e had to negotiate the Cat5e would have to meet Cat3’s standard maximum speed. Exercise 5.2.1 * A MAC address must be unique for every NIC card produced because they are being compared to all other unicast MAC addresses in the same LAN. The effect would be that the MAC address would be duplicated. Exercise 5.2.2 * It gives information on the connection its physical address and DHCP status. Exercise 5.2.3 * The......

Words: 845 - Pages: 4

Premium Essay

It220 Chapter 11 Pg 443-444 # 1-39 Odd

...Harry lary IT220 Chapter 11 pg 443-444 # 1-39 odd 1. List two advantages of wireless networking. 3. What is an ad hoc network? 5. What are the four physical layer technologies being used in 802.11 wireless networking? 7. Define a pseudorandom sequence as it applies to FHSS. 9. What is the frequency range used by 802.11a, and what modulation technique is used? 11. Define MIMO as it applies to 802.11n. 13. What is the purpose of an access point? 15. What is an association, and what is its purpose? 17. Draw a picture of a point-to-point wireless connection 19. In what frequency band does Bluetooth operate? 21. What is a piconet? 23. What is the purpose of the paging procedure in Bluetooth? 25. What are the three parameters that define an RFID system? Means of powering the tag, Frequency of operation, Communications protocol (also called the air interface protocol) 27. Cite three advantages for using an active RFID tags? 29. What is the WiMax frequency standard for the United States? 3.5 GHz 31. How does WiMax differ from Wi-Fi? Wimax using as a wireless 'MAN' for broad band Internet connection, between 30 and 40 miles Wi-fi using as a wireless 'LAN' to connect access point or PC in network, between 25 and 40 meeter 33. What is the purpose of wireless beacons? Beacon's flexible technology platform is ideally suited for custom applications 35. What is the purpose of......

Words: 324 - Pages: 2

Free Essay

Itt It220 Lab 5

...40.) 802.11b: NETGEAR ANT24O5 5dBi Omni-Directional 802.11 22.99 http://www.compuplus.com/ D-Link ANT24-0600 - Antenna - 802.11 b/g - indoor - 6 dBi – directional 14.99 http://www.amazon.com/D-Link-ANT24-0600-Antenna-802-11-directional/dp/B00064AW62 802.11a: TRENDNET TEW-AI75OB DUAL-BAND 802.11A/G 7/5DBI ANTENNA (TEWAI75OB) 23.65 http://www.beachaudio.com/Trendware/Tew-Ai75ob-p-89924.html?utm_source=froogle&utm_medium=cpc&utm_campaign=tew-ai75ob&utm_content=atr Outdoor Pannel Antenna 23DBI 802.11A Directional 152.00 http://www.amazon.com/Outdoor-Pannel-Antenna-802-11A-Directional/dp/B0016HM8VA 802.11g: PROSAFE™ 9 DBI OMNI-DIRECTIONAL ANTENNA ANT2409 129.99 http://www.netgear.com/products/business/access-points-wireless-controllers/antennas-cables/ANT2409.aspx Sewell Part #: SW-6130 Mfg Part #: TEW-OA24D 164.95 http://sewelldirect.com/trendnet-802-11g-wireless-WLAN-24dBi-outdoor-antenna.asp?source=froogle&utm_source=Froogle&utm_medium=cse&cvsfa=1306&cvsfe=2&cvsfhu=53572d36313330 802.11n: CP TECH OAN-2151 Omni-directional Antenna $64.24 http://www.buy.com/prod/cp-tech-oan-2151-omni-directional-antenna-15-dbi-n-type/q/loc/101/210878384.html Netgear ProSafe ANT224D10 2X2 Indoor/Outdoor 10 dBi Directional Antenna, RoHS Compliant, P/N: ANT224D10-10000S. $230 http://www.axiontech.com/prdt.php?item=90457 41.) I would look around and see what other wireless devices, cordless phones, Bluetooth devices and the such......

Words: 353 - Pages: 2

Premium Essay

Seeking Help

...IT255 Introduction to Information Systems Security [Onsite] Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information......

Words: 4296 - Pages: 18

Premium Essay

Course Descriptions

...TB143 Introduction to Personal Computers or equivalent IT109 Microsoft Desktop Operating System | 4 credit hours This course introduces general knowledge and skills required in installation, configuration and management of popular Microsoft operating system(s) for standalone and network client computers. Prerequisite: TB143 Introduction to Personal Computers or equivalent IT203 Database Development | 4 credit hours This course introduces relational database concepts and the role of databases in both Windows and Web applications. The course introduces basic data modeling and normalization concepts. Extensible Markup Language (XML) is also introduced.Prerequisite: TB133 Strategies for the Technical Professional or equivalent IT220 Network Standards and Protocols | 4 credit hours This course serves as a foundation for students pursuing knowledge and skills in computer networking technologies. Major concepts such as OSI and TCP/IP models, network media specifications and functions, LAN/WAN protocols, topologies and capabilities will be discussed. Industry standards and a brief historical development of major networking technologies will be surveyed in conjunction with basic awareness of software and hardware components used in typical networking and internetworking environments.Prerequisite: TB143 Introduction to Personal Computers or TB145 Introduction to Computing IT221 Microsoft Network Operating System I | 4 credit hours The current Microsoft networking......

Words: 1186 - Pages: 5