Chapter 3: Computer Software and System Utilities (Set-7)
When an update is released mainly to correct a critical security weakness, it is best called
A Theme update
B Security patch
C Font pack
D Media plugin
Explanation: A security patch fixes vulnerabilities that attackers may exploit. Installing it reduces the risk of hacking, malware infection, and data theft, especially for operating systems, browsers, and widely used applications.
A “version number” is mainly used to
A Identify release
B Measure CPU
C Count folders
D Check battery
Explanation: A version number tells which specific release of software you are using. It helps track bug fixes, features, and compatibility, and is useful when downloading updates or reporting issues.
A hotfix is usually released to
A Add wallpapers
B Reduce RAM
C Change keyboard
D Fix urgent bug
Explanation: A hotfix is a small, quick update aimed at solving a specific problem urgently. It may be provided before a larger update and later included in cumulative updates or service packs.
A service pack is generally a
A Single file format
B Hardware upgrade
C Bundle of fixes
D Email filter
Explanation: A service pack combines multiple updates, patches, and fixes into one package. It helps users install many improvements at once, improving stability and security for a software product.
Automatic updates are recommended because they
A Delete user files
B Remove RAM
C Block the internet
D Reduce missed patches
Explanation: Automatic updates help ensure important security and bug fixes are installed on time. This lowers the chance of missing critical patches that protect against newly discovered vulnerabilities.
Manual updates are useful when you need to
A Control installation time
B Increase display size
C Repair keyboard
D Change CPU cores
Explanation: Manual updates allow users or admins to choose when to download and install updates. This is useful in offices and labs where updates must be tested or installed outside working hours.
Freeware usually means software that is
A Always open code
B Always trial
C Always paid
D Free to use
Explanation: Freeware is software offered at no cost for use. It can still be proprietary, and its license may restrict redistribution or modification, so the user must follow terms.
Shareware is typically offered as
A Hardware bundled
B Trial version
C BIOS upgrade
D Kernel module
Explanation: Shareware is usually distributed for evaluation with time or feature limits. Users can test it and then pay for a license to continue full use legally.
Open source software allows users to
A Modify source code
B Hide the source
C Avoid all licenses
D Block all updates
Explanation: Open source licenses provide access to source code and allow modification and sharing under conditions. This supports transparency and community development while still requiring license compliance.
Proprietary software is generally
A Public domain
B License-free
C Community owned
D Closed source
Explanation: Proprietary software is owned by a vendor and distributed under restrictions. Users can run it as permitted, but source code access and modification are usually not allowed.
EULA mainly tells the user
A CPU temperature
B Screen resolution
C Allowed usage rules
D Disk speed
Explanation: An End User License Agreement explains how software can be used, restrictions, warranty conditions, and responsibilities. Users usually accept it before installing or using the software legally.
Activation is mainly required to
A Verify license
B Delete files
C Compress folders
D Increase RAM
Explanation: Activation confirms that a copy of software is properly licensed. It unlocks full use and may allow updates and support, while helping reduce unauthorized copying and piracy.
Software piracy refers to
A System updating
B Illegal copying/use
C Disk cleaning
D Data backup
Explanation: Software piracy means using or distributing software without permission or a valid license. It is illegal and risky because pirated installers may contain malware and often block updates.
When a program stops responding but stays open, the problem is called
A Patch
B Boot
C Sync
D Hang
Explanation: A hang means the application becomes unresponsive due to heavy load, low memory, conflicts, or corruption. Waiting may help, but if it continues, ending the task is common.
A sudden unexpected closure of a program is called a
A Crash
B Install
C Backup
D Update
Explanation: A crash happens when software closes unexpectedly due to errors such as corrupted files, incompatible drivers, memory problems, or bugs. Logs and updates help find and fix the cause.
An error message is valuable because it
A Changes wallpaper
B Defrags disk
C Boosts CPU
D Provides a clue
Explanation: Error messages often show what failed, like missing files or access denied. Reading the exact message helps choose the correct fix instead of guessing, saving time and preventing wrong changes.
“Missing DLL” errors usually mean
A Broken monitor
B Missing library file
C Low battery
D Wrong mouse
Explanation: DLL files contain shared code used by programs. If a required DLL is missing or damaged, the program cannot start. Repairing or reinstalling the software often restores it.
Compatibility mode is used mainly to run
A Older programs
B Only antivirus
C Only drivers
D Only games
Explanation: Compatibility mode applies older settings on newer operating systems. It helps older software run properly when it fails due to changes in permissions, graphics handling, or OS behavior.
Safe mode is best described as Windows starting with
A Maximum graphics
B Full startup apps
C Minimal drivers
D Extra plugins
Explanation: Safe mode loads only essential drivers and services, reducing conflicts. It helps troubleshoot driver problems, startup issues, or malware because fewer components load during boot.
A common first step for repeated app crashes is to
A Delete system files
B Disable keyboard
C Remove display
D Update the app
Explanation: Updates often fix known bugs and compatibility issues. Installing the latest version of the application and related drivers reduces crashes and improves stability while also applying security fixes.
Reinstalling software is most helpful when
A Files are corrupted
B Mouse is new
C Screen is clean
D Battery is full
Explanation: Reinstalling replaces damaged program files and resets many settings. It is a common fix for missing components, broken installations, repeated errors, and crashes caused by corrupted files.
Rolling back an update is done when the update
A Adds security
B Improves speed
C Fixes bugs
D Causes problems
Explanation: If a new update causes crashes or incompatibility, rollback returns to the previous version. This restores stability until a corrected update is released by the vendor.
Clearing cache is useful when software
A Needs new RAM
B Needs new CPU
C Shows wrong content
D Needs new mouse
Explanation: Cache stores temporary data for faster loading. If it becomes outdated or corrupted, apps may show incorrect data or behave oddly. Clearing cache forces the app to rebuild fresh data.
A restore point mainly saves
A System settings snapshot
B Only music files
C Only videos
D Only photos
Explanation: Restore points store system files, drivers, and settings at a time. They help undo problematic changes after updates or installs, while usually keeping personal documents intact.
Log files are useful because they
A Increase RAM
B Remove viruses
C Defrag SSD
D Record events
Explanation: Log files store records of errors and actions. They help identify what happened before a crash or failure, making troubleshooting accurate instead of guesswork.
A common image file format is
A EXE
B DLL
C JPG
D BAT
Explanation: JPG is a common image format used for photos. It compresses images to reduce size, making it suitable for storage and sharing, though some quality loss can occur.
A common document file format is
A MP3
B PDF
C ZIP
D ISO
Explanation: PDF is widely used for documents because it preserves layout across devices. It is commonly used for forms, notes, and printable files, and can be opened with many readers.
ZIP files are mainly used for
A Audio playback
B Video streaming
C Keyboard mapping
D Compressed archives
Explanation: ZIP compresses files and bundles them into a single archive. This reduces storage size and makes sharing multiple files easier, commonly used for downloads, backups, and email attachments.
A virtual machine is best described as
A Software-based computer
B Physical keyboard
C Monitor driver
D Disk cleaner
Explanation: A virtual machine runs an operating system inside another system using virtualization software. It is used for testing, running different OS versions, and isolating risky software safely.
Cloud software is typically accessed through
A Printer cable
B Internet connection
C USB only
D BIOS menu
Explanation: Cloud software runs on remote servers and users access it online via a browser or app. It reduces local installation needs and allows updates to be handled by the provider.
Browser extensions are mainly used to
A Replace OS
B Format disk
C Repair RAM
D Add features
Explanation: Extensions add functions like ad blocking, password management, and translation. Only trusted extensions should be installed because unsafe ones can access browsing data and affect privacy.
Plug-ins are commonly used to
A Extend software features
B Replace CPU
C Increase screen size
D Format USB
Explanation: Plug-ins add extra tools to existing software, such as filters in editors or features in browsers. They allow customization without changing the core software permanently.
Default programs decide
A CPU type
B RAM size
C File opening app
D Monitor color
Explanation: Default program settings choose which application opens a particular file type, like PDFs or images. This improves speed and convenience by automatically using the preferred app.
Task scheduling is mainly used to
A Change wallpaper
B Run tasks automatically
C Increase RAM
D Repair keyboard
Explanation: Task schedulers run programs or scripts at set times or events, like backups or cleanups. This automates routine maintenance and reduces the need for manual work.
User permissions mainly control
A Screen brightness
B Internet speed
C File compression
D Access rights
Explanation: Permissions define what a user can do, such as installing apps or changing settings. Proper permissions improve security by limiting system changes to authorized users.
A common reason for installation failure is
A Insufficient disk space
B High volume
C New wallpaper
D Clean keyboard
Explanation: Installers need free space for program files and temporary setup data. Low storage can stop installation or cause errors, so freeing space is a basic troubleshooting step.
An installer often checks OS version to ensure
A Extra icons
B Better speakers
C Compatibility support
D Faster typing
Explanation: Some software requires a specific OS version. Checking OS compatibility prevents installation on unsupported systems that could lead to crashes, missing features, or failure to run.
A common sign of malware is
A Faster boot
B Clearer display
C New fonts
D Unexpected pop-ups
Explanation: Malware can cause pop-ups, redirects, unknown programs, and slow performance. Running a full malware scan with updated antivirus tools helps detect and remove threats safely.
A malware scan should use
A Old trialware
B Updated antivirus
C Random cracked tool
D Unknown plugin
Explanation: Updated antivirus has the latest threat definitions and detection methods. Using trusted, updated tools increases detection accuracy and reduces the risk of installing more malware from unsafe scanners.
A “corrupt file” is usually
A Damaged or unreadable
B Always zipped
C Always encrypted
D Always safe
Explanation: Corrupt files contain broken data due to faulty storage, bad downloads, power failures, or malware. They may not open properly and can cause errors or crashes.
Event logs are checked mainly to
A Increase storage
B Change password
C Find error details
D Boost CPU
Explanation: Event logs record system and application errors with timestamps. They help identify the cause of crashes, failed updates, or service issues, making troubleshooting more accurate.
A common safest source for software downloads is
A Random file forum
B Pop-up ad link
C Unknown messenger file
D Official vendor site
Explanation: Official sites provide genuine installers without tampering. Untrusted sources may bundle malware or unwanted programs, so downloading from official vendors improves security and ensures correct versions.
Installing cracked software is risky mainly because it can
A Include malware
B Improve security
C Increase RAM
D Fix bugs faster
Explanation: Cracked software often comes from untrusted sources and may contain trojans or spyware. It also blocks updates, increasing vulnerability, and violates license rules and copyright laws.
A cumulative update usually means
A One tiny patch
B Only new theme
C Only new fonts
D Many fixes together
Explanation: Cumulative updates include multiple fixes in a single package, often including earlier updates too. Installing them brings software up to date without needing separate individual patch installations.
An app that fails after update can be fixed by
A Deleting OS folder
B Rolling back update
C Removing RAM
D Disabling monitor
Explanation: If an update breaks functionality, rollback restores the previous stable version. This keeps the system usable while the vendor releases a corrected patch or you test a safer update.
A “patch” differs from “upgrade” because a patch usually
A Fixes small issues
B Changes full edition
C Replaces hardware
D Removes license
Explanation: Patches mainly fix bugs and security issues with minimal changes, while upgrades often involve larger feature changes or major version jumps. Patches are usually smaller and faster to install.
If installation asks for admin rights, it is requesting
A More storage
B More internet
C More fonts
D Elevated permission
Explanation: Admin rights allow writing to system folders and registry. This is needed for installing system-level components. It should be granted only to trusted installers to avoid security risks.
A common reason an app shows wrong settings is
A New keyboard
B Clean cache
C Corrupt configuration
D Updated monitor
Explanation: Corrupted configuration files can cause wrong settings, crashes, or startup failures. Resetting settings, deleting the config file, or reinstalling can rebuild clean configuration data.
A safe troubleshooting step before reinstalling is to
A Create restore point
B Delete program files
C Format drive
D Disable all users
Explanation: A restore point allows rollback if troubleshooting changes cause issues. It is a safe precaution before driver installs, updates, or system-level fixes, helping return to a stable state.
An ISO file is commonly used as a
A Text document
B Photo format
C Audio format
D Disk image file
Explanation: ISO files store an image of an optical disc like a DVD. They are used for installing operating systems or software and can be mounted as a virtual drive or written to media.