Chapter 3: Computer Software and System Utilities (Set-8)
In modern operating systems, which core component handles memory allocation, process control, and device access rules
A Web browser
B Media player
C Slide editor
D Kernel
The kernel is the heart of the operating system. It manages processes, memory, and hardware access, decides CPU scheduling, and provides secure services so applications can run without direct hardware control.
Which statement best explains why application software cannot work alone without system software
A Needs OS services
B Needs new keyboard
C Needs monitor driver
D Needs more wallpaper
Applications rely on the operating system for memory management, file handling, device input/output, and user interface services. Without system software, apps have no controlled way to access hardware resources.
A driver is considered system software because it
A Creates presentations
B Compresses videos
C Enables hardware I/O
D Uploads photos
Drivers help the operating system communicate with devices like printers, GPUs, and network cards. They translate OS commands into device-specific instructions, enabling stable and correct hardware input/output.
Firmware differs from an operating system mainly because firmware
A Runs user apps
B Stored in ROM
C Changes user files
D Needs internet always
Firmware is stored in non-volatile memory like ROM or flash and provides low-level control and startup routines. An operating system is larger software stored on disk that manages resources and runs apps.
Middleware is most commonly used to
A Defrag hard disk
B Remove junk files
C Link different systems
D Paint images
Middleware connects applications, services, and databases by providing communication and common services. It helps separate components work together smoothly, especially in client-server and distributed applications.
Which translator produces an executable output file after converting a program
A Interpreter
B Compiler
C Disk cleaner
D File archiver
A compiler converts the whole source code into machine code and typically creates an executable file. This helps programs run faster, and errors are usually found during compilation before execution.
In contrast to a compiler, an interpreter generally
A Creates EXE file
B Needs reboot always
C Works only offline
D Runs line-by-line
An interpreter reads and executes code one line at a time during runtime. It usually does not create a separate executable file, and it reports errors immediately when encountered.
A system utility is best defined as software that
A Writes school essays
B Streams music online
C Maintains the system
D Creates animations
System utilities perform maintenance and protection tasks like cleanup, antivirus scanning, backup, and monitoring. They support the operating system and keep the computer stable, secure, and efficient.
Which tool would you use first to end a process consuming very high CPU
A Disk Cleanup
B Task Manager
C System Restore
D File Explorer
Task Manager shows processes and resource usage. It allows ending tasks that consume high CPU or memory, helping diagnose performance problems and stop unresponsive or suspicious processes quickly.
Disk defragmentation mainly improves performance by
A Reducing seek time
B Increasing RAM size
C Cleaning registry keys
D Updating OS version
On HDDs, file fragments scattered across the disk increase head movement. Defragmentation rearranges fragments into contiguous blocks, reducing seek time and improving file read performance.
Why is defragmentation not useful for most SSDs
A Needs more CPU
B Deletes all files
C Random access fast
D Changes file types
SSDs have no moving parts and can access any memory location quickly, so fragmentation has little effect. Defragmenting adds unnecessary writes, which can slightly reduce SSD lifespan.
A system image backup is mainly useful when
A Printer has jam
B Disk fails completely
C Mouse is missing
D Screen is dim
A system image contains the OS, installed programs, settings, and files. It can restore a full working system after major failure, such as disk crash, severe corruption, or ransomware damage.
Which utility feature helps recover after accidental deletion or corruption
A Screen saver
B Keyboard layout
C File icons
D Backup copies
Backups provide stored copies of important data. If files are deleted, corrupted, or lost due to failure, the backup can restore them, reducing downtime and preventing permanent data loss.
A firewall mainly protects a computer by
A Removing duplicate files
B Compressing folders
C Controlling network access
D Editing registry only
Firewalls filter inbound and outbound traffic using rules. They block unauthorized connections, reduce attack surface, and help prevent intrusions, especially on systems connected to public networks.
Driver updater tools can be risky if they
A Install wrong driver
B Remove cache files
C Zip folders
D Create restore points
Incorrect drivers can cause crashes, device failures, or boot issues. Using official drivers from hardware vendors and creating restore points before changes reduces the risk of instability.
Disk Management is required when you need to
A Edit PDFs
B Resize partitions
C Play songs
D Run antivirus
Disk Management tools manage partitions and volumes, including resizing, formatting, and drive letter assignment. It is used during disk setup, dual-boot planning, or storage reorganization.
Performance Monitor is especially helpful for
A Editing photos
B Uninstalling apps
C Long-term monitoring
D Playing videos
Performance Monitor records resource counters over time, helping find periodic slowdowns and bottlenecks. It supports deeper analysis than quick tools by tracking CPU, RAM, disk, and network trends.
During software installation, “Custom” setup is chosen mainly to
A Select components
B Update the BIOS
C Format the disk
D Repair the monitor
Custom install lets users choose features, install location, and optional items. It helps avoid unnecessary components and offers better control over storage usage and additional bundled software.
MSI packages are mainly used for
A Image compression
B Windows installation
C Network filtering
D Device scanning
MSI is the Windows Installer package format. It supports standard install, repair, modify, and uninstall operations, and is widely used for managed deployment in organizations.
Deleting program folders manually may cause issues because it can
A Boost system speed
B Fix crashes quickly
C Leave leftovers
D Update OS safely
Manual deletion may leave registry entries, services, shared DLLs, or startup tasks. These leftovers can cause errors and clutter, so using the official uninstaller is safer.
A “patch” is usually smaller than an “upgrade” because a patch
A Changes entire product
B Replaces hardware
C Removes all settings
D Fixes specific issues
Patches focus on correcting bugs or security vulnerabilities with minimal changes. Upgrades often involve major new features, large version changes, and bigger compatibility effects.
A version number like 2.1.5 mainly indicates
A Disk partition size
B Software release level
C Internet speed rate
D RAM frequency
Version numbers identify the exact release of software. They help users confirm compatibility, download correct updates, and report issues accurately since fixes and features differ across versions.
A hotfix is different from a service pack because a hotfix
A Bundles many fixes
B Is only a license
C Targets one problem
D Is a hardware tool
Hotfixes are quick updates to solve a specific urgent bug. Service packs combine many updates and fixes into one larger package for broader maintenance.
Automatic updates are valuable mainly to
A Install security fixes
B Increase screen size
C Remove user accounts
D Change keyboard input
Automatic updates help ensure important security patches are installed quickly. This reduces exposure time to known vulnerabilities and keeps the system safer without relying on users to remember updates.
Freeware is free to use, but it may still be
A Public domain
B Proprietary software
C Hardware firmware
D Open kernel
Freeware can be proprietary, meaning the code is closed and redistribution or modification may be restricted. “Free to use” does not always mean “free to change” or share.
Shareware commonly becomes fully usable after
A Changing wallpaper
B Defragging SSD
C Paying license fee
D Disabling firewall
Shareware often starts as a trial with time or feature limits. Purchasing a license removes restrictions and allows legal continued use with full features.
Open source software is commonly identified by
A No license terms
B Always paid only
C No updates ever
D Source availability
Open source software provides source code access and permits modification under license rules. It may still have obligations like attribution or sharing changes, depending on the license.
A common legal document shown during installation is
A BIOS menu
B EULA agreement
C Disk map
D Driver list
The EULA explains software usage rights, restrictions, and terms. Users accept it to proceed with installation, making it an important legal step in software licensing.
A “Not responding” state mostly indicates the program is
A Fully uninstalled
B Fully updated
C Hanging or busy
D Successfully activated
“Not responding” occurs when an app does not process user input, often due to heavy work, low resources, or faults. Waiting may help, otherwise end task and troubleshoot.
A missing DLL error often happens after
A Bad installation
B Better RAM upgrade
C New mouse purchase
D Wallpaper change
Missing DLL errors occur when required library files are absent or corrupted. This may happen after incomplete installs, deletion by malware, or incorrect updates, and is often fixed by repair or reinstall.
Clearing browser cache is useful when websites
A Need new keyboard
B Need new monitor
C Show outdated pages
D Need more RAM
Cached files help load sites faster, but stale cache can show old content or cause display issues. Clearing cache forces fresh downloads of site files, fixing many browsing problems.
Compatibility mode is mainly for solving
A Hard disk failure
B Older app issues
C Printer ink issues
D Keyboard hardware faults
Compatibility mode applies older settings on newer OS versions. It helps older applications run correctly when they fail due to changed permissions, display scaling, or OS behavior differences.
Safe mode is commonly used when troubleshooting
A Photo editing tasks
B Music playback issues
C Spreadsheet formatting
D Driver startup issues
Safe mode loads minimal drivers and services, helping isolate whether a faulty driver or startup program is causing boot problems, crashes, or performance issues.
Rolling back an update is most appropriate when the update
A Breaks functionality
B Adds new tools
C Improves security
D Fixes crashes
If an update causes device errors, crashes, or performance issues, rollback restores the previous version. This maintains usability until a corrected patch or compatible driver is available.
A restore point should be created before
A Changing wallpaper
B Playing a video
C Installing new drivers
D Writing a document
Drivers affect core system stability. Creating a restore point before installing drivers or major updates provides a safety net to roll back system settings if something goes wrong.
Log files are most helpful for
A Increasing brightness
B Finding root cause
C Compressing images
D Unzipping archives
Logs show error codes, messages, and timestamps. They help identify what component failed, enabling accurate troubleshooting rather than trial-and-error, especially for crashes and failed installs.
A common compressed archive format is
A PNG format
B MP4 format
C ZIP format
D DOCX format
ZIP is a standard compressed archive format used to bundle and compress files. It is supported widely on operating systems, making file sharing and storage more efficient.
An ISO file is best described as a
A Disk image file
B Text settings file
C Photo file type
D Audio stream file
ISO files contain an exact copy of a disc’s data structure. They are used for installing operating systems and software and can be mounted as a virtual drive.
A virtual machine helps in software testing because it
A Deletes all viruses
B Boosts CPU speed
C Replaces RAM chips
D Isolated environment
VMs isolate systems so testing new software or settings does not affect the main OS. If problems occur, snapshots or resets can restore the VM quickly.
Cloud software reduces local installation because it
A Runs in BIOS
B Runs on servers
C Needs floppy disks
D Works without internet
Cloud software executes on remote servers and is accessed via internet. The provider handles updates and infrastructure, reducing the need for installing and maintaining full software locally.
Browser extensions can be dangerous if they
A Come from store
B Update regularly
C Request many permissions
D Have small size
Extensions with excessive permissions can read browsing data or modify pages. Installing only trusted extensions and reviewing permissions reduces security and privacy risks.
Plug-ins extend software by adding
A CPU cores
B Extra functions
C Disk partitions
D Hardware cables
Plug-ins add capabilities like filters, viewers, or integration features. They expand a program’s functionality without modifying the main application code, but should be sourced from trusted providers.
Default programs are important because they
A Decide file opening
B Fix hardware faults
C Increase RAM
D Block malware always
Default programs determine which app opens certain file types automatically. This improves workflow by avoiding repeated selection and ensuring files like PDFs or images open in the preferred app.
Task Scheduler is commonly used to
A Draw images
B Defrag SSD
C Automate routine tasks
D Replace OS
Task Scheduler runs scripts or programs at specific times or triggers, such as backups, cleanup, or updates. Automation reduces manual work and ensures regular maintenance.
User permissions help security by
A Increasing download speed
B Limiting actions
C Improving sound quality
D Changing monitor colors
Permissions restrict what users can access or change. Standard users have fewer rights, reducing risk of accidental system changes or malware installation, while admins can perform system-level tasks.
A common reason an installer needs admin rights is to
A Change wallpaper
B Play notification sound
C Reduce file size
D Write system files
Installing software often requires writing to Program Files, registry, and system directories. Admin rights allow these changes, but should be granted only to trusted installers for safety.
“Portable apps” are useful because they
A Need registry always
B Need reboot always
C Run without install
D Require activation always
Portable apps can run from a folder or USB drive without full installation. They usually leave fewer system changes, making them convenient for temporary use, though some features may be limited.
The safest source for downloading software is typically the
A Random sharing link
B Official vendor site
C Unknown forum post
D Pop-up advertisement
Official vendor sites provide genuine installers and updates. Untrusted sources may bundle malware or unwanted software, so using official sources improves security and ensures correct versions.
A strong indication of malware infection is
A Frequent redirects
B Faster boot time
C Better graphics
D Lower CPU use
Malware can cause browser redirects, unwanted ads, and unknown toolbars. Running a full scan with updated antivirus and removing suspicious extensions helps restore safe browsing and system stability.
Keeping software updated is important mainly because it
A Increases keyboard size
B Changes monitor type
C Fixes security bugs
D Deletes user data
Updates fix vulnerabilities and bugs discovered after release. Installing them reduces risk of attacks, improves stability, and ensures better compatibility with new hardware, drivers, and operating system changes.