Chapter 3: Computer Software and System Utilities (Set-10)
In modern OS design, which mechanism most directly enforces that a user-level app cannot execute privileged CPU instructions
A Disk defragmentation
B File compression
C User and kernel mode
D App sandbox theme
Explanation: CPUs support privilege levels. User mode restricts dangerous instructions, while kernel mode allows them. The OS uses this separation to protect the system from faulty or malicious applications.
Which OS feature most directly controls what a standard user can install or change system-wide
A Wallpaper settings
B User permissions
C File naming rules
D Font manager
Explanation: Permissions determine which actions a user account can perform, like installing software or editing system settings. Limiting permissions reduces malware risk and prevents accidental system damage.
A digitally signed driver primarily helps the OS confirm
A Extra disk space
B Faster boot time
C Better audio output
D Publisher authenticity
Explanation: Digital signatures help verify that the driver comes from a trusted publisher and has not been modified. This reduces the chance of loading tampered or malicious drivers into the system.
In software deployment, a “transform” file commonly used with MSI packages is
A JPG file
B ZIP file
C MST file
D DLL file
Explanation: An MST (transform) customizes an MSI installation without changing the original MSI. It can predefine settings, features, and paths, useful for standardized deployment across many systems.
A major reason enterprise admins prefer MSI installers is better support for
A Video editing
B Repair and rollback
C Photo filtering
D Screen rotation
Explanation: MSI supports standardized installation, repair, modify, and uninstall operations. This makes software management easier in organizations and integrates with deployment tools and policy-based installations.
In Windows, 32-bit programs are commonly installed under
A Program Files (x86)
B Program Files only
C Windows System32
D Users Temp
Explanation: On 64-bit Windows, 32-bit apps usually go into Program Files (x86), while 64-bit apps use Program Files. This separation helps compatibility and organization.
If an installer fails with “access denied,” the most likely cause is
A Too much RAM
B Wrong monitor
C Insufficient privileges
D Empty cache
Explanation: Installers often need admin rights to write to system directories and registry. If the user lacks permissions, installation fails. Running as admin or using correct accounts resolves it safely.
Which method best verifies an installer is not tampered with
A Folder rename
B Icon color check
C File open time
D Digital signature check
Explanation: Digital signatures validate the publisher and ensure file integrity. If the signature is invalid or missing when expected, the installer may be modified or unsafe.
A “cumulative update” is important because it
A Removes user files
B Includes earlier fixes
C Disables antivirus
D Formats the disk
Explanation: Cumulative updates bundle multiple fixes and often include previous updates. Installing one update can bring systems up to date without installing each old patch separately.
A “hotfix” is best described as
A Targeted urgent patch
B Major feature upgrade
C Hardware replacement
D License cancellation
Explanation: Hotfixes address a specific urgent bug quickly. They are usually smaller than service packs and may later be included in cumulative updates, providing fast relief for critical issues.
A service pack differs from a hotfix mainly by being
A One bug fix
B Only a license
C Only a driver
D Broad update bundle
Explanation: Service packs combine many updates and fixes into one package. Hotfixes focus on one issue. Service packs simplify maintenance by installing many corrections at once.
When update problems occur, “rollback” commonly restores
A Extra RAM chips
B New browser tabs
C Previous version/build
D Larger monitor size
Explanation: Rollback removes a problematic update and returns to an earlier build or version. This restores stability when an update breaks drivers, applications, or system performance.
A restore point is not a full backup because it usually
A Copies whole disk
B Skips personal data
C Saves external drives
D Encrypts all files
Explanation: Restore points mainly store system files, drivers, and settings. They help undo system changes but do not guarantee recovery of personal files after deletion or full disk failure.
A system image is more suitable than restore point for
A Browser history cleaning
B Font installation
C Screen recording
D Full disk recovery
Explanation: System images capture the OS, programs, settings, and often user data. They allow full restoration after disk failure or severe corruption, unlike restore points which are limited.
In troubleshooting, “clean boot” is used to reduce
A Startup conflicts
B Disk partitions
C Screen brightness
D File sizes
Explanation: Clean boot loads Windows with minimal startup programs and non-essential services disabled. It helps identify whether third-party startup items cause crashes, slowdowns, or software conflicts.
Which tool best provides time-based system performance data and counters
A Disk Cleanup
B Notepad
C Performance Monitor
D Paint
Explanation: Performance Monitor tracks counters for CPU, memory, disk, and network over time. It helps detect bottlenecks and patterns that quick tools may miss.
A common reason a program fails after OS upgrade is missing
A Desktop icons
B Compatibility support
C Keyboard lights
D Screen saver
Explanation: OS upgrades can change APIs, permissions, and drivers. Older programs may need updates, patches, or compatibility mode to run properly on the new operating system.
Compatibility mode mainly helps by changing
A CPU clock speed
B Disk sector size
C BIOS voltage
D Runtime settings
Explanation: Compatibility mode applies older OS behavior settings for an application, such as version reporting and display handling. This can help older programs run without changing system hardware.
Safe Mode helps troubleshooting because it loads
A Maximum startup apps
B Minimal drivers/services
C Extra themes only
D Full cloud tools
Explanation: Safe Mode starts the OS with essential components only. If problems disappear in Safe Mode, the cause is often a third-party driver, service, or startup program.
A missing DLL error often indicates a missing
A Printer hardware
B Monitor cable
C Shared library component
D BIOS battery
Explanation: DLLs are shared libraries used by many programs. If they are missing or corrupted, apps cannot load needed code. Repairing or reinstalling the program often restores required DLLs.
If an app keeps crashing, the most logical first check is
A Change wallpaper
B Replace keyboard
C Defrag SSD
D Application updates
Explanation: Updates frequently fix known bugs and compatibility issues. Installing official app updates and related OS updates reduces crashes and improves stability before deeper troubleshooting.
If antivirus cannot remove malware in normal boot, a better next step is
A Increase volume
B Safe Mode scan
C Install themes
D Resize partitions
Explanation: Safe Mode loads fewer startup items. Malware is less likely to run and defend itself, making detection and removal easier. Using updated antivirus definitions improves success.
A firewall protects mainly by controlling
A Network traffic rules
B File compression size
C Keyboard speed
D Monitor resolution
Explanation: Firewalls allow or block connections using rules. They reduce unauthorized access, limit exposure to attacks, and improve security for internet-connected systems.
Driver signing helps prevent installation of
A Larger programs
B Extra backups
C Tampered drivers
D New fonts
Explanation: Signed drivers help confirm authenticity and integrity. Unsigned or altered drivers may be blocked or warned against, reducing risk of malicious kernel-level code running.
A wrong driver can cause severe issues because drivers run
A Only in browser
B Only in cache
C Only in documents
D Near kernel level
Explanation: Drivers often run with high privileges close to the kernel. Faulty or incompatible drivers can crash the OS, cause BSOD, or break device functionality.
A “portable application” usually
A Requires registry write
B Runs without install
C Needs reboot
D Needs admin always
Explanation: Portable apps can run from a folder or USB without traditional installation. They usually leave fewer system changes, though some may still store settings in local files.
A common risk of cracked software is
A Faster updates
B Better licensing
C Embedded malware
D More support
Explanation: Cracked software often comes from untrusted sources and may include trojans, spyware, or ransomware. It also blocks updates, increasing vulnerability and violating legal licensing terms.
An EULA is mainly a
A Hardware specification
B Network driver file
C Compression format
D Legal usage contract
Explanation: The End User License Agreement defines how software can be used, restrictions, warranties, and responsibilities. Accepting it is typically required before installation or use.
In licensing, an “activation limit” refers to
A Internet speed limit
B File size limit
C Device count limit
D Keyboard limit
Explanation: Some licenses allow activation only on a limited number of devices. After reaching the limit, activation may fail until deactivated elsewhere or additional licenses are purchased.
A software audit in organizations mainly checks
A Monitor sizes
B License compliance
C Mouse sensitivity
D Screen brightness
Explanation: Audits verify that installed software matches purchased licenses. This avoids legal issues, controls costs, and improves software inventory management.
Compression reduces file size mainly by
A Removing redundancy
B Adding pixels
C Increasing RAM
D Changing CPU
Explanation: Compression algorithms reduce repeated patterns in data, storing information more efficiently. This lowers file size for faster storage and transfer, while decompression rebuilds the original data.
ZIP is best described as a
A Photo format
B Audio codec
C BIOS tool
D Compressed archive
Explanation: ZIP archives compress and bundle multiple files into one. It is widely supported and used for downloads, backups, and sharing groups of files efficiently.
An ISO file is mainly used as a
A Text file
B Video file
C Disk image
D Registry file
Explanation: ISO files contain a complete disc image, often used for OS installation media. They can be mounted as a virtual drive or written to USB/DVD for installation.
A virtual machine snapshot helps because it allows
A Permanent RAM increase
B Quick state restore
C Faster CPU hardware
D Printer calibration
Explanation: Snapshots save a VM’s state. If a test causes issues, you can revert instantly, making VMs ideal for experimenting with installs, updates, or malware analysis safely.
Cloud software often updates without user action because updates are
A Stored in BIOS
B Done by printer
C Done by keyboard
D Managed by provider
Explanation: In cloud applications, the provider updates servers centrally. Users automatically get new versions, fixes, and security patches without installing updates locally.
Browser extensions are risky mainly if they
A Have small size
B Request broad access
C Use light theme
D Are paid apps
Explanation: Extensions with broad permissions can read browsing data, modify pages, and capture credentials. Installing only trusted extensions and limiting permissions reduces privacy and security risks.
Plug-ins differ from browser extensions because plug-ins are usually
A Hardware upgrades
B App-specific add-ons
C Disk partitions
D RAM modules
Explanation: Plug-ins extend features inside a specific application like an editor or media player. Extensions typically add features to a browser environment. Both should come from trusted sources.
Default program setting is also called
A File association
B Device signing
C Disk formatting
D CPU scheduling
Explanation: File association links a file type like .pdf or .jpg to a specific program. The default program is chosen automatically to open that file type.
Task Scheduler is useful because it can
A Delete BIOS
B Upgrade CPU
C Fix monitor
D Automate jobs
Explanation: Task Scheduler runs scripts or programs at specified times or triggers, such as daily backup tasks or cleanup. Automation reduces manual work and ensures routine maintenance.
A standard user cannot install some software mainly due to
A File format issues
B Permission restrictions
C Disk fragmentation
D Screen size limits
Explanation: System-wide installs often require writing to protected folders and registry keys. Standard users lack these rights, so admin permissions are required to keep systems secure.
A clean uninstall is preferred before reinstall because it removes
A Only shortcuts
B Only wallpapers
C Leftover components
D Only documents
Explanation: Leftover services, registry entries, and settings can cause repeated errors. Clean uninstall removes these remnants, ensuring a fresh reinstallation that reduces conflicts and recurring issues.
“Repair installation” is useful when an app has
A New keyboard
B New monitor
C More RAM
D Corrupted components
Explanation: Repair installs restore missing or damaged program files and settings without fully removing the software. It is helpful when the application is installed but not working correctly.
When software fails to start due to missing dependencies, the fix is to
A Change wallpaper
B Install required runtime
C Defrag SSD
D Reduce brightness
Explanation: Many apps need runtimes like .NET or Visual C++ libraries. Installing the correct runtime version resolves dependency errors and allows the application to load required components.
A good practice before updating firmware is to
A Ensure stable power
B Increase speaker volume
C Clear browser cookies
D Rename folders
Explanation: Firmware updates should not be interrupted. Power loss during flashing can brick hardware. Using stable power or battery backup and following vendor steps reduces the risk of failure.
Firmware update risks are higher because failure can
A Increase file size
B Improve audio
C Prevent device boot
D Add themes
Explanation: Firmware controls startup and low-level hardware behavior. If update fails, the device may not boot properly. This is why vendor instructions and stable power are critical.
Disk cleanup improves updates because updates often need
A New keyboard
B Faster speakers
C More pixels
D Free disk space
Explanation: OS updates require space for temporary files and installation packages. Low disk space can cause update failure. Cleaning temporary files frees space and improves update success.
In troubleshooting, reading the exact error code matters because it
A Deletes the problem
B Narrows the cause
C Speeds hardware
D Updates BIOS
Explanation: Error codes point to specific failure types like missing files, access denied, or corrupted packages. Using the exact code helps choose the correct solution instead of random trial-and-error.
An app running fine in a VM but failing on host suggests
A VM is broken
B CPU is faulty
C Host environment issue
D ZIP is corrupt
Explanation: If it works in a VM, the software itself is likely fine. Differences like drivers, permissions, installed runtimes, or security software on the host may be causing the failure.
The best tool to see which program starts automatically and slows boot is
A Disk cleanup
B Paint tool
C Zip tool
D Startup manager
Explanation: Startup managers show programs set to run at boot. Disabling unnecessary items reduces boot time and background load, improving system performance without uninstalling software.
A secure way to reduce false positives in antivirus while keeping protection is to
A Disable antivirus fully
B Install cracked tools
C Add specific exclusion
D Stop all updates
Explanation: If trusted software is flagged wrongly, adding a limited exclusion for that file or folder keeps antivirus active for the rest of the system while allowing the trusted program to run safely.