Which operating system function ensures different programs cannot directly damage each other’s memory space during normal use
A Memory protection
B Screen brightness
C Font management
D Audio control
Note: Memory protection isolates processes so one program cannot overwrite another program’s memory. This improves stability and security, preventing crashes and limiting the impact of faulty or malicious software.
When an OS assigns CPU time to processes in small slices for fairness, what is this approach called
A Disk formatting
B File indexing
C Time slicing
D Screen scaling
Note: Time slicing divides CPU time into short intervals and switches between processes quickly. This keeps the system responsive and gives each active program a fair chance to run.
Which OS type is designed specifically to manage resources and services across computers connected in a network environment
A Batch operating system
B Network operating system
C Embedded operating system
D Real-time operating system
Note: A network OS provides services like user authentication, file sharing, printer sharing, and centralized management across multiple computers. It supports network security and resource access control.
Which kind of operating system is most commonly found inside devices like routers, microwaves, and smart TVs
A Distributed operating system
B Desktop operating system
C Embedded operating system
D Batch operating system
Note: Embedded OS runs on dedicated hardware for specific tasks. It is optimized for reliability, limited memory, and special device functions, often working with minimal user interaction.
Which term describes the OS method of handling limited resources like CPU, memory, and devices among users and programs
A Image rendering
B Resource management
C Text formatting
D Cable routing
Note: Resource management means allocating CPU time, memory space, storage, and device access efficiently. The OS prevents conflicts, improves performance, and ensures multiple tasks can run safely.
Which interface element in a GUI typically shows a list of options or commands when clicked
A Menu
B Kernel
C Driver
D Socket
Note: Menus organize commands into clickable lists, helping users find features quickly. They reduce the need to memorize commands and are a key part of graphical user interaction.
In a desktop GUI, what is the purpose of a pointer controlled by a mouse or touchpad
A Increase storage space
B Run disk scans
C Update system firmware
D Select on-screen items
Note: The pointer helps users select icons, buttons, files, and menus on the screen. It is essential for interacting with windows-based graphical environments efficiently.
Which shortcut action is generally intended to copy selected text or files in most operating systems
A Sleep shortcut
B Lock shortcut
C Copy shortcut
D Print shortcut
Note: Copy shortcuts duplicate selected content to the clipboard so it can be pasted elsewhere. While keys vary by OS, the concept remains the same: copy does not remove the original.
Which tool is commonly used to browse folders and files visually in a graphical operating system
A Task scheduler
B File explorer
C Registry editor
D Event viewer
Note: File Explorer (or similar file manager) lets users view, organize, copy, move, and delete files and folders. It provides a graphical way to manage storage without commands.
Accessibility options in an operating system are mainly designed to help whom
A Only system administrators
B Only game developers
C Users with disabilities
D Only network engineers
Note: Accessibility features support users with vision, hearing, mobility, or learning difficulties. Examples include screen readers, magnifier, high contrast, sticky keys, and speech input.
A user account in an operating system is mainly used to do what
A Separate user settings
B Increase CPU speed
C Repair hard disks
D Detect viruses automatically
Note: User accounts keep files, preferences, and permissions separate for each person. This improves privacy and security, and allows different levels of access such as standard and administrator.
In process management, which state means a process is waiting for CPU time to run
A Deleted state
B Ready state
C Locked state
D Archived state
Note: A ready process has everything it needs except CPU time. The scheduler selects from ready processes and assigns CPU time based on scheduling rules and priorities.
Which state describes a process that is currently being executed by the CPU
A Sleeping state
B Hidden state
C Removed state
D Running state
Note: The running state means the CPU is actively executing instructions of that process. The OS may switch it out when its time slice ends or if it must wait for I/O.
Which term refers to a process waiting for an input/output operation to finish, such as disk read or keyboard input
A Ready state
B Active state
C Waiting state
D Visible state
Note: In waiting (blocked) state, a process cannot proceed until an event occurs, like I/O completion. This prevents wasting CPU time while the process is waiting for data.
Which memory problem is reduced by paging compared to older contiguous allocation methods
A Screen flickering
B External fragmentation
C Network congestion
D Keyboard bounce
Note: Paging uses fixed-size blocks, so free memory does not need to be one large continuous chunk. This reduces external fragmentation and improves memory utilization for multiple programs.
Which OS concept allows programs to use more memory than physically available by moving less-used data to disk
A ROM memory
B Cache memory
C Virtual memory
D Flash memory
Note: Virtual memory extends RAM using disk space, storing inactive pages temporarily. It helps run large programs and many tasks, though heavy paging can slow the system noticeably.
In file permissions, what does “read” permission generally allow a user to do
A View file contents
B Delete the file
C Rename the file
D Change file owner
Note: Read permission typically allows opening and viewing file data. It does not automatically allow editing or deleting; those actions require write or other permissions depending on the OS.
In file permissions, what does “write” permission generally allow a user to do
A Only view contents
B Modify file contents
C Only execute programs
D Only list folders
Note: Write permission allows changing or saving data to a file. Depending on the system, it may also allow creating or deleting files within a directory when combined with directory permissions.
In file permissions, what does “execute” permission generally allow in most systems
A Rename text files
B View hidden folders
C Run program file
D Compress directories
Note: Execute permission allows a file to be run as a program or script. Without execute permission, the OS may allow reading the file but not starting it as an executable.
What is the main purpose of a file system in an operating system
A Speed up CPU clock
B Improve monitor quality
C Create web connections
D Organize stored data
Note: A file system organizes how data is stored and retrieved on disks. It manages file names, directories, allocation, and metadata so the OS can find and protect data efficiently.
Which boot component runs first to start loading the operating system after firmware checks
A Device manager
B Boot loader
C File explorer
D Task manager
Note: After BIOS/UEFI initializes hardware and finds a boot device, the boot loader begins. It loads the OS kernel and essential startup components so the operating system can start.
Which firmware system is the newer replacement for traditional BIOS on many modern computers
A GUI
B CLI
C UEFI
D API
Note: UEFI is modern firmware that improves startup features, supports larger drives, and often provides better security features like Secure Boot. It replaces older BIOS on many systems.
Which action best describes “booting” in operating system fundamentals
A Loading OS at start
B Installing new printer
C Cleaning system logs
D Removing temporary files
Note: Booting is the process of starting the computer and loading the operating system into memory. It includes hardware checks, boot loader work, and starting essential services.
Which option best describes why device drivers are loaded during startup
A Change screen wallpaper
B Enable hardware operation
C Create user passwords
D Rename system folders
Note: Drivers allow the OS to communicate with hardware like display, storage, network, and input devices. Loading drivers ensures devices function correctly and are available when the user logs in.
System configuration tools are mainly used to do what in an OS
A Design computer circuits
B Print color documents
C Replace hard disk parts
D Adjust system settings
Note: System configuration manages startup options, services, hardware settings, and performance features. Correct configuration improves stability, controls startup load, and helps troubleshoot slow or faulty behavior.
Which recovery option starts Windows with minimal drivers and services for troubleshooting
A Airplane Mode
B Sleep Mode
C Safe Mode
D Presentation Mode
Note: Safe Mode loads only essential system components. It helps remove faulty drivers, disable problematic startup programs, and troubleshoot issues that prevent normal booting.
Which feature can automatically download and install security and bug fixes in an operating system
A Screen saver
B Update settings
C Color calibration
D Keyboard layout
Note: Update settings control how patches and feature updates are delivered. Keeping updates enabled improves security and stability by fixing known vulnerabilities and software bugs over time.
Control Panel or Settings in an OS is mainly used for what task
A Execute only commands
B View only log files
C Manage system preferences
D Compile programming code
Note: Control Panel or Settings lets users configure devices, network, accounts, privacy, display, and many other preferences. It provides a centralized location for managing OS configuration.
Which tool is most suitable for viewing installed hardware and updating related drivers
A Device Manager
B Disk Cleanup
C File Explorer
D Notepad
Note: Device Manager lists hardware devices and their driver status. It allows updating, disabling, or troubleshooting drivers, helping resolve issues like device not detected or malfunctioning hardware.
Disk cleanup utilities mainly help the OS by doing what
A Increasing RAM capacity
B Freeing disk space
C Changing CPU architecture
D Improving keyboard response
Note: Disk cleanup removes temporary files, cache, and unnecessary system files. This frees storage and can reduce clutter, which helps overall system maintenance and sometimes improves performance.
In many OS tools, “backup” is mainly created to protect against what risk
A Screen brightness changes
B Mouse sensitivity issues
C Data loss events
D Speaker volume reduction
Note: Backups protect against accidental deletion, corruption, malware, or drive failure. Keeping regular backups ensures important files can be restored and reduces the impact of system problems.
Firewall settings in an OS primarily control what kind of traffic
A Printer ink flow
B CPU heat levels
C Monitor pixel colors
D Network connections
Note: Firewalls control which network traffic is allowed in or out. They help block suspicious connections, reduce attack surface, and protect the system when connected to public or unknown networks.
Which OS utility is most directly used to track CPU, RAM, disk, and network usage live
A Disk Defragmenter
B Task Manager
C Word Processor
D Photo Viewer
Note: Task Manager shows real-time usage of CPU, memory, disk, and network and lists running processes. It helps identify heavy programs, end stuck tasks, and troubleshoot performance problems.
Which OS tool records warnings and error messages useful for troubleshooting crashes
A Event Viewer
B Screen Recorder
C Paint Tool
D Sound Mixer
Note: Event Viewer stores system logs with timestamps, including errors, warnings, and information events. These logs help identify what failed, which service caused issues, and when the problem started.
User management tools in an OS are mainly used to do what
A Repair motherboard circuits
B Increase hard disk speed
C Create and control accounts
D Improve screen resolution
Note: User management tools create accounts, set passwords, assign privileges, and manage groups. Proper user control improves security by limiting access to system settings and sensitive files.
What is the basic difference between a standard user and an administrator account
A Standard can edit firmware
B Admin has more privileges
C Admin cannot install apps
D Standard controls hardware drivers
Note: Administrator accounts can install software, change system-wide settings, and manage users. Standard users have limited permissions, which reduces accidental changes and helps protect the system.
Which OS component is mainly responsible for controlling hardware access and low-level resource allocation
A Wallpaper
B File icon
C Kernel
D Web browser
Note: The kernel manages core system tasks like memory, CPU scheduling, device access, and system calls. It provides a controlled environment so applications can work without directly accessing hardware.
Which term best matches the OS interface layer that allows users to run commands or use menus to start programs
A Shell
B Cache
C Pagefile
D Sector
Note: The shell is the user-facing interface that accepts commands or user actions and starts programs. It communicates with the OS to execute tasks, acting as a bridge to the kernel.
System logs in operating systems are mainly created for what reason
A Store user photos
B Record system events
C Increase screen clarity
D Improve keyboard layout
Note: System logs record important events like login attempts, service failures, updates, and driver issues. They help administrators and users troubleshoot problems and monitor security-related activity.
Which action best describes “patch management” in operating systems
A Cleaning hardware dust
B Changing monitor size
C Controlling software updates
D Installing new keyboard
Note: Patch management is the process of obtaining, testing, and installing updates. It reduces security risks and fixes bugs, helping systems remain stable and protected against known vulnerabilities.
Which term refers to programs or components that run in the background without user interaction
A Desktop icons
B Keyboard shortcuts
C File attributes
D System services
Note: Services run in the background to support tasks like networking, printing, updates, and security. They start automatically and keep essential features working even when no user app is open.
Which command is commonly used to restart a system safely instead of turning power off manually
A Copy command
B Restart command
C Search command
D Paste command
Note: Restart closes applications, reloads the OS, and reinitializes system components. It is used after updates or troubleshooting and is safer than forcing power off during system activity.
Which action best matches a proper “shutdown” in operating system basics
A Closing OS and power off
B Removing monitor cable
C Deleting system folder
D Formatting system drive
Note: Proper shutdown closes running programs, stops services, and writes pending data to disk. This prevents file corruption and protects the OS from damage caused by sudden power loss.
In basic OS use, what does “multitasking mode” mainly allow a user to do
A Use only one app
B Disable file saving
C Use multiple apps
D Block all updates
Note: Multitasking lets a user run several applications, such as browser, document editor, and media player. The OS schedules CPU time and manages memory so tasks can work together smoothly.
Job scheduling in operating systems is most closely related to what
A Changing desktop theme
B Deciding job run order
C Creating new folders
D Updating display drivers
Note: Job scheduling arranges when tasks run, especially for batch jobs and system maintenance. It helps balance workload, improve efficiency, and ensure important jobs run at the right time.
Virtual machines are mainly used to do what on a single physical computer
A Increase battery life
B Replace RAM chips
C Improve speaker output
D Run multiple OS instances
Note: Virtual machines allow one computer to host multiple operating systems at the same time. This helps with testing, running older software, isolation, and efficient resource use.
Which term best describes an OS feature that allows sharing printers and files across connected computers
A Screen services
B Audio services
C Network services
D Power services
Note: Network services include file sharing, printer sharing, and authentication features. They enable connected systems to share resources securely and support communication within homes or organizations.
Which OS utility is most useful to see and manage installed storage partitions visually
A Task Manager
B Disk Management
C Device Manager
D Event Viewer
Note: Disk Management displays drives, partitions, and volumes. It lets users format drives, create or extend partitions, and assign drive letters, making storage administration easier.
Which term best describes the OS feature that limits what actions different users can perform
A User privileges
B Screen resolution
C File compression
D Color depth
Note: User privileges define permissions like installing software, changing settings, or accessing files. Limiting privileges reduces security risks and prevents accidental changes that can harm system stability.
Which operating system category is most commonly optimized for smartphones and tablets
A Batch operating system
B Distributed operating system
C Mobile operating system
D Mainframe operating system
Note: Mobile OS is designed for touch input, battery efficiency, and mobile connectivity. It manages sensors, apps, and wireless communication while optimizing performance for limited power and hardware resources.