Chapter 3: Computer Software and System Utilities (Set-2)
When a vendor releases a change mainly to fix security weaknesses, it is called a
A Theme pack
B Security patch
C Media codec
D Font bundle
A security patch is a small update that fixes vulnerabilities attackers could exploit. Installing patches reduces risk of malware, data theft, and unauthorized access, especially for operating systems and browsers.
A software update generally means
A Hardware replacement
B Disk formatting
C New software version
D User account change
A software update is an improved release of the same program. It may add features, fix bugs, improve stability, and patch security issues while keeping the same product and purpose.
The number like 10.0.22631 mainly represents the
A Version number
B File size
C License key
D CPU speed
A version number identifies the specific release of a software product. It helps users and support teams know what features, fixes, and compatibility changes are included in that release.
A quick, targeted fix for a specific problem is usually called a
A Wallpaper pack
B Driver bundle
C Hotfix
D Data archive
A hotfix is a small update released to correct a particular bug or issue quickly. It is often provided before a larger update and may address urgent problems.
A service pack is best described as
A Single bug fix
B Only a license
C Only a theme
D Bundle of updates
A service pack combines many fixes, patches, and sometimes improvements into one larger package. It simplifies updating by installing multiple corrections at once.
Automatic updates are useful because they
A Install fixes automatically
B Delete user files
C Reduce screen size
D Block all internet
Automatic updates download and install software fixes with little user effort. This helps keep systems secure and stable, especially when users forget to apply important patches manually.
A “manual update” means the user
A Uses only DVD
B Removes antivirus
C Starts update themselves
D Formats the disk
Manual updating requires the user or admin to check for updates and install them. It is useful in controlled environments but can increase risk if security updates are delayed.
Freeware usually means software that
A Always has source code
B Is free to use
C Needs monthly fee
D Comes with hardware
Freeware is software provided at no cost for use. It may still be proprietary, and its license terms may restrict copying, modification, or commercial use.
Shareware is typically software that
A Offers trial use
B Is always illegal
C Has no license
D Never expires
Shareware is commonly distributed as a trial or limited version. Users can test it and later pay to unlock full features or continue using it legally after the trial period.
Open source software mainly allows users to
A Hide all code
B Use without updates
C Avoid all licenses
D View and modify code
Open source software provides source code access under a license that permits viewing, modifying, and sharing under stated conditions. It encourages transparency, community improvement, and collaborative development.
Proprietary software is usually
A Public domain
B License-free
C Closed source
D Always freeware
Proprietary software is owned by a company or individual, with restrictions on copying and modifying. The source code is generally not公开, and usage is controlled by license terms.
EULA stands for
A End User License
B Easy User Login
C Enhanced Utility Access
D External Update Link
EULA means End User License Agreement. It is a legal document that states how software can be used, limitations, warranty terms, and user responsibilities before installation or use.
A license key is mainly used to
A Clean temporary files
B Defrag disk
C Print documents
D Activate software
A license key proves a valid purchase or permission to use software. It is used for activation, which unlocks features and ensures the software is used according to licensing rules.
Software piracy refers to
A Free software use
B Software updating
C Illegal copying/use
D Virus scanning
Software piracy means using, copying, or distributing software without proper authorization or license. It violates copyright law and can expose users to malware and unstable modified installers.
If a program stops responding but remains open, the issue is called
A Boot
B Hang
C Sync
D Flash
A hang occurs when a program becomes unresponsive and does not accept input. It may be caused by bugs, low memory, conflicts, or damaged files, and may require ending the task.
A sudden program closure during use is best called a
A Install
B Patch
C Crash
D Backup
A crash is when software closes unexpectedly due to errors such as corrupted files, faulty updates, driver issues, or incompatible components. Checking logs and updating can help diagnose.
An error message is mainly useful because it
A Gives problem clue
B Deletes malware
C Speeds up CPU
D Installs drivers
Error messages provide hints about what went wrong, such as missing files, access denied, or compatibility issues. Reading the exact message helps identify the correct troubleshooting steps.
“Missing DLL” error usually indicates
A Wrong monitor
B Full battery
C Bad keyboard
D Missing library file
DLL files are shared libraries used by Windows programs. A missing DLL error means the required library file is absent or damaged, often fixed by reinstalling or repairing the application.
Clearing cache is most helpful when
A Printer is broken
B RAM is upgraded
C App shows old data
D Monitor is cracked
Cache stores temporary data for speed. If cache becomes outdated or corrupt, apps may display wrong content or behave oddly. Clearing cache forces the app to rebuild fresh data.
Compatibility mode is mainly used to run
A Older software
B Newer OS only
C Only antivirus
D Only drivers
Compatibility mode helps older programs run on newer operating systems by using older settings. It can resolve issues caused by changes in system behavior, permissions, or display handling.
Safe mode in Windows starts with
A Extra animations
B Minimal drivers
C More games
D Stronger Wi-Fi
Safe mode loads Windows with only essential drivers and services. It helps troubleshoot issues caused by drivers, startup programs, or malware because fewer components run during boot.
Reinstalling software mainly helps when
A Power supply weak
B Mouse is dirty
C Keyboard is new
D Files are corrupt
Reinstalling replaces damaged program files and resets many settings. It is a common fix when an app is corrupted, missing components, or repeatedly crashing due to broken installation files.
Update rollback is used when an update
A Improves speed
B Adds printers
C Causes problems
D Increases RAM
Rolling back an update restores the previous version when a new update causes crashes, compatibility issues, or performance drops. It helps restore stability while waiting for a fixed update.
A restore point is mainly a snapshot of
A System settings
B Only movies
C Keyboard layout
D Internet history
Restore points store system files, drivers, and settings at a moment in time. They allow users to revert system changes after bad updates or installations without normally removing personal files.
Log files are useful because they
A Change passwords
B Record system events
C Increase brightness
D Delete duplicates
Log files record events, errors, and actions taken by software or the operating system. They help diagnose crashes, failed installs, and security issues by showing what happened and when.
A common compression format for files is
A JPG
B TXT
C ZIP
D BMP
ZIP is a widely used compression and archive format. It reduces file size and can bundle multiple files into one archive, making storage and sharing easier across different systems.
Which file format is mainly used for images
A EXE
B DLL
C BAT
D JPG
JPG (JPEG) is a common image file format used for photos. It compresses images to reduce size, which is useful for storage and sharing, though it may reduce quality slightly.
A virtual machine is best described as
A Physical monitor
B Printer driver
C Software-based computer
D Disk partition
A virtual machine (VM) is software that runs an operating system inside another system. It allows testing programs safely, running different OS versions, and isolating environments without extra hardware.
Cloud software is mainly software that
A Runs via internet
B Runs only offline
C Uses only CDs
D Needs no login
Cloud software runs on remote servers and is accessed through the internet, often via a browser or app. It reduces local installation needs and allows access from multiple devices.
Browser extensions are mainly used to
A Change CPU type
B Add browser features
C Format hard disk
D Replace Windows OS
Browser extensions add functionality like ad blocking, password management, translation, or productivity tools. They integrate into the browser to provide extra features beyond the default installation.
Plug-ins are often required for
A Hardware repairs
B Disk defrag only
C Extra app features
D User account rename
Plug-ins extend an application’s capability, such as adding filters in photo editors or special tools in browsers. They allow customization without changing the core program permanently.
Setting a default program means choosing an app that
A Opens files by default
B Deletes file types
C Blocks updates
D Resets BIOS
Default programs decide which application opens a specific file type, like PDFs or images. This improves usability by automatically launching the selected app when a file is double-clicked.
Checking system requirements is important before installing because it
A Edits documents
B Prevents incompatibility
C Improves printing
D Adds new fonts
System requirements ensure the device has enough CPU, RAM, storage, and supported OS. Without meeting them, installation may fail or the software may run poorly and crash often.
Software activation mainly confirms
A Screen resolution
B Wi-Fi strength
C License validity
D Keyboard speed
Activation verifies that the software license is genuine and within usage limits. It helps prevent piracy and allows the user to access full features, updates, and support when applicable.
A common sign of malware infection is
A Faster boot
B Sharper display
C Silent fans
D Unexpected pop-ups
Malware may cause unwanted pop-ups, browser redirects, slow performance, and unknown programs running. A malware scan with updated antivirus tools helps detect and remove such threats safely.
“Corrupt file” generally means the file is
A Perfectly safe
B Always compressed
C Damaged or unreadable
D Always encrypted
A corrupt file contains damaged data due to bad storage, sudden power loss, faulty downloads, or malware. Corruption can prevent programs from opening the file or cause crashes.
If software fails after an OS upgrade, a basic fix is to
A Update the software
B Increase wallpaper
C Remove keyboard
D Lower screen size
OS upgrades can break compatibility. Installing the latest software version often fixes issues because vendors release updates to support new OS changes, security rules, and driver models.
A common troubleshooting step for repeated crashes is to
A Ignore updates
B Delete system32
C Disable all users
D Check for updates
Updates often fix known bugs and compatibility issues that cause crashes. Installing official updates for the app, OS, and drivers reduces instability and improves security and performance.
User permissions mainly control
A CPU temperature
B Access rights
C Screen pixels
D Disk speed
Permissions decide what a user can do, such as installing software, changing settings, or accessing files. Proper permissions improve security by limiting actions to authorized users only.
An administrator account typically can
A Only read files
B Only play music
C Install system software
D Only browse web
Administrator accounts have higher privileges, allowing system-wide changes like installing drivers, modifying protected settings, and managing user accounts. Standard users are limited for safety and security.
A common reason an installer fails is
A Not enough storage
B Too many icons
C Loud speakers
D New mouse pad
Installers need free disk space to copy program files and create temporary setup files. Low storage can stop installation or cause errors, so freeing space often resolves the issue.
A “patch Tuesday” style update is mainly about
A Wallpapers
B New keyboards
C Printer ink
D Regular patches
Many vendors release updates on a regular schedule to deliver security patches and fixes. Regular patch cycles make maintenance predictable and help users keep systems protected against known threats.
A license that allows use but restricts source code access is usually
A Open source
B Proprietary license
C Public domain
D No-copyright
Proprietary licenses allow users to run the software under conditions but generally do not allow viewing or modifying source code. Copying and redistribution are also limited by the owner.
A common file format for documents is
A EXE
B ISO
C DOCX
D DLL
DOCX is a document file format used by word processors like MS Word. It stores text, formatting, and images, and it is widely used for creating and sharing editable documents.
A common archive format used for installers or backups is
A ZIP
B PNG
C MP3
D HTML
ZIP archives are often used to package multiple files together, including installers, updates, or backup sets. ZIP also compresses data, making downloads faster and storage more efficient.
A browser plug-in or extension can be risky when it
A Comes from trusted store
B Has small file size
C Requests many permissions
D Updates regularly
Extensions with excessive permissions can read browsing data, change settings, or inject ads. Installing only trusted, necessary extensions and reviewing permissions reduces privacy and security risks.
If an application shows “Not responding,” the quickest safe action is to
A Cut power cable
B Delete Windows folder
C Remove RAM stick
D Wait briefly
“Not responding” may be temporary if the program is processing a heavy task. Waiting briefly can allow recovery. If it continues, then ending the task via Task Manager is the next step.
When software says “Activation required,” it usually means
A Antivirus is off
B License not verified
C Disk is full
D Monitor is old
Activation required indicates the software has not confirmed a valid license on that device. Entering a product key or signing in can verify the license and unlock full functionality.
A common use of task scheduling is to
A Draw pictures
B Replace CPU chip
C Run tasks automatically
D Increase screen size
Task scheduling runs programs or scripts at set times or events, such as daily backups, cleanup tasks, or updates. It automates routine maintenance and reduces the need for manual work.
Using cracked software is risky mainly because it can
A Contain malware
B Improve security
C Reduce RAM use
D Increase battery
Cracked software often comes from untrusted sources and may include trojans, spyware, or ransomware. It also breaks licensing rules and may disable updates, leaving the system vulnerable to attacks.