Chapter 3: Computer Software and System Utilities (Set-5)
In a computer system, which software is essential for booting and managing memory, files, and devices
A Operating system
B Music player
C Photo editor
D PDF reader
Explanation: The operating system is core system software that starts after boot and manages CPU, memory, files, and hardware devices. It provides services so applications can run and users can interact.
When Windows cannot fully use a new Wi-Fi adapter without extra software, that required software is
A Spreadsheet app
B Word processor
C Device driver
D Presentation tool
Explanation: A driver lets the operating system communicate with specific hardware. Without the correct driver, hardware may not work properly or may miss features, so installing the driver enables full device support.
Which of the following is best classified as application software for user productivity
A Disk cleanup tool
B Device driver
C BIOS firmware
D Spreadsheet program
Explanation: A spreadsheet program is application software because it helps users perform tasks like calculations and data analysis. It runs on the OS and does not directly manage hardware resources.
Utility software is mainly designed to
A Maintain system health
B Manufacture hardware
C Create CPUs
D Replace monitor
Explanation: Utility software supports system maintenance and protection tasks such as cleaning temporary files, scanning for malware, backing up data, and monitoring performance to keep the computer stable.
A compiler differs from an interpreter because a compiler
A Runs line-by-line
B Translates whole program
C Only edits images
D Formats USB drives
Explanation: A compiler converts the entire source code into machine code before execution, often producing an executable file. An interpreter executes code line-by-line during runtime without producing a full executable.
Middleware is commonly used in systems to
A Clean disk space
B Defragment SSD
C Connect software services
D Replace device drivers
Explanation: Middleware helps different applications and services communicate, often handling messaging, data exchange, and authentication. It simplifies building distributed systems by providing shared services between layers.
Which tool is most appropriate to remove temporary files and free storage space
A Disk cleanup
B Text editor
C Media player
D Photo viewer
Explanation: Disk cleanup removes temporary files, caches, and other unnecessary items. This frees disk space and can improve system performance by reducing clutter and helping the OS manage storage efficiently.
Defragmentation is mainly beneficial for
A Internet speed
B Keyboard response
C Printer quality
D HDD performance
Explanation: HDDs store files on spinning disks, so scattered file parts slow access. Defragmentation reorganizes fragments into contiguous blocks, reducing head movement and improving read performance on HDDs.
Which utility is most suitable for creating copies of files to restore after loss
A Paint program
B Browser extension
C Backup utility
D Audio player
Explanation: Backup utilities create copies of important data to another device or cloud. If files are deleted, corrupted, or affected by malware, backups allow recovery and reduce permanent loss.
A compression tool is used to
A Reduce file size
B Increase file size
C Change file date
D Boost CPU clock
Explanation: Compression reduces file size by encoding data efficiently. It also allows bundling multiple files into one archive like ZIP, making storage and file sharing faster and easier.
If an app becomes unresponsive and does not react to clicks, it is typically
A Upgrading
B Formatting
C Hanging
D Encrypting
Explanation: Hanging means the program stops responding due to heavy processing, low memory, conflicts, or corrupted files. Waiting may help, but if it continues, ending the task is common.
Task Manager is mainly used to
A Replace drivers
B Manage processes
C Create backups
D Format partitions
Explanation: Task Manager displays running apps and background processes. It helps end unresponsive programs, view CPU and RAM usage, and manage startup items for troubleshooting slow performance.
System Restore is helpful when
A Drivers cause issues
B Mouse is dirty
C Monitor is cracked
D Battery is low
Explanation: System Restore rolls back system settings and system files to an earlier restore point. It helps recover from faulty driver installations or updates while usually keeping personal documents unchanged.
A firewall mainly works to
A Compress folders
B Defrag drives
C Block unwanted access
D Edit documents
Explanation: Firewalls filter network traffic and block unauthorized connections. They help protect systems from hacking attempts and harmful network activity by applying security rules for incoming and outgoing data.
A driver updater is useful to
A Remove junk emails
B Update hardware drivers
C Create restore points
D Record audio
Explanation: Driver updates can fix bugs, improve performance, and enhance compatibility. Driver updater tools help find newer versions for devices like graphics cards, Wi-Fi adapters, and printers.
File recovery tools are mostly used for
A Increasing RAM
B Speeding internet
C Cleaning registry only
D Restoring deleted files
Explanation: File recovery software scans storage to find recoverable data from deleted files. The chance of recovery is higher when new data has not overwritten the deleted file locations.
Disk Management is used for
A Virus detection
B Photo editing
C Partition management
D Video streaming
Explanation: Disk Management helps create, resize, format, and manage partitions and volumes. It also assigns drive letters and prepares new drives so the operating system can use them properly.
Performance Monitor helps you
A Track resource use
B Remove malware
C Install software
D Delete duplicates
Explanation: Performance monitoring tools track CPU, memory, disk, and network usage. This helps identify what is slowing the system and supports troubleshooting by showing which resource is overloaded.
The file Setup.exe is usually a
A Image file
B Installer program
C Audio file
D Log file
Explanation: Setup.exe typically launches installation. It copies program files, configures settings, and registers components so the software works correctly. It may also verify system requirements and licensing.
An installation wizard mainly provides
A Disk repair service
B Malware scanning
C Guided setup steps
D Hardware diagnostics
Explanation: The wizard guides users through installation choices like license acceptance, install location, and features. This reduces errors and ensures settings are applied correctly without manual technical steps.
Checking system requirements before install prevents
A Compatibility problems
B Monitor scratches
C Speaker noise
D Mouse lag
Explanation: Requirements specify needed OS version, RAM, CPU, and storage. If the system does not meet them, installation may fail or run poorly, so checking avoids crashes and wasted effort.
A license key is required mainly for
A Disk defrag
B File backup
C Software activation
D Virus removal
Explanation: License keys confirm legal use of software and enable activation. Activation unlocks features, updates, and support, and helps vendors prevent unauthorized use and piracy.
Silent installation means
A No user interaction
B No internet needed
C No disk space
D No updates allowed
Explanation: Silent installs run with preset options and without prompts. IT teams use them to deploy software across many computers quickly and consistently, reducing manual effort and user mistakes.
The Windows place commonly used to uninstall programs is
A Command Prompt
B Programs and Features
C Paint app
D Device Manager
Explanation: Programs and Features lists installed applications and provides uninstall or change options. It usually runs the program’s uninstaller, which removes files and settings more safely than manual deletion.
The Windows Registry mainly stores
A Music playlists
B Video codecs only
C Printer paper sizes
D Configuration settings
Explanation: The Registry is a database of system and application settings. Installers add entries, and uninstallers may remove them. Wrong edits can cause issues, so changes should be done carefully.
A software update is generally released to
A Replace CPU
B Reduce RAM
C Fix and improve
D Break compatibility
Explanation: Updates fix bugs, improve stability, patch security issues, and sometimes add features. Installing official updates helps keep software working smoothly and reduces risks from known vulnerabilities.
A security patch is meant to
A Fix security flaws
B Change wallpapers
C Add fonts
D Rename files
Explanation: Security patches close vulnerabilities that attackers might exploit. Applying patches quickly is important for protection, especially for operating systems, browsers, and widely used applications.
A hotfix is best described as
A Full service pack
B Quick bug fix
C Hardware reset
D New license type
Explanation: Hotfixes target specific problems and are released quickly. They may not include many other changes and can later be included in cumulative updates or larger service packs.
A service pack typically includes
A Multiple updates bundled
B One small patch
C Only EULA text
D Only UI themes
Explanation: Service packs combine many fixes and updates into one package. They simplify updating and improve stability by ensuring a set of corrections is applied together.
Freeware is software that is
A Always open source
B Always time-limited
C Free to use
D Always illegal
Explanation: Freeware costs nothing to use, but it can still be proprietary. Users should read the license terms because free use does not always mean free to modify or distribute.
Shareware is usually
A Public domain
B Closed network tool
C Hardware driver
D Trial-based software
Explanation: Shareware is provided for evaluation with limits on time or features. Users can test it and then purchase a license to continue full use legally and receive full functionality.
Open source software allows
A Modify source code
B Hide source code
C Avoid licensing
D Block updates
Explanation: Open source licenses give access to source code and allow modifications and sharing under conditions. This supports transparency and collaboration, but users must follow the specific license terms.
Proprietary software is generally
A Public domain
B No owner
C Closed source
D Always freeware
Explanation: Proprietary software is owned by a vendor, and its source code is not typically shared. The license restricts copying, modification, and distribution without permission from the owner.
EULA is mainly a
A Antivirus tool
B License agreement
C File format
D Backup method
Explanation: An End User License Agreement explains allowed usage, restrictions, warranty, and responsibilities. Users usually accept it before installing or using software to comply with legal terms.
A “Missing DLL” message commonly indicates
A Missing library file
B Broken monitor
C Low battery
D Wrong keyboard
Explanation: DLL files contain shared code needed by programs. If a required DLL is missing or corrupted, the program cannot start. Reinstalling or repairing the software often restores the needed file.
Clearing cache is a good step when
A CPU is upgraded
B Mouse is new
C App shows old data
D Speaker is louder
Explanation: Cache stores temporary data for speed. If cache becomes corrupted or outdated, the app may display wrong content or behave strangely. Clearing it forces fresh data to be created.
Compatibility mode is helpful when
A New apps install
B Old apps fail
C Disk is empty
D Printer is online
Explanation: Compatibility mode applies older settings to help older software run on newer operating systems. It can fix issues related to permissions, display settings, or older program behavior.
Safe mode is mainly used for
A Troubleshooting problems
B Installing games
C Making backups
D Creating videos
Explanation: Safe mode starts the OS with minimal drivers and services. This helps identify issues caused by faulty drivers, startup programs, or malware because fewer components run during startup.
Update rollback is used when
A Update adds features
B Update improves speed
C Update causes issues
D Update is optional
Explanation: Rollback restores the earlier version when a new update creates problems like crashes or device failures. It improves stability until the vendor fixes the update or releases a better version.
Log files help troubleshooting because they
A Increase disk space
B Change passwords
C Boost CPU speed
D Record events/errors
Explanation: Logs store detailed records of errors and system events. They help identify what happened before a failure, making it easier to find the root cause of crashes, install failures, or service issues.
A file format mainly used for photos is
A JPG
B DLL
C EXE
D BAT
Explanation: JPG is a common photo format that uses compression to reduce file size. It is widely used for images on phones and the web, though it can slightly reduce quality due to compression.
ZIP files are best described as
A Video files
B Compressed archives
C Driver files
D License files
Explanation: ZIP archives compress and bundle files. They are widely used for sharing multiple files together and reducing size, making downloads faster and storage more efficient.
A virtual machine allows a user to
A Replace hard disk
B Repair monitor
C Run another OS
D Increase speaker power
Explanation: A virtual machine creates a software-based computer that can run another operating system within the current OS. It is useful for testing, training, and isolating risky software.
Cloud software is mainly accessed using
A Internet connection
B BIOS settings
C Printer cable
D DVD drive
Explanation: Cloud software runs on remote servers and is accessed over the internet. Users often use a browser or app, and updates are managed by the provider rather than local installation.
Browser extensions mainly
A Increase RAM
B Repair disks
C Replace OS
D Add extra features
Explanation: Extensions add tools like ad blockers, translators, or password managers. Users should install trusted extensions and check permissions, because some extensions can access browsing data and affect privacy.
Default programs decide
A Which disk formats
B Which app opens
C Which CPU runs
D Which OS boots
Explanation: Default program settings link file types to applications. For example, choosing a PDF reader as default ensures PDF files open automatically in that app when clicked.
Task scheduling is used to
A Delete all files
B Speed up CPU
C Run tasks automatically
D Change wallpaper
Explanation: Task scheduling runs programs or scripts at set times or events, such as daily backups or cleanup. It automates routine work and reduces the need for manual maintenance.
Software activation mainly verifies
A License validity
B Screen resolution
C Printer ink
D Mouse speed
Explanation: Activation confirms the software is properly licensed for that device or user. It helps prevent piracy and enables full features, updates, and official support depending on the product.
Software piracy means
A Legal backup
B Security patching
C Unauthorized copying
D Disk cleaning
Explanation: Piracy is using or distributing software without permission or a valid license. It is illegal and risky because cracked copies may include malware and usually do not receive trusted updates.
User permissions control
A Brightness level
B Access rights
C File compression
D CPU speed
Explanation: User permissions decide what actions a user can perform, such as installing software or changing system settings. Proper permissions improve security by preventing unauthorized changes and protecting important files.