Chapter 3: Computer Software and System Utilities (Set-6)
Which operating system component decides which process gets CPU time using scheduling rules
A B) Browser
B C) Text editor
C A) Kernel
D D) Media player
Explanation: The kernel is the core part of an operating system. It manages processes, memory, and device access, including CPU scheduling, so programs get CPU time in an organized and efficient way.
When an OS loads a device driver, its main purpose is to
A B) Increase screen pixels
B A) Enable hardware communication
C C) Compress folders
D D) Create backups
Explanation: Drivers allow the OS to communicate with specific hardware like printers or network cards. Without drivers, devices may not work properly or may run with limited functionality and features.
Which option best explains why utilities are not called application software
A B) They write novels
B C) They play music
C D) They browse web
D A) They maintain system
Explanation: Utilities mainly support system maintenance tasks such as cleaning, scanning, backup, and optimization. Application software focuses on user productivity tasks like document creation or designing and editing content.
A program written in C is converted into an executable file mainly by a
A B) Interpreter
B C) Defragmenter
C A) Compiler
D D) File manager
Explanation: A compiler translates high-level source code into machine code, producing object files and finally an executable. This allows the CPU to run the program efficiently after compilation completes successfully.
A scripting language often runs using an
A A) Interpreter
B B) Assembler
C C) BIOS utility
D D) Disk formatter
Explanation: Many scripting languages execute through an interpreter that reads commands line-by-line. This supports quick testing and flexibility, though it may be slower than compiled executables in some cases.
In a software stack, firmware is closest to
A B) Application level
B C) Web content
C D) User documents
D A) Hardware level
Explanation: Firmware sits very close to hardware and provides low-level control, startup routines, and basic hardware communication. It is stored in ROM or flash and runs before the full OS loads.
Middleware in a client-server setup commonly handles
A B) Disk defragmentation
B C) Printer alignment
C A) Communication services
D D) Monitor calibration
Explanation: Middleware provides services like messaging, authentication, and data exchange between client and server components. It simplifies development by offering common functions for connecting different software systems.
Which system tool is most directly used to view and manage running processes and services
A B) Disk Cleanup
B A) Task Manager
C C) Paint
D D) Notepad
Explanation: Task Manager shows active apps, background processes, and services. It helps end unresponsive tasks, check CPU/RAM usage, and manage startup items for diagnosing performance and stability problems.
Why is disk defragmentation generally not recommended for SSDs
A B) Improves speed always
B C) Fixes malware only
C A) Unneeded and wear
D D) Increases partition count
Explanation: SSDs access data quickly without mechanical movement, so fragmentation has little impact. Defragmentation adds unnecessary write operations, which can reduce SSD lifespan and offers minimal performance benefit.
A full system backup that includes OS and programs is commonly called
A B) Text document
B C) Cache folder
C D) Driver log
D A) System image
Explanation: A system image backup captures the OS, installed software, settings, and files. It allows full restoration after disk failure or serious corruption, returning the computer to a working state.
Compression helps file transfer mainly because it
A A) Reduces data size
B B) Adds new features
C C) Deletes originals
D D) Changes file owner
Explanation: Compression reduces file size, so uploads and downloads take less time and bandwidth. It can also bundle multiple files into one archive, making sharing and storage more convenient.
A firewall rule that blocks unknown inbound connections mainly improves
A B) Screen brightness
B C) File recovery
C D) Printer speed
D A) Network security
Explanation: Blocking unauthorized inbound connections prevents outsiders from accessing services on your computer. Firewalls control traffic based on rules, reducing risk of hacking attempts and unwanted network access.
Driver updater tools should be used carefully because wrong drivers can
A B) Increase storage
B C) Improve battery
C A) Cause instability
D D) Add wallpapers
Explanation: Installing an incorrect or incompatible driver can cause device failures, crashes, or boot issues. Using official drivers from trusted sources and matching the exact hardware model reduces these risks.
A file recovery tool works best when
A B) Disk fully formatted
B A) Data not overwritten
C C) OS not installed
D D) Monitor turned off
Explanation: After deletion, file data may remain until overwritten by new data. Recovery is more successful if you stop using the drive immediately and run recovery tools to avoid overwriting.
Disk Management is needed when you want to
A A) Create partitions
B B) Edit photos
C C) Scan emails
D D) Play games
Explanation: Disk Management helps create and resize partitions, format volumes, and assign drive letters. It is used when setting up new disks, organizing storage, or changing partition structure.
Performance Monitor is especially useful to
A B) Remove viruses
B C) Uninstall apps
C A) Identify bottlenecks
D D) Change fonts
Explanation: By tracking CPU, memory, disk, and network counters, Performance Monitor helps find what resource is overloaded. This supports diagnosing slow systems and planning upgrades or fixes.
During installation, choosing “Typical” vs “Custom” mainly changes
A B) Screen resolution
B C) Internet speed
C D) Keyboard layout
D A) Components installed
Explanation: Typical installs use default options, while Custom installs allow selecting features, install location, and shortcuts. This helps avoid unnecessary components and control what is installed on the system.
MSI files are commonly used as
A B) Image editors
B C) Driver backups
C A) Windows installers
D D) Firewall logs
Explanation: MSI (Windows Installer) packages contain installation instructions and files. They support repair, modify, and uninstall features and are commonly used in enterprise deployment and managed installations.
An uninstaller generally removes
A A) Program components
B B) CPU drivers
C C) Monitor hardware
D D) Internet connection
Explanation: Uninstallers remove installed program files, shortcuts, and many related settings. Some leftovers may remain, but proper uninstall helps prevent clutter and reduces conflicts from unused software.
Deleting a program folder directly is risky because it may
A B) Increase RAM quickly
B C) Update drivers
C A) Leave registry entries
D D) Fix malware
Explanation: Manual deletion can leave behind registry entries, services, shared libraries, or startup tasks. This can cause errors, wasted space, or conflicts, so using the official uninstaller is safer.
The Windows Registry is best described as a
A B) Photo folder
B C) Mail server
C D) Audio player
D A) Settings database
Explanation: The Registry stores configuration data for Windows and installed software. Installers add entries and uninstallers remove them. Incorrect changes can cause system problems, so edits require caution.
A reboot after installing a driver is sometimes needed to
A B) Compress files
B C) Clear browser cache
C A) Load the driver
D D) Rename folders
Explanation: Some drivers integrate deeply with the OS and require a restart to replace in-use files and load properly. Rebooting ensures the new driver is active and stable.
Setup files often check system requirements to ensure
A B) More disk icons
B A) Compatibility
C C) Faster keyboard
D D) Better sound
Explanation: Requirement checks verify OS version, RAM, CPU, and storage. This prevents installing software on unsupported systems, which could cause failed installs, crashes, or unusable performance.
A licensing key is primarily used to
A B) Defrag disk
B C) Remove malware
C D) Format drive
D A) Activate product
Explanation: License keys prove authorized use and enable software activation. Activation unlocks features, ensures compliance with the license, and often allows updates and support services.
In an installation wizard, “UAC prompt” is related to
A B) Printer settings
B C) Sound volume
C A) Admin permission
D D) File compression
Explanation: User Account Control (UAC) asks for permission before making system-level changes. It helps prevent unauthorized installations and protects the system by requiring admin approval for sensitive actions.
The main purpose of a software utility is to
A A) Support maintenance
B B) Create documents
C C) Play music
D D) Design posters
Explanation: Utilities maintain and protect the system by performing tasks like cleanup, scanning, backup, and monitoring. They support smooth system operation rather than directly producing user content.
Antivirus real-time protection mainly
A B) Formats hard disks
B C) Creates archives
C D) Changes user names
D A) Monitors file activity
Explanation: Real-time protection scans files as they are opened, downloaded, or executed. It blocks threats early, reducing malware infections and preventing harmful changes to the system.
Disk cleanup helps performance mainly by
A B) Increasing CPU cores
B C) Improving internet speed
C A) Freeing storage space
D D) Changing wallpapers
Explanation: Removing temporary files and caches frees disk space and reduces clutter. Low free space can slow the OS and updates, so cleanup helps maintain smooth performance.
A “system restore point” is created to
A A) Roll back system
B B) Encrypt all files
C C) Delete all apps
D D) Increase RAM
Explanation: Restore points capture system files and settings at a time. If an update or driver causes problems, the system can be rolled back to that earlier stable state without usually removing personal files.
A frequent sign of software conflict is
A B) Faster boot
B C) Clear display
C D) Loud keyboard
D A) App crashes often
Explanation: Conflicts between apps, drivers, or versions can cause crashes and instability. Updating, reinstalling, removing conflicting software, or using compatibility settings often helps restore stable behavior.
An “installer package” that includes multiple programs is best called
A B) Boot loader
B C) Cache builder
C A) Bundle installer
D D) Driver scanner
Explanation: Bundle installers install a main program plus additional components, sometimes optional. Users should review options carefully to avoid unwanted toolbars or extra software installed alongside the main application.
During uninstall, keeping user data depends mainly on
A B) CPU brand
B A) App design choices
C C) Monitor type
D D) Keyboard layout
Explanation: Some programs store user data separately and keep it on uninstall, while others remove it. Many uninstallers ask whether to keep settings, so the behavior depends on software design and user choice.
A common reason “setup cannot continue” appears is
A B) Extra RAM installed
B C) New wallpaper
C A) Missing permissions
D D) Speaker muted
Explanation: Many installations need admin rights to write to system folders or registry. If permissions are insufficient, setup may fail. Running as admin or using proper account rights often fixes it.
“Portable software” typically means it
A B) Needs registry entry
B C) Requires reboot
C D) Needs product key
D A) Runs without install
Explanation: Portable applications can run from a folder or USB without full installation. They usually do not add many system files, making them useful for quick use, though features may be limited.
A utility that checks disk errors is similar to
A A) Disk checking tool
B B) Word processor
C C) Video editor
D D) Email client
Explanation: Disk checking utilities scan for file system errors and bad sectors. Fixing these errors can prevent crashes, data loss, and problems reading or writing files on storage devices.
Device Manager is mainly useful for
A B) Writing code files
B C) Editing audio tracks
C A) Managing hardware devices
D D) Printing photos
Explanation: Device Manager shows hardware components and their driver status. It helps update, disable, or troubleshoot devices, and shows warning symbols when drivers are missing or malfunctioning.
A program installed in “Program Files (x86)” is usually
A B) Firmware file
B C) Kernel driver
C D) Boot record
D A) 32-bit app
Explanation: On 64-bit Windows, many 32-bit applications are installed in Program Files (x86). This keeps 32-bit and 64-bit programs organized and helps the OS manage compatibility properly.
If an application is repeatedly slow to open, a useful first check is
A B) Monitor brightness
B C) Keyboard language
C A) Startup programs list
D D) Printer queue
Explanation: Too many startup programs can slow boot and system performance. Checking and disabling unnecessary startup items frees resources, allowing applications to load faster and reducing background load.
A utility called “System Information” helps to
A B) Compress folders
B A) View hardware details
C C) Remove viruses
D D) Restore deleted files
Explanation: System Information shows OS version, hardware components, drivers, and system resources. It helps confirm specifications for compatibility, troubleshooting, and support, especially before installing demanding software.
A common cause of installation errors is
A B) Clean temp folder
B C) Updated antivirus
C D) New mouse driver
D A) Corrupt setup file
Explanation: A damaged or incomplete installer can fail during setup. Re-downloading from the official source and verifying file integrity helps avoid errors and ensures the correct installation files are used.
“Repair” option in some installers is used to
A A) Fix program files
B B) Increase RAM
C C) Change CPU type
D D) Add new monitor
Explanation: Repair reinstalls missing or damaged files and resets essential settings without fully removing the program. It is useful when the application behaves incorrectly due to corrupted components.
For troubleshooting, checking “Event Viewer” helps because it
A B) Speeds internet
B C) Edits photos
C A) Shows error logs
D D) Deletes malware
Explanation: Event Viewer records system and application events and errors. Reviewing these logs helps identify causes of crashes, service failures, and driver issues with timestamps and error details.
A system utility that restores deleted files from Recycle Bin is
A B) Disk defrag tool
B C) Firewall service
C D) Driver updater
D A) Restore from bin
Explanation: Files deleted normally often go to the Recycle Bin. Restoring from it is the simplest recovery method because the file is not permanently removed yet, unlike deep recovery tools.
When installing software, selecting “Run as administrator” mainly provides
A A) Elevated privileges
B B) Higher screen size
C C) Faster internet
D D) Better sound
Explanation: Running as administrator grants the program permission to write to system locations and registry. This is often required for installations and system tools, but should be done only for trusted software.
In Windows, “Add or remove programs” is now mainly found in
A B) Paint menu
B C) BIOS screen
C A) Settings apps list
D D) Boot manager
Explanation: Modern Windows provides uninstall options through Settings under Apps. It lists installed programs and allows uninstalling in a user-friendly way, similar to older Control Panel options.
A common function of an installer is to create
A B) New CPU cores
B A) Shortcuts and entries
C C) Extra RAM chips
D D) New monitor pixels
Explanation: Installers often create desktop/start menu shortcuts and register components so the software integrates properly. They may also add registry entries and configure services required for the application.
Utility software can be built into the OS, like
A B) Web browser only
B C) Video game app
C D) Music streaming
D A) Disk Cleanup
Explanation: Many operating systems include built-in utilities for maintenance. Disk Cleanup is a common example that removes temporary files, freeing space and helping keep the system efficient.
A key benefit of uninstalling unused software is
A B) Higher screen brightness
B C) Faster printer ink
C A) Reduced background load
D D) More keyboard keys
Explanation: Unused programs may run background services or startup tasks that consume CPU and RAM. Removing them can free resources, reduce conflicts, and improve system performance and stability.
If a device shows a warning icon in Device Manager, it often indicates
A A) Driver problem
B B) Low battery
C C) Full disk
D D) Slow internet
Explanation: Warning icons often mean the driver is missing, outdated, or malfunctioning. Updating or reinstalling the correct driver typically fixes the issue and restores the device’s normal operation.
The best safe source for downloading an installer is usually the
A B) Random file forums
B C) Unknown pop-up link
C D) Social media post
D A) Official vendor site
Explanation: Official vendor sites provide genuine installers without tampering. Untrusted sources may bundle malware or unwanted programs. Using trusted sources improves security, ensures correct versions, and supports updates properly.