Chapter 3: Computer Software and System Utilities (Set-9)
In an OS, which kernel responsibility most directly prevents one app from overwriting another app’s memory
A File compression
B Disk cleanup
C App theming
D Memory protection
Explanation: Memory protection isolates each process’s address space so one program cannot access or overwrite another program’s memory directly. This improves stability and security by preventing crashes and unauthorized data access.
When a driver is “signed,” the main practical benefit is
A Faster CPU clock
B Larger disk size
C Trusted driver integrity
D Better screen color
Explanation: Driver signing helps the OS verify the driver’s publisher and detect tampering. It reduces the chance of loading malicious or altered drivers and improves system security and reliability.
A “service” in an OS context is best described as
A Background system process
B Photo editing tool
C File archive type
D Screen resolution
Explanation: Services run in the background to provide system or application features like updates, printing, or networking. They often start automatically and continue running without a user interface.
Which scenario best matches a “dependency” problem during software launch
A Low screen brightness
B Extra disk partitions
C Missing runtime library
D Loud fan noise
Explanation: Many applications require supporting components such as runtime libraries or frameworks. If a required dependency is missing or incompatible, the app may fail to start or show errors like missing DLL.
A missing DLL error after a partial uninstall most often happens because
A CPU overheated
B Shared component removed
C RAM upgraded
D Browser cache full
Explanation: Some programs share DLLs. If a partial uninstall removes a shared DLL still needed by another app, that app may fail with missing DLL errors until the component is restored.
Which update type is most likely to include many earlier fixes in one package
A Cumulative update
B Theme pack
C Codec install
D Font update
Explanation: Cumulative updates bundle multiple fixes and often include previously released updates. Installing one cumulative update can bring a system up to date without installing many individual patches.
If an enterprise wants to deploy software without prompts across many PCs, they prefer
A Manual install
B Trial mode
C Silent install
D Safe mode
Explanation: Silent installation uses preset options and runs without user interaction. It supports large-scale deployment through scripts or management tools, ensuring consistent installation across many computers.
Which licensing type legally allows use, modification, and redistribution under license terms
A Proprietary
B Shareware
C Trialware
D Open source
Explanation: Open source licenses typically allow modifying and redistributing software, provided the license conditions are followed. Conditions may include attribution, sharing changes, or keeping the same license for derivatives.
A common risk of using “driver updater” tools from unknown sources is
A Wrong driver install
B Faster boot always
C More SSD space
D Cleaner desktop
Explanation: Untrusted driver updaters may install incorrect drivers or bundle malware. Wrong drivers can cause crashes or device failure. Prefer official vendor drivers and create restore points before changes.
In Windows, “Compatibility mode” mainly changes
A Hardware BIOS chips
B CPU core count
C App environment settings
D Disk partition table
Explanation: Compatibility mode applies older settings such as version reporting, display scaling, or permission behavior so older applications can run on newer systems without changing hardware or OS internals.
Why does Safe Mode help remove stubborn malware in many cases
A Extra graphics drivers
B Minimal startup components
C Maximum background apps
D Faster internet speed
Explanation: Safe Mode loads minimal drivers and startup programs. Many malware components do not start, making them easier to detect and remove because fewer malicious processes are active.
A restore point rollback will most directly affect
A Personal photos only
B Cloud emails only
C System files/settings
D External USB data
Explanation: System Restore rolls back system files, drivers, and settings to an earlier state. It usually does not remove personal documents, but it can undo recent system changes causing instability.
Which of the following best describes “firmware update” impact
A Hardware-level behavior
B Document formatting
C Browser bookmarks
D App shortcuts
Explanation: Firmware updates modify low-level code controlling hardware behavior, such as BIOS/UEFI or device firmware. They can improve compatibility, fix bugs, or add support but must be applied carefully.
A program that runs but frequently freezes under heavy load indicates likely
A Wrong wallpaper
B Extra fonts
C Resource bottleneck
D New mouse pad
Explanation: Freezing under heavy load often indicates insufficient RAM, high CPU usage, or slow disk I/O. Monitoring resource usage helps identify the bottleneck and decide whether to optimize or upgrade hardware.
Which tool best helps find whether disk, CPU, or RAM is the main bottleneck over time
A Disk Cleanup
B Paint
C Notepad
D Performance Monitor
Explanation: Performance Monitor records system counters over time, showing trends for CPU, memory, disk, and network usage. It helps identify recurring bottlenecks more accurately than brief snapshots.
A software “rollback” is safest when combined with
A Verified restore point
B Random registry edits
C Folder manual deletion
D Cracked installer
Explanation: A restore point provides a known fallback if rollback actions cause further problems. It reduces risk by allowing you to revert system settings and drivers to a stable state.
When an installer requests elevated privileges, it is typically to
A Change wallpaper
B Play audio
C Write system areas
D Zip photos
Explanation: Installers often need admin rights to write to Program Files, system directories, or registry. Elevated permissions allow these changes, so they should be granted only for trusted installers.
Deleting an app’s folder may not fully remove it because
A CPU becomes slower
B Services may remain
C RAM increases
D Monitor changes
Explanation: Some apps install services, scheduled tasks, registry entries, and shared libraries. Manual deletion does not remove these components, which may still run or cause errors, so uninstallation is recommended.
In troubleshooting, “clean boot” is mainly used to
A Isolate startup conflicts
B Increase disk size
C Update firmware
D Repair monitor
Explanation: Clean boot starts Windows with minimal startup programs and non-essential services disabled. It helps identify whether a third-party startup item or service is causing crashes or slowdowns.
A software update that changes major version number usually indicates
A Minor hotfix
B Disk cleanup
C Major release
D File compression
Explanation: Major version changes usually reflect significant feature changes or architecture updates. They may introduce new requirements or compatibility changes, so testing and backups are recommended before upgrading.
Which scenario most likely needs “repair install” instead of full uninstall
A Broken keyboard
B Slow internet
C Empty recycle bin
D Missing program files
Explanation: Repair install restores missing or damaged application components without removing the program completely. It is useful when the app is installed but fails due to corrupted files or missing libraries.
If an antivirus scan finds malware but cannot remove it while Windows runs normally, a good next step is
A Increase brightness
B Install themes
C Safe Mode scan
D Defrag SSD
Explanation: In Safe Mode, fewer processes run, so malware is less likely to protect itself. Running a scan there can improve removal success for stubborn infections.
Which file type is most associated with Windows Installer packages
A JPG
B MSI
C MP3
D HTML
Explanation: MSI is the Windows Installer package format used for installations, repairs, and uninstalls. It supports standardized deployment and management, especially in enterprise environments.
When software fails only on one Windows version but works on others, it is likely a
A Compatibility issue
B Disk fragmentation
C Printer issue
D Monitor issue
Explanation: OS differences can affect permissions, drivers, or supported libraries. If the app works elsewhere, using compatibility mode, updating, or installing required runtimes often resolves version-specific issues.
Browser extensions are a security risk mainly when they
A Are small in size
B Are open source
C Have broad permissions
D Use dark theme
Explanation: Extensions with wide permissions can read browsing data, modify pages, and capture credentials. Limiting extensions and reviewing permissions reduces risk, especially for unknown developers.
Which licensing model commonly restricts copying and source code access
A Open source
B Public domain
C Free software
D Proprietary license
Explanation: Proprietary licenses usually allow use under conditions but restrict copying, modification, and distribution. Source code is typically closed, and the vendor controls how the software can be used.
A “trial” limitation in shareware is often enforced through
A Time or features
B BIOS settings
C Disk partition
D File format
Explanation: Shareware commonly limits usage time or disables features until payment. Activation keys or account verification can unlock the full version after purchase.
Installing patches late increases risk mainly because
A Files compress slower
B Keyboard changes
C Vulnerabilities stay open
D Screen gets dim
Explanation: Known vulnerabilities remain exploitable until patched. Delaying security patches increases exposure to malware and attacks that target published weaknesses.
If “Programs and Features” uninstall fails, a safer next step is
A Delete system32
B Use vendor uninstaller
C Format drive
D Disable OS updates
Explanation: Some vendors provide dedicated removal tools to clean leftover services and files. Using official uninstall utilities is safer than manual deletion and reduces the chance of breaking shared components.
An OS-level “update rollback” most commonly restores
A Screen wallpaper
B Printer paper
C Previous build
D File zip format
Explanation: Rolling back a system update returns to a previous version or build when a new update causes instability. It helps restore usability while waiting for corrected updates or drivers.
A corrupted installer download is best handled by
A Re-download official copy
B Disable antivirus
C Edit registry
D Defrag SSD
Explanation: Corruption can occur from interrupted downloads or tampering. Re-downloading from the official source ensures integrity and reduces malware risk. Verifying digital signatures or checksums adds confidence.
In Windows, the default location for 64-bit apps is commonly
A Temp folder
B System32 only
C Program Files
D Recycle Bin
Explanation: 64-bit apps typically install in “Program Files,” while 32-bit apps often go to “Program Files (x86).” This separation helps compatibility and organization on 64-bit Windows systems.
A frequent reason a program runs as “Access denied” is
A Too much RAM
B SSD fragmentation
C New wallpaper
D Insufficient permissions
Explanation: Access denied errors occur when the user account lacks rights to read, write, or execute files. Running as admin, adjusting permissions, or installing in user space can fix it safely.
Which concept best explains “default program” setting
A File association
B Disk partitioning
C Driver signing
D CPU scheduling
Explanation: File association links a file type like .pdf or .jpg to a specific application. The default program is the one automatically chosen to open that file type.
Why is “restore point” not a full backup substitute
A Saves everything always
B Works offline only
C Limited scope
D Deletes user files
Explanation: Restore points focus on system files and settings, not full user data. They help undo system changes, but do not guarantee recovery of personal files after deletion or disk failure.
A “system image” is more complete than restore point because it
A Stores only settings
B Captures full disk
C Stores only logs
D Stores only cache
Explanation: System images include OS, programs, settings, and often user data in a disk snapshot. They can restore a whole system after disk failure, unlike restore points which are limited.
If an app works only when antivirus is disabled, a safer approach is
A Keep antivirus off
B Use cracked version
C Add trusted exclusion
D Disable firewall too
Explanation: Disabling security permanently is risky. If the app is trusted and falsely flagged, adding a specific exclusion for the app’s folder or process is safer while keeping protection active.
A common reason for repeated BSOD after driver update is
A Incompatible driver
B Clean disk space
C New user account
D Changed wallpaper
Explanation: Blue Screen errors often result from faulty or incompatible drivers interacting with kernel mode. Rolling back the driver or installing the correct version from the hardware vendor commonly fixes the issue.
A plug-in differs from an extension mainly because a plug-in usually
A Changes CPU hardware
B Formats hard disk
C Integrates into host app
D Updates BIOS
Explanation: Plug-ins add features within a specific host application. Extensions often add features to browsers. Both extend functionality but are tied to different platforms and permission models.
A VM snapshot is mainly useful to
A Increase RAM permanently
B Remove OS license
C Repair monitor
D Revert VM quickly
Explanation: Snapshots capture the VM state at a point. If a test breaks the system, you can revert quickly without reinstalling, making VMs ideal for safe experimentation and training.
A key advantage of cloud software updates is
A Needs no internet
B Provider manages updates
C Always works offline
D No permissions needed
Explanation: In cloud services, the provider applies updates on servers. Users get latest features and fixes without manual installation, though this depends on connectivity and provider change management.
Which troubleshooting step best addresses “corrupt cache” issues
A Clear cache data
B Increase CPU cores
C Change monitor
D Replace keyboard
Explanation: Clearing cache removes corrupted temporary data, forcing the application to rebuild fresh files. This often fixes display glitches, loading errors, and unexpected behavior in browsers and apps.
A “clean uninstall” aims to remove
A Only shortcuts
B Only documents
C Leftover components
D Only wallpapers
Explanation: Clean uninstall removes not just program files but also services, registry entries, and configuration leftovers. This prevents future conflicts and ensures a fresh state before reinstalling.
In licensing, “activation limit” means
A Unlimited sharing
B Free modifications
C No EULA needed
D Limited device installs
Explanation: Some licenses allow activation on only a certain number of devices. Exceeding the limit may block activation until deactivated elsewhere or the license is upgraded.
A software “audit” in an organization mainly checks
A Keyboard speed
B Monitor pixels
C License compliance
D File compression
Explanation: Software audits verify that installed software matches purchased licenses. This prevents legal issues, ensures proper usage, and helps manage inventory and costs.
“Hotfix rollback” might be needed when the hotfix
A Breaks stability
B Adds security only
C Clears cache
D Zips files
Explanation: Even small fixes can introduce new issues. Rolling back restores the previous state and keeps systems usable until a corrected patch is provided.
A common best practice before major updates is to
A Disable firewall
B Take full backup
C Use cracked tools
D Remove antivirus
Explanation: Major updates can fail or cause incompatibilities. A full backup or system image allows recovery if the system becomes unbootable or unstable after the update.
An application that fails on standard user but works on admin suggests
A Better RAM needed
B Driver missing
C Permission requirement
D Wrong file format
Explanation: If admin works but standard fails, the app likely needs access to protected folders or settings. Proper fixes include adjusting permissions or installing per-user rather than running everything as admin.
A typical sign of registry corruption is
A Install/launch errors
B Cleaner desktop
C Faster boot
D Better battery
Explanation: Corrupt registry entries can break file associations, services, and application settings, leading to install failures, launch errors, or misconfiguration. Repairs may involve reinstalling affected apps or system repair tools.
The safest way to verify a downloaded installer is genuine is to check
A File icon color
B Folder name length
C Digital signature
D Screen resolution
Explanation: Digital signatures verify the publisher and detect tampering. Checking the signature or trusted checksum helps ensure the installer is authentic and reduces the risk of malware from modified downloads.