Which of the following is not a typical function performed by the os installation program?

Skip to main content

This browser is no longer supported.

Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.

Windows Setup Installation Process

  • Article
  • 09/15/2021
  • 2 minutes to read

In this article

Windows Setup is the program that installs Windows or upgrades an existing Windows installation. It is also the basis for the following installation and upgrade methods:

  • Interactive Setup
  • Automated installation
  • Windows Deployment Services

Windows Setup Installation Types

Windows Setup can perform both clean and upgrade installations. However, it does not perform computer-to-computer migrations. Instead, you must use Windows Easy Transfer, the User State Migration Tool (USMT), or another migration tool to move data from a previous installation to the new operating system.

  • Custom installations. Windows Setup can perform a custom installation, also known as a clean installation, which saves your previous Windows installation but does not migrate your settings. The previous Windows installation will not boot after a clean installation.

  • Upgrade installations. Windows Setup can perform an installation that retains your settings and preferences while upgrading your operating system.

Windows Setup Process

The Windows Setup program starts and restarts the computer, gathers information, copies files, and creates or adjusts configuration settings. The following table shows the overall process for Windows Setup:

Windows Setup phaseSetup actions

Downlevel (for custom installations and upgrades)

- or -

Windows PE (for booting the Windows DVD or booting a custom Windows PE image)

  1. Specify Windows Setup configurations by using either the Windows Setup dialog boxes (interactive) or an answer file (unattended), or a combination of the two. Windows Setup configurations include adding a product key and configuring a disk.

  2. Apply answer file settings in the windowsPE configuration pass to configure the installation behavior and user experience.

  3. Configure the disk.

  4. Copy the Windows image to the disk.

  5. Prepare boot information.

  6. Process answer file settings in the offlineServicing configuration pass. The settings are applied to the Windows image before that Windows image boots. When the computer first boots, any optional components, drivers, updates, or language packs are processed.

Online configuration

Create specific configurations, making the Windows installation unique.

Windows Welcome

  1. Apply answer file settings in the oobeSystem configuration pass.

  2. Apply content file settings from the Oobe.xml file.

  3. Start Windows Welcome.

Windows Setup Technical Reference

Automate Windows Setup

Settings for Automating OOBE

Windows Setup Scenarios and Best Practices

Windows Setup Automation Overview

Audit Mode Overview

Windows Setup Configuration Passes

Windows Setup Supported Platforms and Cross-Platform Deployments

1) Which of the following is not an operating system?

  1. Windows
  2. Linux
  3. Oracle
  4. DOS

Answer: (c) Oracle

Explanation: Oracle is an RDBMS (Relational Database Management System). It is known as Oracle Database, Oracle DB, or Oracle Only. The first database for enterprise grid computing is the Oracle database.


2) What is the maximum length of the filename in DOS?

  1. 4
  2. 5
  3. 8
  4. 12

Answer: (c) 8

Explanation: The maximum length of the filename is 8 characters in the DOS operating system. It is commonly known as an 8.3 filename.


3) When was the first operating system developed?

  1. 1948
  2. 1949
  3. 1950
  4. 1951

Answer: (c) 1950

Explanation: The first operating system was developed in the early 1950's. It was also called a single-stream batch processing system because it presented data in groups.


4) When were MS windows operating systems proposed?

  1. 1994
  2. 1990
  3. 1992
  4. 1985

Answer: (d) 1985

Explanation: The first MS Windows operating system was introduced in early 1985.


5) Which of the following is the extension of Notepad?

  1. .txt
  2. .xls
  3. .ppt
  4. .bmp

Answer: (a) .txt

Explanation: The .txt file extension is a standard text document extension that contains the unformatted text. It is the default file extension for the notepad.


6) What else is a command interpreter called?

  1. prompt
  2. kernel
  3. shell
  4. command

Answer: (c) shell

Explanation: The command interpreter is also called the shell.


7) What is the full name of FAT?

  1. File attribute table
  2. File allocation table
  3. Font attribute table
  4. Format allocation table

Answer: (b) File allocation table.

Explanation: The FAT stands for File allocation table. The FAT is a file system architecture. It is used in computer systems and memory cards. A FAT of the contents of a computer disk indicates which field is used for which file.


8) BIOS is used?

  1. By operating system
  2. By compiler
  3. By interpreter
  4. By application software

Answer: (a) By operating system

Explanation: BIOS is used by the operating system. It is used to configure and identify the hardware in a system such as the hard drive, floppy drive, optical drive, CPU, and memory.


9) What is the mean of the Booting in the operating system?

  1. Restarting computer
  2. Install the program
  3. To scan
  4. To turn off

Answer: (a) Restarting computer

Explanation: Booting is a process of the restart the computer. After restarting it, there is no software in the computer's main memory.


10) When does page fault occur?

  1. The page is present in memory.
  2. The deadlock occurs.
  3. The page does not present in memory.
  4. The buffering occurs.

Answer: (c) The page does not present in memory.

Explanation: Page faults occur when a process tries to access a block page of the memory and that page is not stored in RAM (Read only memory) or memory.


11) Banker's algorithm is used?

  1. To prevent deadlock
  2. To deadlock recovery
  3. To solve the deadlock
  4. None of these

Answer: (a) To prevent deadlock

Explanation: Banker's algorithm is used to prevent the deadlock condition. The banker algorithm is sometimes called the detection algorithm. It is named the banker algorithm because it is used to determine whether a loan can be granted in the banking system or not.


12) When you delete a file in your computer, where does it go?

  1. Recycle bin
  2. Hard disk
  3. Taskbar
  4. None of these

Answer: (a) Recycle bin

Explanation: When you delete a file on your computer device, it is transferred to your computer system's recycle bin or trash.


13) Which is the Linux operating system?

  1. Private operating system
  2. Windows operating system
  3. Open-source operating system
  4. None of these

Answer: (c) Open-source operating system

Explanation: The Linux operating system is an open-source operating system made up of a kernel. It is a very safe operating system.


14) What is the full name of the DSM?

  1. Direct system module
  2. Direct system memory
  3. Demoralized system memory
  4. Distributed shared memory

Answer: (d) Distributed shared memory

Explanation: The DSM stands for Distributed Shared Memory.


15) What is the full name of the IDL?

  1. Interface definition language
  2. Interface direct language
  3. Interface data library
  4. None of these

Answer: (a) Interface definition language

Explanation: The IDL stands for Interface Definition Language. It is used to establish communications between clients and servers in RPC (Remote Procedure Call).


16) What is bootstrapping called?

  1. Cold boot
  2. Cold hot boot
  3. Cold hot strap
  4. Hot boot

Answer: (a) Cold boot

Explanation: Bootstrapping is also known as the cool boot.


17) What is the fence register used for?

  1. To disk protection
  2. To CPU protection
  3. To memory protection
  4. None of these

Answer: (c) To memory protection

Explanation: The fence register is used for memory protection on the computer. It is a way to access the memory in the computer.


18) If the page size increases, the internal fragmentation is also?..?

  1. Decreases
  2. Increases
  3. Remains constant
  4. None of these

Answer: (b) Increases

Explanation: None


19) Which of the following is a single-user operating system?

  1. Windows
  2. MAC
  3. Ms-Dos
  4. None of these

Answer: (c) Ms-Dos

Explanation: The single-user operating system is the operating system in which only one user can access the computer system at a time, and Ms-DOS is the best example of a single-user operating system.


20) The size of virtual memory is based on which of the following?

  1. CPU
  2. RAM
  3. Address bus
  4. Data bus

Answer: (c) Address bus

Explanation: The size of virtual memory is based on the address bus.


21) If a page number is not found in the translation lookaside buffer, then it is known as a?

  1. Translation Lookaside Buffer miss
  2. Buffer miss
  3. Translation Lookaside Buffer hit
  4. All of the mentioned

Answer: (a) Translation Lookaside Buffer miss

Explanation: A Translation Lookaside Buffer miss arises when the page table entry needed to translate a virtual address to a physical address is not available in the translation lookaside buffer.


22) Which of the following is not application software?

  1. Windows 7
  2. WordPad
  3. Photoshop
  4. MS-excel

Answer: (a) Windows 7

Explanation: Windows 7 is not an application software because it is a operating system.


23) Which of the following supports Windows 64 bit?

  1. Window XP
  2. Window 2000
  3. Window 1998
  4. None of these

Answer: (a) Window XP

Explanation: Windows XP supports the 64-bits. Windows XP is designed to expand the memory address space. Its original name is Microsoft Windows XP Professional x64 and it is based on the x86-64 architecture.


24) Which of the following windows does not have a start button?

  1. Windows 7
  2. Windows 8
  3. Windows XP
  4. None of these

Answer: (b) Windows 8

Explanation: Windows 8 does not have a start button because it uses the tablet mode, but windows 8.1 has a start button.


25) Which of the following operating systems does not support more than one program at a time?

  1. Linux
  2. Windows
  3. MAC
  4. DOS

Answer: (d) DOS

Explanation: DOS stands for Disk operating system. Disk operating system is a single-user operating system that does not support more than one program at a time.


26) Which of the following is a condition that causes deadlock?

  1. Mutual exclusion
  2. Hold and wait
  3. Circular wait
  4. No preemption
  5. All of these

Answer: (e) All of these

Explanation: None


27) Who provides the interface to access the services of the operating system?

  1. API
  2. System call
  3. Library
  4. Assembly instruction

Answer: (b) System call

Explanation: The system call provides an interface for user programs to access the services of the operating system through the API (Application Program Interface).


28) Where are placed the list of processes that are prepared to be executed and waiting?

  1. Job queue
  2. Ready queue
  3. Execution queue
  4. Process queue

Answer: (b) Ready queue

Explanation: The ready queue is a set of all the processes that processes are ready to execute and wait.


29) Who among the following can block the running process?

  1. Fork
  2. Read
  3. Down
  4. All of these

Answer: (d) All of these

Explanation: None


30) Which of the following does not interrupt the running process?

  1. Timer interrupt
  2. Device
  3. Power failure
  4. Scheduler process

Answer: (b) Scheduler process

Explanation: Scheduler process does not interrupt in any running process. Its job is to select the processes for long-term, short-term, and short-term scheduler.


31) What is Microsoft window?

  1. Operating system
  2. Graphics program
  3. Word Processing
  4. Database program

Answer: (a) Operating system

Explanation: Microsoft Windows is an operating system that was developed by Microsoft company. The Microsoft Windows is available in 32-bits and 64-bits in the market.


32) Which of the following is group of programs?

  1. Accessories
  2. Paint
  3. Word
  4. All of above

Answer: (a) Accessories

Explanation: The windows accessories are a group of programs in the operating system. Windows XP offers many accessories or software that you can use to help with your work. The accessories are not full features programs, but it is useful for a specific task in the operating systems. It provides many programs such as a painting program, a calculator, a word processor, a notepad, and Internet software.


33) Which of the following is an example of a Real Time Operating System?

  1. MAC
  2. MS-DOS
  3. Windows 10
  4. Process Control

Answer: (d) Process Control

Explanation: Process control is a best example of a Real time operating system.


34) Which of the following operating systems do you use for a client-server network?

  1. MAC
  2. Linux
  3. Windows XP
  4. Windows 2000

Answer: (d) Windows 2000

Explanation: Windows 2002 operating systems were used to implement a client Server Network. It is a server OS that was developed by Microsoft in April 24, 2002. It includes some features of Windows XP.


35) Which windows was introduced to My Computer?

  1. Windows 10
  2. Windows XP
  3. Windows 95
  4. Windows 98

Answer: (c) Windows 95

Explanation: Windows 95 was first window to introduced the My Computer.


36) What type of commands are required to perform various tasks in DOS?

  1. Internal commands
  2. External commands
  3. Valuable commands
  4. Primary commands

Answer: (b) External commands

Explanation: External commands are required to perform various tasks in DOS.


37) What is the number of characters contained in the primary name of the file of MS-DOS?

  1. Up to 8 characters
  2. 3 characters
  3. Up to 10 characters
  4. None of the above

Answer: (a) Up to 8 characters

Explanation: MS-DOS operating system uses the file system that supports the 8.3 characters. The eight characters are used to the filename, and three characters are used to the extension.


38) Which command is used to fetch a group (.doc) of files that have just been deleted?

  1. Undelete
  2. Undelete/all
  3. Undelete *.doc
  4. All of above

Answer: (c) Undelete *.doc

Explanation: Undelete *.doc command is used to fetch a group (.doc) of files that have just been deleted.


39) Which of the following is system software?

  1. Operating system
  2. Compiler
  3. Utilities
  4. All of the above

Answer: (d) All of the above

Explanation: The system software is a type of computer program designed to run hardware and software programs on a computer.

According to some definitions, system software also includes system utilities, system restore, development tools, compilers, and debuggers.


40) Which program runs first after booting the computer and loading the GUI?

  1. Desktop Manager
  2. File Manager
  3. Windows Explorer
  4. Authentication

Answer: (d) Authentication

Explanation: The authentication program is run first after booting the computer and loading the GUI. Authentication is a process of verifying the person or device. For example, when you log in to Facebook, you enter a username and password.


Which of the following is not a typical function of operating systems?

Virus protection is the function of Firewall and Antivirus. Hence, it is not the function of an operating system. So, the correct answer is option (b).

Which one of the following is not an operating system program?

The correct answer is Oracle.

What are the 5 main functions of an operating system?

In any computer, the operating system:.
Controls the backing store and peripherals such as scanners and printers..
Deals with the transfer of programs in and out of memory..
Organises the use of memory between programs..
Organises processing time between programs and users..
Maintains security and access rights of users..

What are the functions of an OS?

Functions of Operating System.
File Management. An operating system's (OS) primary function is to manage files and folders. ... .
Device management. Operating systems provide essential functions for managing devices connected to a computer. ... .
Process management. ... .
Memory management. ... .
Job Accounting..