Utility software
utility softwareSoftware that performs a specific and useful task, for example compressing files, defragmenting the hard disk helps maintain the system. Utility software is used for:
- defragmentationThe process of reordering files stored on a hard disk so that their segments run contiguously.
- data compressionA method of reducing file sizes, particularly in digital media such as photos, audio and video.
- backupA copy of important files that is kept separately in case the original files are lost or damaged.
- virus scannerAn application that scans a computer's hard disk and any other attached storage device for viruses.
- firewallAn application that prevents unauthorised connections to and from the Internet.
- system monitoring
- task management
- disk scanning and repair
Disk defragmentation
When a file is stored on a hard disk driveA device used to store large amounts of data. it is not stored as a whole file, but as a series of segments. Sometimes the segments run together in sequence (see File 1) and sometimes the segments are split up over a disk (see File 3). This is known as fragmentation.
Over time, more and more files become fragmented. A fragmented disk takes longer to read from and write to, making a computer run slower.
Defragmentation software takes the fragmented files and rearranges the segments so that they run contiguously. This decreases read/write time, thereby speeding up computer performance.
Data compression
Compression software reduces the size of a file stored on secondary storageNon-volatile memory external to the CPU and used for long-term storage of programs and data..
Smaller files are easier to transmit across a networkA group of interconnected computers/devices. as they require fewer data packetA piece of data sent over a network. Messages have to be broken down into binary data packets before they are transferred. to be sent. Their reduced size also means more files can be stored in any given area of storage.
Backups
dataUnits of information. In computing there can be different data types, including integers, characters and Boolean. Data is often acted on by instructions. can be lost accidentally or deliberately. A user may accidentally delete or overwrite a file or a hard disk may fail, preventing access to any files stored on it. A hackerA person who tries to gain unauthorised access to a computer. or malicious user may deliberately delete or overwrite data.
To prevent data loss, regular copies of the data should be made. A copy of data is known as a backup. Backups can contain a copy of all files on a computer, or just those specified by a user.
network administratorAlso known as network manager. A person with the responsibility of managing and maintaining the network within an organisation. - also known as network administrators - make regular backups of all files on a network using backup software. The software automatically makes a backup at a scheduled time of day, usually during the evening when the network is quiet. Backups are usually made to a high capacity secondary storage device or to the cloudA term often used to describe a location on the internet from which software applications are run and where data is stored..
If data loss occurs, data can be retrieved from the backup. The software allows all backed-up files to be retrieved, or just specified files. This can be done with a system restore.
Two types of backup are possible:
- full backup
- incremental backup
A full backup involves making a copy of every file on the computer or network. They can require a lot of storage space and can be time consuming to make.
Incremental backups take a copy of any new files created since the last backup or of any files that have been edited, such as user documents.
Most network managers make an initial full backup and then switch to daily incremental backups. This way all data is backed up and daily backups are small and less time consuming.
Virus scanning
anti-virusAnti-virus software scans all forms of storage devices for viruses (programs harmful to computers) and, if found, attempts to remove them. software scans a computer system, either when activated or automatically at a specified date and time, and identifies potential viruses. Many antivirus software programs can also delete or fix potential threats once they have been identified.
Firewall
A firewall is a network security system that monitors incoming and outgoing network traffic and blocks content based on predetermined rules. It works as a barrier to protect the users on the network from untrusted or undesirable content, typically from the internet.
System monitoring
System monitoring is used to monitor the resources and performance of a computer system, such as CPU/processorCentral processing unit - the brain of the computer that processes program instructions. usage or the amount of free RAMRandom access memory. This is volatile memory that is constantly being written to and read from. It does not retain its contents without a constant supply of power. When a computer is turned off, everything stored in its RAM is lost..
Task management
Task management software provides information about the processes and applications currently running on a computer. This can be used to identify why a computer may be running slowly. It highlights all tasks that the CPU is currently performing, including those that are hidden from the user.
Disk scanning and repair
This allows a system to detect and, if possible, recover from physical errors on the disk. It scans disk surfaces for defects and marks those sections as unavailable to prevent the rewriting of data and data loss.
More guides on this topic
- The CPU - Eduqas
- Primary storage - Eduqas
- Secondary storage and embedded systems - Eduqas
- Networks - Eduqas
- Internet and cybersecurity - Eduqas
- Data representation - Eduqas
- Storage and data organisation - Eduqas
- Principles of programming - Eduqas
- Algorithms - Eduqas
- Sorting, searching and validation - Eduqas
- Software development - Eduqas
- Impacts of digital technology on wider society - Eduqas