Loading…
Transcript

Nathan Bewick

Types of Utility software

What is Utility Software?

  • Small pieces of software that help the computer run more effectively and efficiently.

What is Utility Software

Types of Utility software:

  • Defragmentation
  • Back up utilities
  • Anti-virus
  • Compression
  • Encryption

Types

Defragmentation

Defragmentation

  • When a file is stored on a hard disk it is not stored as a whole file, but as a series of segments. Sometimes the segments run together in sequence the segments are split up over a disk. This is known as fragmentation.

  • Over time, more and more files become fragmented.

  • Defragmentation software takes the fragmented files and rearranges the segments so that they run contiguously. This decreases read/write time, thereby speeding up computer performance.

A fragmented disk takes longer to read from and write to, making a computer run slower.

Back up utilities

Full Back up

  • A full backup involves making a copy of every file on the computer or network. They can require a lot of storage space and can be time consuming to make.

Incremental

  • Incremental backups take a copy of any new files created since the last backup or of any files that have been edited, such as user documents.

Anti-virus

Anti -virus

  • scans a computer system, either when activated or automatically at a specified date and time, and identifies potential viruses. Many anti-virus software programs can also delete or fix potential threats once they have been identified.

Compression

Compression

  • Compression software reduces the size of a file stored on secondary storage.

  • Smaller files are easier to transmit across a network as they require fewer packets to be sent. Their reduced size also means more files can be stored in any given area of storage.

Encryption

Encryption

  • used to scramble information so that it can be sent safely without anyone else being able to read it. The information is encrypted with a password or key that is needed to read the information again. The information receiver has the key or password to access the information.