You are viewing a free preview of this lesson.
Subscribe to unlock all 10 lessons in this course and every other course on LearningBro.
This lesson covers utility software — a type of systems software that performs specific maintenance and optimisation tasks to keep the computer running efficiently. Utility software is examined in AQA and OCR GCSE Computer Science.
Utility software is a category of systems software designed to help manage, maintain, and optimise the computer system. Utilities are not used for day-to-day productivity tasks (that is what application software is for). Instead, they work "behind the scenes" to keep the system healthy, secure, and efficient.
Most operating systems come with built-in utilities, but users can also install third-party alternatives.
graph TD
A["Utility Software"] --> B["Anti-Malware"]
A --> C["Disk Defragmentation"]
A --> D["Encryption"]
A --> E["Backup"]
A --> F["Compression"]
A --> G["File Management"]
F --> H["Lossy"]
F --> I["Lossless"]
E --> J["Full Backup"]
E --> K["Incremental Backup"]
Purpose: Detect, quarantine, and remove malware (malicious software) from the system.
How it works:
| Feature | Explanation |
|---|---|
| Real-time protection | Monitors activity continuously |
| Scheduled scans | Runs full system scans at preset times |
| Signature database | List of known malware patterns (must be updated regularly) |
| Quarantine | Isolates threats without deleting them |
Exam Tip: If asked about anti-malware, always mention that the signature database must be regularly updated to protect against new threats.
Purpose: Reorganise data on a magnetic hard drive so that files are stored in contiguous (adjacent) blocks.
Why is it needed?
Important notes:
Before defragmentation:
[A1][B1][__][A2][C1][B2][A3][__][C2][B3]
After defragmentation:
[A1][A2][A3][B1][B2][B3][C1][C2][__][__]
Purpose: Scramble data so that it can only be read by someone with the correct decryption key or password.
How it works:
| Term | Meaning |
|---|---|
| Plaintext | The original, readable data |
| Ciphertext | The encrypted, unreadable data |
| Encryption key | A piece of data used to encrypt/decrypt |
Use cases:
Purpose: Create copies of data so that it can be restored if the original is lost, corrupted, or damaged.
Types of backup:
| Backup Type | Description | Pros | Cons |
|---|---|---|---|
| Full backup | Copies all data every time | Complete copy; easy to restore | Slow; uses a lot of storage |
| Incremental backup | Copies only data changed since the last backup | Fast; uses less storage | Slower to restore (need all increments) |
Best practices:
Purpose: Reduce the file size of data so it takes up less storage space and can be transferred more quickly.
How it works:
| Type | Data Lost? | Examples | Best For |
|---|---|---|---|
| Lossy | Yes | JPEG, MP3, MP4 | Photos, music, video |
| Lossless | No | ZIP, PNG, FLAC | Documents, code, data |
Purpose: Help users organise, search, move, copy, and delete files and folders.
| Utility | Purpose | Key Point |
|---|---|---|
| Anti-malware | Detect and remove malware | Must update signature database regularly |
| Defragmentation | Reorganise fragmented data on HDD | Do NOT defragment SSDs |
| Encryption | Scramble data for security | Uses keys to encrypt/decrypt |
| Backup | Create copies of data for recovery | Store backups offsite |
| Compression | Reduce file size | Lossy (data lost) vs lossless (no data lost) |
| File management | Organise and manage files | Built into the OS |
Key Vocabulary: utility software, anti-malware, defragmentation, fragmented, contiguous, encryption, plaintext, ciphertext, backup, full backup, incremental backup, compression, lossy, lossless.
Subscribe to continue reading
Get full access to this lesson and all 10 lessons in this course.