SOFTWARE - 2 UTILITY SOFTWARE

Slides:



Advertisements
Similar presentations
Utility program + driver program Thomas Wat 4D (21)
Advertisements

© Vera Castleman Software Grade 10. What is software? A program is a collection of instructions to do a job. Programs are collectively known as SOFTWARE.
Backup Strategy. An Exam question will ask you to describe a backup strategy. Be able to explain: Safe, secure place in different location. Why? – For.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Computer Referbishment The Demonstration. To Do… Virus Protection Schedule A Full System Scan Install Service Pack 3 Clean Up Tools Drive Formatting Install.
Utility Programs and their Functions. Antivirus Software (Virus Checker) Keep the Computer software healthy and free of virus’ that can harm the function.
Software utilities Gladys Nzita-Mak. Disk defragmentation Disk defragmentation makes computers run efficiently. When you save, change or delete files.
Utility Programs  A type of system software that is used to solve a particular problem is called utility program. Many operating system provides different.
Chapter 5: System Software: Operating Systems and Utility Programs.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Chapter Three OPERATING SYSTEMS.
IT Security for Users By Matthew Moody.
Utility Programs Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Software.
Your Interactive Guide to the Digital World Discovering Computers 2012.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Operating System and Utility Programs 1. Objectives Overview Define system software and identify the two types of system software Describe the functions.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
AS Level ICT Selection and use of appropriate software: Utilities and file management.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
1 Chapter 7 Operating Systems & Utility Programs.
Your Interactive Guide to the Digital World Discovering Computers Types of Utility Programs and Operating Systems Chapter Eight.
Matthew Glenn AP2 Techno for Tanzania This presentation will cover the different utilities on a computer.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Software - Utilities Objectives Understand what is meant by utility software and application software Look at common utilities – Security – Disk organisation.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Information Systems Design and Development Security Precautions Computing Science.
CHAPTER 2 COMPUTER SOFTWARE. LEARNING OUTCOMES At the end of this class, students should be able to:  Explain the significance of software  Define and.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Copyright Prentice Hall, Inc. 1 Computers: Information Technology in Perspective, 11e Larry Long and Nancy Long Chapter 5 Storing and Retrieving Information.
Networking Objectives Understand what the following policies will contain – Disaster recovery – Backup – Archiving – Acceptable use – failover.
Lesson 9: SOFTWARE ICT Fundamentals 2nd Semester SY
Chapter 6 Protecting Your Files
Tech Level Cyber Security Lesson 7
Objectives Overview Define system software and identify the two types of system software Describe the functions of an operating system Summarize the features.
Discovering Computers 2012: Chapter 8
Lesson Objectives Aims You should be able to:
Objectives Overview Define system software and identify the two types of system software Describe the functions of an operating system Summarize the startup.
Systems Software Keywords Utilities and Backups
TexPREP Summer Camp Computer Science
Discovering Computers 2011: Living in a Digital World Chapter 8
Backup your Data © EIT, Author Gay Robertson, 2017.
Objectives Overview Define system software and identify the two types of system software Describe the functions of an operating system Summarize the features.
Chapter 4 The Power behind the Power
Chapter 6 Purchasing and Maintaining a Computer
Systems Software Keywords Operating Systems
LO2: Understand Computer Software
Utility Programs.
File Managements.
Objectives Overview Define system software and identify the two types of system software Describe the functions of an operating system Summarize the startup.
Objectives Overview Define system software and identify the two types of system software Describe the functions of an operating system Summarize the startup.
5 SYSTEM SOFTWARE CHAPTER
Chapter 4 The Power behind the Power
Types of Software.
Operating Systems Tasks 17/02/2019.
Unit 4 IT Security Kerris Davies.
Software - Operating Systems
Utility Software compression; defragmentation; backing up; encryption Revision YouTube clip:
LO2 – Understand Computer Software
GCSE Computer Science System Software Workbook Year 10 Half Term 4
Operating Systems & System Software
G061 - Network Security.
Objectives Overview Define system software and identify the two types of system software Describe the functions of an operating system Summarize the startup.
Presentation transcript:

SOFTWARE - 2 UTILITY SOFTWARE

Thought for the day This rack of servers in CERN’s Geneva data centre, where it stores 160PB of data on disk and tape drives. The detectors that record particle collisions take 14 million pictures per second – all of which need to be stored!

Big Picture – Systems Software In this topic, you need to understand: The purpose and functionality of systems software Operating systems: User interface Memory management/multitasking Peripheral management and drivers User management File management Utility system software: Encryption software Defragmentation Data compression The role and methods of backup: full and incremental

Systems Software Anti-Virus Software Operating Systems Disk Defragmentation Tool Utility Programs Disk copier / formatter Systems Software Data Compression Graphics card driver Device Drivers Network Interface Card Driver

Learning Objectives By the end of today’s lesson, you will be able to: To understand the need for Utility Software To be able to describe the purpose of Encryption Software Defragmentation Data Compression To understand the role and methods of backup Full Incremental

Starter: What does the OS system manage? Operating System P…… manager M…… manager D…. Manager F…. manager User Interfaces GUI WIMP Windows (7, 8, 10) IOS Mac Android Linux / Unix Raspbian What do the acronyms mean? What is the other type of user interface?

Utility Software Utility programs are designed to do just one or two tasks Utility software interacts with the computers hardware E.g. the Disk Drive, Utility programs are in built in to the Operating System or could be bought/downloaded as separate programs Utilities are not essential for the computer to work, but either make it easier for the user to use or do something, or provide some “housekeeping”

Utility Programs Disk/File Management eg Disk Copying, Disk Formatting Disk Defragmentation File Compression File Repair Disk Backup / Restore Security utilities eg Anti-Virus, Firewall Encryption

Defragmentation Software When a hard disk drive is new – files get added onto the disk in order – very much like starting with a blank piece of paper and adding to it As files are deleted – this leaves gaps When new files are saved – the files fill the gaps and become fragmented Defragmentation software groups fragmented files back together

Defragmentation Software Here we have a hard disc with 3 platters. We have 3 files but they are not together so the read/write head needs to move to different places to read the whole file. This is slow. Defragmenting a drive moves the file fragments so that they are all in continuous sectors. This means the read/write head does not have to move as far and so can read files faster. The defragmenter also groups all the free disk space together so that new files can be store in one place This optimises disk performance

Automatic Updating Makes sure utility software is up to date For any software already installed, the update utility will regularly check the internet for updates It will download and install these if newer This is particularly important for antivirus and firewall software Application software should also be updated as there will be bug fixes and improvements available for people with a license

Compression Reducing the size of the file by performing an algorithm on the original data to remove redundant data Lossless The original file can be re-created as no data is lost. For example: used on text files where it has to be possible to restore the files exactly otherwise you wouldn’t be able to read them Lossy Some of the original data is lost and the original file can not be re- created For example: a photo where some detail may be lost but this will be undetectable to the human eye on screen

Why compress files? Zipped or compressed files can be transmitted much more quickly over the internet Sometimes there is a file size limit – compressing can help keep your file within the limit Download and upload speeds are reduced

Compression activity Can you reduce the number of characters that the following message takes up: “Hello my friend, we have just arrived in a very sunny and hot Spain. I could not wait to get into the pool and cool off. I am still laughing a lot at the previous text message that you sent to me this morning”

Other utilities The operating system will come with disk organisation and management tools - for example move files, copy files, rename files. You can get utility programs to carry out other functions on the disk: Disk checking and repairing: locate and solve problems such as bad links between file fragments and identifies bad sectors on the disk, keeping a record of where the problems are located. Bad sectors can then be avoided in future Disk/System clean-up – identifies temporary files, cached copes of files and unused files that can be removed safety leaving more free space on the hard disk

Encryption Software Keeping data secure is important for data protection reasons as well as being worth money for a business. Sensitive data can be encrypted so that a password (or other security like a fingerprint scanner) must be used to be able to read the files. Encryption means to scramble data in a way that it is unreadable to anybody who doesn’t have a key to be able to unscramble this. Data is encrypted using a key and then decrypted using a key The encryption process uses an algorithm to transform plain text into cipher text To decode the original information, you would need to know the algorithm and the key

Encryption Software

Activity 1 Encryption Task

Activity 1 ( Answer) Well Done You Have Cracked The Code Task 1: Well Done You Have Cracked The Code Task 2: Hello And Welcome To A Secret Code All letters were shifted two places (Caesar Cipher)

Security Utilities Anti-virus & Anti -Malware Software Viruses, Trojan horses, and worms are malicious software programs. They can be written to disrupt your computer, and even enable hackers to take it over. Malware includes programs such as spyware, adware, key loggers. Anti virus/malware software works by Scanning files on your computer for suspicious activity. Detects, prevents and removes malware by scanning incoming files Safety removes anything that is considered a threat

Security Utilities Firewall A firewall is software that monitors data coming into the computer from a network. It prevents data that is not arriving in the correct manner from coming in.

Backups Backups are completed to ensure there is a way of restoring files/data/programs in case of computer failure Copies of data and/or software are taken regularly and usually stored in a different location Ensures that if computers are stolen or damaged in for example a fire or a natural disaster that data can be restored and the organisation doesn’t lose its data completely. Depending on the organisation, the implications of losing data could be very expensive!

Backups In some organisations, like a school, a daily backup may be sufficient But in others such as a bank or retail company, every transaction needs to be duplicated to a second or even third storage device in a remote location Various options: How much? back up important files or back up whole drive, Which device? Use an external hard drive or other device that is portable and high capacity stored off site or fire proof safe. Or, use remote data storage such as the cloud where your data is safely saved in a huge data warehouse, with data stored at multiple sites.

Backup Types - Full Full backups have pros and cons: A copy of all data and software on the hard disk drive / server is copied to a backup medium (e.g. an external hard disk drive ) every time a back up happens and the medium is kept at a different location Take a long time to complete (usually overnight) Recovery takes a long time as it restores all data and programs BUT does only require the most recent backup to restore all the data Requires a lot of storage space Inefficient as lots of duplicated data is stored each time

Backup Types - Incremental Incremental backups have pros and cons: A full backup is made initially Each night only the files which have been changed since the last incremental back-up are copied Much faster to complete than full back-ups Requires less space than the other methods Doesn’t store duplicated files Takes much longer at restoring than a Full Back up as the full back up would need restoring first and then every incremental back-up since the last full back up Monday: 15GB Original source data Tuesday: 2GB New/Modified Files Wednesday: 1 GB New/Modified Files Thursday: 2GB New/modified files Friday: 1.5 GB New/Modified files

Archiving Often there is a large amount of data stored on computer that is no longer needed on a regular basis eg student data from 2009 You can’t delete it in case it is needed again, and in business, companies are required to keep data for a number of years for tax purposes This can be taken off the main system and stored in an archive, often on magnetic tape as it is cheap. This frees up space for data used more regularaly/recently.

What to do now Log into Moodle Go to ICT & Computing GCSE Computer Science 2016-18 Computer Systems 1.7 – Systems Software iBytes 7.2 Utility Programs Download, save and then complete the work sheet 1.7 OS and Utilities Worksheet.docx

Plenary: Define Key Words Utility Program Operating System Defragmentation Compression Lossy Lossless Encryption Backup Incremental Full