LO2: Understand Computer Software

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Utility program + driver program Thomas Wat 4D (21)
© Vera Castleman Software Grade 10. What is software? A program is a collection of instructions to do a job. Programs are collectively known as SOFTWARE.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Discovering Computers Fundamentals, Third Edition CGS 1000 Introduction to Computers and Technology Fall 2006.
Computer Referbishment The Demonstration. To Do… Virus Protection Schedule A Full System Scan Install Service Pack 3 Clean Up Tools Drive Formatting Install.
COMPUTER BACKUP A disaster will happen to you one day…an accidentally deleted file, a new program that caused problems or a virus that wreaked havoc, wiping.
Format Scandisk Defragmentation Antivirus Compression Software
ONLINE DATA STORAGE & DOCUMENTS Lesson 3. Lesson 3 – Online documents In this lesson we will be covering:  Online documents  Compression and expansion.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of.
Operating System Utility Programs & Stand-alone utility Programs.
Operating Systems Concepts 1/e Ruth Watson Chapter 4 Chapter 4 Windows Utilities Ruth Watson.
Utility Programs Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
Software Utilities Pages 65 to 73 Looking After Your Computer Nick Sims.
Unit 5- Computer Software.  Identify how hardware & software interact  Explain how a software program works  Describe the difference between application.
Software.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
Your Interactive Guide to the Digital World Discovering Computers 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Module 2.4 Computer management 1. Contents Initial maintenance Setting up accounts Configuring the desktop Security settings Ongoing maintenance Adding.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Back ups Megan Wilkinson. What data can be held on a computer? Personal data / files: 1.Bank info 2. address and passwords 3.Bank passwords and wage.
Matthew Glenn AP2 Techno for Tanzania This presentation will cover the different utilities on a computer.
1 Maintaining the Windows O/S. 2 Introduction Virus protection Remove old and unused files Scan hard disk Defragment hard drive Back up and updated recovery.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Software Applications and Utilities. Software Applications Programs that allow the computer to be used to solve a problems for a particular task. This.
SOFTWARE. Software… Instructions that are stored electronically that tell the computer what to do.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
Jake Horsfield (P3/D1) PURPOSE OF SOFTWARE UTILITIES.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Windows 10 Utilities  Windows Utilities:  Anti-Malware/Anti-Virus  Windows Update  Disk Cleanup  Defrag  Task Manager  Backup.
CHAPTER 2 COMPUTER SOFTWARE. LEARNING OUTCOMES At the end of this class, students should be able to:  Explain the significance of software  Define and.
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
PC Support & Repair Chapter 5 Operating Systems Part 2.
Lesson 9: SOFTWARE ICT Fundamentals 2nd Semester SY
Chapter 6 Protecting Your Files
SOFTWARE - 2 UTILITY SOFTWARE
Tech Level Cyber Security Lesson 7
What they are and how to protect against them
Discovering Computers 2012: Chapter 8
Lesson Objectives Aims You should be able to:
Diskless Networks By Sam Morris.
Systems Software.
Unit 4 IT Security.
Computing Fundamentals
Lesson Objectives Aims You should be able to:
Systems Software Keywords Utilities and Backups
Robert Crawford, MBA West Middle School
Introduction To Computers
Unit 2 Computer Systems HND in Computing and Systems Development
Unit 4 IT Security.
Basic Computer Maintenance
Objectives Overview Define system software and identify the two types of system software Describe the functions of an operating system Summarize the features.
Chapter 6 Purchasing and Maintaining a Computer
File Managements.
Types of Software.
Operating Systems Tasks 17/02/2019.
Unit 4 IT Security Kerris Davies.
Securing Windows 7 Lesson 10.
Utility Software compression; defragmentation; backing up; encryption Revision YouTube clip:
LO2 – Understand Computer Software
G061 - Network Security.
Presentation transcript:

LO2: Understand Computer Software Utility Software LO2: Understand Computer Software

Saturday, 10 November 2018 Utility Software Learning Objective: To be able to demonstrate an understanding of how utility software is used in a computer system. Success Criteria: I can describe the purpose of different utility software. I can identify and explain key features and functions of different utility software. I can evaluate the advantages and disadvantages of each.

What is Utility Software? Utility system software helps to maintain or configure a computer. Many useful utilities are installed with the operating system, but extra utility software can be installed to perform additional tasks. We are going to focus on the following types of utility software: Defragmentation Backups Compression Anti-virus Encryption

Defragmentation Files are stored on a hard disk in available spaces. Ideally, entire files would be stored together. However as files are moved, deleted and change size, lots of small gaps begin to appear on the disk. When writing files to the disk, the OS splits files into smaller blocks to fill up the gaps. Over time, the disk becomes more and more fragmented. This makes reading and writing files slower as the read/write head has to move back and forth across the disk. Defragmentation software reorganises data on the hard drive to put fragmented files back together. It also moves files to collect all the free space together. This helps prevent further fragmentation. Each colour is a file Gaps appear New file (grey) split into blocks Blocks collected Gaps collected Data on HDD Files deleted New file added After defragmentation Note: As SSDs use flash storage with no moving parts, fragmentation doesn’t cause any problems as they can access data just as quickly however its arranged.

Backups Select what files to backup Where you can recover data from a previous backup A backup is a copy of a computer system’s files and settings stored externally. This means data can be recovered in the event of data loss. Data loss can happen for many reasons: fire theft flood malware hardware failure just accidentally deleting a file. A backup utility is software with facilities such as scheduling of regular backups, creating rescue disks, disk images and options to have either full or incremental backups. Where you can schedule your backups Incremental Backup: A backup of all changed and new files since the last backup. Full Backup: A backup of all files in a specified set of data.

Compression Compression software reduces the size of files so they take up less disk space. It’s used a lot on the internet to make files quicker to download. Standard file formats include .zip and .rar Compressed files need to be extracted before they can be used. You can purchase/download software that deals with file compression, but most operating systems have this built in.

Anti-Virus/Malware Software Did you know? There are on average 82,000 new viruses written every day. Anti-Virus/Malware Software Anti-Malware software is designed to find and stop malware from damaging a network and the devices on it. There are lots of different types of anti- malware software, including anti-virus programs which isolate and destroy computer viruses. This is why your anti-virus software updates daily. Every time a new virus is discovered it is stored in a virus database so that your software knows to look for this one as well when running scans. Fact: Nearly seven out of ten attacks on all firms involved viruses, spyware or malware (.gov UK)

Encryption Software Encryption scrambles data in such a way that only a person or computer with the right software key can read it. Much of the data that we send across the internet is encrypted by software already built into the browser. An encryption utility can be used to secure data. The file is selected, a password created ad the encryption utility encrypts the data within that file. In order to decrypt that data, the correct password must be entered. Otherwise someone else opening that file would be scrambled/jibberish data.

Exam Question Practise Explain the difference between a full and incremental backup. [2 Marks] 2) Explain how data encryption software works. [3 marks] 3) Describe how defragmentation works. [4 Marks]