The Purpose & Functionality of Utility Software (AQA GCSE Computer Science)

Revision Note

Test yourself

Utility Software

  • System software can be further broken down in to two categories, operating system and utility software

system-software

What is utility software?

  • Utility software is software designed to help maintain, enhance and troubleshoot/repair a computer system

  • Utility software is designed to perform a limited number of tasks

  • Utility software interacts with the computers hardware, for example, secondary storage devices

  • Some utility software comes installed with the operating system

  • Examples of utility software and their function are:

Defragmentation (maintain)

  • Defragmentation software groups fragmented files back together in order to improve access speed

  • As programs and data are added to a new hard disk drive, it is added in order, over time as files are deleted this leaves gaps

  • As programs and data are added over time, these gaps get filled and data becomes fragmented

  • Defragmentation can only be used on magnetic storage

    utility-software-disk-defragmentation-alevel

Examiner Tip

If the concept of defragmentation still seems a little difficult then hopefully this analogy will help

  • In a tidy bedroom you can find your things faster because they are in the right place (in order)

  • Over time you move things, forget to put them back and/or add new things

  • The time taken to find your things increases, until...

  • You tidy your room and finding things becomes quicker again (defragmentation!)

Compression (enhance)

  • Compression reduces the amount of secondary storage required by performing an algorithm on the original data

  • Lossy compression physically removes data from the original data to reduce its size, the original file can not be re-created

  • Lossless compression uses mathematics to order data more efficiently reducing its size, the original files can be re-created as no data is lost

Encryption (enhance)

  • Encryption is the process of scrambling data using an algorithm from plain-text into cipher-text in order to make it unreadable to users without the master key

  • Encryption software enhances the security of the computer system and keeps data safe

Task manager (troubleshoot/repair)

  • Task manager is software that is built into the operating system to allow users to monitor system resources in order to help troubleshoot potential problems

  • Task manager gives system information such as:

    • Processes

    • Performance

    • App history

    • Start-up apps

    • Users

    • Services

Worked Example

A hotel has a computer-based booking system which is running slowly. A technician has
said that the hard disk drive is fragmented. The technician has suggested using utility software to defragment the drive.

Explain how the hotel’s hard disk could have become fragmented [4]

How to answer this question

  • The keyword is 'how', do not just explain what fragmented means in general, you must give examples of how it could have become fragmented in the hotel. What does a hotel use a computer for?

Answer

  • Booking have been saved onto the system and then deleted once completed [1]

  • New bookings are created [1] which may need more space than the completed ones left behind [1]

  • The booking files are split up [1]

Last updated:

You've read 0 of your 10 free revision notes

Unlock more, it's free!

Join the 100,000+ Students that ❤️ Save My Exams

the (exam) results speak for themselves:

Did this page help you?

Robert Hampton

Author: Robert Hampton

Expertise: Computer Science Content Creator

Rob has over 16 years' experience teaching Computer Science and ICT at KS3 & GCSE levels. Rob has demonstrated strong leadership as Head of Department since 2012 and previously supported teacher development as a Specialist Leader of Education, empowering departments to excel in Computer Science. Beyond his tech expertise, Robert embraces the virtual world as an avid gamer, conquering digital battlefields when he's not coding.

James Woodhouse

Author: James Woodhouse

Expertise: Computer Science

James graduated from the University of Sunderland with a degree in ICT and Computing education. He has over 14 years of experience both teaching and leading in Computer Science, specialising in teaching GCSE and A-level. James has held various leadership roles, including Head of Computer Science and coordinator positions for Key Stage 3 and Key Stage 4. James has a keen interest in networking security and technologies aimed at preventing security breaches.