0% found this document useful (0 votes)
117 views1 page

1.5.2b Utility Software ANSWERS

Utility software maintains computer systems by keeping them secure, organizing data, and optimizing performance. Examples include encryption software which scrambles data, defragmentation software which reorganizes hard drive data, backup software which creates data copies, compression software which reduces file sizes, and formatting software which prepares disks for storage. Encryption software scrambles data using encryption keys to convert plain text into unreadable cipher text for security.

Uploaded by

emona.mocku
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
117 views1 page

1.5.2b Utility Software ANSWERS

Utility software maintains computer systems by keeping them secure, organizing data, and optimizing performance. Examples include encryption software which scrambles data, defragmentation software which reorganizes hard drive data, backup software which creates data copies, compression software which reduces file sizes, and formatting software which prepares disks for storage. Encryption software scrambles data using encryption keys to convert plain text into unreadable cipher text for security.

Uploaded by

emona.mocku
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

1. Define the term ‘Utility Software’.

[2]

 Software which maintains a computer system by …


 …keeping it secure, organising data and optimising the system.
Question Zone 1-3

2. List 5 different examples of ‘Utility Software’ and for each one give a brief description of its purpose. [5]

 Encryption Software: Scrambles data so that if it is intercepted it cannot be understood.


 Defragmentation Software: Reorganises data stored on a hard drive so related data is stored next to each other on the disk.
 Back up Software: Creates a copy of data so that it can be stored in a separate storage device.
 Compression Software: Either permanently or temporarily deletes some of a files data so that its file size can be reduced.
 Formatting Software: Software which prepares a disk for data storage.

3. Explain how encryption software works. [3]

 Encryption software scrambles data before it is sent across a network so that it is unreadable if intercepted.
 To encrypt data, an encryption key is used which will convert ‘plain text’ into ‘cipher text’. An encryption key is an algorithm which will systematically alter each piece of data in
a file. For example, a key may convert each letter in a text file to the next letter in the alphabet: e.g. ‘hello’ becomes ‘ifmmp’
 For the ‘cipher text’ to be converted back to ‘plain text’, the same key is required by the recipient to reverse the encryption.
Question Zone 4-6

4. Explain the need for ‘Defragmentation Software’. [4]

 Files are not stored ‘as one’ on a hard disk and are instead stored in 512 bytes sized ‘building blocks’.
 Over time, these ‘building blocks’ get fragmented over the hard disk.
 This means that reading a file takes longer as the hard drive needs to be searched in multiple places instead of one area.
 To help improve read speeds, defragmentation software searches the disk for related data items and reorganises them so they become positioned physically next to one
another.

5. Describe what compression software does and explain the difference between ‘Lossy’ and ‘Lossless’ compression methods, using examples to support your answer. [5]

 Compression software reduces the size of files. This might be so that less storage space required, or faster download times (improving online experience) or faster streaming
speeds of video/audio files.
 One method of compression is ‘Lossy Compression’. This is when unrequired data is removed from a file.
 MP3s are an example of this where sound quality may reduce but not to a point which is noticeable by the listener.
 Another method of compression is ‘Lossless Compression’. This is when data is temporarily removed from the file, but added back (rebuilt) when the file is to be used again.
 Zip files are an example of this. They will need to be unzipped (extracted) to be useable again.
Question Zone 7-9

6. Explain the purpose of ‘Backup Software’ and describe two methods that ‘Backup Software’ may use. [6]

 The purpose of ‘Backup Software’ is to make a copy of some data and store it elsewhere.
 It is vital that data is backed up so that in the event of data loss (through malware, attacks, natural disasters, accidents etc.) the data can be recovered
 One method of data backup is to perform a ‘Full Backup’ where the software makes a copy of all the files on a system.
 Doing this each day will take a long time but recovering the data is quick as all the data is stored together, ready to be re-loaded onto the system
 Another method of data backup is to perform an ‘Incremental Backup’ where only the files that have changed since the last backup, are backed up.
 It is much quicker to run the backup, as the system will only back up files that have been changed in the short term. This also leaves an audit trail of the file changes. However, it
can take a long time to restore all the incremental backups as well as the last full backup.

7. Explain why a hard drive which has had its data wiped (using formatting software) could still have its original data retrieved. [5]

 Formatting prepares the storage device for data storage by creating sectors and tracks on which data can be stored.
 It also creates a special list called the File Allocation Table (FAT), which is used to keep track of where data is located.
 Each time you write a new file to your hard disk, the table is updated with where the data is stored.
 When you format your hard disk, you don’t actually delete the data on the disk, you simply delete the FAT.
 The computer can no longer locate any data and thinks it is empty. But in fact the data remains and can be recovered with specialist software.

You might also like