• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Explain the purpose of different software utilities

Extracts from this document...

Introduction

Transfer-Encoding: chunked P3 - explain the purpose of different software utilities Software utilities are software that performs specific tasks that are designed to help analyse, arrange, improve or maintain a computer; they help improve the performance of a computer. Some software utilities include virus protection, disk clean up, drive formatting, drive defragmentation, clean up tools and firewall. Anti-virus programs are designed to protect the computer from malicious software, like viruses, Trojans and key loggers. Most anti-virus offer real-time protection, threat detection, automatic updates and can give alerts when a program is trying to get into your computer. It is important to have an anti-virus software on your computer because if your computer does become into threat the software may be able to resolve it which will lead to no damage to the computer or privacy. This software utilities allows you to make sure nothing harmful is on the computer which could affect the computer performance. For instance, if the computer gets a virus it could make the computer run slowly, or not run at all. ...read more.

Middle

When a computer's hard drive is formatted or reformatted, all data on the disk is completely erased and a fresh copy of the system's operating system is reinstalled. There will be a larger amount of free space on your hard drive. This extra room is the result of the formatting process deleting unnecessary system files that were previously taking up space on the hard drive. Computers run faster and more efficiently when there is more room on the hard drive, so formatting the drive can increase the computer's performance in terms of data storage ad speed. Furthermore, disk formatting can delete harmful programs that may have not been resolved from the virus protection program. Therefore, this will stop the computer from not working properly and will allow the computer to run normally and not be slowed down by harmful programs that the user may be unaware of. As you use the computer, the files get fragmented which means storing of a file in several separate areas and is scattered throughout a hard disk. Fragmentation makes your hard disk do extra work to find the files you need; this can slow down your computer. ...read more.

Conclusion

Consequently, more space on a computer leads to faster performance. Internet history -History maintains the path of pages the user has been on. You have the option to delete them ? this will avoid privacy issue. In addition, internet history can slow down the computer because it takes space to record each page. By deleting internet history, it deletes cache and cookies this means the site will load faster because it?s taking less space on the hard drive. A firewall is a network security system that control's the incoming and outgoing network traffic based on applied settings. A firewall makes a barrier between trusted and secure networks. This prevents unauthorised access to the computer. This helps with security and can stop malware and harmful things happening to the computer which could affect personal privacy. Many personal computers operating systems include software based firewalls to protect from threats. Firewall devices can be purchased but they are very expensive. However, more recently hardware firewalls are typically found in broadband routers. Hardware firewalls can be effective with little or no configuration, and they can protect every machine on a local network. Most hardware firewalls will have a minimum of four network ports to connect other computers. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    Advantages * Performance is a lot better because the data packets that are sent and goes through unnecessary node the star topology will block this from happening. Even if the central node has very high network utilization it will only affect the computer it is communicating with.

  2. Explain the component parts of a computer system - Include both hardware, software and ...

    This information is obviously of a very private nature to individuals and it is important that although there is a need for some of this data to be held there is also a need to maintain a level of personal freedom and privacy.

  1. Computer Maintainance - anti-virus, cookie deletion, drive scanning

    Consequently, many networks are now connected to the Internet where Internet connectivity would otherwise have been too great a risk. Firewalls allow network administrators/user to offer access to specific types of Internet services to selected network users.

  2. Free essay

    Setting up and E-Commerce Site

    * Uploading of your own images - Provides a interface that's personal to that of the owners of the business meaning they have a control over the look of the website, this is very useful for displaying images of the products and so on.

  1. Hardware and Software

    Types of Software Macromedia Studio 8 Macromedia Studio 8 is a complete toolkit for Web designers and animators, and it introduces new features. Many digital content makers can find their way around Macromedia software, but the upgrade to Studio 8 makes common tasks easier to execute for those without coding expertise.

  2. Firewall Protection

    This is not a very common use of a personal firewall, though. Preventing Communication to Tracking Sites? Some web pages contain references to tracking sites. e.g. instruct the web browser to download a small picture (sometimes invisible) from tracking sites.

  1. Smart Card System

    Access control list's criteria could be the source address of the traffic, the destination address of the traffic, the upper-layer protocol, or other information. It is important to note that sophisticated users can sometimes successfully evade or fool basic access lists because that is no any authentication is required.

  2. Describe the hardware and software used to create and edit graphic images and compare ...

    It also needs to be cleaned regularly or it will get clogged with lint and dust. If it?s not cleaned it will not work properly or be slow responsive. Lastly, the cord on most mice can get hung up and drag, making the mouse difficult to use.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work