• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

System and Upgrades

Free essay example:

Computer Systems                Maintaining Systems & Upgrades

MAINTAINING SYSTEMS & UPGRADES

TASK 1(A) – RANGE OF UTILITY SOFTWARE

Utility software are computer programs designed to manage and tune up the computer OS and hardware. They prevent or reduce problems by diagnosing and correcting the faults before it gets worse.

Some of the main utility programs are described below:

Disk De-Fragmenter

A de-fragmenter scans for fragmented computer files and move them together to increase efficiency. It reduces the amount of fragmented files in a computer system. It tidies up the hard-drive reusing the space more efficiently after a disk cleanup.

Defragmentation’s result will be the best if it’s carried out after a disk cleanup, as all the unwanted files will be deleted. The application can be loaded from the control panel or from All programs/Accessories/System Utilities from the Start Menu. Clicking on the Analyse button on the application window shows the estimated disk usage after defragmentation. We can then choose to defragment the disk by clicking on the Defragment button.

Screen shots of the defragmentation process are displayed below:

image00.png

image01.png

The screen shot above shows the result of the process.

Antivirus

Antivirus software prevents and removes Viruses, Worms and Trojans from the computer. Most of the antivirus software comes with built in spyware, adware and malware removal tools.

Antivirus software uses different methods to detect viruses; Signature based detection, Malicious activity detection and Heuristic based detection. Signature based detection is the most common way of antivirus and other malware detection. The software traces the virus by spotting the signature. The software manufactures collect profiles and signature information of the virus in the form of DAT files. These files will be downloaded by the antivirus software through updates and will be used to detect new malwares. This makes it essential to keep the antivirus software up-to-date and to run virus scans periodically.

Firewall

Firewall is a utility designed to prevent unauthorised access to from a private network. It prevents unauthorised internet users from accessing private networks connected to the internet. All the packet data entering and leaving the computer is examined when it passes through the firewall and will be blocked if the packet data do not meet the security criteria. Firewalls build a protective environment around computers that are connected to a network.

Firewall uses four different types of techniques to block unauthorised access. They are:

Packet Filter                :        Packet filter scans each packet of data entering or leaving a network and block them if they are not based on the user-defined rules. This kind of filtering is an effective method to prevent unauthorised access.

Application Gateway        :        Application gateway applies security measures to applications like FTP and Telnet Servers. This is another effective firewall technique, but it really affects the performance of the network.

Circuit-Level Gateway:        Circuit-level Gateway applies mechanisms when a TCP connection is established. Once the connection is made packets can flow between hosts without further checking.

Proxy Server                :        This technique is used to intercept all messages entering and leaving the network. The proxy server hides the real network address.

Formatting

Formatting is the process of preparing a hard disk or a storage medium to store data. Formatting a disk involves two major process: High Level formatting and Low Level formatting.

Physical formatting(low-level)

Low-level formatting is the process of outlining the position of tracks and sector on hard-drives and other storage media. All the data in a drive will be lost permanently after a low-level formatting is done. A low-level formatting is generally done by the BIOS rather than the Operating System.

Logical formatting (high-level)

High-level formatting is the process of setting up an empty file system on the disk and installing a boot sector. As this process takes only a little time it is commonly known as Quick Format. In this process the disk also have the option to scan the entire disk for potential defects which may take several hours depending on the size of the medium.

Below is a screen shot of a Quick Formatting.

image02.png

Disk Cleanup

The Disk Cleanup tool helps to free up space on the hard disk by searching disk for files that can safely delete. You can choose to delete some or all of the files. Disk cleanup tool can be used to perform the following  task to free up space in a hard-drive.

  • Remove temporary Internet files.
  • Remove downloaded program files. For example, ActiveX controls and Java applets that are downloaded from the Internet.
  • Empty the Recycle Bin.
  •         Remove Windows temporary files.
  • Remove optional Windows components that you are not using.
  • Remove installed programs that you no longer use.

References:

BTEC National- Information Technology Practitioners Book 1 (2nd edition) - Heinemann Publications

http://www.pcguide.com/ref/hdd/geom/formatHigh-c.html

http://www.pcguide.com/ref/hdd/geom/formatLow-c.html

http://www.webopedia.com/TERM/f/firewall.html

References:

BTEC National- Information Technology Practitioners Book 1 (2nd edition) - Heinemann Publications

http://www.pcguide.com/ref/hdd/geom/formatHigh-c.html

http://www.pcguide.com/ref/hdd/geom/formatLow-c.html

http://www.webopedia.com/TERM/f/firewall.html

References:

BTEC National- Information Technology Practitioners Book 1 (2nd edition) - Heinemann Publications

http://www.pcguide.com/ref/hdd/geom/formatHigh-c.html

http://www.pcguide.com/ref/hdd/geom/formatLow-c.html

http://www.webopedia.com/TERM/f/firewall.html

BTEC ND IT Practitioners        

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

(?)
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Related AS and A Level ICT Skills and Knowledge Essays

See our best essays

Related AS and A Level Information Systems and Communication essays

  1. Data Processing Task. Mr Peters, the man who runs this particular Samsung store ...

    Total Price of Product ordered The sum of, the quantity of the product bought by its price. =Sum(([Quantity])*([Price])) Total Price of the Order The adding of the VAT, delivery price to the total price of the order. =([Subtotal]+[VAT]+[Delivery Price])

  2. Health Book

    It is from this an individual's privacy can be broken and personal information leaked. Over the years more and more people have become concerned with their personal information's privacy and from this concern the Privacy Act of 1988 was born.

  1. Analysis Tools

    ERD's are made up of entity's, is an object in which you want to store information, a weak entity, these are the attributes and properties of the object, a key attribute, is the unique distinguishing characteristic of the entity, For example, an employee's social security number might be the employee's

  2. ICT Spreadsheet System

    It should have all the standard peripherals and generic software packages installed. The following software that might be used: > A spreadsheet application o This has different functions which enable efficient use o Calculations can be done easily Cost There will be an initial cost of setting up the proposed

  1. Before the system can be installed and used by hatch end cars it is ...

    Task 4- Entering the model of car : Input- PL Actual output: "The model of car has been wrongly entered. It should be either "CL" Or "B Class" Or "318 CI SE" Or "S" Or "A4" Or "Avensis" Or "cooper" Or "Tourneo" Or "Sharan".

  2. Implementing a new system for Mastercare.

    and these will need to be produced for every job, every day. The engineers will be using the system on their laptops, which were bought less than two years ago. The laptops have Microsoft Office 2000 that contains the necessary programs that could be needed on order to create and use the system.

  1. ICT analyse

    This information is received by the customer and by searching the product/prices book which is placed under the till. Once the order form is completed it is then sent to the chef where the order is prepared. After the order has been made a receipt is created manually by the

  2. ict as level coursework

    Herbal Anti Wrinkle cream Extra moisture cream Non greasy mint cream Quantity Desired number of product wished to be purchased. Number will show up on invoice Lip Balm Drop down menu of available Lip Balm will be selected by user.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work