• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

System and Upgrades

Free essay example:

Computer Systems                Maintaining Systems & Upgrades

MAINTAINING SYSTEMS & UPGRADES

TASK 1(A) – RANGE OF UTILITY SOFTWARE

Utility software are computer programs designed to manage and tune up the computer OS and hardware. They prevent or reduce problems by diagnosing and correcting the faults before it gets worse.

Some of the main utility programs are described below:

Disk De-Fragmenter

A de-fragmenter scans for fragmented computer files and move them together to increase efficiency. It reduces the amount of fragmented files in a computer system. It tidies up the hard-drive reusing the space more efficiently after a disk cleanup.

Defragmentation’s result will be the best if it’s carried out after a disk cleanup, as all the unwanted files will be deleted. The application can be loaded from the control panel or from All programs/Accessories/System Utilities from the Start Menu. Clicking on the Analyse button on the application window shows the estimated disk usage after defragmentation. We can then choose to defragment the disk by clicking on the Defragment button.

Screen shots of the defragmentation process are displayed below:

image00.png

image01.png

The screen shot above shows the result of the process.

Antivirus

Antivirus software prevents and removes Viruses, Worms and Trojans from the computer. Most of the antivirus software comes with built in spyware, adware and malware removal tools.

Antivirus software uses different methods to detect viruses; Signature based detection, Malicious activity detection and Heuristic based detection. Signature based detection is the most common way of antivirus and other malware detection. The software traces the virus by spotting the signature. The software manufactures collect profiles and signature information of the virus in the form of DAT files. These files will be downloaded by the antivirus software through updates and will be used to detect new malwares. This makes it essential to keep the antivirus software up-to-date and to run virus scans periodically.

Firewall

Firewall is a utility designed to prevent unauthorised access to from a private network. It prevents unauthorised internet users from accessing private networks connected to the internet. All the packet data entering and leaving the computer is examined when it passes through the firewall and will be blocked if the packet data do not meet the security criteria. Firewalls build a protective environment around computers that are connected to a network.

Firewall uses four different types of techniques to block unauthorised access. They are:

Packet Filter                :        Packet filter scans each packet of data entering or leaving a network and block them if they are not based on the user-defined rules. This kind of filtering is an effective method to prevent unauthorised access.

Application Gateway        :        Application gateway applies security measures to applications like FTP and Telnet Servers. This is another effective firewall technique, but it really affects the performance of the network.

Circuit-Level Gateway:        Circuit-level Gateway applies mechanisms when a TCP connection is established. Once the connection is made packets can flow between hosts without further checking.

Proxy Server                :        This technique is used to intercept all messages entering and leaving the network. The proxy server hides the real network address.

Formatting

Formatting is the process of preparing a hard disk or a storage medium to store data. Formatting a disk involves two major process: High Level formatting and Low Level formatting.

Physical formatting(low-level)

Low-level formatting is the process of outlining the position of tracks and sector on hard-drives and other storage media. All the data in a drive will be lost permanently after a low-level formatting is done. A low-level formatting is generally done by the BIOS rather than the Operating System.

Logical formatting (high-level)

High-level formatting is the process of setting up an empty file system on the disk and installing a boot sector. As this process takes only a little time it is commonly known as Quick Format. In this process the disk also have the option to scan the entire disk for potential defects which may take several hours depending on the size of the medium.

Below is a screen shot of a Quick Formatting.

image02.png

Disk Cleanup

The Disk Cleanup tool helps to free up space on the hard disk by searching disk for files that can safely delete. You can choose to delete some or all of the files. Disk cleanup tool can be used to perform the following  task to free up space in a hard-drive.

  • Remove temporary Internet files.
  • Remove downloaded program files. For example, ActiveX controls and Java applets that are downloaded from the Internet.
  • Empty the Recycle Bin.
  •         Remove Windows temporary files.
  • Remove optional Windows components that you are not using.
  • Remove installed programs that you no longer use.

References:

BTEC National- Information Technology Practitioners Book 1 (2nd edition) - Heinemann Publications

http://www.pcguide.com/ref/hdd/geom/formatHigh-c.html

http://www.pcguide.com/ref/hdd/geom/formatLow-c.html

http://www.webopedia.com/TERM/f/firewall.html

References:

BTEC National- Information Technology Practitioners Book 1 (2nd edition) - Heinemann Publications

http://www.pcguide.com/ref/hdd/geom/formatHigh-c.html

http://www.pcguide.com/ref/hdd/geom/formatLow-c.html

http://www.webopedia.com/TERM/f/firewall.html

References:

BTEC National- Information Technology Practitioners Book 1 (2nd edition) - Heinemann Publications

http://www.pcguide.com/ref/hdd/geom/formatHigh-c.html

http://www.pcguide.com/ref/hdd/geom/formatLow-c.html

http://www.webopedia.com/TERM/f/firewall.html

BTEC ND IT Practitioners        

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

(?)
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Related AS and A Level ICT Skills and Knowledge Essays

See our best essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    details held in the old system, with a few new helpful fields created in addition to one new file. From the interview with Fred, it has been decided that unique identification numbers will be assigned to each record in the Customer, Staff, Vehicle, Rental and Manufacturer files.

  2. ict as level coursework

    The first v look up is =VLOOKUP(b14,shampoo,2) I will explain this vlookup. Firstly it looks up the cell in which the catalogue number is present. It then looks up the defined product, in this case shampoo (I defined all of my products earlier)

  1. Implementing a new system for Mastercare.

    be repaired at the workshop and also queries used to search for stock that is below a required level in order to be able to generate an order form to order the new stock. Regular backups of the system will need to be made so that any data loss does not destroy weeks of information.

  2. Data Processing Task. Mr Peters, the man who runs this particular Samsung store ...

    have been identified: * All of the staff of the business will be using this system but obviously managers will use it more frequently. All of the staff have trained computer skills as they deal with computers every day but not a lot of them will be familiar with a database so therefore I have to make it user friendly.

  1. Health Book

    to develop further initiatives, such as secure messaging, medical directories, e-prescriptions, and more." (Anonymous1 2010) One technology currently being analysed by Telstra to be used in the construction of this suite is known as 'Cloud Computing'.

  2. Analysis Tools

    For example, customer is an external entity o Process - A process shows a transformation or manipulation of data flows within the system. For example, a department or a piece of hardware. o Data Store - A data store is a holding place for information within the system, such as documents waiting to be processed.

  1. ICT Spreadsheet System

    Date of Order Date dd/mm/yy Date on which order for goods is placed Notes Text 50 Any additional notes can be added. > Inputting all the customer details; items bought, the price they paid and when it was bought - this would be efficient and very fast.

  2. Before the system can be installed and used by hatch end cars it is ...

    Normal data and unit testing. Click on members then click on the delete button. A dialogue box appears to confirm the action, then click OK. The member information is successfully deleted. Pass None needed. 9 Find Member field in the Members form. Normal data and unit testing.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work