• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

System and Upgrades

Free essay example:

Computer Systems                Maintaining Systems & Upgrades

MAINTAINING SYSTEMS & UPGRADES

TASK 1(A) – RANGE OF UTILITY SOFTWARE

Utility software are computer programs designed to manage and tune up the computer OS and hardware. They prevent or reduce problems by diagnosing and correcting the faults before it gets worse.

Some of the main utility programs are described below:

Disk De-Fragmenter

A de-fragmenter scans for fragmented computer files and move them together to increase efficiency. It reduces the amount of fragmented files in a computer system. It tidies up the hard-drive reusing the space more efficiently after a disk cleanup.

Defragmentation’s result will be the best if it’s carried out after a disk cleanup, as all the unwanted files will be deleted. The application can be loaded from the control panel or from All programs/Accessories/System Utilities from the Start Menu. Clicking on the Analyse button on the application window shows the estimated disk usage after defragmentation. We can then choose to defragment the disk by clicking on the Defragment button.

Screen shots of the defragmentation process are displayed below:

image00.png

image01.png

The screen shot above shows the result of the process.

Antivirus

Antivirus software prevents and removes Viruses, Worms and Trojans from the computer. Most of the antivirus software comes with built in spyware, adware and malware removal tools.

Antivirus software uses different methods to detect viruses; Signature based detection, Malicious activity detection and Heuristic based detection. Signature based detection is the most common way of antivirus and other malware detection. The software traces the virus by spotting the signature. The software manufactures collect profiles and signature information of the virus in the form of DAT files. These files will be downloaded by the antivirus software through updates and will be used to detect new malwares. This makes it essential to keep the antivirus software up-to-date and to run virus scans periodically.

Firewall

Firewall is a utility designed to prevent unauthorised access to from a private network. It prevents unauthorised internet users from accessing private networks connected to the internet. All the packet data entering and leaving the computer is examined when it passes through the firewall and will be blocked if the packet data do not meet the security criteria. Firewalls build a protective environment around computers that are connected to a network.

Firewall uses four different types of techniques to block unauthorised access. They are:

Packet Filter                :        Packet filter scans each packet of data entering or leaving a network and block them if they are not based on the user-defined rules. This kind of filtering is an effective method to prevent unauthorised access.

Application Gateway        :        Application gateway applies security measures to applications like FTP and Telnet Servers. This is another effective firewall technique, but it really affects the performance of the network.

Circuit-Level Gateway:        Circuit-level Gateway applies mechanisms when a TCP connection is established. Once the connection is made packets can flow between hosts without further checking.

Proxy Server                :        This technique is used to intercept all messages entering and leaving the network. The proxy server hides the real network address.

Formatting

Formatting is the process of preparing a hard disk or a storage medium to store data. Formatting a disk involves two major process: High Level formatting and Low Level formatting.

Physical formatting(low-level)

Low-level formatting is the process of outlining the position of tracks and sector on hard-drives and other storage media. All the data in a drive will be lost permanently after a low-level formatting is done. A low-level formatting is generally done by the BIOS rather than the Operating System.

Logical formatting (high-level)

High-level formatting is the process of setting up an empty file system on the disk and installing a boot sector. As this process takes only a little time it is commonly known as Quick Format. In this process the disk also have the option to scan the entire disk for potential defects which may take several hours depending on the size of the medium.

Below is a screen shot of a Quick Formatting.

image02.png

Disk Cleanup

The Disk Cleanup tool helps to free up space on the hard disk by searching disk for files that can safely delete. You can choose to delete some or all of the files. Disk cleanup tool can be used to perform the following  task to free up space in a hard-drive.

  • Remove temporary Internet files.
  • Remove downloaded program files. For example, ActiveX controls and Java applets that are downloaded from the Internet.
  • Empty the Recycle Bin.
  •         Remove Windows temporary files.
  • Remove optional Windows components that you are not using.
  • Remove installed programs that you no longer use.

References:

BTEC National- Information Technology Practitioners Book 1 (2nd edition) - Heinemann Publications

http://www.pcguide.com/ref/hdd/geom/formatHigh-c.html

http://www.pcguide.com/ref/hdd/geom/formatLow-c.html

http://www.webopedia.com/TERM/f/firewall.html

References:

BTEC National- Information Technology Practitioners Book 1 (2nd edition) - Heinemann Publications

http://www.pcguide.com/ref/hdd/geom/formatHigh-c.html

http://www.pcguide.com/ref/hdd/geom/formatLow-c.html

http://www.webopedia.com/TERM/f/firewall.html

References:

BTEC National- Information Technology Practitioners Book 1 (2nd edition) - Heinemann Publications

http://www.pcguide.com/ref/hdd/geom/formatHigh-c.html

http://www.pcguide.com/ref/hdd/geom/formatLow-c.html

http://www.webopedia.com/TERM/f/firewall.html

BTEC ND IT Practitioners        

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

(?)
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Related AS and A Level ICT Skills and Knowledge Essays

See our best essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    list of vehicles due back on a certain day, a list of all overdue vehicles, the contact details of a particular customer, staff member or manufacturer contact and whatever else is considered during the design of the system. Problem with Current System After a careful analysis of the results from

  2. Health Book

    Beginning December 2001, the private sector came under the regulation of the Privacy Amendment (Private Sector) Act 2000, which amended the Privacy Act 1988. The introduction of the Privacy Amendment (Private Sector) Act 2000 paved the way for better privacy protection of the patients in the private clinics and hospitals.

  1. Data Processing Task. Mr Peters, the man who runs this particular Samsung store ...

    * The user must be able to add new employee records, edit employee records and search for a particular employee's record. * The user must be able to add new products, edit products and search for a product within the database.

  2. ICT Spreadsheet System

    Also, the money given by the customer will be deducted from the total price. Finally, the change will calculate. When entering customer details it will made very easy. There will various menus and selections to choose from making it easy to navigate.

  1. Before the system can be installed and used by hatch end cars it is ...

    A membership card should be printed for the member with the member ID 7 in the correct format as designed. Pass. None needed. 12 Member details query and Member details report. Normal data and integration testing. Click on Print Member Details in the Reports menu and enter '11' as the parameter.

  2. Implementing a new system for Mastercare.

    (Please tick) [] Yes [] No [] Unsure 12. How often does the system need to be backed up? (Please Tick) [] Daily [] Weekly [] Monthly [] Less than Monthly Thank you very much for completing this questionnaire. Your answers will lead to a better system being produced for you and the company.

  1. ICT analyse

    with clear documentation of the user requirement specification and it will also, enable me to create the appropriate system for my end user. I decided to do this by conducting a questionnaire that I put forward to Mr. Kabir during the interview.

  2. ict as level coursework

    This means that no one will have to work out the value themselves ensuring the correctness of the calculations. Another benefit is all the data is safe and secure as only authorised people will have access to customer information due to passwords.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work