SlideShare a Scribd company logo
P3: Explain the purpose of
different software utilities
By George Smith-Moore
D1: Explain how software
utilities can improve the
performance of computer
systems
By George Smith-Moore
Anti-Virus
• An anti-virus software is what protects/prevents the system from attack.
Attacks would be from a piece of malware, of some kind (worm,Trojan,
virus, botnet attacks, and spyware/adware).
• An anti-virus would also have features to remove any existing piece of
malware on the computer. So an anti-virus program will both remove
malware and protct the PC from further incursions. It does so by looking for
malicious code.This is why it is important to continuously update the anti-
virus database.
• Malware can slow your computer (or do worse, like remove data). Removing
this unwanted software would help improve system performance.
Backup software
• This is used to create an exact copy of all of the data on a HDD/ SSD.
• By doing this you can, create a backup in case of a system failure.
• This piece of utility software can improve system performance by, creating a
restore point.This will allow you to bring your system back to a previous
state in case of a system failure.
• By creating backups periodically, this can ensure minimal data is lost.
Disk cleaner
• Disk cleaners find unnecessary files, on the computer storage, and remove
them.They help the user to decide what to delete when storage medium is
full.
• By removing unwanted files, there becomes more space on the storage
device, and it will improve performance by removing some unwanted files
that could take up RAM storage.
Disk Defragmenters
• Over the extensive storage of the Hard Drive, files can become scattered
across the storage device.This results in inaccessible ‘free’ storage,The Disk
Defragmenter software compresses the files, to create one large area of
‘free’ storage.
Drive formatting
• Drive formatting software allows you to remove all data on a specified drive.
• By doing this, you can securely remove data.The drive then becomes re-
useable to place new data on it.
• This can improve performance by removing old and unwanted data, and
allowing room for newer software.
Firewall
• Most modern OS’s have a built in firewall, this is a preventative measure.
• This preventative measure stops malware entering the system, it is a layer
of protection, and is regularly updated.
• A firewall does not improve performance, it creates a layer of security,
which helps maintain performance levels, by stopping viruses entering the
system.
Internet History
• Internet history is a piece of
utility software that records
the internet history. It does not
necessarily improve system
performance, but it does
provide an easy way to revisit
previous websites, it also
allows you to create ‘favourite’
websites, that are saved for
easy access.
Utility software and system performance
• Utility software, in particular those that clean, and defragment , improve
system performance.
• Utility software such as the internet history, does not greatly improve
performance. By keeping a log of every website visited, this can take up a
considerable amount of space. Other utility software like: disk cleaner, is
needed as it deletes the file and improves performance.
• Overall, utility software can improve system performance, and in some
cases, it can limit the performance.

More Related Content

What's hot

Introduction To Operating System
Introduction To Operating SystemIntroduction To Operating System
Introduction To Operating System
Laguna State Polytechnic University
 
2.4
2.42.4
FP 202 - Chapter 5
FP 202 - Chapter 5FP 202 - Chapter 5
FP 202 - Chapter 5rohassanie
 
features of windows7 & 8(trail)
features of windows7 & 8(trail)features of windows7 & 8(trail)
features of windows7 & 8(trail)ava & araf co.
 
Operating System & Utility Programme
Operating System & Utility ProgrammeOperating System & Utility Programme
Operating System & Utility Programme
bbp2067
 
Operating system windows XP
Operating system windows XPOperating system windows XP
Operating system windows XP
Rohan Bhatkar
 
Unit 2 p2
Unit 2 p2Unit 2 p2
Unit 2 p2
Joebarton1997
 
Operating Systems and Memory Management
Operating Systems and Memory ManagementOperating Systems and Memory Management
Operating Systems and Memory Management
guest1415ae65
 
Introduction to Operating system
Introduction to Operating system Introduction to Operating system
Introduction to Operating system
Bilal Bhatti
 
Final intrict without vid
Final intrict without vidFinal intrict without vid
Final intrict without vid
pringles77
 
hiren boot CD
hiren boot CDhiren boot CD
hiren boot CD
shaikmohammedsalman
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
Mohamed Loey
 
Lesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and ProtectingLesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and ProtectingGene Carboni
 
Computer fault
Computer fault Computer fault
Operating system presentation
Operating system presentationOperating system presentation
Operating system presentation
Sonu Vishwakarma
 
Operating system and its types
Operating system and its types Operating system and its types
Operating system and its types
vimal kumar arora
 
The operating system pres jay
The operating system pres jayThe operating system pres jay
The operating system pres jayJHUSSAIN1702
 

What's hot (20)

Introduction To Operating System
Introduction To Operating SystemIntroduction To Operating System
Introduction To Operating System
 
2.4
2.42.4
2.4
 
FP 202 - Chapter 5
FP 202 - Chapter 5FP 202 - Chapter 5
FP 202 - Chapter 5
 
Lesson 3.2
Lesson 3.2Lesson 3.2
Lesson 3.2
 
features of windows7 & 8(trail)
features of windows7 & 8(trail)features of windows7 & 8(trail)
features of windows7 & 8(trail)
 
Lesson 3.1
Lesson 3.1Lesson 3.1
Lesson 3.1
 
Operating System & Utility Programme
Operating System & Utility ProgrammeOperating System & Utility Programme
Operating System & Utility Programme
 
Operating system windows XP
Operating system windows XPOperating system windows XP
Operating system windows XP
 
Unit 2 p2
Unit 2 p2Unit 2 p2
Unit 2 p2
 
Operating Systems and Memory Management
Operating Systems and Memory ManagementOperating Systems and Memory Management
Operating Systems and Memory Management
 
Introduction to Operating system
Introduction to Operating system Introduction to Operating system
Introduction to Operating system
 
Final intrict without vid
Final intrict without vidFinal intrict without vid
Final intrict without vid
 
hiren boot CD
hiren boot CDhiren boot CD
hiren boot CD
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
 
Lesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and ProtectingLesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and Protecting
 
Computer fault
Computer fault Computer fault
Computer fault
 
Installation guide_Rajeev
Installation guide_RajeevInstallation guide_Rajeev
Installation guide_Rajeev
 
Operating system presentation
Operating system presentationOperating system presentation
Operating system presentation
 
Operating system and its types
Operating system and its types Operating system and its types
Operating system and its types
 
The operating system pres jay
The operating system pres jayThe operating system pres jay
The operating system pres jay
 

Viewers also liked

ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2
OriginalGSM
 
Unit 2 m1
Unit 2 m1Unit 2 m1
Unit 2 m1
Joebarton1997
 
UNIT 2 P6 part 2
UNIT 2 P6 part 2UNIT 2 P6 part 2
UNIT 2 P6 part 2
OriginalGSM
 
UNIT 2 P4 and m2
UNIT 2 P4 and m2UNIT 2 P4 and m2
UNIT 2 P4 and m2
OriginalGSM
 
UNIT 2 P5 part 2
UNIT 2 P5 part 2UNIT 2 P5 part 2
UNIT 2 P5 part 2
OriginalGSM
 
ICT BTEC UNIT 2 M1
ICT BTEC UNIT 2 M1ICT BTEC UNIT 2 M1
ICT BTEC UNIT 2 M1
OriginalGSM
 
Task 2
Task 2Task 2
Task 2rafhat
 
UNIT 2 M3 and d2 v2
UNIT 2 M3 and d2 v2UNIT 2 M3 and d2 v2
UNIT 2 M3 and d2 v2
OriginalGSM
 
P7
P7P7
Impact of i.t system breaches
Impact of i.t system breachesImpact of i.t system breaches
Impact of i.t system breachesOriginalGSM
 
Managing i.t security
Managing i.t securityManaging i.t security
Managing i.t securityOriginalGSM
 
Backing Storage
Backing StorageBacking Storage
Backing Storage
Forrester High School
 

Viewers also liked (20)

ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2
 
p3 unit 2
p3 unit 2p3 unit 2
p3 unit 2
 
Unit 2 m1
Unit 2 m1Unit 2 m1
Unit 2 m1
 
P1 Computer systems
P1 Computer systemsP1 Computer systems
P1 Computer systems
 
UNIT 2 P6 part 2
UNIT 2 P6 part 2UNIT 2 P6 part 2
UNIT 2 P6 part 2
 
UNIT 2 P4 and m2
UNIT 2 P4 and m2UNIT 2 P4 and m2
UNIT 2 P4 and m2
 
UNIT 2 P5 part 2
UNIT 2 P5 part 2UNIT 2 P5 part 2
UNIT 2 P5 part 2
 
ICT BTEC UNIT 2 M1
ICT BTEC UNIT 2 M1ICT BTEC UNIT 2 M1
ICT BTEC UNIT 2 M1
 
UNIT 2 P8
UNIT 2 P8UNIT 2 P8
UNIT 2 P8
 
UNIT 2 P5
UNIT 2 P5UNIT 2 P5
UNIT 2 P5
 
Task5
Task5Task5
Task5
 
Task 2
Task 2Task 2
Task 2
 
UNIT 2 M3 and d2 v2
UNIT 2 M3 and d2 v2UNIT 2 M3 and d2 v2
UNIT 2 M3 and d2 v2
 
D2
D2D2
D2
 
P7
P7P7
P7
 
UNIT 2 M1
UNIT 2 M1UNIT 2 M1
UNIT 2 M1
 
Impact of i.t system breaches
Impact of i.t system breachesImpact of i.t system breaches
Impact of i.t system breaches
 
Managing i.t security
Managing i.t securityManaging i.t security
Managing i.t security
 
UNIT 2 P1
UNIT 2 P1UNIT 2 P1
UNIT 2 P1
 
Backing Storage
Backing StorageBacking Storage
Backing Storage
 

Similar to UNIT 2 P3 and d1

system software
system softwaresystem software
system software
fatinsmile
 
System software 3
System software 3System software 3
System software 3
fatinsmile
 
Gopcpro Computer Cleaning-Software | PC-Cleaner
Gopcpro Computer Cleaning-Software | PC-CleanerGopcpro Computer Cleaning-Software | PC-Cleaner
Gopcpro Computer Cleaning-Software | PC-Cleaner
web expert
 
Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)
ella dimaiwat
 
Utility programs
Utility programsUtility programs
Utility programs
Software Alliance
 
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxMAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
RichardSugbo
 
1 5 system software and computer management
1 5 system software and computer management1 5 system software and computer management
1 5 system software and computer management
QondileRamokgadi
 
Chapter 8 system soft ware
Chapter 8 system soft wareChapter 8 system soft ware
Chapter 8 system soft ware
MrSaem
 
Network Administrator Career
Network Administrator CareerNetwork Administrator Career
Network Administrator Career
Bill Kuhl
 
Diagnostic Software Tools.pptx
Diagnostic Software Tools.pptxDiagnostic Software Tools.pptx
Diagnostic Software Tools.pptx
marlonfelizardo3
 
Care & Feeding Of Your Computer
Care & Feeding Of Your ComputerCare & Feeding Of Your Computer
Care & Feeding Of Your Computer
Don Hazelwood
 
Best data migration tools
Best data migration toolsBest data migration tools
Best data migration tools
SameerShaik43
 
Smart speed up pc pro
Smart speed up pc proSmart speed up pc pro
Smart speed up pc prosmilegreen
 
Seven steps to great PC health (Windows)
Seven steps to great PC health (Windows)Seven steps to great PC health (Windows)
Seven steps to great PC health (Windows)
Ralf Schwoebel
 

Similar to UNIT 2 P3 and d1 (20)

P3
P3P3
P3
 
Returnil 2010
Returnil 2010Returnil 2010
Returnil 2010
 
system software
system softwaresystem software
system software
 
System software 3
System software 3System software 3
System software 3
 
Gopcpro Computer Cleaning-Software | PC-Cleaner
Gopcpro Computer Cleaning-Software | PC-CleanerGopcpro Computer Cleaning-Software | PC-Cleaner
Gopcpro Computer Cleaning-Software | PC-Cleaner
 
Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)
 
Utility programs
Utility programsUtility programs
Utility programs
 
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptxMAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
MAINTAINING AND REPAIRING COMPUTER SYSTEMS AND NETWORKS 12.pptx
 
1 5 system software and computer management
1 5 system software and computer management1 5 system software and computer management
1 5 system software and computer management
 
Chapter 8 system soft ware
Chapter 8 system soft wareChapter 8 system soft ware
Chapter 8 system soft ware
 
Network Administrator Career
Network Administrator CareerNetwork Administrator Career
Network Administrator Career
 
Diagnostic Software Tools.pptx
Diagnostic Software Tools.pptxDiagnostic Software Tools.pptx
Diagnostic Software Tools.pptx
 
Care & Feeding Of Your Computer
Care & Feeding Of Your ComputerCare & Feeding Of Your Computer
Care & Feeding Of Your Computer
 
Lecture10.pptx
Lecture10.pptxLecture10.pptx
Lecture10.pptx
 
Best data migration tools
Best data migration toolsBest data migration tools
Best data migration tools
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
Smart speed up pc pro
Smart speed up pc proSmart speed up pc pro
Smart speed up pc pro
 
Seven steps to great PC health (Windows)
Seven steps to great PC health (Windows)Seven steps to great PC health (Windows)
Seven steps to great PC health (Windows)
 
Avc per 201304_en
Avc per 201304_enAvc per 201304_en
Avc per 201304_en
 
Types of software
Types of softwareTypes of software
Types of software
 

More from OriginalGSM

ICT BTEC UNIT 2 P2
ICT BTEC UNIT 2 P2ICT BTEC UNIT 2 P2
ICT BTEC UNIT 2 P2
OriginalGSM
 
ICT BTEC UNIT 2 P1
ICT BTEC UNIT 2 P1ICT BTEC UNIT 2 P1
ICT BTEC UNIT 2 P1
OriginalGSM
 
Software preparation
Software preparationSoftware preparation
Software preparation
OriginalGSM
 
Personalising desktop
Personalising desktopPersonalising desktop
Personalising desktopOriginalGSM
 
Software licences
Software licencesSoftware licences
Software licencesOriginalGSM
 
Preperation for the installation of computer hardware
Preperation for the installation of computer hardwarePreperation for the installation of computer hardware
Preperation for the installation of computer hardware
OriginalGSM
 
Installation of a selected piece of hardware
Installation of a selected piece of hardwareInstallation of a selected piece of hardware
Installation of a selected piece of hardware
OriginalGSM
 
Problems of installation of hardware
Problems of installation of hardwareProblems of installation of hardware
Problems of installation of hardware
OriginalGSM
 
Installation of OS
Installation of OSInstallation of OS
Installation of OS
OriginalGSM
 
Building a computer virtual desktop computer components
Building a computer virtual desktop computer componentsBuilding a computer virtual desktop computer components
Building a computer virtual desktop computer components
OriginalGSM
 
Installation of wireless NIC software
Installation of wireless NIC softwareInstallation of wireless NIC software
Installation of wireless NIC software
OriginalGSM
 
OS comparison
OS comparisonOS comparison
OS comparison
OriginalGSM
 
Health and safety in the workplace.
Health and safety in the workplace.Health and safety in the workplace.
Health and safety in the workplace.
OriginalGSM
 

More from OriginalGSM (16)

UNTI 2 P7
UNTI 2 P7UNTI 2 P7
UNTI 2 P7
 
UNIT 2 P2
UNIT 2 P2UNIT 2 P2
UNIT 2 P2
 
ICT BTEC UNIT 2 P2
ICT BTEC UNIT 2 P2ICT BTEC UNIT 2 P2
ICT BTEC UNIT 2 P2
 
ICT BTEC UNIT 2 P1
ICT BTEC UNIT 2 P1ICT BTEC UNIT 2 P1
ICT BTEC UNIT 2 P1
 
Security plan
Security planSecurity plan
Security plan
 
Software preparation
Software preparationSoftware preparation
Software preparation
 
Personalising desktop
Personalising desktopPersonalising desktop
Personalising desktop
 
Software licences
Software licencesSoftware licences
Software licences
 
Preperation for the installation of computer hardware
Preperation for the installation of computer hardwarePreperation for the installation of computer hardware
Preperation for the installation of computer hardware
 
Installation of a selected piece of hardware
Installation of a selected piece of hardwareInstallation of a selected piece of hardware
Installation of a selected piece of hardware
 
Problems of installation of hardware
Problems of installation of hardwareProblems of installation of hardware
Problems of installation of hardware
 
Installation of OS
Installation of OSInstallation of OS
Installation of OS
 
Building a computer virtual desktop computer components
Building a computer virtual desktop computer componentsBuilding a computer virtual desktop computer components
Building a computer virtual desktop computer components
 
Installation of wireless NIC software
Installation of wireless NIC softwareInstallation of wireless NIC software
Installation of wireless NIC software
 
OS comparison
OS comparisonOS comparison
OS comparison
 
Health and safety in the workplace.
Health and safety in the workplace.Health and safety in the workplace.
Health and safety in the workplace.
 

Recently uploaded

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 

Recently uploaded (20)

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 

UNIT 2 P3 and d1

  • 1. P3: Explain the purpose of different software utilities By George Smith-Moore
  • 2. D1: Explain how software utilities can improve the performance of computer systems By George Smith-Moore
  • 3. Anti-Virus • An anti-virus software is what protects/prevents the system from attack. Attacks would be from a piece of malware, of some kind (worm,Trojan, virus, botnet attacks, and spyware/adware). • An anti-virus would also have features to remove any existing piece of malware on the computer. So an anti-virus program will both remove malware and protct the PC from further incursions. It does so by looking for malicious code.This is why it is important to continuously update the anti- virus database. • Malware can slow your computer (or do worse, like remove data). Removing this unwanted software would help improve system performance.
  • 4. Backup software • This is used to create an exact copy of all of the data on a HDD/ SSD. • By doing this you can, create a backup in case of a system failure. • This piece of utility software can improve system performance by, creating a restore point.This will allow you to bring your system back to a previous state in case of a system failure. • By creating backups periodically, this can ensure minimal data is lost.
  • 5. Disk cleaner • Disk cleaners find unnecessary files, on the computer storage, and remove them.They help the user to decide what to delete when storage medium is full. • By removing unwanted files, there becomes more space on the storage device, and it will improve performance by removing some unwanted files that could take up RAM storage.
  • 6. Disk Defragmenters • Over the extensive storage of the Hard Drive, files can become scattered across the storage device.This results in inaccessible ‘free’ storage,The Disk Defragmenter software compresses the files, to create one large area of ‘free’ storage.
  • 7. Drive formatting • Drive formatting software allows you to remove all data on a specified drive. • By doing this, you can securely remove data.The drive then becomes re- useable to place new data on it. • This can improve performance by removing old and unwanted data, and allowing room for newer software.
  • 8. Firewall • Most modern OS’s have a built in firewall, this is a preventative measure. • This preventative measure stops malware entering the system, it is a layer of protection, and is regularly updated. • A firewall does not improve performance, it creates a layer of security, which helps maintain performance levels, by stopping viruses entering the system.
  • 9. Internet History • Internet history is a piece of utility software that records the internet history. It does not necessarily improve system performance, but it does provide an easy way to revisit previous websites, it also allows you to create ‘favourite’ websites, that are saved for easy access.
  • 10. Utility software and system performance • Utility software, in particular those that clean, and defragment , improve system performance. • Utility software such as the internet history, does not greatly improve performance. By keeping a log of every website visited, this can take up a considerable amount of space. Other utility software like: disk cleaner, is needed as it deletes the file and improves performance. • Overall, utility software can improve system performance, and in some cases, it can limit the performance.