TopMyGrade

GCSE/Computer Science/AQA

CS4.5Utility programs: encryption, defragmentation, data compression, backup; how each helps maintain a working system

Notes

Utility programs

Utility software performs system-maintenance and housekeeping tasks. These tools are part of system software (alongside the OS itself) and run in the background or on demand. AQA highlights four utilities: encryption, defragmentation, data compression, and backup.

1. Encryption

Encryption scrambles data so only someone with the correct key can read it.

  • Used for files on disk (full-disk encryption — BitLocker, FileVault), data in transit (HTTPS, VPN), and backups.
  • Without the key, the encrypted data appears as random bytes.
  • Two main types: symmetric (one key for both encrypt and decrypt) and asymmetric (public and private key pair).

Why it matters: lost laptop or stolen backup → data is unreadable to thieves.

Trade-off: slight performance cost; if you lose the key, you lose your data.

2. Defragmentation (defrag)

Over time, files written to a magnetic hard drive become fragmented — split into pieces stored across different parts of the disk. The drive's read head must move more, slowing access.

A defragmenter reorganises file fragments so each file's parts are contiguous. The result: faster reads, less wear on the drive.

Important nuances:

  • Only useful for magnetic hard drives (HDDs).
  • Solid-state drives (SSDs) should not be defragmented — fragmentation doesn't slow them, and unnecessary writes shorten their life.
  • Modern OSes detect drive type and skip SSDs automatically.

3. Data compression

A compression utility (WinZip, 7-Zip, gzip) shrinks files for storage or transmission. Same idea as covered in CS3.8 but as a tool the user runs:

  • Open a folder of files, "Add to ZIP", get a single smaller archive.
  • Often offers password protection (a form of encryption).
  • Useful for emailing collections of files or reducing backup size.

4. Backup

Backup software copies important data to a separate location, allowing recovery from:

  • Hardware failure (drive crash).
  • User error (accidental deletion).
  • Malware (ransomware encrypts your data — but you can restore the backup).
  • Theft or fire.

Common backup strategies:

  • Full backup — copy everything every time. Simple but slow and storage-heavy.
  • Incremental backup — only files changed since the last backup. Fast, but restoring requires the chain of incrementals.
  • Differential backup — files changed since last full backup. Compromise between full and incremental.

The 3-2-1 rule: at least 3 copies, on 2 different media, with 1 offsite. (Beyond core GCSE but worth knowing.)

Other common utilities

  • Antivirus / antimalware — scans for and removes malicious software.
  • System monitor / task manager — shows CPU, memory, disk usage; can stop runaway processes.
  • Disk cleanup — removes temporary files and freed space.
  • Driver update tool — keeps device drivers current.

Why utilities are system software

Utilities support the system itself, not the user's productivity tasks. You don't write essays in a defragmenter — it just keeps your hardware healthy.

Worked exampleWorked example — chosen utilities

A school's IT staff want to:

  • (a) Protect pupils' work if a USB stick is lost → encryption.
  • (b) Speed up old desktop PCs with HDDs → defragmentation.
  • (c) Reduce email attachment sizes → compression.
  • (d) Recover quickly from a server crash → backup.

Common mistakesPitfalls

  1. Defragmenting an SSD. Causes wear without benefit.
  2. Treating compression as encryption. Compression isn't security — anyone with the file can decompress it (unless password-protected).
  3. Only doing backups when you remember. Use scheduled / automatic backups.
  4. Backing up to the same drive. A drive failure loses both — use a separate medium.
  5. Forgetting to test backups. A backup you've never restored may not work when you need it.

Visual: utilities sit between OS and apps

       USER
         ↓
  Application software
         ↓
  Utility programs   ← encryption, defrag, compression, backup
         ↓
  Operating system
         ↓
       HARDWARE

Try thisQuick check

For each scenario, recommend a utility:

  • A teacher emails a folder of 200 photos: compression.
  • A solicitor's laptop gets stolen: encryption would have protected the data.
  • A magnetic-disk PC feels slow opening files: defragmenter.
  • A virus encrypts all your documents: restore from backup.

AI-generated · claude-opus-4-7 · v3-deep-computer-science

Practice questions

Try each before peeking at the worked solution.

  1. Question 14 marks

    Define encryption

    Define encryption and explain how it protects data.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

  2. Question 24 marks

    Why defragment?

    Explain why defragmenting a magnetic hard drive can improve performance.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

  3. Question 33 marks

    Don't defrag SSDs

    Explain why SSDs should not be defragmented.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

  4. Question 42 marks

    Compression utility

    Give two reasons a user might use a compression utility.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

  5. Question 54 marks

    Backup strategies

    Compare full and incremental backups.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

  6. Question 63 marks

    Choose a utility

    For each problem, recommend the most appropriate utility:
    (a) Reduce the size of a 500 MB folder for emailing.
    (b) Protect data on a laptop in case of theft.
    (c) Recover documents after a hard-drive crash.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

  7. Question 72 marks

    Encryption vs compression

    State two differences between encryption and compression.

    Ask AI about this

    AI-generated · claude-opus-4-7 · v3-deep-computer-science

Flashcards

CS4.5 — Utility programs — encryption, defrag, compression, backup

12-card SR deck for AQA GCSE Computer Science topic CS4.5

12 cards · spaced repetition (SM-2)