Utility programs
Utility software performs system-maintenance and housekeeping tasks. These tools are part of system software (alongside the OS itself) and run in the background or on demand. AQA highlights four utilities: encryption, defragmentation, data compression, and backup.
1. Encryption
Encryption scrambles data so only someone with the correct key can read it.
- Used for files on disk (full-disk encryption — BitLocker, FileVault), data in transit (HTTPS, VPN), and backups.
- Without the key, the encrypted data appears as random bytes.
- Two main types: symmetric (one key for both encrypt and decrypt) and asymmetric (public and private key pair).
Why it matters: lost laptop or stolen backup → data is unreadable to thieves.
Trade-off: slight performance cost; if you lose the key, you lose your data.
2. Defragmentation (defrag)
Over time, files written to a magnetic hard drive become fragmented — split into pieces stored across different parts of the disk. The drive's read head must move more, slowing access.
A defragmenter reorganises file fragments so each file's parts are contiguous. The result: faster reads, less wear on the drive.
Important nuances:
- Only useful for magnetic hard drives (HDDs).
- Solid-state drives (SSDs) should not be defragmented — fragmentation doesn't slow them, and unnecessary writes shorten their life.
- Modern OSes detect drive type and skip SSDs automatically.
3. Data compression
A compression utility (WinZip, 7-Zip, gzip) shrinks files for storage or transmission. Same idea as covered in CS3.8 but as a tool the user runs:
- Open a folder of files, "Add to ZIP", get a single smaller archive.
- Often offers password protection (a form of encryption).
- Useful for emailing collections of files or reducing backup size.
4. Backup
Backup software copies important data to a separate location, allowing recovery from:
- Hardware failure (drive crash).
- User error (accidental deletion).
- Malware (ransomware encrypts your data — but you can restore the backup).
- Theft or fire.
Common backup strategies:
- Full backup — copy everything every time. Simple but slow and storage-heavy.
- Incremental backup — only files changed since the last backup. Fast, but restoring requires the chain of incrementals.
- Differential backup — files changed since last full backup. Compromise between full and incremental.
The 3-2-1 rule: at least 3 copies, on 2 different media, with 1 offsite. (Beyond core GCSE but worth knowing.)
Other common utilities
- Antivirus / antimalware — scans for and removes malicious software.
- System monitor / task manager — shows CPU, memory, disk usage; can stop runaway processes.
- Disk cleanup — removes temporary files and freed space.
- Driver update tool — keeps device drivers current.
Why utilities are system software
Utilities support the system itself, not the user's productivity tasks. You don't write essays in a defragmenter — it just keeps your hardware healthy.
✦Worked example— Worked example — chosen utilities
A school's IT staff want to:
- (a) Protect pupils' work if a USB stick is lost → encryption.
- (b) Speed up old desktop PCs with HDDs → defragmentation.
- (c) Reduce email attachment sizes → compression.
- (d) Recover quickly from a server crash → backup.
⚠Common mistakes— Pitfalls
- Defragmenting an SSD. Causes wear without benefit.
- Treating compression as encryption. Compression isn't security — anyone with the file can decompress it (unless password-protected).
- Only doing backups when you remember. Use scheduled / automatic backups.
- Backing up to the same drive. A drive failure loses both — use a separate medium.
- Forgetting to test backups. A backup you've never restored may not work when you need it.
Visual: utilities sit between OS and apps
USER
↓
Application software
↓
Utility programs ← encryption, defrag, compression, backup
↓
Operating system
↓
HARDWARE
➜Try this— Quick check
For each scenario, recommend a utility:
- A teacher emails a folder of 200 photos: compression.
- A solicitor's laptop gets stolen: encryption would have protected the data.
- A magnetic-disk PC feels slow opening files: defragmenter.
- A virus encrypts all your documents: restore from backup.
AI-generated · claude-opus-4-7 · v3-deep-computer-science