{"id":312,"date":"2020-03-04T12:05:47","date_gmt":"2020-03-04T12:05:47","guid":{"rendered":"http:\/\/learnlearn.uk\/alevelcs\/?page_id=312"},"modified":"2021-03-21T21:45:23","modified_gmt":"2021-03-21T21:45:23","slug":"utility-software","status":"publish","type":"page","link":"https:\/\/learnlearn.uk\/alevelcs\/utility-software\/","title":{"rendered":"Utility Software"},"content":{"rendered":"<div class=\"responsive-tabs\">\n<h2 class=\"tabtitle\">Encryption<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Encryption Software<\/h3>\n<p>Encryption software uses complex algorithms that make it very difficult(usually impossible) to read the contents of a file or drive without the correct decryption key. You can either choose to encrypt individual files using encryption software or more commonly encrypt and entire file system or drive.<\/p>\n<p>This reduces the chances of thieves or hackers accessing private, confidential or sensitive information.<\/p>\n<p>Hackers have used encryption together with viruses to attack large organisations, encrypting the data and locking the organisation out of their files unless money is paid to them (usually in the form of an untraceable bitcoin transaction).<\/p>\n<p><strong>Example Encryption Software<\/strong><\/p>\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/information-protection\/bitlocker\/bitlocker-overview\">Bitlocker<\/a> &#8211; include for free with most versions of Windows. Can be used to encrypt entire drives.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/download-3.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-765\" src=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/download-3.jpg\" alt=\"\" width=\"209\" height=\"241\" \/><\/a><\/p>\n\n<\/div><h2 class=\"tabtitle\">Disk Analysis<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Disk Analysis &amp; Repair Software<\/h3>\n<p><strong>File System Checking &amp; Repair<\/strong><\/p>\n<p>If the power to a computer is lost while the computer in the process of writing to disk then the file system can become corrupted. In this case your computer will automatically run disk repair software to attempt to fix the problem. An example of this is the chkdsk utility on windows.<\/p>\n<div id=\"attachment_1777\" style=\"width: 740px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/learnlearn.uk\/alevelcs\/wp-content\/uploads\/sites\/20\/2020\/03\/chkdsk.png\"><img aria-describedby=\"caption-attachment-1777\" decoding=\"async\" loading=\"lazy\" class=\"wp-image-1777 \" src=\"https:\/\/learnlearn.uk\/alevelcs\/wp-content\/uploads\/sites\/20\/2020\/03\/chkdsk.png?_t=1616363075\" alt=\"\" width=\"730\" height=\"407\" srcset=\"https:\/\/learnlearn.uk\/alevelcs\/wp-content\/uploads\/sites\/20\/2020\/03\/chkdsk.png 979w, https:\/\/learnlearn.uk\/alevelcs\/wp-content\/uploads\/sites\/20\/2020\/03\/chkdsk-300x167.png 300w, https:\/\/learnlearn.uk\/alevelcs\/wp-content\/uploads\/sites\/20\/2020\/03\/chkdsk-768x428.png 768w\" sizes=\"(max-width: 730px) 100vw, 730px\" \/><\/a><p id=\"caption-attachment-1777\" class=\"wp-caption-text\">Screenshot of the chkdsk utility. Click to enlarge.<\/p><\/div>\n<h4>De-fragmentation Software<\/h4>\n<p>The longer you use a computer for, and the more files \/ programs you install on your computer, the fragmented a hard drive becomes. This slows down the speed at which your computer can read \/ write because the data is spread across many locations.<\/p>\n<p>You therefore need to de-fragment the hard drive in order to speed up the read\/write times your computer, back to its original speed.<\/p>\n<p>In windows this can be found by searching for <strong>disk defragmenter in the start menu.<\/strong><\/p>\n<p><a href=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/defragmentation.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-767 size-full\" src=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/defragmentation.jpg?_t=1545134101\" alt=\"\" width=\"500\" height=\"385\" \/><\/a><\/p>\n<h3><\/h3>\n\n<\/div><h2 class=\"tabtitle\">Compression<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Compression Software<\/h3>\n<p>As software and media increase in quality, they also increase in size. This creates 2 problems:<\/p>\n<ul>\n<li>They take up an ever increase amount of disk drive space on computers and storage devices<\/li>\n<li>They take longer to send \/ receive when sending files to devices or across a network \/ the Internet.<\/li>\n<\/ul>\n<p>Compression software reduces the size of files using either <a href=\"https:\/\/learnlearn.uk\/gcsecs\/color-image-representation\/\">lossy or lossless compression<\/a>, meaning that they:<\/p>\n<ul>\n<li>Take up a smaller amount of storage space<\/li>\n<li>Faster to copy from device to device<\/li>\n<li>Faster to send \/ receive over a network<\/li>\n<\/ul>\n<p>Microsoft windows has in built compression software &#8211; zipped files are automatically compressed using lossless compression.<\/p>\n<p><a href=\"https:\/\/learnlearn.uk\/alevelcs\/wp-content\/uploads\/sites\/20\/2020\/03\/Compression-software-cie-alevel-computer-science-ict.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-1542\" src=\"https:\/\/learnlearn.uk\/alevelcs\/wp-content\/uploads\/sites\/20\/2020\/03\/Compression-software-cie-alevel-computer-science-ict.png\" alt=\"\" width=\"527\" height=\"392\" srcset=\"https:\/\/learnlearn.uk\/alevelcs\/wp-content\/uploads\/sites\/20\/2020\/03\/Compression-software-cie-alevel-computer-science-ict.png 527w, https:\/\/learnlearn.uk\/alevelcs\/wp-content\/uploads\/sites\/20\/2020\/03\/Compression-software-cie-alevel-computer-science-ict-300x223.png 300w\" sizes=\"(max-width: 527px) 100vw, 527px\" \/><\/a><\/p>\n\n<\/div><h2 class=\"tabtitle\">Backup<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Backup Software<\/h3>\n<p>If your computer, tablet or phone is lost, stolen or damaged then you risk losing any data on that device, including:<\/p>\n<ul>\n<li>Photos \/ videos<\/li>\n<li>Documents<\/li>\n<li>Install software<\/li>\n<\/ul>\n<p>In order to remove or reduce this risk, it is important to backup your files on your devices on a regular basis.<\/p>\n<p>Some software applications (such as Whatsapp) come with in built backup systems, but others need to be backed up manually.<\/p>\n<p>Backups can either be<a href=\"https:\/\/learnlearn.uk\/gcsecs\/system-backups\/\"> full backups or Incremental backups<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/backup.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-768\" src=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/backup.png\" alt=\"\" width=\"223\" height=\"226\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><\/h3>\n\n<\/div><h2 class=\"tabtitle\">Game<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Utility Vs Application Software<\/h3>\n<p><a href=\"https:\/\/trinket.io\/python\/e0a62ccebf?toggleCode=true\">https:\/\/trinket.io\/python\/e0a62ccebf?toggleCode=true<\/a><\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/trinket.io\/embed\/python\/e0a62ccebf?outputOnly=true\" width=\"100%\" height=\"600\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\"><\/iframe><\/p>\n\n<\/div><h2 class=\"tabtitle\">Resources<\/h2>\n<div class=\"tabcontent\">\n\n<p><a href=\"https:\/\/docs.google.com\/document\/d\/1xKdlWtR9Ln0IQf257HPzfXtfDqBVBjC2bDgupgG5WMg\/edit?usp=sharing\">https:\/\/docs.google.com\/document\/d\/1xKdlWtR9Ln0IQf257HPzfXtfDqBVBjC2bDgupgG5WMg\/edit?usp=sharing<\/a><\/p>\n<p>&nbsp;<\/p>\n<\/div><\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Encryption Software Encryption software uses complex algorithms that make it very difficult(usually impossible) to read the contents of a file or drive without the correct decryption key. You can either choose to encrypt individual files using encryption software or more commonly encrypt and entire file system or drive. This reduces the chances of thieves or&hellip;&nbsp;<a href=\"https:\/\/learnlearn.uk\/alevelcs\/utility-software\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Utility Software<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"right","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":70,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Utility Software - A Level Computer Science<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/learnlearn.uk\/alevelcs\/utility-software\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Utility Software - A Level Computer Science\" \/>\n<meta property=\"og:description\" content=\"Encryption Software Encryption software uses complex algorithms that make it very difficult(usually impossible) to read the contents of a file or drive without the correct decryption key. You can either choose to encrypt individual files using encryption software or more commonly encrypt and entire file system or drive. This reduces the chances of thieves or&hellip;&nbsp;Read More &raquo;Utility Software\" \/>\n<meta property=\"og:url\" content=\"https:\/\/learnlearn.uk\/alevelcs\/utility-software\/\" \/>\n<meta property=\"og:site_name\" content=\"A Level Computer Science\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-21T21:45:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/download-3.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/learnlearn.uk\/alevelcs\/utility-software\/\",\"url\":\"https:\/\/learnlearn.uk\/alevelcs\/utility-software\/\",\"name\":\"Utility Software - A Level Computer Science\",\"isPartOf\":{\"@id\":\"https:\/\/learnlearn.uk\/alevelcs\/#website\"},\"datePublished\":\"2020-03-04T12:05:47+00:00\",\"dateModified\":\"2021-03-21T21:45:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/learnlearn.uk\/alevelcs\/utility-software\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/learnlearn.uk\/alevelcs\/utility-software\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/learnlearn.uk\/alevelcs\/utility-software\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"A Level Computer Science Home\",\"item\":\"https:\/\/learnlearn.uk\/alevelcs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Utility Software\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/learnlearn.uk\/alevelcs\/#website\",\"url\":\"https:\/\/learnlearn.uk\/alevelcs\/\",\"name\":\"A Level Computer Science\",\"description\":\"CIE Specification\",\"publisher\":{\"@id\":\"https:\/\/learnlearn.uk\/alevelcs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/learnlearn.uk\/alevelcs\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/learnlearn.uk\/alevelcs\/#organization\",\"name\":\"A Level Computer Science\",\"url\":\"https:\/\/learnlearn.uk\/alevelcs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/learnlearn.uk\/alevelcs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/learnlearn.uk\/alevelcs\/wp-content\/uploads\/sites\/20\/2019\/09\/LearnLearnLogowhite.png\",\"contentUrl\":\"https:\/\/learnlearn.uk\/alevelcs\/wp-content\/uploads\/sites\/20\/2019\/09\/LearnLearnLogowhite.png\",\"width\":710,\"height\":98,\"caption\":\"A Level Computer Science\"},\"image\":{\"@id\":\"https:\/\/learnlearn.uk\/alevelcs\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Utility Software - A Level Computer Science","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/learnlearn.uk\/alevelcs\/utility-software\/","og_locale":"en_GB","og_type":"article","og_title":"Utility Software - A Level Computer Science","og_description":"Encryption Software Encryption software uses complex algorithms that make it very difficult(usually impossible) to read the contents of a file or drive without the correct decryption key. You can either choose to encrypt individual files using encryption software or more commonly encrypt and entire file system or drive. This reduces the chances of thieves or&hellip;&nbsp;Read More &raquo;Utility Software","og_url":"https:\/\/learnlearn.uk\/alevelcs\/utility-software\/","og_site_name":"A Level Computer Science","article_modified_time":"2021-03-21T21:45:23+00:00","og_image":[{"url":"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/download-3.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/learnlearn.uk\/alevelcs\/utility-software\/","url":"https:\/\/learnlearn.uk\/alevelcs\/utility-software\/","name":"Utility Software - A Level Computer Science","isPartOf":{"@id":"https:\/\/learnlearn.uk\/alevelcs\/#website"},"datePublished":"2020-03-04T12:05:47+00:00","dateModified":"2021-03-21T21:45:23+00:00","breadcrumb":{"@id":"https:\/\/learnlearn.uk\/alevelcs\/utility-software\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/learnlearn.uk\/alevelcs\/utility-software\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/learnlearn.uk\/alevelcs\/utility-software\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"A Level Computer Science Home","item":"https:\/\/learnlearn.uk\/alevelcs\/"},{"@type":"ListItem","position":2,"name":"Utility Software"}]},{"@type":"WebSite","@id":"https:\/\/learnlearn.uk\/alevelcs\/#website","url":"https:\/\/learnlearn.uk\/alevelcs\/","name":"A Level Computer Science","description":"CIE Specification","publisher":{"@id":"https:\/\/learnlearn.uk\/alevelcs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/learnlearn.uk\/alevelcs\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/learnlearn.uk\/alevelcs\/#organization","name":"A Level Computer Science","url":"https:\/\/learnlearn.uk\/alevelcs\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/learnlearn.uk\/alevelcs\/#\/schema\/logo\/image\/","url":"https:\/\/learnlearn.uk\/alevelcs\/wp-content\/uploads\/sites\/20\/2019\/09\/LearnLearnLogowhite.png","contentUrl":"https:\/\/learnlearn.uk\/alevelcs\/wp-content\/uploads\/sites\/20\/2019\/09\/LearnLearnLogowhite.png","width":710,"height":98,"caption":"A Level Computer Science"},"image":{"@id":"https:\/\/learnlearn.uk\/alevelcs\/#\/schema\/logo\/image\/"}}]}},"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"learnlearnadmin","author_link":"https:\/\/learnlearn.uk\/alevelcs\/author\/learnlearnadmin\/"},"rttpg_comment":0,"rttpg_category":null,"rttpg_excerpt":"Encryption Software Encryption software uses complex algorithms that make it very difficult(usually impossible) to read the contents of a file or drive without the correct decryption key. You can either choose to encrypt individual files using encryption software or more commonly encrypt and entire file system or drive. This reduces the chances of thieves or&hellip;&nbsp;Read&hellip;","_links":{"self":[{"href":"https:\/\/learnlearn.uk\/alevelcs\/wp-json\/wp\/v2\/pages\/312"}],"collection":[{"href":"https:\/\/learnlearn.uk\/alevelcs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/learnlearn.uk\/alevelcs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/alevelcs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/alevelcs\/wp-json\/wp\/v2\/comments?post=312"}],"version-history":[{"count":5,"href":"https:\/\/learnlearn.uk\/alevelcs\/wp-json\/wp\/v2\/pages\/312\/revisions"}],"predecessor-version":[{"id":1778,"href":"https:\/\/learnlearn.uk\/alevelcs\/wp-json\/wp\/v2\/pages\/312\/revisions\/1778"}],"wp:attachment":[{"href":"https:\/\/learnlearn.uk\/alevelcs\/wp-json\/wp\/v2\/media?parent=312"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}