{"id":381,"date":"2018-01-22T14:04:06","date_gmt":"2018-01-22T14:04:06","guid":{"rendered":"http:\/\/learnlearn.uk\/gcsecs\/?page_id=381"},"modified":"2018-12-20T11:23:35","modified_gmt":"2018-12-20T11:23:35","slug":"utility-system-software","status":"publish","type":"page","link":"https:\/\/learnlearn.uk\/gcsecs\/utility-system-software\/","title":{"rendered":"Utility Software"},"content":{"rendered":"\n<div class=\"arconix-tabs-horizontal\"><ul class=\"arconix-tabs\"><li data-arconix-icon=\" \" data-arconix-color=\" \" class=\"arconix-tab tab-Encryption\"><a class=\"\" href=\"#tab-Encryption\">Encryption<\/a><\/li>\n<li data-arconix-icon=\" \" data-arconix-color=\" \" class=\"arconix-tab tab-De-fragmentation\"><a class=\"\" href=\"#tab-De-fragmentation\">De-fragmentation<\/a><\/li>\n<li data-arconix-icon=\" \" data-arconix-color=\" \" class=\"arconix-tab tab-Compression\"><a class=\"\" href=\"#tab-Compression\">Compression<\/a><\/li>\n<li data-arconix-icon=\" \" data-arconix-color=\" \" class=\"arconix-tab tab-Backup\"><a class=\"\" href=\"#tab-Backup\">Backup<\/a><\/li>\n<li data-arconix-icon=\" \" data-arconix-color=\" \" class=\"arconix-tab tab-Game\"><a class=\"\" href=\"#tab-Game\">Game<\/a><\/li>\n<li data-arconix-icon=\" \" data-arconix-color=\" \" class=\"arconix-tab tab-Resources\"><a class=\"\" href=\"#tab-Resources\">Resources<\/a><\/li><\/ul>\n<div class=\"arconix-panes\"><div class=\"arconix-pane pane-Encryption\">\n<div class=\"arconix-column-two-thirds\">\n<h3>Encryption Software<\/h3>\n<p>Encryption software uses complex algorithms that make it very difficult(usually impossible) to read the contents of a file or drive without the correct decryption key. You can either choose to encrypt individual files using encryption software or more commonly encrypt and entire file system or drive.<\/p>\n<p>This reduces the chances of thieves or hackers accessing private, confidential or sensitive information.<\/p>\n<p>Hackers have used encryption together with viruses to attack large organisations, encrypting the data and locking the organisation out of their files unless money is paid to them (usually in the form of an untraceable bitcoin transaction).<\/p>\n<p><strong>Example Ecryption Software<\/strong><\/p>\n<p><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/information-protection\/bitlocker\/bitlocker-overview\">Bitlocker<\/a> &#8211; include for free with most versions of Windows. Can be used to encrypt entire drives.<\/p>\n<\/div>\n<div class=\"arconix-column-one-third\">\n<p><a href=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/download-3.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-765\" src=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/download-3.jpg\" alt=\"\" width=\"209\" height=\"241\" \/><\/a><\/p>\n<\/div>\n<\/div>\n<div class=\"arconix-pane pane-De-fragmentation\">\n<h3>De-fragmentation Software<\/h3>\n<p>The longer you use a computer for, and the more files \/ programs you install on your computer, the fragmented a hard drive becomes. This slows down the speed at which your computer can read \/ write because the data is spread across many locations.<\/p>\n<p>You therefore need to de-fragment the hard drive in order to speed up the read\/write times your computer, back to its original speed.<\/p>\n<p>In windows this can be found by searching for <strong>disk defragmenter in the start menu.<\/strong><\/p>\n<p><a href=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/defragmentation.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-767 size-full\" src=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/defragmentation.jpg?_t=1545134101\" alt=\"\" width=\"500\" height=\"385\" srcset=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/defragmentation.jpg 500w, https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/defragmentation-300x231.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<h3><\/h3>\n<\/div>\n<div class=\"arconix-pane pane-Compression\">\n<h3>Compression Software<\/h3>\n<p>As software and media increase in quality, they also increase in size. This creates 2 problems:<\/p>\n<ul>\n<li>They take up an ever increase amount of disk drive space on computers and storage devices<\/li>\n<li>They take longer to send \/ receive when sending files to devices or across a network \/ the Internet.<\/li>\n<\/ul>\n<p>Compression software reduces the size of files using either <a href=\"https:\/\/learnlearn.uk\/gcsecs\/color-image-representation\/\">lossy or lossless compression<\/a>, meaning that they:<\/p>\n<ul>\n<li>Take up a smaller amount of storage space<\/li>\n<li>Faster to copy from device to device<\/li>\n<li>Faster to send \/ receive over a network<\/li>\n<\/ul>\n<p>Microsoft windows has in built compression software &#8211; zipped files are automatically compressed using lossless compression.<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<div class=\"arconix-pane pane-Backup\">\n<div class=\"arconix-column-two-thirds\">\n<h3>Backup Software<\/h3>\n<p>If your computer, tablet or phone is lost, stolen or damaged then you risk losing any data on that device, including:<\/p>\n<ul>\n<li>Photos \/ videos<\/li>\n<li>Documents<\/li>\n<li>Install software<\/li>\n<\/ul>\n<p>In order to remove or reduce this risk, it is important to backup your files on your devices on a regular basis.<\/p>\n<p>Some software applications (such as Whatsapp) come with in built backup systems, but others need to be backed up manually.<\/p>\n<p>Backups can either be<a href=\"https:\/\/learnlearn.uk\/gcsecs\/system-backups\/\"> full backups or Incremental backups<\/a>.<\/p>\n<\/div>\n<div class=\"arconix-column-one-third\">\n<p><a href=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/backup.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-768\" src=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/backup.png\" alt=\"\" width=\"223\" height=\"226\" \/><\/a><\/p>\n<\/div>\n<h3><\/h3>\n<\/div>\n<div class=\"arconix-pane pane-Game\">\n<h3>Utility Vs Application Software<\/h3>\n<p><a href=\"https:\/\/trinket.io\/python\/e0a62ccebf?toggleCode=true\">https:\/\/trinket.io\/python\/e0a62ccebf?toggleCode=true<\/a><\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/trinket.io\/embed\/python\/e0a62ccebf?outputOnly=true\" width=\"100%\" height=\"600\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<\/div>\n<div class=\"arconix-pane pane-Resources\">\n<p>https:\/\/docs.google.com\/document\/d\/1xKdlWtR9Ln0IQf257HPzfXtfDqBVBjC2bDgupgG5WMg\/edit?usp=sharing<\/p>\n<p>&nbsp;<\/p>\n<\/div><\/div><\/div>\n\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Utility Software - GCSE Computer Science Theory<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/learnlearn.uk\/gcsecs\/utility-system-software\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Utility Software - GCSE Computer Science Theory\" \/>\n<meta property=\"og:description\" content=\"&nbsp; &nbsp;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/learnlearn.uk\/gcsecs\/utility-system-software\/\" \/>\n<meta property=\"og:site_name\" content=\"GCSE Computer Science Theory\" \/>\n<meta property=\"article:modified_time\" content=\"2018-12-20T11:23:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/download-3.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/utility-system-software\/\",\"url\":\"https:\/\/learnlearn.uk\/gcsecs\/utility-system-software\/\",\"name\":\"Utility Software - GCSE Computer Science Theory\",\"isPartOf\":{\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/#website\"},\"datePublished\":\"2018-01-22T14:04:06+00:00\",\"dateModified\":\"2018-12-20T11:23:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/utility-system-software\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/learnlearn.uk\/gcsecs\/utility-system-software\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/utility-system-software\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"OCR GCSE Computer Science Home\",\"item\":\"https:\/\/learnlearn.uk\/gcsecs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Utility Software\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/#website\",\"url\":\"https:\/\/learnlearn.uk\/gcsecs\/\",\"name\":\"GCSE Computer Science Theory\",\"description\":\"Just another My Blog site\",\"publisher\":{\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/learnlearn.uk\/gcsecs\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/#organization\",\"name\":\"GCSE Computer Science Theory\",\"url\":\"https:\/\/learnlearn.uk\/gcsecs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2019\/02\/LearnLearnLogowhite.png\",\"contentUrl\":\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2019\/02\/LearnLearnLogowhite.png\",\"width\":710,\"height\":98,\"caption\":\"GCSE Computer Science Theory\"},\"image\":{\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Utility Software - GCSE Computer Science Theory","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/learnlearn.uk\/gcsecs\/utility-system-software\/","og_locale":"en_GB","og_type":"article","og_title":"Utility Software - GCSE Computer Science Theory","og_description":"&nbsp; &nbsp;","og_url":"https:\/\/learnlearn.uk\/gcsecs\/utility-system-software\/","og_site_name":"GCSE Computer Science Theory","article_modified_time":"2018-12-20T11:23:35+00:00","og_image":[{"url":"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2018\/01\/download-3.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/learnlearn.uk\/gcsecs\/utility-system-software\/","url":"https:\/\/learnlearn.uk\/gcsecs\/utility-system-software\/","name":"Utility Software - GCSE Computer Science Theory","isPartOf":{"@id":"https:\/\/learnlearn.uk\/gcsecs\/#website"},"datePublished":"2018-01-22T14:04:06+00:00","dateModified":"2018-12-20T11:23:35+00:00","breadcrumb":{"@id":"https:\/\/learnlearn.uk\/gcsecs\/utility-system-software\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/learnlearn.uk\/gcsecs\/utility-system-software\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/learnlearn.uk\/gcsecs\/utility-system-software\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"OCR GCSE Computer Science Home","item":"https:\/\/learnlearn.uk\/gcsecs\/"},{"@type":"ListItem","position":2,"name":"Utility Software"}]},{"@type":"WebSite","@id":"https:\/\/learnlearn.uk\/gcsecs\/#website","url":"https:\/\/learnlearn.uk\/gcsecs\/","name":"GCSE Computer Science Theory","description":"Just another My Blog site","publisher":{"@id":"https:\/\/learnlearn.uk\/gcsecs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/learnlearn.uk\/gcsecs\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/learnlearn.uk\/gcsecs\/#organization","name":"GCSE Computer Science Theory","url":"https:\/\/learnlearn.uk\/gcsecs\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/learnlearn.uk\/gcsecs\/#\/schema\/logo\/image\/","url":"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2019\/02\/LearnLearnLogowhite.png","contentUrl":"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2019\/02\/LearnLearnLogowhite.png","width":710,"height":98,"caption":"GCSE Computer Science Theory"},"image":{"@id":"https:\/\/learnlearn.uk\/gcsecs\/#\/schema\/logo\/image\/"}}]}},"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"learnlearnadmin","author_link":"https:\/\/learnlearn.uk\/gcsecs\/author\/learnlearnadmin\/"},"rttpg_comment":0,"rttpg_category":null,"rttpg_excerpt":"&nbsp; &nbsp;","_links":{"self":[{"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/pages\/381"}],"collection":[{"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/comments?post=381"}],"version-history":[{"count":11,"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/pages\/381\/revisions"}],"predecessor-version":[{"id":774,"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/pages\/381\/revisions\/774"}],"wp:attachment":[{"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/media?parent=381"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}