Utility Software

Lesson Instructions

Watch and follow the YouTube video, the lesson contains three parts:

  1. Key Information and content - all you need to do here is watch and listen. We recommend you take some notes for this one!

  2. Learning activity - there is one activity to complete. You will need to complete the fill in the blanks

  3. Consolidation - these are past exam question and are for deliberate practice to check your understanding.

Task - Fill in the Blanks

Utility Software Activity

Task - Exam Questions - Deliberate Practice

Exam Questions - Web

Mark Scheme

Question 1


  • Scans the computer periodically

  • To check if any software has been installed which contains code that may harm the computer

  • Removes/quarantines these programs / notifies the user

  • Prevents these programs from being installed

  • Protects the computer by preventing important files (eg the boot sector or operating system) from being changed

Disk defragmenter

  • Moves (parts of) of files around so that all parts of a file are stored together (allowing files to be accessed more quickly)

  • Free space is collected together (allowing large files to be saved easily)

Question 2

  • Use an algorithm

  • ...to remove repeated/unnecessary data

  • Could use lossy/lossless unnecessary data

  • Lossless will not remove data permanently // lossless means original file will be restored

  • lossy is permanent deletion // lossy means original file will not be restored

  • Reduce number of pixels // reduce resolution noticeable to the human

  • Record the changes in the colour for each pixel

  • ... instead of the colour

  • Run length encoding

  • ... record the colour and number of consecutive pixels of that colour

  • ... instead of the colour of every pixel

  • Decrease colour depth//decrease number of colours

Question 3

  • Uses an algorithm to

  • ...jumble/scramble/mix up the data / turns it into cipher text / by example

  • If it is accessed it cannot be understood / it is unitelligible

  • Use of keys to encrypt/decrypt data