0% found this document useful (0 votes)
64 views4 pages

Module 3 - Reading5 - UtilitySoftware

Utility software is designed to analyze, configure, optimize or maintain a computer's infrastructure including hardware, operating system, software and data storage. Some examples of utility software include anti-virus utilities, backup software, data compression utilities, debuggers, disk checkers, file managers, hex editors, memory testers, network utilities, package managers, registry cleaners, screensavers, system monitors, and system profilers. Utility software works alongside operating systems to maintain and manage the computer system.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views4 pages

Module 3 - Reading5 - UtilitySoftware

Utility software is designed to analyze, configure, optimize or maintain a computer's infrastructure including hardware, operating system, software and data storage. Some examples of utility software include anti-virus utilities, backup software, data compression utilities, debuggers, disk checkers, file managers, hex editors, memory testers, network utilities, package managers, registry cleaners, screensavers, system monitors, and system profilers. Utility software works alongside operating systems to maintain and manage the computer system.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Reading: Utility Software

Utility software is system software designed to help


analyze, configure, optimize or maintain a computer.
Utility software usually focuses on how the computer
infrastructure (including the computer hardware, operating
system, software and data storage) operates. Utility
software, along with operating system software, is a type of
system software, distinguishing it from application software.
Utility software
• Anti-virus utilities scan for computer viruses.
• Archivers output a stream or a single file when provided
with a directory or a set of files. Archive utilities, unlike
archive suites, usually do not include compression or
encryption capabilities. Some archive utilities may even
have a separate un-archive utility for the reverse
operation.
• Backup software can make copies of all information
stored on a disk and restore either the entire disk (e.g.
in an event of disk failure) or selected files (e.g. in an
event of accidental deletion).
• Clipboard managers expand the clipboard functionality of
an operating system .
• Cryptographic utilities encrypt and decrypt streams and
files.
• Data compression utilities output a shorter stream or a
smaller file when provided with a stream or file.
• Data synchronization utilities establish consistency
among data from a source to a target data storage and
vice versa. There are several branches of this type of
utility:
• File synchronization utilities maintain consistency
between two sources. They may be used to create
redundancy or backup copies but are also used to
help users carry their digital music, photos and
video in their mobile devices.
• Revision control utilities are intended to deal with
situations where more than one user attempts to
simultaneously modify the same file.
• Debuggers are used to test and “debug” other programs,
mainly to solve programming errors. Also utilized for
reverse engineering of software or systems.
• Disk checkers can scan operating hard drive.
• Disk cleaners can find files that are unnecessary to
computer operation, or take up considerable amounts
of space. Disk cleaner helps the user to decide what to
delete when their hard disk is full.
• Disk compression utilities can transparently
compress/uncompress the contents of a disk,
increasing the capacity of the disk.
• Disk defragmenters can detect computer files whose
contents are scattered across several locations on the
hard disk, and move the fragments to one location to
increase efficiency.
• Disk partitions can divide an individual drive into multiple
logical drives, each with its own file system which can
be mounted by the operating system and treated as an
individual drive.
• Disk space analyzers for the visualization of disk space
usage by getting the size for each folder (including sub
folders) & files in folder or drive. showing the
distribution of the used space.
• Disk storage utilities
• File managers provide a convenient method of performing
routine data management tasks, such as deleting,
renaming, cataloging, uncataloging, moving, copying,
merging, generating and modifying data sets.
• Hex editors directly modify the text or data of a file. These
files could be data or an actual program.
• Memory testers check for memory failures.
• Network utilities analyze the computer’s network
connectivity, configure network settings, check data
transfer or log events.
• Package managers are used to configure, install or keep
up to date other software on a computer.
• Registry cleaners clean and optimize the Windows
Registry by removing old registry keys that are no
longer in use.
• Screensavers were desired to prevent phosphor burn-in
on CRT and plasma computer monitors by blanking the
screen or filling it with moving images or patterns when
the computer is not in use. Contemporary screensavers
are used primarily for entertainment or security.
• System monitors for monitoring resources and
performance in a computer system.
• System profilers provide detailed information about the
software installed and hardware attached to the
computer.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy