Preview

04 - Utility Software

 1. In 2016, the top 10 Utility software vendors accounted for nearly 45% of the global Utility applications market which grew 1.5% to approach nearly $3.3 billion in license, maintenance and subscription revenues
Source: https://www.appsruntheworld.com/top-10-utility-software-vendors-and-market-forecast/
systemsoftware_utilitysoftware_question1.png

  True

  False

 2. What is utility software?

  System software that communicates to other devices

  Computer software that erases viruses, run emulators and creates creates libraries

  Computer system software that is intended to analyse, configure, monitor or help maintain a computer (often performing day to day tasks)

  Software that creates new software

 3. Which of the following are computer utility software?
1) Antivirus
2) Backup software
3) Debuggers
4) Encryption tools
5) File manager

  3 & 4

  1, 2, 3, 4 & 5

  2 & 5

  1, 2 & 4

 4. Utility software interacts with the computer's hardware.

  FALSE

  TRUE

 5. What is encryption software?
systemsoftware_utilitysoftware_question2.png

  Software that uses changes public keys into private keys

  Software that prevents viruses

  Software that uses cryptography to prevent unauthorized access to digital information

  Software that hides your files

 6. What is used to encrypt and decrypt code?

  A key

  A card

  A code

  A licence

 7. Using encryption software makes your personal data more vulnerable to attack and interception

  True

  False

 8. Read the following excerpt and fill in the blanks
_____________ occurs when the file system cannot or will not allocate 
enough contiguous space to store a complete file as a unit, but instead
puts parts of it in gaps between existing files (usually those gaps 
exist because they formerly held a file that the file system has 
subsequently deleted or because the file system allocated excess 
space for the file in the first place)

  Brokenation

  Laceration

  Fragmentation

  Bugmentation

 9. In the maintenance of file systems, ________________ is a process that reduces the amount of fragmentation
systemsoftware_utilitysoftware_question3.png

  re-orderation

  defragmentation

  re-fragmentation

  anti-fragmentation

 10. Fill in the blanks to correctly complete the following statement
When defragging a ______ the _____ are placed next to each other.

  soft disk, memory locations

  smartphone, data

  computer, folders

  hard drive, files

 11. Read the following excerpt and fill in the blanks
Files are stored in memory. 

On a hard disk, memory is divided into chunks called 'sectors'.

When a file needs to be stored, the operating system looks for free 
sectors on the disk. However, these sectors are rarely sequential 
(i.e. next to one another), instead they are usually scattered in 
different places across the hard disk.


If a file is broken up ("fragmented") across too many separate memory 
sectors, it becomes difficult for the hard disk to access all of the pieces 
of a file in a timely manner. This can make the computer appear to be 
________________

  running slowly

  processing data in parallel

  jittery (i.e a fragmented and flashing screen effect will be displayed)

  running very quickly

 12. _________________ utilities juggle the contents of memory sectors around to keep files together as much as possible

  Defragmentation

  Backup

  Encryption

  Compression

 13. You may want to compress a file to let you send it as an email attachment. For this task you would choose to use a _____________________

  anti-compression RAM chip

   file compression utility program

  cost defragmenter

  anti-virus utlity program

 14. In many cases, a utility program is built in to the operating system. (e.g. Windows has a built in compression utility you can use to compress a file or folder)

  FALSE

  TRUE

 15. A compression utility program (like winzip) simply __________________

  increases file size

  deletes files and archives them

  edits the file contents so they are encrypted

  reduces file size

 16. A ______ utility may enable you to set up a schedule to ________ all your files automatically on a regular basis

  chinup

  fedup

  letup

  backup

 17. There are two main types of backup - complete or ____________

  mental

  incremental

  miniscual

  full

 18. Encryption over the internet is often carried out by a utility built into the web browser.

  TRUE

  FALSE

 19. An ______________ utility can be used to secure data

  assymetric

  enigmatic

  animated

  encryption

 20. Utility software cannot diagnose or ever fix system issues and hardware problems

  FALSE

  TRUE