We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Maintaining Systems & Upgrades Essay Sample

essay
  • Pages: 4
  • Word count: 1,094
  • Rewriting Possibility: 99% (excellent)
  • Category: computer

Get Full Essay

Get access to this section to get all help you need with your essay and educational issues.

Get Access

Introduction of TOPIC

Utility software are computer programs designed to manage and tune up the computer OS and hardware. They prevent or reduce problems by diagnosing and correcting the faults before it gets worse.

Some of the main utility programs are described below:

Disk De-Fragmenter

A de-fragmenter scans for fragmented computer files and move them together to increase efficiency. It reduces the amount of fragmented files in a computer system. It tidies up the hard-drive reusing the space more efficiently after a disk cleanup.

Defragmentation’s result will be the best if it’s carried out after a disk cleanup, as all the unwanted files will be deleted. The application can be loaded from the control panel or from All programs/Accessories/System Utilities from the Start Menu. Clicking on the Analyse button on the application window shows the estimated disk usage after defragmentation. We can then choose to defragment the disk by clicking on the Defragment button.

Screen shots of the defragmentation process are displayed below:

The screen shot above shows the result of the process.

Antivirus

Antivirus software prevents and removes Viruses, Worms and Trojans from the computer. Most of the antivirus software comes with built in spyware, adware and malware removal tools.

Antivirus software uses different methods to detect viruses; Signature based detection, Malicious activity detection and Heuristic based detection. Signature based detection is the most common way of antivirus and other malware detection. The software traces the virus by spotting the signature. The software manufactures collect profiles and signature information of the virus in the form of DAT files. These files will be downloaded by the antivirus software through updates and will be used to detect new malwares. This makes it essential to keep the antivirus software up-to-date and to run virus scans periodically.

Firewall

Firewall is a utility designed to prevent unauthorised access to from a private network. It prevents unauth

orised internet users from accessing private networks connected to the internet. All the packet data

Sorry, but full essay samples are available only for registered users

Choose a Membership Plan
entering and leaving the computer is examined when it passes through the firewall and will be blocked if the packet data do not meet the security criteria. Firewalls build a protective environment around computers that are connected to a network.

Firewall uses four different types of techniques to block unauthorised access. They are:

Packet Filter : Packet filter scans each packet of data entering or leaving a network and block them if they are not based on the user-defined rules. This kind of filtering is an effective method to prevent unauthorised access.

Application Gateway : Application gateway applies security measures to applications like FTP and Telnet Servers. This is another effective firewall technique, but it really affects the performance of the network.

Circuit-Level Gateway: Circuit-level Gateway applies mechanisms when a TCP connection is established. Once the connection is made packets can flow between hosts without further checking.

Proxy Server : This technique is used to intercept all messages entering and leaving the network. The proxy server hides the real network address.

Formatting

Formatting is the process of preparing a hard disk or a storage medium to store data. Formatting a disk involves two major process: High Level formatting and Low Level formatting.

Physical formatting(low-level)

Low-level formatting is the process of outlining the position of tracks and sector on hard-drives and other storage media. All the data in a drive will be lost permanently after a low-level formatting is done. A low-level formatting is generally done by the BIOS rather than the Operating System.

Logical formatting (high-level)

High-level formatting is the process of setting up an empty file system on the disk and installing a boot sector. As this process takes only a little time it is commonly known as Quick Format. In this process the disk also have the option to scan the entire disk for potential defects which may take several hours depending on the size of the medium.

Below is a screen shot of a Quick Formatting.

Disk Cleanup

The Disk Cleanup tool helps to free up space on the hard disk by searching disk for files that can safely delete. You can choose to delete some or all of the files. Disk cleanup tool can be used to perform the following task to free up space in a hard-drive.

Remove temporary Internet files.
Remove downloaded program files. For example, ActiveX controls and Java applets that are downloaded from the Internet.
Empty the Recycle Bin.
Remove Windows temporary files.
Remove optional Windows components that you are not using.
Remove installed programs that you no longer use.

References:

BTEC National- Information Technology Practitioners Book 1 (2nd edition) – Heinemann Publications

http://www.pcguide.com/ref/hdd/geom/formatHigh-c.html

http://www.pcguide.com/ref/hdd/geom/formatLow-c.html

http://www.webopedia.com/TERM/f/firewall.html

References:

BTEC National- Information Technology Practitioners Book 1 (2nd edition) – Heinemann Publications

http://www.pcguide.com/ref/hdd/geom/formatHigh-c.html

http://www.pcguide.com/ref/hdd/geom/formatLow-c.html

http://www.webopedia.com/TERM/f/firewall.html

References:

BTEC National- Information Technology Practitioners Book 1 (2nd edition) – Heinemann Publications

http://www.pcguide.com/ref/hdd/geom/formatHigh-c.html

http://www.pcguide.com/ref/hdd/geom/formatLow-c.html

http://www.webopedia.com/TERM/f/firewall.html

We can write a custom essay on

Maintaining Systems & Upgrades Essay Sample ...
According to Your Specific Requirements.

Order an essay

You May Also Find These Documents Helpful

Computer software programs

To know about the connection of these topics it is must to know about the link between these phrases as well as the basic concept of these two. Firstly, to know what is computer software and wireless Information systems and then secondly to discuss about their affects upon each other. Computer software is basically some programs or events that are written just to achieve certain functions by the software engineers. Events are the set of steps that is written and combined to make a program. Now there arises a question that what is a program then the answer of this question is that: Programs are basically a set of rules and instructions on the basis of which a computer act to achieve certain functions. To perform specific set of actions on computers intelligently or normally is the basic need to write a program. Wireless Information systems are basically the systems...

The Turing Test Review

The Turing Test (TT) is used to test whether computers have mentality. The set up of the test is as follows: there are 3 subjects involved. All three subjects are accessible to each other via a chat program and nothing else. The first subject is a real person, a human being. The second subject is a computer. The third subject is an interrogator whose job it is to determine which of the other two subjects is a human and which a machine. A computer has mentality if it is able to ‘trick’ the third subject into thinking that it is a human. The idea here is that to pass the TT, the computer just has to fool the person at the other end of the conversation that it is human. The TT can be interpreted in two distinct ways: (1) that it is a necessary condition for mentality; or (2)...

Chic Paints Ltd Essay Sample

1 Chic Paints Limited (CPL) are a large manufacturing company who specialise in producing niche specialist paints such as those used on boats, cars and industrial machinery. As a result of a management buyout from Ashstead Plc 6 years ago, CPL was bought by 5 of Ashstead’s directors who had previously formed the board on Chic Paints when it was a subsidiary of Ashstead Plc. CPL aims to manufacture paints and allied products that are expertly formulated to meet the highest international standards, using the best available technology for end user consumers. 4.2 Chic Paints is a private limited company with both the accounts department and the company as whole, having a relatively tall organisation structure. Since the formation of CPL 6 years ago, company has steadily reduced its turnover from £200 million to £120 million however has improved its gross profit margin from around 12% in 2007 to around...

Popular Essays

logo

Emma Taylor

online

Hi there!
Would you like to get such a paper?
How about getting a customized one?