5.2: Utility Software

What is utility software?

Utility software are dedicated programs used for the maintenance and organisation of a computer system.

Antivirus Software

Antivirus software is used to locate and delete viruses on a computer system. The antivirus scans each file on the computer and compares it against a database of known viruses. Files with similar features to viruses in the database are identified and deleted.

There are thousands of known viruses but new ones are created each day by attackers so antivirus software must be regularly updated to keep systems secure.

Other roles of an antivirus:

  • Checking all incoming and outgoing emails and their attachments.

  • Checking files as they are downloaded.

  • Scanning the hard drive for viruses and deleting them.


A firewall manages incoming and outgoing network traffic.


Each data packet is processed to check whether it should be given access to the network by examining the source and destination address.

Unexpected data packets will be filtered out and not accepted to the network.

Other roles of a firewall include:

  • Blocking access to insecure / malicious web sites.

  • Blocking certain programs from accessing the internet.

  • Blocking unexpected / unauthorised downloads.

  • Preventing specific users on a network accessing certain files.


As files are edited over time they will become fragmented -  this is when the file is split into parts that are stored in different locations on the hard disk drive. Files that are fragmented take longer to load and read because of the distance between the fragments of the file. 

Defragmentation software is used to rearrange the file on the hard disk drive so that all parts are together again in order. Defragmentation improves the speed of accessing data on the hard disk drive.

Exam Board:

Eduqas / WJEC


2016 +  

Disk Compression

Compression is the process of decreasing the size of a file.


Disk compression is a utility tool that automatically compresses files when saved so that more data can be stored on the hard disk drive.


When a file is to be opened, the program is automatically decompressed. Disk compression increases the amount of space on a hard disk drive but it takes longer to open and close files.

System Monitoring & Task Management

These types of applications allow users to monitor system resources and see the processes that are currently running. Users will be able to see which programs are being executed and how much CPU time they are requiring. If a program has stopped responding, or is using too many resources, the user can close it.

Windows Task Manager is an example of this type of utility software - press Ctrl + Alt + Delete on any Windows computer to open it.

You can also find applications that will scan the hard disc for any errors and attempt to repair them.

task manager.png

Disk Scanning & Repair

This utility is used to scan a hard drive for any corrupted data.

The corrupted data is deleted to speed up reading from and writing to the hard drive.

More advanced disk checkers are used to scan for bad sectors. A bad sector is a permanently damaged section of the hard drive which can no longer be used and must be skipped over. 

Magnetic Hard Disk Drive.png

System Backup

Not the same as traditional backup, system backup specifically saves a copy of the operating system and essential data.


In the case of data corruption, the system backup can be restored to a previously saved copy of the essential files and systems.

5.2 - Utility Software:

1. What is meant by utility software? [1]

2a. Describe how antivirus software works. [2]

2b. Describe 3 further roles of antivirus software. [3]

3a. What is the purpose of a firewall? [2]

3b. Describe 3 further roles of a firewall. [3]

4a. Describe what is meant by defragmentation[2]

4b. Explain why defragmentation software is used. [2]

5. Describe 2 benefits of using compression. [2] 

6. Explain why task management software could be used. [2]

7a. Explain why backups are important. [2]

7b. Describe a common type of backup policy. [3]

Questo's Questions