Computer-Science-A-level-Ocr
-
3-3-networks8 主题
-
3-2-databases7 主题
-
3-1-compression-encryption-and-hashing4 主题
-
2-5-object-oriented-languages7 主题
-
2-4-types-of-programming-language4 主题
-
2-3-software-development5 主题
-
2-2-applications-generation6 主题
-
2-1-systems-software8 主题
-
1-3-input-output-and-storage2 主题
-
1-2-types-of-processor3 主题
-
1-1-structure-and-function-of-the-processor1 主题
-
structuring-your-responses3 主题
-
the-exam-papers2 主题
-
8-2-algorithms-for-the-main-data-structures4 主题
-
8-1-algorithms10 主题
-
7-2-computational-methods11 主题
-
7-1-programming-techniques14 主题
-
capturing-selecting-managing-and-exchanging-data
-
entity-relationship-diagrams
-
data-normalisation
-
relational-databases
-
hashing
-
symmetric-vs-asymmetric-encryption
-
run-length-encoding-and-dictionary-coding
-
lossy-and-lossless-compression
-
polymorphism-oop
-
encapsulation-oop
-
inheritance-oop
-
attributes-oop
-
methods-oop
-
objects-oop
-
capturing-selecting-managing-and-exchanging-data
-
6-5-thinking-concurrently2 主题
-
6-4-thinking-logically2 主题
-
6-3-thinking-procedurally3 主题
-
6-2-thinking-ahead1 主题
-
6-1-thinking-abstractly3 主题
-
5-2-moral-and-ethical-issues9 主题
-
5-1-computing-related-legislation4 主题
-
4-3-boolean-algebra5 主题
-
4-2-data-structures10 主题
-
4-1-data-types9 主题
-
3-4-web-technologies16 主题
-
environmental-effects
-
automated-decision-making
-
computers-in-the-workforce
-
layout-colour-paradigms-and-character-sets
-
piracy-and-offensive-communications
-
analysing-personal-information
-
monitoring-behaviour
-
censorship-and-the-internet
-
artificial-intelligence
-
the-regulation-of-investigatory-powers-act-2000
-
the-copyright-design-and-patents-act-1988
-
the-computer-misuse-act-1990
-
the-data-protection-act-1998
-
adder-circuits
-
flip-flop-circuits
-
simplifying-boolean-algebra
-
environmental-effects
utility-software
Utility Software
What is utility software?
-
In A Level Computer Science, utility software is designed to help analyse, configure, optimise, or maintain a computer
-
It supports the operating system, which is different to application software that performs tasks that benefit end-users
|
Utility Software |
Purpose |
Role |
Examples/Notes |
|---|---|---|---|
|
Disk Defragmentation |
To rearrange the files on a hard drive to increase efficiency |
By putting files into contiguous blocks and minimizing empty spaces, disk defragmentation speeds up file access and can improve overall system performance |
Modern SSDs generally don’t require defragmentation |
|
File Management |
To organize, search, rename, and relocate files stored on the system |
Includes creating, deleting, moving, and renaming files and folders |
Windows Explorer, macOS Finder |
|
Device Driver |
To provide an interface between the hardware and the operating systems |
Ensures that the OS and programs can communicate with the hardware without needing to know the hardware’s precise details |
The OS usually manages drivers, but users may sometimes need to update them |
|
System Cleanup |
To free up space on the system by removing unnecessary files and data |
System cleanup utilities remove temporary files, system cache, unused applications, and other “junk” that can slow down the system |
CCleaner, Disk Cleanup on Windows |
|
Security |
To protect the computer system from various threats like viruses, malware, and spyware |
Monitors the system and controls the computer’s activities to protect it from threats |
Norton, McAfee, Windows Defender |

Disk defragmentation process
Worked Example
Operating systems usually come with utility software pre-installed. Give two examples of utility software, explaining the purpose of both.
[4]
Answer:
Example answer that gets full marks:
Disk defragmentation is a utility that will better organise files on the hard disk so that the operating system can access them more efficiently. Better organised files will lead to a smoother operation of the system.
File encryption software enables users to transfer sensitive data files over a network securely. A simple encryption utility will request a password from the user and scramble the file’s contents. The file contents will only be reassembled in the correct order if the receiver knows the password.
Acceptable answers you could have given instead:
Disk defragmentation rearranges files on a computer’s hard disk to make it run more smoothly. File encryption software lets users send private files safely by scrambling the contents, and only someone with valid permission can unscramble them.
Responses