Login

Please fill in your details to login.





lesson 3.15.5 system utilities

Discover how system utility software like disk clean-up, defragmentation, and file compression keep your computer running smoothly and protect your data.


image

Welcome back to the digital workshop! Today, we're looking at the special 'mechanic' tools your operating system uses to keep your computer running like a dream. Have you ever wondered how to squish a massive folder of photos so it fits in an email or develop a backup strategy? We'll be exploring System Utilities, the exact same tools that IT Support Technicians and System Administrators use every single day to fix problems, speed things up, and protect vital data from disappearing forever!

Learning Outcomes

The Building Blocks (Factual Knowledge)
recall that utility software is a distinct type of system software designed to help manage, maintain, and optimise a computer.
describe the purpose of backup software for creating retrievable copies of important data.
describe how data compression software reduces the size of files so they consume less storage space.

The Connections and Theories (Conceptual Knowledge)
analyse the benefits of compressing files to make them much quicker to transmit over a network connection.
evaluate the risks of losing data to determine when and how often backups should be performed.

The Skills and Methods (Procedural Outcomes)
apply compression tools to compress a folder of large files into a single zip archive.
apply extraction tools to successfully decompress a received archive file to extract the original contents without data loss.

Digital Skill Focus: You will learn how to compress a folder of large files into a single zip archive to prepare it for emailing, and successfully decompress a received archive file.


The Digital Mechanic's Toolkit: Utility Software


Your Operating System relies on a suite of Utility Software to maintain, optimise, and protect your system. While there are many utilities running in the background, today we are going to focus practically on just two of the most critical ones.

Here are the most common system utilities:
Disk Defragmenter: Reorganises fragmented files on a magnetic hard drive to speed up read/write times.
Disk Clean-up: Scans for and safely deletes temporary files and cache data to free up storage space.
Anti-Malware / Anti-Virus: Continuously monitors the system for malicious software and quarantines threats.
File Compression: Reduces the file size of data to save storage space and speed up network transmission.
Backup Software: Creates retrievable copies of important data on separate storage media to prevent data loss.

Today, we are putting on our hard hats and focusing entirely on File Compression and Backup Software!

image
Active Learning Directive
Sort it out! Pick 5 to 8 key words from the notes. Group them together based on how they connect and give each group a catchy title. Be ready to explain why you grouped them that way!

Shrinking Data: File Compression


Have you ever tried to email a massive folder of documents, only to be told the attachment is too large? This is where Data Compression software saves the day.

When dealing with text documents or important code, we use Lossless Compression (like a .zip file). This means the file size is shrunk significantly (or is it?), but when it is extracted later, not a single piece of data is lost or altered. It must be perfect!

But how does it shrink the file without losing anything? The compression algorithm acts like a detective, scanning the file looking for repeated patterns. Instead of saving the word "the" a thousand times, it saves the word once and leaves a tiny instruction saying "put the word 'the' here 1000 times".

image
Active Learning Directive
Boil this entire section down to exactly three bullet points. What are the absolute, unmissable facts you need to take away today?


time limit
Task 1 The Compression Mystery

It is time to put the squeeze on your files! You are going to test how clever the compression utility really is by giving it a puzzle to solve.

0
Research time

Before we start, click on this carefully crafted AI prompt to learn a little more about lossless compression.

image
You are an expert computer science teacher. Explain to a 13-year-old student how lossless zip compression uses pattern recognition to shrink text files. Maximum 128 words. Keep the tone engaging and simple. NO intro, NO outro, NO deviation from the topic, NO follow-up questions.


1
Get Organised!

Download both files - repeated.txt and novel.txt.
They will probably end up in your downloads folder. Find the files but don't open them.
Right-click on both files, select Properties, and note down their exact starting file size. They should be identical!

2
Squish It!

Right-click on "repeated.txt" and select Compress to Zip file (or Send to > Compressed (zipped) folder).
Do the exact same thing for "novel.txt".
Look at the new zipped files. Right-click them and check their new compressed sizes.

3
Crack the Case!

One file shrunk massively, and the other only halved in size!
Open both the original text files and look at the contents.
Discuss with your partner: Knowing that lossless compression works by looking for patterns, why did one file compress so much better than the other? Be prepared to share your answer with the class!

Outcome: You have practically demonstrated how file contents affect the efficiency of lossless compression algorithms.

Checkpoint

Disaster Recovery: Backups and the 3-2-1 Rule


A Backup utility is arguably the most important software on your computer. Hard drives fail, laptops get dropped, and cybercriminals use malware to lock or destroy data. A backup utility automatically creates a retrievable copy of your important files so you can recover them if disaster strikes.

In 2019, Maastricht University suffered a devastating ransomware attack. Hackers locked all their systems and demanded a massive ransom. Because their backups were also connected to the main network, the hackers locked those too! The university was forced to pay the hackers hundreds of thousands of euros to get their data back.

To prevent this, professionals use the 3-2-1 Backup Rule:

Keep 3 copies of your data (1 original, 2 backups).
Store them on 2 different types of media (e.g., an external hard drive and a cloud server).
Keep 1 copy completely offsite (away from your physical building, in case of fire or theft).

image
Active Learning Directive
Scroll the notes out of view right now! Scribble down absolutely everything you can remember from what you have just read. Once you're stuck, uncover your notes and use a different coloured pen to fill in the gaps.


time limit
Task 2 The Disaster Recovery Poster

You have been hired by the school's IT Department! Students keep losing their homework because they do not understand how to back up their data. You need to create an eye-catching digital poster to teach them the golden rule of backups.

1
Research the Maastrict Hacking Disaster

Use this safe search link to quickly read up on the Maastricht University ransomware attack.
Find out: What happened to their data? Why couldn't they just use their backups?

2
Plan your Design

Open PowerPoint, Publisher, or a design tool like Canva.
Your target audience is other 13-year-old students. Keep it punchy, visual, and easy to read.

3
Build the Poster

Your poster MUST include:

A catchy headline.
A brief "Cautionary Tale" section describing the Maastricht University disaster.
A clear, simple explanation of the 3-2-1 Backup Rule.
Icons or images to represent the different types of storage media.

Outcome: You have created an educational poster explaining industry-standard backup protocols using a real-world case study!

Checkpoint

image
Today you have learnt that system utility software is essential for maintaining your computer's health, using compression algorithms to shrink files for efficient storage, and employing backup strategies like the 3-2-1 rule to protect against catastrophic data loss.

image

Hungry for more?


To zip or not to zip: Discover why you cannot effectively 'zip' a JPEG photograph by researching the fascinating differences between lossy and lossless compression using this Google search.
I don't wannacry: Investigate the devastating 2017 WannaCry ransomware attack on the NHS to see why secure, offsite backups are a matter of life and death, starting with this search.
Password powerup: Level up your data security skills by learning how to encrypt and add a secure password to your newly created zip archives by exploring these tutorials.

Out of Lesson Learning




Last modified: May 11th, 2026
The Computing Café works best in landscape mode.
Rotate your device.
Dismiss Warning