lesson 3.15.5 system utilities
Discover how system utility software like disk clean-up, defragmentation, and file compression keep your computer running smoothly and protect your data.

Welcome back to the digital workshop! Today, we're looking at the special 'mechanic' tools your operating system uses to keep your computer running like a dream. Have you ever wondered how to squish a massive folder of photos so it fits in an email or develop a backup strategy? We'll be exploring System Utilities, the exact same tools that IT Support Technicians and System Administrators use every single day to fix problems, speed things up, and protect vital data from disappearing forever!
Learning Outcomes
The Building Blocks (Factual Knowledge)
recall that utility software is a distinct type of system software designed to help manage, maintain, and optimise a computer.
describe the purpose of backup software for creating retrievable copies of important data.
describe how data compression software reduces the size of files so they consume less storage space.
The Connections and Theories (Conceptual Knowledge)
analyse the benefits of compressing files to make them much quicker to transmit over a network connection.
evaluate the risks of losing data to determine when and how often backups should be performed.
The Skills and Methods (Procedural Outcomes)
apply compression tools to compress a folder of large files into a single zip archive.
apply extraction tools to successfully decompress a received archive file to extract the original contents without data loss.
Digital Skill Focus: You will learn how to compress a folder of large files into a single zip archive to prepare it for emailing, and successfully decompress a received archive file.
The Digital Mechanic's Toolkit: Utility Software
Your Operating System relies on a suite of Utility Software to maintain, optimise, and protect your system. While there are many utilities running in the background, today we are going to focus practically on just two of the most critical ones.
Here are the most common system utilities:
Disk Defragmenter: Reorganises fragmented files on a magnetic hard drive to speed up read/write times.
Disk Clean-up: Scans for and safely deletes temporary files and cache data to free up storage space.
Anti-Malware / Anti-Virus: Continuously monitors the system for malicious software and quarantines threats.
File Compression: Reduces the file size of data to save storage space and speed up network transmission.
Backup Software: Creates retrievable copies of important data on separate storage media to prevent data loss.
Today, we are putting on our hard hats and focusing entirely on File Compression and Backup Software!
Sort it out! Pick 5 to 8 key words from the notes. Group them together based on how they connect and give each group a catchy title. Be ready to explain why you grouped them that way!
Shrinking Data: File Compression
Have you ever tried to email a massive folder of documents, only to be told the attachment is too large? This is where Data Compression software saves the day.
When dealing with text documents or important code, we use Lossless Compression (like a .zip file). This means the file size is shrunk significantly (or is it?), but when it is extracted later, not a single piece of data is lost or altered. It must be perfect!
But how does it shrink the file without losing anything? The compression algorithm acts like a detective, scanning the file looking for repeated patterns. Instead of saving the word "the" a thousand times, it saves the word once and leaves a tiny instruction saying "put the word 'the' here 1000 times".
Boil this entire section down to exactly three bullet points. What are the absolute, unmissable facts you need to take away today?

Task 1 The Compression Mystery
It is time to put the squeeze on your files! You are going to test how clever the compression utility really is by giving it a puzzle to solve.
0
Research time
Before we start, click on this carefully crafted AI prompt to learn a little more about lossless compression.
You are an expert computer science teacher. Explain to a 13-year-old student how lossless zip compression uses pattern recognition to shrink text files. Maximum 128 words. Keep the tone engaging and simple. NO intro, NO outro, NO deviation from the topic, NO follow-up questions.
1
Get Organised!
Download both files - repeated.txt and novel.txt.
They will probably end up in your downloads folder. Find the files but don't open them.
Right-click on both files, select Properties, and note down their exact starting file size. They should be identical!
2
Squish It!
Right-click on "repeated.txt" and select Compress to Zip file (or Send to > Compressed (zipped) folder).
Do the exact same thing for "novel.txt".
Look at the new zipped files. Right-click them and check their new compressed sizes.
3
Crack the Case!
One file shrunk massively, and the other only halved in size!
Open both the original text files and look at the contents.
Discuss with your partner: Knowing that lossless compression works by looking for patterns, why did one file compress so much better than the other? Be prepared to share your answer with the class!
Outcome: You have practically demonstrated how file contents affect the efficiency of lossless compression algorithms.

Disaster Recovery: Backups and the 3-2-1 Rule
A Backup utility is arguably the most important software on your computer. Hard drives fail, laptops get dropped, and cybercriminals use malware to lock or destroy data. A backup utility automatically creates a retrievable copy of your important files so you can recover them if disaster strikes.
In 2019, Maastricht University suffered a devastating ransomware attack. Hackers locked all their systems and demanded a massive ransom. Because their backups were also connected to the main network, the hackers locked those too! The university was forced to pay the hackers hundreds of thousands of euros to get their data back.
To prevent this, professionals use the 3-2-1 Backup Rule:
Keep 3 copies of your data (1 original, 2 backups).
Store them on 2 different types of media (e.g., an external hard drive and a cloud server).
Keep 1 copy completely offsite (away from your physical building, in case of fire or theft).
Scroll the notes out of view right now! Scribble down absolutely everything you can remember from what you have just read. Once you're stuck, uncover your notes and use a different coloured pen to fill in the gaps.

Task 2 The Disaster Recovery Poster
You have been hired by the school's IT Department! Students keep losing their homework because they do not understand how to back up their data. You need to create an eye-catching digital poster to teach them the golden rule of backups.
1
Research the Maastrict Hacking Disaster
Use this safe search link to quickly read up on the Maastricht University ransomware attack.
Find out: What happened to their data? Why couldn't they just use their backups?
2
Plan your Design
Open PowerPoint, Publisher, or a design tool like Canva.
Your target audience is other 13-year-old students. Keep it punchy, visual, and easy to read.
3
Build the Poster
Your poster MUST include:
A catchy headline.
A brief "Cautionary Tale" section describing the Maastricht University disaster.
A clear, simple explanation of the 3-2-1 Backup Rule.
Icons or images to represent the different types of storage media.
Outcome: You have created an educational poster explaining industry-standard backup protocols using a real-world case study!

Hungry for more?
To zip or not to zip: Discover why you cannot effectively 'zip' a JPEG photograph by researching the fascinating differences between lossy and lossless compression using this Google search.
I don't wannacry: Investigate the devastating 2017 WannaCry ransomware attack on the NHS to see why secure, offsite backups are a matter of life and death, starting with this search.
Password powerup: Level up your data security skills by learning how to encrypt and add a secure password to your newly created zip archives by exploring these tutorials.
Last modified: May 11th, 2026
