The operating system controls and manages the computer system
Utilities provide extra functionality that make it easier to use
They can be packaged as part of the operating system
or bought as stand-alone software programs
Utility programs are designed to do just one or two tasks.
E.g. the Disk Drive. Utility software interacts with the computers hardware
Encryption software is used to transform text so that
it cannot be read without knowing the key to decode it
Encrypt files and folders on a portable
disk such as a USB memory stick
Encryption software utilities are commonly used to:
Encrypt web communication
Encrypt data on an organisation's database
Encryption utilities use an algorithm to
Data is encrypted using a key and then decrypted using a key.
scramble plain text into cipher text.
When a hard disk drive is new files
get added onto the disk in order
Utilities provide extra functionality that make it easier to use
They can be packaged as part of the operating system
or bought as stand-alone software programs
Utility programs are designed to do just one or two tasks.
E.g. the Disk Drive. Utility software interacts with the computers hardware
Encryption software is used to transform text so that
it cannot be read without knowing the key to decode it
Encrypt files and folders on a portable
disk such as a USB memory stick
Encryption software utilities are commonly used to:
Encrypt web communication
Encrypt data on an organisation's database
Encryption utilities use an algorithm to
Data is encrypted using a key and then decrypted using a key.
scramble plain text into cipher text.
When a hard disk drive is new files
get added onto the disk in order