Utility software helps maintain the system. ____ are not essentail for the computer to work but they make it easier for the user to perform ____ tasks, or they provide ____ functionallity. Encryption software ____ the contents of files so they can only be understood by ____ users. The software uses a complex ____ to scramble the content so that it appears to be ____. Only authorised users can descramble the content.The software can encrypt specified files, or the whole of the hard disk on which the files are ____. Data ____ software reduces the ____ of a file stored on secondary storage.Smaller files are easier to ____ across a network as they require ____ packets to be sent. Their reduced size also means more files can be stored in any given area of ____. Compression can be ____ or lossless. ____ compression means that as the file size is compressed, the picture ____ remains the same - it does not get worse. Also, the file can be decompressed to its ____ quality. Lossy compression ____ removes data. It can be used on photos. Some detail is lost but this will be ____ when viewed on a screen. Two types of ____ are possible, they are ____ backup and ____ backup. Data can be lost accidentally, or deliberately. A user may ____ delete or overwrite a file, or a hard disk may fail, preventing access to any files stored on it. A ____ or malicious user may deliberately delete or overwrite data. To prevent data ____, regular copies of the data should be made. A copy of data is known as a backup. Backups can contain a copy of all files on a computer, or just ones specified by a user. Network managers make regular ____ of all files on a network using backup software. The software automatically makes a backup at a scheduled time of day, usually during the evening when the network is not busy. Backups are usually made to a high capacity secondary ____ device, or to the cloud.If data loss occurs, data can be retrieved from the backup. The ____ allows all backed-up files to be retrieved or just ____ files. A full backup involves making a copy of ____ file on the computer or network. They can require a lot of storage space and can be time ____ to make. Incremental backups take a copy of any new files created since the ____ backup, or of any files that have been edited, such as ____ documents. Most network managers make an initial ____ backup and then switch to daily incremental backups. This way all data is backed up and daily backups are ____ and less time-consuming. Disc ____ is when a file is stored on a hard disk it is actually stored not as a ____ file, but as a series of ____. Sometimes the segments run together in sequence and sometimes the segments are ____ up over a disk. This is known as ____. Over time, more and more files become fragmented, as do ____ files. A fragmented disk takes longer to ____ from and write to, making a computer run ____. Defragmentation software takes the fragmented files and ____ the segments so that they run contiguously. This ____ read/write time, thereby ____ up computer performance.

Výsledková tabule/Žebříček

Vizuální styl

Možnosti

Přepnout šablonu

Obnovit automatické uložení: ?