What is a utility? Useful Windows system utilities


Many users have heard the word “utility” more than once. Similar programs(software) are created to solve problems aimed at diagnosing the system and PC components. They provide the user with access to various settings, parameters and settings. Some software is built directly into the operating system (OS), while others require downloading from the Internet.

What is a utility

Utility – auxiliary highly specialized software for optimizing the operating system, diagnosing and repairing system components. Translated from in English, utility means - a utility or utility program. It does not represent a complete software, they are developed with the purpose solving specific problems. Most popular apps aimed at cleaning the registry, formatting and breaking down sections of hard disk and flash drives, malware removal and PC performance optimization.

Utilities are an integral part of the work of professional programmers, and they also play an important role in application programming.

There are also utility programs that are designed primarily to meet the needs of the developers themselves. Utilitarian software, most often acts as a service, processing any data. Such software is not intended for public access.

Types of utilities

This type of software can be divided into several categories:

  1. archivers. The software is designed for unzipping archives and archiving files. This is necessary if the file weighs too much and needs to be compressed;
  2. diagnostic. The software is primarily focused on diagnosing software and hardware components. You can identify the problem and, in some cases, fix it. An example would be a utility for diagnosing hard disk. Such software scans the disk, if there are faults (bad sectors, fragmentation) it tries to eliminate them;
  3. optimizers. In turn, optimizers provide access to settings (tweaks) to increase PC performance (setting startup, cleaning the registry, disabling unnecessary processes);
  4. antivirus. Allows you to scan the system for the presence malicious files. Treatment applications remove suspicious files and clean the OS, and also perform recovery;
  5. uninstallers. It is not always possible to remove any programs using standard OS tools. For such purposes, uninstallers are created that are capable of removing any software. For such computer utilities special access rights are required;
  6. systemic. These are standard operating system tools that are built into it by default. Such software does not need to be downloaded; it is enough to launch it using special commands.

Useful utilities

Archivers (WinRAR and 7 ZIP)

WinRAR is enough famous archivist. With it you can create, edit and unpack archives. Also, this archiver implements quite powerful safety equipment: AES encryption, archive recovery, password protection, small built-in antivirus. It should be noted that the utility is paid, the free period is only 30 days.

The second similar software is the 7 ZIP archiver. This is a freely available free software product. There is support for effective compression algorithms. With its help you can create multi-volume archives. The function is being implemented hardware acceleration(on some processors).

Diagnostic (AIDA64 and OCCT)

AIDA64 is a popular utility that provides information about software and hardware components. With its help you can carry out express testing OS to identify operational problems. It also shows the peripherals connected to the computer, data of the installed operating system, and overclocking potential.

OCCT is a utility that allows you to high-quality diagnostics personal computer. With its help you can carry out system stability tests, and if any problems are detected, the software will notify the user. Main feature is the presence of tests to check functionality hard drive(reading, writing speed), video card and processor.

Optimizers (CCleaner and AusLogics BoostSpeed)

CCleaner is a popular system optimization software. With this software, users can clean the OS from temporary files, browser data, clipboard, registry, dump, recycle bin, cache, etc. At the same time, there are tools for uninstalling programs and optimizing startup.

AusLogics BoostSpeed ​​is a package of utilities for flexible configuration of registry settings and has tools for optimizing the loading of pages on the Internet. There are also various tweaks for optimization and improvement operating system performance. Corrects errors in the OS, deletes temporary files and duplicates. Checks the system using stability tests, and additionally has blocking tools in its arsenal advertising windows in the Internet.

Antivirus (Dr.Web CureIt and Kaspersky Virus Removal Tool)

Dr.Web CureIt is a small healing utility that will scan the OS once and perform scan and delete malicious files. This product no installation required, just download the program and run it to start diagnosing. It can be used to perform both quick and full OS scans.

Kaspersky Virus Removal Tool – free antivirus scanner, which will perform scan and treatment infected files. Can determine Trojans, spyware, scripts and other malware. To ensure effective detection and removal of viruses, it uses advanced scanning algorithms.

Uninstallers (Revo Uninstaller and IOBIT UNINSTALLER)

Revo Uninstaller powerful tool to clean the system and remove unnecessary programs. In addition to removing unnecessary software, it can clean startup, the registry from duplicates, etc. The program is free and paid version. Also built in additional tools: access to 12 OS administration tools, permanent deletion of files, folders, documents and programs.

IOBIT UNINSTALLER – powerful utility For permanent deletion programs and files. Additionally, it allows you to create an OS restore point, the ability to batch uninstall, and restore deleted software. The main advantage is the function " Forced deletion "- with her help it happens complete removal any program that cannot be uninstalled using system tools.

System (resource monitor and hard drive cleanup)

Resource Monitor is standard means operating system. You can use it to check current CPU load, RAM, disk and network. There is no need to download it, just run the following actions: press “WIN+R”, in the window that appears, enter “perfmon /res” and click “OK”.

Cleaning your hard drive is another built-in utility that helps users delete temporary files, recycle bin, restore points, etc. As in the previous case, you don’t need to download anything: press “WIN+R”, enter “cleanmgr” in the window that appears and click “OK”.

We often come across something new to ourselves computer concepts, and we may be interested in the question, for example, about what utilities are. But, as you know, everything has an explanation and purpose. Utilities are specialized programs, which are designed to optimize the operation and maintenance of the system, that is, these are assistant programs that take on tasks that the operating system cannot cope with on its own. Most of these products are focused on maintaining the file system as well as disks. The task of some utilities is to maintain data archives, but special ones are designed to protect your computer from a variety of viruses.

Utilities for Windows are necessary components for the work of programmers of any level, primarily applied ones. Initially, this concept was usually identified with small programs that were quite simple. However, on this moment in terms of complexity and size, they can even exceed some office suites. At the same time, they can perform many more operations than before. It is worth saying that at the moment many utilities can be found on the shelves of computer stores, where they are offered as serious commercial packages, presented in stores in beautiful boxes. But most of them, presented as shareware products, can be found on the Internet in the public domain.

So, if we have tried to understand the utilities, it’s time to determine what they are needed for. They have a very diverse purpose. These assistant programs take on many of the tasks mentioned above. Using utilities, you can encrypt personal file data through coding of varying degrees of complexity, and also set the maximum strong password in order to limit access to specific file. This is a very important aspect that ensures the protection of private information from interference, theft or damage.

Most often, certificate files, passwords, codes, media files of a certain value, email, licensed programs, operating system settings. System utilities take on the task of monitoring the performance of computer services, for example, processor, video card, reading devices and disks, physical and RAM, and other things. In addition, they regularly conduct tests of peripheral and built-in devices, signaling any detected problems, and they also make demands for replacing or improving installed software and components, for example, a printer cartridge. Speaking further about what utilities are, it can be noted that they restore files that were lost or carelessly deleted. And if necessary, then these same programs can delete the file from the computer permanently.

There is also a type of utility called tweakers, their purpose is to implement fine tuning settings of your operating system. They are designed to solve various tasks, for example, restructuring the interface to suit some individual user requests, optimizing the activities of the entire system. Of course, it is possible that there are “bad” utilities that can harm your computer. Such developments include worms, constructors, joke programs that can give the user incorrect information about the operation of the computer, and others.

So, now you should clearly understand what utilities are and how they affect the activities of the entire computer.

Table frames

Table Properties

Formula

Converting the finished document text into a table

Converting a table to ready-made text

We can convert the delimited text we already have into a table. Tab character ( Tab) or a comma can mark places where text is broken into columns.

To apply the transformation, you need to select the text and select from the menu TABLE-CONVERT-TEXTTO TABLE(Figure 2.9.)

In the dialog box that opens Word 2003 we are asked to choose the one we need separator sign:

Paragraph mark

Tab character

Semicolon

Any other sign.


To convert existing text, typed with a delimiter (tab, semicolon, or other delimiter), into a table:

1. Select text with a delimiter.

2. Select the Convert to Table command in the Table menu (Table, Convert Text to Table) (Figure 2.10.)

Value calculations mathematical formula. To insert a field into a table or the main text of a document, you need to use the command Table - Formula

Formula – An expression containing a valid combination of numbers, an order containing numbers, fields whose values ​​are numbers, operators, and functions. An expression can refer to the contents of table cells and values ​​returned by functions.

IN Microsoft Word 2007, there is a very convenient set of functions combined in a dialog box Table Properties. It can be opened by pressing the button Properties in Group Table on the tab Layout on the tape.

In the dialog box Table Properties(Figure 2.11.) can be determined following parameters:

· location of the table relative to the text;

· borders and shadows;

· parameters of each column and row of the table;

· placement of text in a cell.


Default border Word tables is a single thin line around each table cell. How to change the frame design:

1. Select table cells whose borders can be changed

2. Select the Format - Borders and Shading command to open the Borders and Shading dialog box. If necessary, click on the tab Border.

3. Click OK.

  • PC I/O Ports

Modern computers are equipped with various ports for connecting external devices so that these devices can work together with the PC.

The computer needs ports in order to use them to “load and unload” information, or rather, input and output data. For example, they allow you to enter data into a PC using a keyboard, mobile phone, digital camera, from a scanner, display the results on a monitor, to a printer, record music from a PC to a player or iPod, as well as books to a reader (book reading device), etc.



But such a variety of external devices working with a PC did not appear immediately. Since the creation of the first computers, their ability to work with external devices has been almost the most important task.

Indeed, who needs high PC performance if there is no way to quickly enter a large number of data for further processing? If the time we spend entering data is many times longer than the time it takes to process it on a computer, then all the meaning of such automation will be lost. Likewise, if calculations are done quickly, but you have to wait to get the results long time, such a fast calculation with extremely slow data output does not make practical sense.

By the way, the first electronic computing machines were designed and created immediately with external devices connected to them, and their number and capabilities were strictly limited. These were consoles for operators in the computer room, displays for programmers and users (usually in the display room), printers, disk and tape drives, input/output devices on punched tapes and punched cards, etc.

With the development of PCs and their proliferation in homes and offices, data input and output has become even more relevant and, most importantly, more diverse. PCs were created to be able to connect a theoretically unlimited number of various external devices for various purposes(keyboards, mouse, monitors, printers, scanners, modems, etc.), as well as household devices(cameras, music players etc.) or specialized devices (for example, MIDI keyboards or synthesizers, etc.).

With such a variety of data input/output devices, it is impossible to create its own unique port for each device. Initially, such attempts were made, but it did not pay off. It turned out to be much more convenient to create universal I/O ports, to which any devices the users could choose could be connected.

One of the first universal ports were the so-called serial port(COM port computer, the abbreviation COM comes from Communication port, which means “communications port”) and parallel port (LPT port printer, the abbreviation LPT stands for Line Printer Terminal - “line for connecting a printer”). They differ in the way they transfer data between the PC and external devices.

Serial ports transmit data bit by bit, i.e. transmitted bytes of information pass through the port sequentially one bit at a time. These ports got their name for such serial transmission of information. Parallel ports transmit information in whole bytes, i.e. bytes are transferred through the port at the same time or parallel, hence the name of the port.

The first serial ports (COM ports on a computer) were much slower than parallel ports because transferring data bit by bit takes much longer than transferring whole bytes at once. Accordingly, it was possible to connect to serial ports only relatively slow devices, for example, mouse manipulators or modems.

Currently, COM ports are rarely used, mainly for working with various sensors, bill acceptors and other technical devices.

How to find out com port? By appearance port connector, which looks like a trapezoid with rounded corners with 9 (more common) or 25 (much less common) male contacts. By the way, the LPT port also has 25 contacts, but their type is “mother”.

High-speed devices such as printers or scanners began to work slowly and inefficiently when connected to a serial port.

Therefore, to ensure the required performance, these devices required connection to a parallel LPT port, which at that time provided maximum speed work and productivity.

Further development computers has led to the need to increase the speed and reliability of data transfer through ports. Even a high-speed parallel port no longer met the demands of the times for several reasons.

For example, this port was unsafe for both the computer and the device connected to it if, for example, you connect or disconnect an external device while it is running. This could damage the port, computer, or device. Also, due to the PC architecture, the number of parallel ports was limited; there could only be 2 of these ports.

Due to the development of engineering, serial ports received new capabilities that put them not only on a par with parallel ports, but also made them more convenient for use by PC users. The speed of the serial ports has become sufficient for connection high-speed devices. Opportunities have emerged for further increasing their number.

These ports include, first of all, universal USB ports computer (USB stands for Universal Serial Bus), which in currently have become widespread in PCs.

Computer USB ports are also convenient because they are autonomous external devices can receive electrical power, which simplifies such devices and makes them smaller in size and energy-independent electrical networks. For example, to USB ports computers can connect external drives on hard drives, CD and DVD drives, flash drives, players and other devices that no longer need power supplies and cords to connect to the electricity that is so necessary for their operation.

But the most important thing about input and output ports is that they have become a kind of standard for connecting external devices. TO this standard All manufacturers of these devices began to strive, which allowed consumers - PC users to choose for themselves those devices that are most suitable for them, and not just those devices that PC developers offer along with the PC.

Such a standard leads to competition among manufacturers, which in turn helps to improve the quality of external devices and to offer devices at an affordable price for consumers. Any monopoly in this area, if it existed and would be conditioned design features PC would certainly lead to a significant increase in the prices of external devices, without which the PC would not have become so popular among users

  • Hard drive performance parameters
  • Classification of PC application software
  • Using templates and styles in Word
  • Description of the process of reading information from CDs.
  • Factors influencing the choice of modem type

The following factors influence the choice of modem type:

Price: external modems are more expensive because the price includes the cost of the case and power supply

Availability of free ports/slots: An external modem is connected to the serial port. The internal modem is connected to the slot motherboard. If the slots or ports are occupied, then you need to select one of the devices.

Ease of use: on the body of the external modem there are indicators that display its status, as well as a power supply switch. To install an external modem, you do not need to disassemble the computer case.

  • Types of inserts in Word
  • Categories graphic editors
  • Working with large documents in Word
  • Operating system kernel functions
  • Printer color models
  • Operations with disk drives
  • Setting up Windows XP
  • Basic operations of working with files in Windows XP
  • Kinds sound files. Working with the Sound Recorder application
  • Windows Player Media for OS Windows XP
  • Movie recording formats
  • Parallel and sequential transmission of information in computer networks
  • Wireless lines communications and networks
  • Elements computer network and their characteristics
  • Problems solved by a computer network
  • Basic features of the mail Outlook client Express
  • Multilayer model of computer network hardware and software
  • Terminal-host network architecture
  • Characteristics of the most used topologies computer networks
  • Enterprise, departmental and campus networks. Corporate networks
  • Peer-to-peer computer network architecture
  • Purpose of the control panel
  • Basic LAN components
  • Internet search tools, search engines and search engines
  • Client-server architecture
  • Workstations, network adapters And file servers
  • Categories of Internet hosts. Domain Name Service
  • Features of choosing a computer network architecture
  • Multimedia Windows XP
  • Network OS structure

Network operating systems are a set of programs that provide processing, transmission and storage of data on the network. Network OS provides users with different kinds network services (file management, Email, network management processes, etc.), supports work in subscriber systems. Network operating systems use a client-server or peer-to-peer architecture. They are assessed according to a set of criteria: performance, variety of user communication options, administration capabilities.
^

Important classes of system programs are also auxiliary programs - utilities (lat. utilitas - benefit). They either expand and complement the corresponding capabilities of the operating system, or solve independent important tasks.

^ Let's briefly describe some types of utilities:

monitoring, testing and diagnostic programs , which are used to check the correct functioning of computer devices and to detect malfunctions during operation; indicate the cause and location of the malfunction;

driver programs , which expand the capabilities of the operating system to manage input/output devices, RAM, etc.; Using drivers, you can connect new devices to your computer or non-standard use available;

packer programs (archivers) , which allow, through the use of special information packaging algorithms, to compress information on disks, i.e. create smaller copies of files, as well as combine copies of several files into one archive file. The use of archiver programs is very useful when creating an archive of files, since in most cases it is much more convenient to store them after having previously compressed them with archiver programs. Representatives of these programs – WinRar and WinZip.

antivirus programs , designed to prevent infection by computer viruses and eliminate the consequences of virus infection. Computer virus is a specially written small program that can “attribute” itself to other programs to perform any harmful actions- spoils files, clogs RAM etc. Representatives of the antivirus program family - Kaspersky Antivirus, DrWeb, Norton Antivirus

According to a study by the organization AVIEWS (Antivirus Information & Early Warning System), Sophos detects at least 80 percent of unknown malicious codes, significantly ahead of many other very popular and famous programs. Second place took "Kaspersky Anti-Virus" , which detects 65 percent of threats. Interestingly, third place with 60 percent was taken by Ikarus , a program unknown to the general public. And such a famous program as Panda , showed only 10%.

Programs for creating backup copies information allow periodic copying important information located on the computer’s hard drive to additional media. Program representatives Reserve copyAPBackUp Acronis True Image

disk space optimization and quality control programs ;

information recovery, formatting, data protection programs;

communication programs , are designed to organize the exchange of information between computers. These programs allow you to conveniently transfer files from one computer to another when connecting their serial ports with a cable. Another type of such programs provides the ability to connect computers via telephone network(if you have a modem). They make it possible to send and receive telefax messages. Representatives of communication programs – Venta Fax, Cute FTP.

memory management programs , providing more flexible use of RAM;

Screen printing programs are very useful when using graphic programs to print out the contents of the screen, since this cannot always be done using the graphics program. Representatives of screen printing programs – SnagIt, HyperSnap-DX.

programs for burning CD-ROM, CD-R and many others .

Some utilities are part of the operating system, and the other part functions independently of it, i.e. offline.

Not many users of Windows-based devices know that this operating system has huge amount built-in useful utilities(narrowly focused applications that are designed to solve a specific problem). A huge disadvantage is that they are not always easy to find in the system and not every beginner will be able to understand some of them. Therefore, third-party utilities are most often used.

However, built-in system functions useful and functional, and it will also be useful to know how to work with them in the absence of third-party applications.

system configuration

This is one of the main utilities. Mainly responsible for loading the operating system and allows you to change many parameters.

To launch it, just start writing in the search “ system configuration", and Windows will automatically show it in the results. Another option is to press simultaneously Win+ R and enter in the window that opens msconfig, and click Enter.

Understanding the configuration window is quite simple; it contains only five tabs:

System Information

You can launch the application in a standard way: Win+r and enter in the window msinfo32 . Allows you to obtain comprehensive information about installed system and physical equipment. In fact, many third party programs they do the same. Therefore, in many cases, instead of installing downloaded software, you can use system information.

Troubleshooting Windows

Launching it is quite simple:

Computer management

Computer management is not one utility, but a whole set of applications. Allows you to change and check many parameters, some of which we will consider below.

You can run it by pressing Win+R and using the command compmgmt.msc. It can also be found through search or in Start, in the administrative tools section.

Task Scheduler

This component is designed to run specific tasks on time. Here you can set to turn off the computer, launch files and programs, turn the Internet on and off, and much more.

You can run it through the control panel or enter the command taskschd.msc in the window that appears by pressing the Win+R keys.

By the way, it is very convenient to use the scheduler to start defragmentation or disk cleanup at a certain time.

The event log

Most system events of the system are recorded here. In the magazines you can find diagnostic, information alerts, as well as critical errors and warnings.

Event viewing can be customized as you wish; there are sets of filters and subscriptions.

When serious system errors occur, people will usually check this utility first to understand what went wrong.

The application is launched by entering the command eventvwr.msc after pressing Win+R, or through the control panel.

Resource Monitor

Another diagnostic utility. Allows you to monitor the operation of the system in real time. Makes it possible to monitor ongoing processes in the system, not only software, but also hardware.

So, here you can find out the load on the processor, look at disk and memory access, determine which running process is consuming traffic, etc.

You can run it using the command perfmon /res, after pressing the combination Windows + R. You can also get here through Computer management by selecting Performance – Resource Monitor.

Disk management

A standard application that allows you to flexibly manage physical and local disks. Can be used as an alternative to third-party software. Can assign drive letters, repartition partitions, format into different file systems and much more

On Windows 10, you can launch it by clicking right click mouse on start and selecting the item of the same name. Or use Win+R and the command diskmgmt.msc.

System Stability Monitor

A powerful tool for checking the stability of the system as a whole. Allows you to track events over time and with a convenient chart.

The launch is standard - the combination Win + R, and then entering the command perfmon /rel.

Disk Cleanup

A small application that cleans the disk from unnecessary garbage. Doesn't clean like CCleaner, but allows you to remove unnecessary system files. Sometimes this way you can free up several gigabytes.

To run use the command cleanmgr in the Run window (Win+R).

Memory checkers

Lastly, let's look at a tool that allows you to check your RAM without using third party software. It works quite effectively. You can run it with the command mdsched.exe from the command interpreter, which is launched with the Win+R combination.

Other utilities

We have not mentioned all useful system functions. In fact, there are many more of them, for example:

  • Registry Editor– allows you to make changes to the system. A very serious tool that provides a lot of possibilities, but it can also completely destroy the OS.
  • Task Manager- manages everyone running processes and program. Simple at first glance, but quite a powerful management tool. In recent Windows versions It even allows you to assign processor cores to each task.
  • Editor group policy . Beginner users rarely encounter this tool. It allows you to change almost everything in the operation of the system. For example, it is with the help of this editor that you can prevent your computer from working with external drives.
  • Firewall– built-in firewall. Allows you to protect your computer from attacks from the Internet. AT 10 Windows versions, together with the built-in antivirus, allows you to avoid using third-party antivirus solutions at all.

And it's not full list what you can use without using the functionality of third-party software.

Utility is a highly specialized, additional or auxiliary program that is designed to optimize or improve the operation of another program, operating system (OS), flash drives, and so on.
Utility translated from English means utility or usefulness.

Utilities do NOT represent a full-fledged software product with wide application. They are created for a specific task, for example, a utility for formatting a flash drive, a utility for removing viruses, or scanning an operating system.
There are a huge variety of utilities with different functionality.

Types of utilities (main):

  1. Archivers or packers. They are used to compress the size of files and decompress them, designed to save disk space.
  2. Diagnostic utilities. Used to identify damage and problems on the hard drive, including operating system, and can also find malware or files.
  3. Antivirus utilities. By using antivirus utilities scan the system for harmful viruses And suspicious files. An anti-virus or healing utility allows you to uninstall the source of viruses and restore data damaged by the virus.
  4. Uninstallers. Not every program can be removed independently, sometimes installed programs require additional access rights to edit or delete. Uninstaller utilities are used for this.
  5. Optimizer programs. They optimize memory on hard drives, reduce file access time, allow you to configure startup and optimize various processes.

There are other utilities, both for narrower and simpler tasks, and for more complex ones.

Initially, utilities were created as small, auxiliary programs that perform one or several functions, but today this list of capabilities is much wider. Downloading one software package, you can get a whole set of utilities:

  • archiving/unarchiving, optimization, uninstallation, diagnostics;
  • with antivirus, file manager and task manager functions;
  • utilities for cleaning the registry, installing and updating drivers, and much more.

Utilities can be either paid or free, some may come bundled with software. One way or another, you most likely have already used such utilities, but perhaps you did not know their primary purpose.







2024 gtavrl.ru.