309:
provide a convenient method of performing routine data management, email recovery and management tasks, such as deleting, renaming, cataloging, uncataloging, moving, copying, merging, setting write protection status, setting file access permissions, generating and modifying folders and data
45:(OS), and this first party utility software is often considered part of the operating system, users often install replacements or additional utilities. Those utilities may provide additional facilities to carry out tasks that are beyond the capabilities of the operating system.
235:
may include compression and encryption capabilities. Some archive utilities have a separate un-archive utility for the reverse operation. One nearly universal type of archive file format is the
279:
utilities maintain consistency between two sources. They may be used to create redundancy or backup copies but are also used to help users carry their digital music, photos and video in their
38:
may run user-written code to update a database and may then include a step that runs a utility to back up the database, or a job may run a utility to compress a disk before copying files.
203:
provide a visualization of disk space usage by getting the size for each folder (including sub folders) and files in folder or drive. showing the distribution of the used space.
191:
prepare a data storage device such as a hard disk, solid-state drive, floppy disk or USB flash drive for initial use. These are often used to permanently erase an entire device.
197:
divide an individual drive into multiple logical drives, each with its own file system which can be mounted by the operating system and treated as an individual drive.
273:
utilities establish consistency among data from a source to a target data storage and vice versa. There are several branches of this type of utility:
324:
413:
30:, which is aimed at directly performing tasks that benefit ordinary users. However, utilities often form part of the application
22:
is a program specifically designed to help manage and tune system or application software. It is used to support the computer
459:
346:
333:
directly modify the text or data of a file without regard to file format. These files can be data or programs.
102:
analyze the computer's network connectivity, configure network settings, check data transfer or log events.
390:
408:
242:
86:
typically permit the examination and modification of data and program instructions in memory and on disk.
363:
utilities perform alterations of files, especially object programs when program source is unavailable.
551:
289:
utilities can recreate a coherent structure where multiple users simultaneously modify the same file.
353:
programs, usually applications programs, for use in a specific computer environment. There are also
77:
297:
find files that are unnecessary to computer operation, or take up considerable amounts of space.
257:
utilities transform data from a source file to some other format, such as from a text file to a
48:
Many utilities that might affect the entire computer system require the user to have elevated
498:
418:
71:
49:
475:
403:
276:
270:
231:
output a stream or a single file when provided with a directory or a set of files. Archive
27:
143:
makes copies of all information stored on a disk and restores either the entire disk (aka
8:
200:
251:
utilities output a shorter stream or a smaller file when provided with a stream or file.
89:
393:
permit use of keyboard macros in programs that do not natively support such a feature.
360:
236:
194:
174:
148:
99:
67:
378:
374:
370:
350:
286:
248:
168:
164:
161:
scan an operating hard drive and check for logical (filesystem) or physical errors.
115:
111:
42:
520:
438:
320:
300:
254:
188:
140:
127:
105:
121:
108:
are used to configure, install or keep up to date other software on a computer.
92:
determine and report the operational status of computer hardware and software.
23:
303:
utilities provide a standalone capability to detect differences between files.
545:
280:
264:
228:
211:
178:
93:
384:
433:
336:
306:
294:
158:
144:
366:
354:
171:/uncompress the contents of a disk, increasing the capacity of the disk.
41:
Although a basic set of utility programs is usually distributed with an
428:
330:
207:
152:
61:
182:
35:
423:
130:
provide detailed information about installed software and hardware.
83:
80:
software grants or denies requests for access to system resources.
215:
151:
or selected files that are accidentally deleted or corrupted.
327:) create a file of test data according to specified patterns.
181:
whose contents are scattered across several locations on the
64:
utilities scan for computer viruses and block or remove them.
387:
arrange records (lines) of a file into a specified sequence.
267:
utilities are used to rescue good data from corrupted files.
52:, while others that operate only on the user's data do not.
340:
461:
258:
118:
by removing old registry keys that are no longer in use.
124:
monitor resources and performance in a computer system.
134:
185:
and collect the fragments into one contiguous area.
543:
245:utilities encrypt and decrypt streams and files.
349:or setup utilities are used to initialize or
222:
214:or other magnetic medium. Initializers for
457:
414:Support programs for OS/360 and successors
314:
496:
458:Parsons, June Jamrich; Oja, Dan (2013).
155:utilities are sometimes more convenient.
544:
74:functionality of an operating system.
135:Storage device management utilities
55:
13:
497:Mendelson, Edward (June 8, 1999).
14:
563:
464:. Course Technology. p. 129.
513:
490:
468:
451:
1:
444:
478:. Computerworld. Sep 3, 1979
218:format the tape into blocks.
7:
409:List of macOS built-in apps
397:
10:
568:
476:"Non-Opec (advertisement)"
391:Standalone macro recorders
206:Tape initializers write a
223:File management utilities
521:"Linux ifconfig command"
167:utilities transparently
499:"Fix What Ails Your PC"
315:Miscellaneous utilities
114:clean and optimize the
78:Computer access control
195:Disk partition editors
424:List of KDE utilities
419:List of Unix commands
343:code and check links.
404:List of DOS commands
277:File synchronization
271:Data synchronization
201:Disk space analyzers
28:application software
385:Sort/Merge programs
90:Diagnostic programs
175:Disk defragmenters
68:Clipboard managers
379:computer monitors
147:) in an event of
112:Registry cleaners
100:Network utilities
34:. For example, a
26:- in contrast to
559:
552:Utility software
536:
535:
533:
531:
517:
511:
510:
508:
506:
494:
488:
487:
485:
483:
472:
466:
465:
455:
371:phosphor burn-in
287:Revision control
249:Data compression
165:Disk compression
128:System profilers
116:Windows Registry
106:Package managers
96:are one example.
56:System utilities
43:operating system
20:Utility software
567:
566:
562:
561:
560:
558:
557:
556:
542:
541:
540:
539:
529:
527:
519:
518:
514:
504:
502:
495:
491:
481:
479:
474:
473:
469:
456:
452:
447:
439:System software
400:
321:Data generators
317:
301:File comparison
255:Data conversion
225:
189:Disk formatters
141:Backup software
137:
122:System monitors
58:
17:
12:
11:
5:
565:
555:
554:
538:
537:
512:
489:
467:
449:
448:
446:
443:
442:
441:
436:
431:
426:
421:
416:
411:
406:
399:
396:
395:
394:
388:
382:
364:
358:
344:
334:
328:
316:
313:
312:
311:
304:
298:
292:
291:
290:
284:
281:mobile devices
268:
262:
252:
246:
240:
224:
221:
220:
219:
204:
198:
192:
186:
179:computer files
172:
162:
156:
136:
133:
132:
131:
125:
119:
109:
103:
97:
94:Memory testers
87:
81:
75:
65:
57:
54:
33:
24:infrastructure
15:
9:
6:
4:
3:
2:
564:
553:
550:
549:
547:
526:
525:Computer Hope
522:
516:
501:. PC Magazine
500:
493:
477:
471:
463:
462:
454:
450:
440:
437:
435:
432:
430:
427:
425:
422:
420:
417:
415:
412:
410:
407:
405:
402:
401:
392:
389:
386:
383:
380:
376:
372:
368:
365:
362:
359:
356:
352:
348:
345:
342:
338:
337:HTML checkers
335:
332:
329:
326:
322:
319:
318:
308:
307:File managers
305:
302:
299:
296:
295:Disk cleaners
293:
288:
285:
282:
278:
275:
274:
272:
269:
266:
265:Data recovery
263:
260:
256:
253:
250:
247:
244:
243:Cryptographic
241:
238:
234:
230:
227:
226:
217:
213:
212:magnetic tape
209:
205:
202:
199:
196:
193:
190:
187:
184:
180:
176:
173:
170:
166:
163:
160:
159:Disk checkers
157:
154:
150:
146:
142:
139:
138:
129:
126:
123:
120:
117:
113:
110:
107:
104:
101:
98:
95:
91:
88:
85:
82:
79:
76:
73:
69:
66:
63:
60:
59:
53:
51:
46:
44:
39:
37:
31:
29:
25:
21:
16:Software type
528:. Retrieved
524:
515:
503:. Retrieved
492:
480:. Retrieved
470:
460:
453:
434:Shell script
367:Screensavers
355:Uninstallers
347:Installation
232:
149:disk failure
145:Disk cloning
47:
40:
19:
18:
377:and plasma
331:Hex editors
70:expand the
445:References
429:Batch file
153:Undeletion
62:Anti-virus
50:privileges
351:configure
339:validate
261:document.
229:Archivers
183:hard disk
84:Debuggers
72:clipboard
36:batch job
546:Category
398:See also
369:prevent
361:Patching
237:zip file
169:compress
530:May 20,
505:May 20,
482:May 20,
216:DECtape
177:detect
32:systems
323:(e.g.
233:suites
325:IEBDG
310:sets.
210:to a
208:label
532:2019
507:2019
484:2019
341:HTML
375:CRT
373:on
259:PDF
548::
523:.
534:.
509:.
486:.
381:.
357:.
283:.
239:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.