Skip to content
Computing · Year 10

Active learning ideas

Utility Software: Antivirus & Defragmentation

Active learning works well for utility software because students need to see, test, and compare how antivirus scans and defragmentation reorganize data. Hands-on trials make invisible processes visible, helping students connect theory to real system behaviour.

National Curriculum Attainment TargetsGCSE: Computing - Utility Software
25–50 minPairs → Whole Class4 activities

Activity 01

Document Mystery50 min · Small Groups

Demo Stations: Utility Tool Trials

Prepare stations with virtual machines: one for antivirus scans on safe malware samples, one for defragmentation demos using HDD simulators, one for compression tests on large files, and one for side-by-side built-in vs third-party comparisons. Groups rotate every 10 minutes, logging results like scan times and space savings in shared documents.

Justify the necessity of regular defragmentation for older hard disk drives.

Facilitation TipDuring Demo Stations, circulate with a checklist to ensure every student touches the antivirus interface and initiates a scan.

What to look forProvide students with a scenario: 'Your computer is running slowly, and you suspect a virus.' Ask them to write two steps they would take using utility software to address this, explaining the purpose of each step.

AnalyzeEvaluateSelf-ManagementDecision-Making
Generate Complete Lesson

Activity 02

Document Mystery30 min · Pairs

Threat Analysis Pairs: Malware Case Studies

Provide pairs with real-world case studies of viruses and ransomware. They identify detection methods antivirus would use, then test similar threats in sandboxed environments. Pairs present findings on mitigation strategies.

Analyze how antivirus software identifies and mitigates threats to a computer system.

Facilitation TipWhen running Threat Analysis Pairs, provide printed malware case files with highlighted suspicious behaviours to guide analysis.

What to look forPose the question: 'When might using a third-party antivirus program be more beneficial than relying on the built-in Windows Defender?' Facilitate a class discussion where students justify their answers by considering features, detection rates, and resource usage.

AnalyzeEvaluateSelf-ManagementDecision-Making
Generate Complete Lesson

Activity 03

Formal Debate40 min · Whole Class

Formal Debate: Built-in vs Third-Party

Divide class into teams to research and debate pros and cons of built-in utilities versus alternatives, using criteria like cost, reliability, and system impact. Each team prepares evidence from quick online demos and votes on winners.

Evaluate the trade-offs between using built-in utility software and third-party alternatives.

Facilitation TipSet a 3-minute timer during the Built-in vs Third-Party debate to keep arguments concise and evidence-based.

What to look forDisplay a diagram showing fragmented files on a hard drive. Ask students to identify the problem and explain in one sentence how defragmentation would solve it. Alternatively, show a screenshot of an antivirus scan and ask what type of detection method is likely being used.

AnalyzeEvaluateCreateSelf-ManagementDecision-Making
Generate Complete Lesson

Activity 04

Document Mystery25 min · Individual

Individual Optimisation Challenge

Students install free trial utilities on personal virtual drives, perform scans, defrags, and compressions, then measure before-and-after performance metrics like boot times.

Justify the necessity of regular defragmentation for older hard disk drives.

Facilitation TipFor the Individual Optimisation Challenge, limit tools to one antivirus scan and one defrag pass per student to standardize comparisons.

What to look forProvide students with a scenario: 'Your computer is running slowly, and you suspect a virus.' Ask them to write two steps they would take using utility software to address this, explaining the purpose of each step.

AnalyzeEvaluateSelf-ManagementDecision-Making
Generate Complete Lesson

A few notes on teaching this unit

Teach this topic by pairing explanations with immediate hands-on practice. Avoid long lectures about signatures—show a live scan instead. Research shows students grasp heuristics better when they witness real-time anomaly detection. Emphasize that utility tools are maintenance tasks, not magic fixes. Keep demonstrations short and focused so students don’t lose track of the purpose behind each tool.

Successful learning looks like students confidently using utility tools, explaining how each feature works, and justifying choices based on performance data. They should articulate trade-offs between speed, security, and system health after completing the tasks.


Watch Out for These Misconceptions

  • During Threat Analysis Pairs, watch for students assuming antivirus only detects known viruses.

    While analyzing malware case studies, direct students to examine the antivirus interface for behavioural warnings or sandboxing messages that show modern detection methods beyond signature matching.

  • During Demo Stations, watch for students believing defragmentation benefits SSDs.

    At the HDD vs SSD models, have students measure boot times before and after defragmentation to observe that SSDs show no improvement and may even slow due to extra writes.

  • During Individual Optimisation Challenge, watch for students assuming compression always reduces size without trade-offs.

    In the compression trials, ask students to compare CPU load and extraction speed for compressed and uncompressed files to reveal performance costs.


Methods used in this brief