1.3 Exchanging Data Flashcards

(46 cards)

1
Q

What is compression used for?

A

Used to reduce storage space, which is useful when sending an file via the internet as the longer the file the more time it takes to send.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Pros of compression (both types)

A

Data sent more quickly
Less bandwidth used
Buffering less likely to occur
Less storage required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 2 types of compression?

A

Lossy and Lossless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is lossy compression?

A

Reduces file size while also removing some of its information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what can lossy compression lead to in images and audio

A

could lead to a more pixelated image or less clear audio.

lower quality img/audio

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is lossless compression?

A

Reduces file size withought losing any information. The original file can be recovered from the compressed version.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is lossless compression done

A

Groups of repeating data found and recorded along with the number of repetitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which is more effective, lossy or lossless

A

Lossy (most times) when trying to reduce file siles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is lossy compression suitable for?

A

Images audio and video

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is lossless compression suitable for?

A

Executable files and documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why should lossless be used for texts

A

Lossless is the only option for files such as text files or executable programs, where any loss of data would destroy their functionality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is encryption?

A

The process of encoding plaintext to ciphertext so it can only be read by the sender and the intended recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is symmetric encryption?

A

This is when Both parties use a single key to both encrypt and decrypt a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is necessary for systematic encryption?

A

Both parties have the key to encrypt and decrypt the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the problem to systematic encryption?

A

1.Interception of the key
2.Duplication of the key production process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a more safe alternative to systematic encryption?

A

asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is different in asymmetric encryption?

A

We use 2 different keys, the first key to encrypt it and the second key to decrypt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Why is asymmetric encryption good

A

1.No one else will be able to read the message
2.Can make sure the message is authentic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the 2 keys called in asymmetric encryption?

20
Q

For asymmetric encryption what do we have to do to one of our key?

A

Make one private key and make one public.

21
Q

If we want to send an asymmetric encrypted message to another person what would we do 3 steps?

A

1.Exchange/Take their public key
2.Use their public key to encrypt the message you want to send and send it to them.
3.They would use their private key to decrypt it.

22
Q

If we want to send the most secure asymmetric encrypted message to another person what would we do 3 steps?

A

1.Combine your private key with their public key.(Combined encryption key)
2.Then use this combined key to encrypt the message and send it to them
3.To decrypt the message they would use their own private key and your public key

23
Q

What is it called when you combined your private key and their public key?

A

Combined encryption key

24
Q

What is a database?

A

An organised collection of data

25
When looking at a database what is it you see?
1.Table 2.Records 3.Fields
26
What is a flat file Database?
A database that only holds a single table Represented using a data dictionary
27
What are the 5 benefits of flat file Database?
1.Simple 2.Quick to setup 3.Easy maintenance 4. Easy to Use 5. Cheap
28
What is 3 disadvantage of flat file database?
1.Take up unnecessary space 2.Slow to query 3.Difficult to maintain if too much data in it
29
What is a relational database?
A database with multiple tables linked together
30
What is the primary key?
Unique Identifier for each record
31
What is an entity
A category of a person, place, thing or concept about which data can be collected.
32
What is an attribute
the facts, details or characteristics of an entity
33
Whats a composite key
A primary key with multiple fields
34
What do foreign key have to reference to in another table
Have to reference the primary key of the other table.
35
What is a index in databases?
A database automatically has an index of primary keys so that specific primary keys can be located quickly
36
5 rules for First Normal form?
1.All field name unique 2.Values in fields should be the same type of data. 3.Values in field should be atomic. 4.No two records identical 5.Each table needs a primary key
37
What is a composite key?
Combination of two or more field in table used to uniquely identify each record.
38
2 rules for Second Normal form?
1.Data already in 1NF. 2.Any partial dependencies are removed
39
2 rules for 3NF?
1.In second normal form 2.All fields must depend on the primary key and nothing else but the primary key./No transitive dependencies
40
What is a hash?
The result generated by applying an algorithm to a value.
41
What is the benefit of using a hash function?
Hash functions are one way. If someone gains access to the hashed value they cant see the real one
42
What is not allowed in 3NF?
Many to many relationships.
43
What is an advantage of indexing and what is a disadvantage?
1.Easy access to what you have index 2.Takes more space in database.
44
What is special about hash functions?
They are one way.
45
What are the 2 serialisations techniques?
Timestamp ordering Commitment ordering
46
What do serialisations do?
Serialisation ensures that transactions do not overlap in time and therefore cannot interfere with each other.