What is compression used for?
Used to reduce storage space, which is useful when sending an file via the internet as the longer the file the more time it takes to send.
Pros of compression (both types)
Data sent more quickly
Less bandwidth used
Buffering less likely to occur
Less storage required
What are the 2 types of compression?
Lossy and Lossless
What is lossy compression?
Reduces file size while also removing some of its information
what can lossy compression lead to in images and audio
could lead to a more pixelated image or less clear audio.
lower quality img/audio
What is lossless compression?
Reduces file size withought losing any information. The original file can be recovered from the compressed version.
How is lossless compression done
Groups of repeating data found and recorded along with the number of repetitions
Which is more effective, lossy or lossless
Lossy (most times) when trying to reduce file siles
What is lossy compression suitable for?
Images audio and video
What is lossless compression suitable for?
Executable files and documents
Why should lossless be used for texts
Lossless is the only option for files such as text files or executable programs, where any loss of data would destroy their functionality.
What is encryption?
The process of encoding plaintext to ciphertext so it can only be read by the sender and the intended recipient.
What is symmetric encryption?
This is when Both parties use a single key to both encrypt and decrypt a message.
What is necessary for systematic encryption?
Both parties have the key to encrypt and decrypt the message
What is the problem to systematic encryption?
1.Interception of the key
2.Duplication of the key production process
What is a more safe alternative to systematic encryption?
asymmetric encryption
What is different in asymmetric encryption?
We use 2 different keys, the first key to encrypt it and the second key to decrypt.
Why is asymmetric encryption good
1.No one else will be able to read the message
2.Can make sure the message is authentic
What are the 2 keys called in asymmetric encryption?
Key pairs.
For asymmetric encryption what do we have to do to one of our key?
Make one private key and make one public.
If we want to send an asymmetric encrypted message to another person what would we do 3 steps?
1.Exchange/Take their public key
2.Use their public key to encrypt the message you want to send and send it to them.
3.They would use their private key to decrypt it.
If we want to send the most secure asymmetric encrypted message to another person what would we do 3 steps?
1.Combine your private key with their public key.(Combined encryption key)
2.Then use this combined key to encrypt the message and send it to them
3.To decrypt the message they would use their own private key and your public key
What is it called when you combined your private key and their public key?
Combined encryption key
What is a database?
An organised collection of data