1.3 Exchanging data Flashcards

(59 cards)

1
Q

Lossy compression

A

Reduces file size by permanently removing data; not reversible; e.g., JPEG, MP3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Lossless compression

A

Reduces file size without losing data; reversible; e.g., PNG, ZIP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Run Length Encoding (RLE)

A

Replaces repeated consecutive characters with count + value (e.g., WWWWW -> 5W).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Dictionary coding

A

Replaces frequently occurring patterns with index references to a dictionary (e.g., LZW, GIF).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Symmetric encryption

A

Same key used for encryption and decryption; fast; problem = key exchange (e.g., AES).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Asymmetric encryption

A

Public key encrypts, private key decrypts; slower; used for key exchange/digital signatures (e.g., RSA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Use of hashing

A

One-way function; verify integrity; store passwords; digital signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Primary key

A

Uniquely identifies a record in a table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Foreign key

A

Field in one table that references the primary key in another table; establishes relationship.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Secondary key

A

An indexed field used for searching that is not unique (e.g., searching customers by surname).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Entity Relationship (ER) modelling

A

Diagram showing entities, attributes, and relationships between entities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Normalisation

A

Process of organising data to reduce redundancy and improve integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

First Normal Form (1NF)

A

No repeating groups; atomic values; primary key identified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Second Normal Form (2NF)

A

1NF + No partial dependencies (non-key attributes depend on whole primary key).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Third Normal Form (3NF)

A

2NF + No transitive dependencies (non-key depends on non-key).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Indexing

A

Improves speed of data retrieval; uses additional storage; slows down INSERT/UPDATE/DELETE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Referential integrity

A

Ensures foreign key values match a valid primary key; prevents orphan records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ACID acronym

A

Atomicity, Consistency, Isolation, Durability (properties of database transactions).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Atomicity

A

Transaction is all-or-nothing; if one part fails, whole transaction rolls back.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Consistency

A

Transaction brings database from one valid state to another; constraints maintained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Isolation

A

Concurrent transactions do not interfere; appear as if executed serially.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Durability

A

Once committed, transaction persists even after system failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Record locking

A

Prevents two users from editing the same record simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Redundancy (database)

A

Duplication of data; normalisation removes it; can also refer to backup copies for fault tolerance.

25
SQL: SELECT
Retrieves data from a database.
26
SQL: SELECT with multiple tables
Can retrieve data from multiple tables using JOIN or subqueries.
27
SQL: Nested SELECT
A SELECT query within another SELECT query (inner query executes first).
28
SQL: FROM
Specifies which table(s) to retrieve data from.
29
SQL: WHERE
Filters records based on a condition.
30
SQL: LIKE
Used in WHERE clause for pattern matching.
31
SQL: AND
Combines multiple conditions; all must be true.
32
SQL: OR
Combines multiple conditions; at least one must be true.
33
SQL: DELETE
Removes records from a table.
34
SQL: INSERT
Adds new records to a table.
35
SQL: DROP
Deletes an entire table or database structure.
36
SQL: JOIN (INNER JOIN)
Returns records where the join condition matches in both tables.
37
SQL: Wildcard `*`
Selects all columns.
38
SQL: Wildcard `%`
Represents zero or more characters in LIKE (e.g., `WHERE name LIKE 'A%'`).
39
SQL: Wildcard `_`
Represents a single character in LIKE (e.g., `WHERE name LIKE 'A_'`).
40
TCP/IP Stack layers (top to bottom)
Application, Transport, Internet, Link.
41
What does DNS do?
Converts domain names (google.com) into IP addresses (142.250.180.46).
42
Packet switching
Data split into packets; each packet routes independently; efficient; no fixed path.
43
Circuit switching
Dedicated communication path established for duration of call (e.g., traditional telephone).
44
Client-server network
Central server provides services; clients request; centralised control.
45
Peer-to-peer (P2P) network
No central server; each node acts as client/server; decentralised (e.g., BitTorrent).
46
What is a NIC?
Network Interface Card; hardware that connects a device to a network (MAC address).
47
What is a switch?
Connects devices within a LAN; uses MAC addresses to forward data only to destination.
48
What is a router?
Connects different networks (e.g., LAN to WAN); uses IP addresses; forwards packets between networks.
49
What is a bridge?
Connects two LAN segments; filters traffic based on MAC addresses.
50
What is a gateway?
Connects networks using different protocols; translates between them.
51
What is a firewall?
Monitors and controls incoming/outgoing traffic based on security rules.
52
What is a proxy server?
Intermediary between client and destination; hides client IP; can cache content; filter requests.
53
HTML purpose
Structure and content of a webpage.
54
CSS purpose
Stlying and layout of a webpage.
55
JavaScript purpose
Adds interactivity/dynamic behaviour to a webpage.
56
How do search engines index?
Web crawlers/spiders follow links; parse content; store keywords/metadata in an index database.
57
PageRank algorithm
Google algorithm; ranks pages based on number/quality of inbound links.
58
Server-side processing
Code runs on web server (e.g., PHP, Python); generates dynamic HTML.
59
Client-side processing
Code runs in user's browser (e.g., JavaScript); reduces server load.