1.3 Exchanging Data Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Define and explain lossy compression

A

Lossy compression is a way of reducing the file size by deleting irrelevant data. The data is lost and the original cannot be recreated. This reduces the quality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define and explain lossless compression

A

Data from the file is not lost and the original can be easily recreated. Records patterns in the data and stores instructions on how to recreate the file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is run length encoding?

A

Used with images. The data can be stored as a list of colours, counting the number of repeating patterns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is dictionary coding?

A

Used mainly for text and software applications where no data is irrelevant. The data is stored in a dictionary style. The word is stored once and referenced to reduce the amount of data stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the difference between symmetric and asymmetric encryption?

A

symmetric - if the key is intercepted the message is easily de-cryptable as the same key is used to encrypt and decrypt the data
Asymmetric - a user has a private and public key which is unique, the user only ever sends the public key to encrypt a message and decrypts the message using the private key which is never sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is encryption?

A

The process of encoding the message so that it can only be read by the sender and the intended recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an encryption key?

A

The data is encrypted using an encryption key. If the data is intercepted, it cannot be deciphered unless they have the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is hashing?

A

Data is converted into a number or string similar to encryption however the data is unable to be converted back to its original input. If the output is the same you can assume that the passwords match.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the difference between encryption and hashing?

A

Encryption makes a message unreadable to users that should not be allowed access unless they have the key whereas hashing coverts an input into an output and cannot be reversed. Can be used for checking and storing passwords as well as determining where to store data i.e. hash tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a hash function?

A

Used to generate the output. The output will be the same every time a string is entered providing you enter the same string each time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define what a relational database is

A

a database that links tables through primary and foreign keys including attributes and entities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define what a flat file database is

A

made as lists like a spreadsheet. Flat file databases are often prone to data redundancy however they are fine for small amounts of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define primary key

A

unique identifier of an entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define what an entity relationship diagram is

A

A data modelling diagram technique used to define a relational database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is database normalisation?

A

Organising attributes and relations of a relational database to minimise data redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is database indexing?

A

Used to speed up searching. sequentially searches through the data. Like an index in a book

17
Q

What are the rules of 1NF?

A

Remove duplicate data

Needs a primary key

18
Q

What are the rules of 2NF?

A

Must be in 1NF
A composite key is usually created
Remove data sets that occur in multiple rows

19
Q

What are the rules of 3NF?

A

Must be in 2NF

All data has to rely on the primary key

20
Q

What is SQL?

A

Structured Query Language - used to communicate and create databases

21
Q

Name 3 SQL commands and explain what they do

A

SELECT
DELETE
UPDATE

22
Q

What is meant by referential integrity?

A

Adds constraints to the data updated, deleted and entered into a relational database to ensure that the data is as accurate as possible uses cascade updates and prevents deletion of a record that is a foreign key of another table

23
Q

What is ACID?

A
Atomicity
Consistency
Isolation
Durability
A set of properties to ensure that the integrity of the database is maintained under all circumstances. It guarantees that transactions are processed reliably
24
Q

What is atomicity?

A

Requires a transaction to be processed in its entirety or not at all. It makes it impossible to process only part of a transaction

25
Q

What is consistency?

A

Ensures that no transaction can violate any of the validation rules. Therefore referential integrity will always be upheld

26
Q

What is isolation?

A

Ensures that the execution of transactions leads to the same results as if they were processed one after another. Crucial in a multi-user database

27
Q

What is durability?

A

Ensures that once a transaction has been committed, it remains even in the even of a power cut. As each part of the transaction is completed, it is held in a buffer on a disk until all elements are completed. Only then will changes be made to the database.

28
Q

What is a multi-user database?

A

allows multiple users to simultaneously access a database. This could potentially cause updates to be lost if more than one user is editing the database at a time

29
Q

What is record locking?

A

Prevents simultaneous access to the database to prevent updates being lost or inconsistencies in the data arising. However if two users are attempting to update two records deadlock can occur

30
Q

What is serialisation?

A

Prevents deadlock. This ensures that the transactions do not overlap in time and therefore cannot interfere with each other or lead to updates being lost.

31
Q

What is timestamp ordering?

A

Every object in the database has a read and write timestamp. These are updated whenever an object is written or read. When a user tries to save an update the DBMS knows that another user has accessed the object is the timestamp is not the same as when they started

32
Q

What is database redundancy?

A

What a part of the system fails, the machine becomes redundant. We can create duplicate hardware that mirrors every transaction that takes place and can automatically take over if the main system fails

33
Q

Why is it important that networks have protocols and standards?

A

Protocols are rules and standards that govern data transmission. They ensure that devices can talk to each other. 4 layers
Application - concerned with production and reception of data. Packages data and passes to transport layer
Transport - makes and breaks connections via routers
Internet - Provides links across different network types
Link - Passes data to the physical network.

34
Q

Describe the TCP/IP stack

A

Transmission Control Protocol/ Internet Protocol - Used to bring order to the internet as well as many private networks.

35
Q

What is meant by a client-server network?

A

High end computers acting as servers which provide service to the users/clients. This includes; file storage and access, printing, internet access and security features. Adds more control over the network

36
Q

What is meant by a peer to peer network?

A

Each computer has an equal status. It is generally cheap and not a very common way of implementing a network. Easy to pass files between the users without having to go through a server. Can make use of distributed computing for collaborative working

37
Q

What is HTML?

A

HyperText Markup Language - a text-based language that uses tags, producing basic web pages using any plain text editor

38
Q

What is CSS?

A

Cascading Style Sheets - Defines how HTML elements are to be displayed. CSS files are stored separately from the HTML they affect

39
Q

What is JavaScript?

A

Adds interactivity into a webpage