1.3.1 Compression, encryption and hashing Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is Lossy compression?

A

A compression method where non essential data is permanently removed

  1. Deletes the data when its compressed
  2. It deletes unnecessary data
  3. Usually normally on images, videos and audio
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Benefits of Lossy Compression

A
  • It results in significantly smaller file size, smaller than lossless
  • Quicker transmission speed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Drawbacks of Lossy Compression

A

-Loss image/video quality

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Lossless Compression?

A

Patterns in data are spotted and summarised in a shorter format

  1. With lossless the size of the image can be reduced, but also the image can be restored
  2. It is ideal for vector images such as cartoons
  3. It records the patterns instead of the data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Benefits of Lossless Compression

A
  • No loss of quality
  • Slight decrease in image file size
  • Full restoration of data is available after transmission
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Drawbacks of Lossless Compression

A
  • Larger files than using lossy

- Slower loading speeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the methods of Lossless Compression?

A
  1. Dictionary Encoding

2. Run Length Encoding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Encryption?

A

The process of protecting data so that once it has been sent over a network the data is no longer identifiable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Symmetric encryption

A

The same key is used to encrypt and decrypt
–This means that the key must be sent to the recipient

The key can be intercepted and the data can then be stolen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Asymmetric Encryption?

A
  1. This uses two different but related keys
  2. One key, known as the public key, is made public so that others wishing to send you data can use this key to encrypt it
  3. The public key cannot decrypt the data
  4. Only the private key can be used to decrypt the data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Hashing?

A

This is the process of encryption that makes use of a hash function to give the data a hash value.The value can then be used to identify the data inside a hash table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The use of hashing for encryption

A
  1. Hashing can not be undone, so the original data can not be returned.
  2. Hashing is useful for storing PIN codes and passwords
  3. To verify a user’s password, the software applies the hash function to the user input and compares the hashed result with the one stored
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Collision in Hashing?

A
  1. A collision happens when an algorithm generates the same address for different primary keys
  2. A collision is sometimes referred to as a synonym
  3. However good the hashing algorithm is, it is impossible to avoid collisions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How to deal with a collision

A
  1. The easiest method is too put the item into next free slot available
    • A disadvantage is that it causes a clustering of items
  2. An alternative algorithm is to increment the ‘skip’ value by adding 1,3, 5, 7 etc. instead of repeatedly incrementing by 1 to find a free space.
  3. Note that the size of the skip value must be such that all slots in the table will eventually be reached, or part of the table will be unused
How well did you know this?
1
Not at all
2
3
4
5
Perfectly