1.3.1 Compression, Encryption and Hashing Flashcards

1
Q

Why is it beneficial to compress files? (2)

A

To reduce storage space needed for files in physical storage (1) and on the internet to reduce buffering time/increase loading speed (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of compression removes unnecessary information? (1)

A

Lossy compression (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of compression retains all original information? (1)

A

Lossless compression (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which media types are usually compressed using lossy compression? (3)

A

Audio (1) video (1) images (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which media types are usually compressed using lossless compression? (2)

A

Text files (1) Program code (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is meant by the word compression? (2)

A

(An algorithm that) makes a file storage size smaller (1) but information is lost in the process (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why is asymmetric encryption more suited than symmetric to transmissions over the Internet? (4)

A

Any four from Symmetric encryption would require both parties to have copy of the key (1) this couldn’t be transmitted over the internet or an eavesdropper monitoring the message may see it (1) Asymmetric gets round thisrequirement as there are two different keys (1) One key encrypts the data (1) which can be publically distributed (1) and a different key to decrypt it (1) which is kept private (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe the pros and cons of encryption (5)

A

The strength and ease of use of encryption has made it widely used on the Internet. (1) E-Commerce would not be possible without it. (1) Governments are no longer able to easily crack encrypted messages they intercept. (1) This gives individuals unprecedented levels of privacy (1) But also means those communicating for nefarious purposes can do so undetected. (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Hashing and its uses (3)

A

A result gained by applying an algorithm to a value (1). Used for gererating predictable indexes for data (1). Used as a type of one way encryption (1).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Rehashing(2)

A

The process of resolving DATA COLLISIONS (1) by selecting where to put clashing data (1).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the 3 types of Rehashing? (3)

A

Linear moves to the next available space (1). Chaining uses a linked list (1). Overflow designates an area for rehashes (1).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Salt? (1)

A

It is data added to a hash to ensure each output is unique (1).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why do we use salt? (3)

A

Most hashing algorithms are well known and hackers can use rainbow tables that store pre hashed values of a whole dictionary of possible passwords to look for a match (1). When a match is found the associated password is revealed (1). We use salt to make all password unique so that the hackers find no matches and can find out the passwords (1).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly