1.3.1 Compression, Encryption and Hashing Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

1.3.1 A)
Why should you use compression

A

-reduces file size
-reduces download time
-reduce storage requirments
- best use of bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

1.3.1 A)
How does compression work

A

reduces overall file size of a file as much as possible when it is reviced file needs to be uncompressed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

1.3.1 A)
What are the two types of compression

A

lossy & lossless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

1.3.1 A)
How does lossy compression work

A

reduces file size while removing some of its infomation could result in more pixelated images or less clear audio

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

1.3.1 A)
How does lossless compression work

A

reduce file size of file without losing info orginal can be revcover.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

1.3.1 B)
What is run length encoding

A

method of lossless compression. repeated values are removed and replaced with one value. May not be reduced by a big number if no repeats
AAABBC = 3A2B1C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

1.3.1 B)
What is dictionary encoding

A

Lossless compression stored alongside a dictonary example in notes.
index frequently occuring notes.
rewrite with index

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

1.3.1 C)
What is encryption

A

Used to keep data secure. scrambles data before its send and then dispher once arrive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

1.3.1 C)
What are the two types of encryption

A

Symmetric & Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

1.3.1 C)
What is symmetric encryption

A

sender and reciever share the same priv key. Key is used for encryption and decryption

important private key is kept secret. if key is intercepted during key exhange communication can be intercepted and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

1.3.1 C)
What is asymmetric encryption

A

Solves this problem of interception.
Uses two keys one priv and one public. Public key can be used/published anywhere
Two keys are key pairs they are mathematically related

A single key cannot be used to both encryption and decryption. recipent has the private key

Digital signitrues send a msg w private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

1.3.1 D)
What is hashing

A

Process in which an input(a key) is turned into a fixed size value (a hash) the algorthmn that does that is called hasing algroithm.

output of hashing function cannot be revered to form the key, makes it good for storing passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

1.3.1 D)
What is another use for hashing

A

Hash table is a data structure which holds key-value. used to look up data in an array in constant time, for example cache and data base.

Two keys can produce the same hash which can cause collion.
To overcome collison store items together in a list under hash value or use a second hash function to make a new hash

A good hash function should have low collision chance and should produce an output which is smaller than the input it was provided otherwise it would be quicker to simple serch for the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

1.3.1 C
Two characteristic you want from a hashing algorithm

A

Low Collision rate
Provides a smaller output than input
(This is the last point of flash card 13 but I want to make it clearer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly