1.3.1 Compression, Encryption, Hashing Flashcards

1
Q

Compression meaning

A

Aims to reduce file size, while trying to make the compressed file as true to the original file as possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Benefits of compression

A
  • Uses less storage space
  • Faster streaming/downloading files from the internet as they take less bandwidth
  • Web pages load faster
  • Would adhere to email service restrictions to attachment sizes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Types of compression

A

Lossy (JPG, MP3, GIF)
Lossless (PNG, TIF, SVG, FLAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Image f.s (bits) formula

A

Width * Height * Colour Depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Lossy

A

Compression techniques that result in a permanent loss of data. When decompressed, the recreated data is an approximation of the original data. Often used with images and sound, but not text or computer programs.
Reduction in quality and resolution of images.
In sound, sounds outside our frequency range are removed which doesn’t affect playback quality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Lossless

A

Compression methods where no data is permanently lost. The decompressed file is identical to the original file. Often used when data cannot be approximated.
Types of compression include RLE and dictionary encoding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encryption meaning

A

Process of converting a message from plaintext to cipher text so that it cannot be intercepted and understood by unauthorised/third parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Symmetric encryption

A

Both the sender and recipient use the same key, however intercepting the key would mean accessing the message.
The key is used to encrypt the message from plaintext to ciphertext, and the recipient would then use the key to decipher the text from ciphertext to plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Asymmetric encryption

A

Uses a key pair (public and private)
The sender encrypts the key with the recipient’s public key, and the recipient decrypts it using their own private key.
More secure as the key cannot be intercepted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hashing definition

A

Applying a hashing algorithm to a piece of data, the key, to create a hash value. It takes large range of values and maps them into a smaller set of values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hashing features

A
  • unique, two keys dont result in the same hash value
  • repeatable, a hash value applied to the same key should return the same hash value
  • irreversible, cannot reconvert to receive the key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hashing uses

A

Keeping passwords
Searching for a record
Sending files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly