3.6 - Data Compression & Encryption Flashcards

1
Q

What does reducing file size help?

A
  • data is sent more quickly
  • less bandwidth
  • buffering is less likely
  • less storage is required
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is lossy compression? Which file types?

A

Non - essential data is permanently removed
JPEG, MP3, MP4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is lossless compression? Which file types?

A

Patterns in the data are spotted and summarised in a shorter format without permanently removing any information
PNG, GIF, ZIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When would you use lossy compression?

A
  • need a significantly smaller file size
  • not essential to fully recover all the data
  • data has random elements so lossless won’t significantly reduce the file size
  • contains irrelevant data that can be removed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does lossy compression work in JPG, MP3?

A

JPG - removes data permanently and tries to reconstruct an image without the missing data
MP3 - removes sound in the frequency ranges we can’t easily hear or least affect the perceived playback quality. Quieter notes played at the same time as louder sounds are a,so removed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is run length encoding (RLE)?

A

Basic method of compression that summarises consecutive patterns of the same data
Works well with sound and image data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is dictionary compression?

A

Spots regularly occurring data and stores it separately in a dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the Caesar cipher?

A

Most basic type of encryption and most insecure
Letters of the alphabet are shifter by a consistent amount

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a frequency analysis? Which encryption method is vulnerable to it?

A

Looks at how often certain characters or sequences of characters appear to discover patterns and discover the key without doing any brute force attacks
Caesar cipher (max 25 brute force attacks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a brute force attack?

A

Attempts to apply every possible key to decrypt ciphertext until one works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does the vernal cipher work?

A

Uses a one-time pad which is random and used only once then destroyed
Look at flipped learning notes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly