Codes and Cryptography 2 Flashcards

1
Q

Sender of the message

A

Source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Recipient of the
message.

A

Receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The process of
turning thoughts into
communication.

A

Encoding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The process of
turning communication into
thoughts.

A

Decoding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Reply or response to
the message.

A

Feedback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Content of
communication.

A

Message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vehicle through which
communication travels.

A

Channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a symbolic way to
represent information

A

Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Three areas of coding

A

Data compression
Error-correcting codes
Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

the process of reducing the
amount of data needed for the
storage or transmission of a
given piece of information, by the
use of encoding techniques

A

Data compression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

are algorithms,
mathematical formulas used to
compress and decompress files.

A

CODECs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CODECs for data

A

PKZIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CODECs for still images

A

JPEG,GIF,PNG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CODECs for audio

A

MP3, MP4, AAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CODECs for video

A

Cinepak, MPEG-2, H.264, VP8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Two types of Compression Techniques

A

Lossless Compression
Lossy Compression

17
Q

No data lost when file is reduced

A

Lossless Compression

18
Q

used in image, text file and also
use for executable file; Examples: WinZip, 7z, GIF & PNG.

A

Lossless Compression

19
Q

Small losses in data is tolerable.

A

Lossy Compression

20
Q

Used in video and audio; Examples: JPEG, MPE

A

Lossy Compression

21
Q

a condition when the
transmitted information is not
the same as the information
sent.

22
Q

when it
detects an error it tries to put
data back to how it should have
been

A

Error correction

23
Q

the general
term for correction and error
detection systems.

A

Error control

24
Q

Types of error detection

A

Parity Checking
Cyclic Redundancy Check
Longitudinal Redundancy Check
Check Sum

25
One extra bit is sent along with the original data bits.
Parity Check
26
help to check if any error occurred in the data during the transmission.
Parity bits
27
used to verify errors on identification numbers; A single number generated using the other characters from the identification number.
Check Digits
28
the bar code which is the identification number of a retail item
Universal Product Code
29
Code printed on retail product packaging to aid in identifying a particular item/product
Bar codes
30
Series of thick and thin lines with numbers at the bottom printed on the item.
Bar codes
31
Consists of 12 digits; the first 11 characters specify the source of the item and the product number.
UPC
32
Who used Ceasar Cipher
Julius Ceasar teh
33
How many alphabet positions does the Ceasar Cipher shifts
3
34
What's the modular arithmetic of Ceasar Cipher
f(p) = (m + 3 mod 26)
35
Three types of Cryptography
1. Secret Key Cryptography (Symmetric) 2. Public Key Cryptography (Assymetric) 3. Message Digest (Hashing)