Codes and Cryptography 2 Flashcards

1
Q

Sender of the message

A

Source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Recipient of the
message.

A

Receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The process of
turning thoughts into
communication.

A

Encoding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The process of
turning communication into
thoughts.

A

Decoding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Reply or response to
the message.

A

Feedback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Content of
communication.

A

Message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vehicle through which
communication travels.

A

Channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a symbolic way to
represent information

A

Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Three areas of coding

A

Data compression
Error-correcting codes
Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

the process of reducing the
amount of data needed for the
storage or transmission of a
given piece of information, by the
use of encoding techniques

A

Data compression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

are algorithms,
mathematical formulas used to
compress and decompress files.

A

CODECs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CODECs for data

A

PKZIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CODECs for still images

A

JPEG,GIF,PNG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CODECs for audio

A

MP3, MP4, AAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CODECs for video

A

Cinepak, MPEG-2, H.264, VP8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Two types of Compression Techniques

A

Lossless Compression
Lossy Compression

17
Q

No data lost when file is reduced

A

Lossless Compression

18
Q

used in image, text file and also
use for executable file; Examples: WinZip, 7z, GIF & PNG.

A

Lossless Compression

19
Q

Small losses in data is tolerable.

A

Lossy Compression

20
Q

Used in video and audio; Examples: JPEG, MPE

A

Lossy Compression

21
Q

a condition when the
transmitted information is not
the same as the information
sent.

A

Error

22
Q

when it
detects an error it tries to put
data back to how it should have
been

A

Error correction

23
Q

the general
term for correction and error
detection systems.

A

Error control

24
Q

Types of error detection

A

Parity Checking
Cyclic Redundancy Check
Longitudinal Redundancy Check
Check Sum

25
Q

One extra bit is sent along with
the original data bits.

A

Parity Check

26
Q

help to check if any
error occurred in the data during
the transmission.

A

Parity bits

27
Q

used to verify errors on
identification numbers; A single number generated
using the other characters from
the identification number.

A

Check Digits

28
Q

the bar code which is the
identification number of a retail
item

A

Universal Product Code

29
Q

Code printed on retail product
packaging to aid in identifying a
particular item/product

A

Bar codes

30
Q

Series of thick and thin lines with
numbers at the bottom printed
on the item.

A

Bar codes

31
Q

Consists of 12 digits; the first 11
characters specify the source of
the item and the product
number.

A

UPC

32
Q

Who used Ceasar Cipher

A

Julius Ceasar teh

33
Q

How many alphabet positions does the Ceasar Cipher shifts

A

3

34
Q

What’s the modular arithmetic of Ceasar Cipher

A

f(p) = (m + 3 mod 26)

35
Q

Three types of Cryptography

A
  1. Secret Key Cryptography
    (Symmetric)
  2. Public Key Cryptography
    (Assymetric)
  3. Message Digest (Hashing)