Data Exchange (unit 4) (finished) Flashcards

1
Q

Lossy Compression

A

Actual data is removed from the file in order to reduce its size. An algorithm is used to strip out the least important data. The original file cannot be restored as data is physically removed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Lossless Compression

A

Reduces the file size but allows the original data be perfectly reconstructed from the compressed data. Actual data is still removed however the data is encoded in such a way that the original can be recreated.
Less effect at reducing file size than lossy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Run Length Encoding

A

Run length encoding is used when there is repeated redundant data. It stores the item once and then an index with how often the item is repeated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Dictionary Coding

A

Dictionary coding is when an index is built where every data item in the file is recorded along with an indexed reference. The final compressed file will just consist of the dictionary index along with the sequence of occurrences needed to recreate the original file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Purpose of Compression

A
  1. Reduce download times
  2. Reduce requirements on file storage
  3. Make best use of bandwidth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

uses of lossy

A

multimedia files e.g. MP3, JPEG, MPEG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

uses of lossless

A

text files and computer programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Encryption

A

Encryption is the process of encoding a message so that it can be read only by the sender and the intended recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Symmetric Encryption

A

Symmetric Encryption is when the same key is used to encrypt and decrypt the message. Both party’s must know the key and also keep it secret.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Negatives of Symmetric encryption

A

There is a security risk as the key may be intercepted or the process of creating the key may be duplicated meaning the data can be decrypted by a third party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Asymmetric Encryption

A

Asymmetric Encryption (Public Key Cryptography) is when a public key and a private key is used. The public key is used to encrypt the data and the private key is used to decrypt the data. If you use person X’s public key to encrypt the data only person X’s private key will be able to decrypt it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hashing

A

Hashing is the process used to transform a data item into something different. A hashing function provides a mapping between an arbitrary length input and a fixed length output. It is a one-way transformation meaning you cannot get back to the original form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Uses of Hashing

A
  • generating disk address

- storing and checking passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

digital signature

A

hash total is encrypted using the users private key. If the receiver can decryptit using the senders public key they know that the message is authentic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Uses of assymetric encryption

A

used for transfering data e.g. online shopping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Uses of symmetric encryption

A

Used when the same person is accessing and saving data e.g. for backing up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

benefits of symmetric

A
  • encrypted very quickly

- simple and easy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Benefits of asymmetric

A
  • no movement of keys, more secure

- can be used for digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

drawbacks of assymmetric

A
  • not as fast
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Database

A

Databases are structured, persistent collections of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Flat File

A

single table database. It is inefficient as it is difficult to query and leads to data redundancy which can cause errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Relational Database

A

A relational database has more than one related table. It is more efficient that a flat file database as no data is duplicated meaning querying is easier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Entity Relationship Modelling

A

when the relationships between tables are shown in abstracted view.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

relationships

A

one-to-one
one-to-many
many-to-many

25
Q

primary key

A

A field that uniquely identifies each record

26
Q

Foreign key

A

a foreign key is a field in one table that uniquely identifies a row of another table

27
Q

composite key

A

A composite key is a combination of two or more columns in a table that can be used to uniquely identify a row.

28
Q

Secondary key

A

any field in a database which is not a primary, candidate or foreign key. They are used to order queries.

29
Q

Method of capturing data (Automated)

A

barcode readers, scanners, sensors, magnetic ink character recognition, smart card readers

30
Q

Method of capturing data (Manual)

A

Paper data capture form (read by OCR & OMR or typed in manually)

31
Q

Data redundancy

A

The unnecessary duplication of data in a database

32
Q

Variable length fields

A

an element may use a different number of bytes to another element for example a different number of characters.
Means it only uses the necessary amount of storage

33
Q

Hashing Databases

A

transforms a string of characters in a record into a shortened form that can be used as a disk address

34
Q

Attribute/field

A

the columns (describes the characteristics of each record)

35
Q

Record/Tuple

A

the rows (a data set that applies to one item)

36
Q

Normalisation

A

Organising the attributes and relations of a relational database to minimise redundancy

37
Q

Atomic

A

data is in its lowest level of detail and cannot be split into separate attributes

38
Q

partial key dependency

A

one or more f the attributes depends on only part of the primary key (if the primary key is a composite key)

39
Q

non key dependency

A

where the value of an attribute is determined by the value of another attribute which is not part of the key.

40
Q

all attributes are dependent on..

A

the key, the whole key, and nothing but the key

41
Q

first normal form

A
  1. Eliminate duplicate columns
  2. Get rid of any groups of repeating data
  3. Identify the primary key
  4. Separate out any attributes which are not atomic into separate attributes
42
Q

second normal form

A
  1. It is in first normal form.
  2. It does not have any non-prime attribute that is functionally dependent on any proper subset of any candidate key of the relation. A non-prime attribute of a relation is an attribute that is not a part of any candidate key of the relation.
43
Q

third normal form

A
  1. In second normal form

2. if there is no transitive dependency for non-prime attributes

44
Q

SQL

A

Structured Query Language, used to manage relational databases

45
Q

create a new table SQL

A

CEATE TABLE (table name)

46
Q

Insert data into a table SQL

A
INSERT INTO (table) (column1, column2, column3...)
VALUES (value1, value2, value3...)
47
Q

Query SQL

A

SELECT column1, column2, …

FROM table_name;

48
Q

Order Queried data SQL

A

SELECT column1, column2, …
FROM table_name
ORDER BY column1, column2, … ASC|DESC;

49
Q

update attribute SQL

A

UPDATE table_name
SET column1 = value1, column2 = value2, …
WHERE condition;

50
Q

Condition between two values SQL

A

SELECT column_name(s)
FROM table_name
WHERE column_name BETWEEN value1 AND value2;

51
Q

Check if an attribute is similar to a given value SQL

A

SELECT column1, column2, …
FROM table_name
WHERE columnN LIKE pattern;

52
Q

Data Integrity

A

Data integrity is the maintenance and consistency of data in a data store.
The data store must reflect the reality that it represents.

53
Q

Referential Integrity

A

Referential Integrity is where table relationships must always be consistent.
Any foreign key field must agree with the primary key that is referenced by the foreign key. Thus, any changes to the primary key field must be applied to all foreign keys in another table, or not at all.

54
Q

Transaction Processing

A

any information processing which is divided into individual, indivisible operations each operation must secede or fail as a complete unit.

55
Q

ACID

A

Atomicity
Consistency
Isolation
Durability

56
Q

Atomicity

A

a change to a database is either completely performed or not performed at all. A half-completed change MUST NOT be saved back to the database.

57
Q

Consistency

A

Any change in the database must retain the overall state of the database.

58
Q

Isolation

A

a transaction must not be able to be interrupted by anther transaction. The transaction must occur in isolation so that other users or processes cannot have access to the data concerned.

59
Q

Durability

A

Once a change has been made to a database it must not be lost due to a system failure.