Data Representation and Cyber Security Flashcards
State the decimal representation of the binary number 10010100
148
State the hexadecimal representation of the binary number 10010100
94
State the hexadecimal representation of the decimal number 143
8F
State the binary representation of the hexadecimal number BE
B - 1011
E - 1110
10111110
Give two reasons why hexadecimal is often used instead of binary in computer science.
Hexadecimal is easier for humans to read than binary
It is quicker to type in hexadecimal than binary
what is the answer to 01010101 + 01101100 + 00011001
11011010
State the result in binary of performing binary shift 2 places to the left on the value 00111001
11100100
What is the largest decimal number that can be represented using 6 bits
63
How many bits are there in 5kb
5000
* 8
* 1000
40,000
Explain how a sound wave is converted so that it can be stored in a computer.
A microphone or sound sensor picks up the sound wave
The wave is converted from an analogue to digital signals
The height of the wave is measured
the sample are stored as binary values.
A student has recorded a 30 second digital sound track using a sample rate of 44 000Hz. 8 bit have been used to store each sample taken.
Calculate the file size in kb.
44,000 * 8 * 30 = 10,560,000
10,560,000 / 8 = 1320000
1320000/1000 = 1320 kB
What is data compression
C- the process of encoding information to try and use fewer bits than the original
Give 2 reasons why data compression is often used.
To speed up file transfer
To use less storage
RLE is one method of compressing data
State the feature of data that allows it to be compressed effectively using RLE
The data contains lots of runs
Describe how RLE works. Give an example
It looks for consecutive repeating data in a file - called a run. Instead of storing each pice of repeated data separately, it stores the number of times it repeats.
An example is a image of how the specific rows of pixels would be compressed
Define the term cyber security
Cyber security aims to protect networks, data, programs and computers against damage, cyber attacks and unauthorised access