exchanging data (compression, encryption, hash) Flashcards

Learn all.

You may prefer our related Brainscape-certified flashcards:
1
Q

Explain compression?

A

Compression is the process used to reduce storage space required by a file, meaning you can store more files with the same amount of storage space. It is good for sharing files over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain Lossy Compression?

A

Lossy Compression is where file sizes are reduced while also removing some of its info. Results in more pixelated images etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain Lossless Compression?

A

Lossless Compression reduces the file size of a file without losing any of its info. When using Lossless the original file can be recovered. This is not possible with lossy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Run Length Encoding?

A

RLE is a method of lossless compression where repeated values are removed and replaced with one occurrence of the data followed by the number of times it has been repeated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Dictionary Encoding?

A

Another type of lossless compression. Repeated data is replaced with an index and compressed data is stored alongside a dictionary which matches the data to the index.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain encryption?

A

It is used to keep data secure when it’s being transmitted. A way of scrambling data to then be deciphered once it has reached its destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain Symmetric Encryption.

A

Both the sender and receiver share the same private key which they distribute to each other during a key exchange. This can be used to encrypt and decrypt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain Asymmetric Encryption?

A

2 keys are used. One public one private. Public can be published anywhere but private is kept secret.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do they differ?

A

In symmetric encryption a single key can be used to encrypt and decrypt however asymmetric encryption messages encrypted with recipients public key can only be decrypted with their private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain Hashing?

A

Where a key is turned into a hash. Input > fixed value. A use is hash tables. This holds key-value pairs. Hash tables are used in databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly