Fundamentals of Data Representation Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Multiplying unsigned binary integers

A
11011 x
       11
---------
  11011
110110
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Two’s Complement

A

A method of working with signed binary values (positive and negative integers)
http://preview.ibb.co/h0LJEd/E10_EA4_A1_396_C_4_F70_B90_C_76_C8_D9577_C82.jpg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fixed Point

A

Where the decimal/binary point is fixed within a number.

https://image.ibb.co/nvFSqJ/fixed_point.jpg

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Floating Point Numbers

A

Where the decimal/binary point can move within a number.

https://youtu.be/dcIDAnfp8Dc?t=5m21s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Advantages of Floating Point over Fixed Point

A

A wider range of numbers can be produced with the same number of bits as a fixed point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Advantages of Fixed Point over Floating Point

A

Quicker to process due to no processing required to move the binary point
More precise despite a more limited range of numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Normalisation Main Use Case

A

Storing the number with the greatest accuracy possible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How to tell if a number is normalised

A

If the number is normalised
Positive - binary starts with 01
Negative - binary starts with 10

https://youtu.be/RcY0aiSsyqI?t=3m55s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Overflow

Underflow

A

When a number is too large to be represented with the number of bits allocated.
When a number is too small to be represented with the number of bits allocated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Absolute Errors

Relative Error

A

The actual mathematical difference between the answer and the approximation of it, that you can store.

Relative Error = Absolute Error / Number intended to be stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Character Code

A

A binary representation of a particular letter, number or special character.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ASCII

A

A standard binary coding system for characters and numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Unicode

A

A standard binary coding system that has superseded ASCII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Parity Bit

A

A method of checking binary codes by counting the numbers of 0s and 1s

Even Parity - If there are an odd number of 1s in a binary code, a 1 parity bit is added to make the number of 1s even. Once the data is received, it is checked to ensure there is an even number of 1s, if there are, dada is assumed to be correct.

Odd Parity 0 If there are an even number of 1s in a binary code, a 1 parity bit is added to make the number odd. Once the data is received, it is checked to ensure there is an odd number of 1s, if there are, dada is assumed to be correct.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Majority Voting

A

A method of checking for errors by producing the same data several times and checking it is the same each time.

1001 would be send as 111 000 000 111
When the data is checked, you would expect to see patterns of 3 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Check Digits

A

A digit is added to the end of binary data to check the data is accurate. It is the most popular method of checking ef used on barcodes. However, it is also the most error-prone method.

The most simplest way to calculate a check digit is to keep on adding digits until it becomes one number:

123456 –> 1+2+3+4+5+6 = 21 –> 2+1 = 3.
Therefore 3 is the check digit.

However, thie problem with this system is that if two numbers are swapped around, the check digit will be the same. To overcome this, each number is given its own weighting. This means each number is multiplied by a different weight or scale factor. A common method is the modulo-11 method:
https://image.ibb.co/hCsMjd/checkdigits.jpg

17
Q

Bit-Mapped Graphs

A

An image made up of individual pixels

To create colour graphics, each pixel is mapped to more than one bit (eg one byte/8 bits) which means each pixel could be 2^8 or 256 (Colour Depth) different colours

Colour Depth - The number of bits or byted allocated to represent the colour of a pizel in a bit-mapped graphic

Your computer will contain a graphics card for controlling graphics. The amount of memory allocated for bit-mapping depends on the amount of memory on the card.

Storage = resolution x colour depth.

18
Q

Vector Graphics

A

An image made up of objects and coordinates

19
Q

Analogue and Digital Conversions

A

Analogue to Digital Converter (ADC) - Microphone and a computer, the microphone inputs sound inthe form of changes in air pressure and then converts them into electrical signals. These analogue electrical signals are then converted by the ADC into digital signals that the computer can process.

Digital to Analogue Converter (DAC)

20
Q

Sound Sampling

A

Sampling is the process of converting analogue sound waves into digital form to create what is commonly known as digitised or digital sound.

To calculate how large the file size will become you can use the following calculation
sample rate (Hz) * length of recording (secs) * sampling resolution (bits)

eg If sample rate was 44000Hz, with a recording lasting 60 seconds with a sample of 16 bits (two bytes)
44000 * 60 * 16 = 42240000 bits = 5280000 bytes or 5.28MB

21
Q

Data Compression

A

Compression is the process of encoding information with fewer bits so that the files take up less memory.

Lossless means that the compressed file is as accurate as it was before compression ie no data is lost
Lossy means that there will be some degradation in the data, for example, a grainer image might be produced.

Lossless compression uses run-length encoding for images, which is a method of compressing data by eliminating repeated data. Eg an image contains data about each pixel, so the file read: blue blue, blue, blue, red, red. You could instead store: x blue pixels, then x red pixels so it is compressed without losing quality. eg BBBBBBBBB pixels will simply display 9B for 9 blue pixels.

For text files, lossless compression uses Dictionary-based encoding. For example, many words end in tion, such as station, nation and creation. Rather than storing the words individually, ‘tion’ can instead be encoded to the dictionary as ‘1’ and then used in combination with other prefixed to form words. This significantly reduces file size without losing quality.

22
Q

Encryption

A

The process of turning plaintext into scrambled ciphertext, which can only be understood if decrypted.

23
Q

Decryption

A

The process of deciphering encrypted data or messages.

24
Q

The Caesar Cipher

A

The Caesar Cipher is a substitution cipher where one character of plaintext is substituted for another, becoming the cipher text.
Eg a two-letter shift - A = C, B = D, C = E
Or random substitution - A = O, B = Z, C = P

A further level of complexity can be added to the substitution cipher using polyalphabetic cipher
eg encrypting the letter B
B –> W in 1st alphabet
W –> Q in 2nd alphabet

Polyalphabetic - Using more than one alphabet.

25
Q

Frequency Analysis

A

In cryptography, it is the study of how often different letters or phrases are used.

26
Q

Transposition Cipher

A

A transposition cipher is when the letters of the message are transposed, or rearranged to form an anagram.

Railfence Cipher - https://www.thecrazyprogrammer.com/wp-content/uploads/2017/09/Rail-Fence-Cipher-Example.png
Original Message - Hello World
Encrypted message - HorelollWd

Route Cipher - https://bit.ly/2sXkxup

27
Q

Vernam Cipher

A

Varnam Cipher is known as the one-time pad cipher.
Vernam Cipher is considered to be the most secure method of encryption, unbreakable.

All “one-time pad ciphers” offer perfect security IF:

  • The encryption key (one-time pad) is equal to or longer than the plaintext message
  • The Key is truly random
  • The key is used only once and then destroyed.

How to apply Vernam Cipher:
Get message you want to encrypt
Create one-time pad
Find ASCII binary code for the first letter of both
Perform XOR on each binary code
Find the new ASCII character from the new binary code
Repeat for each character.

28
Q

One-time Pad

A

A key that is only used once to encrypt and decrypt a message and is then discarded.