Section 4 - exchanging data Flashcards
What does ACID stand for?
Atomicity, Consistency, Isolation, durability
Name 5 automated transaction methods
Smart card readers,
barcode readers,
scanners,
optical character recognition,
optical mark recognition
What 4 ways can data from transaction processing data be sent to a database?
automatically using DBMS software,
typing it into a customized form,
importing it from a spreadsheet or file,
using EDI (Electronic Data Interchange)
What is Electronic Data Interchange (EDI)?
EDI is the computer to computer exchange of documents such as purchases, invoices or shipping documents between businesses or business partners.
What needs to happen to EDI data to make it useable?
EDI data needs to be translated by EDI translation software in order to be added to a company database
What is a transaction in terms of databases?
A single logical database operation
What is the purpose of ACID?
To ensure the integrity of a database is maintained under all circumstances
What does ACID do practically?
Guarantees that transactions are processed reliably
What does Atomicity in ACID mean?
A transaction or query is either fully processed or not processed at all. It is not possibly to execute only part of a transaction.
What does Consistency in ACID mean? (use referential integrity)
Consistency ensures no transaction can violate the pre-defined rules for data validation. Referential integrity, defined when the database is set up, will always be upheld
What does Isolation mean in ACID?
Isolation ensures that concurrent execution of transactions gives the same result as if the transactions were executed one after another.
In what kind of database is Isolation important?
Multi-user databases.
What does Durability mean in ACID?
Durability ensures that once a transaction has been committed then it will remain committed even in the event of a power cut.
How is Durability achieved in a database?
As each part of a transaction is completed, it is held on a buffer disk until all elements of the transaction have been completed.
What does record-locking do?
It prevents simultaneous access to elements in a database to prevent updates being lost or inconsistencies in the database arising.
How does a deadlock happen with record-locking?
If two users attempt to edit two different records, they can lock both records and cause a deadlock
What is serialization?
Serialization is a Database Management system that ensures transaction do not overlap in time and therefore cannot interfere with each other.
Name 2 serialization techniques
Timestamp ordering
Commitment ordering
How does timestamp ordering work?
A transaction is given a read and write timestamp. If the user tries to save an update and the read timestamp is not the same as when they started, the DBMS knows another user has accessed the same object.
How does commitment ordering work?
Transactions are ordered in terms of their dependencies on each other as well as the time they were initiated. It prevents deadlocking by blocking one request until another one is completed.
How do many systems use redundancy to ensure they have no database downtime?
They have duplicate hardware in a separate geographical location that automatically takes over the main database if it goes down
Why might someone compress a file?
To reduce data usage when transferring over the internet
To allow a file to be posted online
To store a file using less data
Name 3 lossy compression examples
JPG
MP3
AVC (video)
Name 3 lossless compression examples
GIF
PNG
ZIP
Simply, how does lossless compression work?
Lossless compression looks for patterns in given data and reduces an original file to these patterns, allowing a receiver to rebuild the compressed file.
How does run-length encoding (RLE) work?
Run-length encoding compresses a file to only the patterns within it. For example, if an image has 6 green, 5 yellow and 17 orange pixels in a line, instead of storing these pixels individually as 28 bits, the computer would store it as the number of what colour pixel, reducing this sample to only 6 bits (one bit for the number, one bit for the colour).
How does dictionary-based compression work?
A compressed message is sent alongside a dictionary containing words and corresponding coded values which is then used to rebuild a compressed image on the other side while transmitting much less data.
What is data before it has been encrypted known as?
Plaintext
What is encrypted data called?
Ciphertext
What is an encryption method or algorithm known as?
The cipher
How does the Caesar cipher work?
By shifting letters to represent other ones directly
Why is the Vernam cipher so good?
It is the only cipher still proven to be unbreakable.
How does the Vernam cipher work?
By exchanging a one-time pad with someone, in person, and destroying it after use, the distribution of encrypted characters is completely random making it theoretically unbreakable, given that the one-time pad is not compromised
How is a one-time pad used with a message to encrypt it?
Each bit of each letter in the original text is XORd with each corresponding bit in the corresponding letter of the one-time pad. This resulting binary value is then converted using ASCII.
Why are modern-computer-generated encrypted messages never perfectly secure?
The keys they generate are never perfectly random but always predictable in some mathematical way.
How can you make a perfectly secure encryption key?
By creating it with a truly random natural phenomenon such as white noise or radioactive decay.
How does symmetric encryption work?
The same key is used to encrypt the data as to decrypt the data and so the key is transmitted with the ciphertext.