Topic 3: Exchanging Data Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is Normalisation

A
  • The process of designing a relational database.
  • Aims to produce the best and most effective design
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some considerations of normalisation

A
  • Remove redundant or duplicated components.
  • Ensure data in linked tables is consistent.
  • Allow complex queries to be carried out.
  • Ensure records can be added or removed without problems.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is first normal form

A

Attributes may contain a single value only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is second normal form

A
  • In First Normal Form.
  • Partial dependencies are not allowed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Third Normal Form

A
  • In Second Normal Form.
  • Non key dependencies are not allowed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Run Length Encoding

A
  • A lossless compression method.
  • Repeated values are replaced with a single instance of the value and the number of times the value occurs.
  • It relies on all consecutive pieces of data being the same.
  • It offers poor reduction in file size if there is little repetition.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Indexing

A
  • Stores the position of each record when records are ordered by a certain attribute.
  • The primary key is automatically indexed.
  • Allows data to be found and accessed quickly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ways of Capturing Data

A
  • There are many ways to capture the data needed for a database.
  • The most appropriate way will depend on the type and quantity of data needed and available resources.
  • Data may be manually entered by a human or scanned in using optical character recognition, sensors or barcodes.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 3 types of Entity Relationship Modelling

A

One - One
One - Many
Many - Many

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is One - One ERM

A

Each Entity can be associated with one other entity only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is One - Many ERM

A

A single record can be associated with many records in another table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Many - Many ERM

A

Each record in one entity can be associated with multiple records in another entity, and vice versa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is SQL used for

A

To sort, structure and filter the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Referential Integrity

A
  • Ensures consistency.
  • Ensures that information is not removed if it is needed elsewhere in the database.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Transaction Processing

A
  • A single operation executed on data.
  • Must be processed in line with ACID
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is ACID

A

Atomicity
Consistency
Isolation
Durability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Atomicity

A

The whole transaction must be processed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Consistency

A

Transactions must maintain the referential integrity rules between linked tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Isolation

A

Executing transactions at the same time must produce the same result as if they were executed one after the other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Durability

A

When a transaction has been executed it will not be undone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is Record Locking

A
  • Prevents records being accessed by more than one transaction at the same time.
  • Prevents inconsistencies and data loss.
  • Can result in deadlock.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a Redundancy

A
  • Multiple copies of the data are kept in different physical locations.
  • If data in one copy is lost or damaged it can be retrieved from another copy.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the 3 main SQL commands

A

SELECT
FROM
WHERE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does LIKE mean in SQL

A

Used to specify wildcard criteria in conjunction with the % character
e.g. Searching for records that contain a specific word pattern

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What does JOIN do in SQL

A

Allows rows from multiple tables to be returned
and defines how the tables are linked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What does INSERT INTO do in SQL

A

Inserts a new record into an existing table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What does DELETE do in SQL

A

Deletes a record from a table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What does DROP do in SQL

A

Deletes an Entire table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is an Entity

A

An entity is item about which information is stored such as books, or customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is an Attribute

A

Attributes are the categories in which data is collected such as height or name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is a Flat File Database

A
  • Consists of a single file.
  • Usually based around a single entity.
  • Only one table.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is a Relational Database

A
  • Uses many tables to store data about different entities.
  • These tables are linked together.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is a Primary Key

A
  • A unique identifier, different for each object in the database
  • Usually and ID number or other unique ID
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is a Foreign Key

A
  • Used to link two tables together.
  • The primary key from a different table.
35
Q

What is a Secondary Key

A
  • Used to enable searching or sorting.
  • Usually a common field like name.
36
Q

What is Dictionary Encoding

A
  • A lossy compression method.
  • Commonly used data is replaced with an index.
  • The compressed data is stored with a dictionary.
  • The dictionary can restore original data.
  • The dictionary links the commonly used data to the index.
37
Q

What is Hashing

A
  • Turns an input into a value of a fixed size.
  • The input is known as a key.
  • The output is known as a hash.
  • The hash cannot be turned into the key.
  • A hash table stores keys and their matching values.
  • They can be used to lookup data in an array.
38
Q

What makes a Good Hash Function

A
  • Quick to run
  • Low Rate of Collisions
39
Q

What helps overcome collisions in Hashing

A

Using a second hash function and storing items together with the hash

40
Q

What is Encryption

A
  • Used to keep data secure.
  • Used when transmitting or storing data in ways where others may have access to it.
  • Scrambles the data to prevent it being easily read.
  • Encryption keys are used to encrypt and decrypt data.
41
Q

What is Symmetric Encryption

A
  • The same private key is used by the sender and receiver.
  • The same key is used to encrypt and decrypt data.
  • A key exchange process is used to share the key.
  • Data can be read should the key be intercepted.
42
Q

What is Asymmetric Encryption

A
  • Uses two different keys.
  • The public key is used to decrypt data and can be shared anywhere.
  • The private key is used to encrypt data and must be kept securely.
  • The two keys are known as a key pair and are related to each other.
  • Encrypting a message using the public key verifies that it was sent and encrypted by the owner of the key.
43
Q

What are Search Engines

A
  • Search a database of web addresses to find resources based on criteria set by the user.
  • Rely on an index of pages through which they search.
  • Web Crawlers build the index by traversing the Internet exploring all links on the page.
  • Crawlers collect keywords, phrases and metadata from pages.
44
Q

Name 3 Network Topologies

A
  • Bus
  • Star
  • Mesh
45
Q

Describe a Bus Network

A

All devices are connected to a single cable (called the bus) A terminator is at each end of the cable.

46
Q

Describe a Star Network

A

All nodes are connected to one or more central switches. Often used with wireless networks.

47
Q

Describe a Mesh network

A

No central connection point, with each device connecting directly to others. Full mesh networks have every device connected to every other device. Partial mesh networks have each device connected to several others but not necessarily every other device.

48
Q

Adv/Disadvantages of a Bus Network

A

ADV
▪ Easy to install extra devices.
▪ Cheap to install as it doesn’t require much cable.

DIS
▪ If the cable fails or is damaged the whole network will fail.
▪ Performance becomes slower as additional devices are connected due to data collisions.
▪ Each device receives all data, a security risk

49
Q

Adv/Disadvantages of a Star Network

A

ADV
▪ Every device has its own connection so failure of one node will not affect others.
▪ New devices can be added by simply connecting them to the switch.
▪ Usually have higher performance as a message is passed only to its intended recipient.

DIS
▪ If the switch fails it takes out the whole network.
▪ Requires a lot of cable so can be expensive.

50
Q

Adv/Disadvantages of a Mesh Network

A

ADV
▪ Messages can be received more quickly.
▪ Messages have many possible routes they can take.
▪ Multiple connections mean that no device should be isolated
▪ Each device can talk to more than one node at the same time.
▪ Devices can be added without interruption.

DIS
▪ Can be impractical and expensive to setup.
▪ Require a lot of maintenance.

51
Q

What is a Topology

A
  • The physical topology defines the physical layout of the network
  • The logical topology defines the way data flows through the network
52
Q

What is a Protocol

A

A set of rules for communication between devices

53
Q

What is a Network

A

Two or more computers connected together for the purposes of transmitting data

54
Q

What’s a LAN

A

Local Area Network
Covers a small geographical area

55
Q

What’s a WAN

A

Wide Area Network
Covers a Large Geographical area

56
Q

What is the TCP/IP stack

A
  • Transfer Control Protocol / Internet Protocol.
  • A group (stack) of protocols which work together.
  • Controls the flow of data packets through the network.
57
Q

What are the 4 Layers of the TCP/IP Stack

A
  • Application
  • Transport
  • Network
  • Link
58
Q

What’s the DNS

A
  • Domain Name System
  • Allows websites and other network devices to be identified by a human readable name.
  • DNS Server converts the name to an IP Address.
  • A hierarchy.
  • Each domain name is separated by a dot.
  • The names to the right are highest in the hierarchy.
59
Q

What is the Application Layer

A
  • Top of the stack.
  • Specifies the required protocol needed by the application the user is using
60
Q

What is the Transport Layer

A
  • Uses TCP to establish a connection through the network between the source and recipient devices.
  • Splits data into packets labelled with a packet number.
  • Requests retransmission of any packets lost during transit.
61
Q

What is the Network Layer

A
  • Adds a source and destination IP Address to packets.
  • Routers use this address to forward packets through the network to their destination.
62
Q

What is the Link Layer

A
  • The physical connection between devices.
  • Uses a MAC Address to communicate.
63
Q

What is a Client Server Network

A
  • Clients connect to a central server.
  • The server is a powerful computer central to the network.
  • It holds all the data.
  • More secure setup.
  • Clients do not need to be backed up.
  • Data and resources can be shared easily.
  • Expensive to setup.
  • More secure.
64
Q

What’s a Peer to Peer Network

A
  • Computers are connected directly to each other.
  • Computers share data with one another.
  • Quick, cheap and easy to setup.
  • Less secure.
  • Easier to maintain.
65
Q

What is a Proxy Server

A
  • Sits between a user and the resource they are accessing.
  • Protects users’ privacy.
  • Caches frequently accessed websites to increase performance.
  • Reduces web traffic.
  • Uses rules to block access to sensitive information.
66
Q

What does the Page Rank Algorithm do

A
  • Ranks each web page
  • Higher ranked pages appear first when results are shown.
  • Rank based on the number of incoming links on the page and the rank of these pages.
  • This is stored in a directed graph.
  • The sites are nodes and the links between the pages are the arcs.
67
Q

What’s the Algorithm of the Page Rank Algorithm

A

PageRank(x) = (1-d) + d[(PageRank(T1) ÷ Count(T1)) + … + (PageRank(Tn) ÷ Count(Tn)

68
Q

What are the 2 types of Compression

A

Lossy
Lossless

69
Q

What is Compression

A

Reduces the space needed to store or transmit a file.

70
Q

Why is Compression Important

A

Important when sharing files over a network or The Internet and when dealing with limited storage space.
Increases the number of files which can be sent or received.

71
Q

What is Lossy Compression

A

Lossy compression removes some information whilst compressing the file. Original cannot be retrieved.

72
Q

What is Lossless Compression

A

Lossless compression reduces the size of the file without losing any information.
Original can be retrieved.

73
Q

Name 5 pieces of Network Hardware

A
  • NIC
  • Switches
  • WAPs
  • Routers
  • Gateway
74
Q

What is an NIC

A

Network Interface Card
* May be wired or wireless.
* Allows a device to connect to a network.
* Has a unique MAC (Media Access Control) address assigned to it

75
Q

What is a Switch

A
  • Controls the flow of data through the network.
  • Used in star topologies.
76
Q

What is a WAP

A

Wireless Access Point
* Allows devices to connect wirelessly to a network.
* Used in mesh networks.
* Often used with a router to allow devices Internet access.

77
Q

What is a Router

A
  • Used to connect two or more networks together.
  • Often used between a home/office network and an ISP to allow Internet access.
78
Q

What is a Gateway

A
  • Used to connect networks using different protocols.
  • Translates protocols to allow devices to communicate.
  • Changes the packet headers.
79
Q

What is Packet Switching

A
  • Data is split into packets.
  • Packets are sent across the network.
  • Packets may take different routes through the network.
80
Q

What is Circuit Switching

A
  • A direct link is created between devices.
  • The link is maintained for the entire conversation.
  • Both devices must transfer data at the same rate.
81
Q

What is a Firewall

A
  • Prevent unauthorised access to the network.
  • Has two NICs.
  • Data enters one NIC and is compared to a set of rules.
  • Traffic which matches the rules is passed out the other NIC.
82
Q

What is Server Side Processing

A
  • Client sends all data to the server for processing. Examples include SQL and PHP.
  • It requires no plugins on the client.
  • Servers can usually perform large or complex calculations more quickly.
  • It is not browser dependent.
  • It is more secure
83
Q

What is Client Side Processing

A
  • Client processes the data locally.
  • Examples include JavaScript.
  • Web pages can immediately respond to actions.
  • Code executes more quickly.
  • It gives more control over the behaviour and look of websites.