unit 4 Flashcards

1
Q

what is compression?

A

reducing the size of a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is lossy compression?

A

reducing file size when some data is discarded/removed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is lossless compression?

A

reducing file size and all original data is kept

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are the benefits of lossy compression?

A
  • greatly reduced file sizes
    suitable for media streaming where some data loss is acceptable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are the benefits of lossless compression?

A

maintains original data
best for text and data thar require integrity like documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are the drawbacks of lossy compression?

A

irreversible loss of data quality
not suitable for text or archival storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are the drawbacks of lossless compression?

A

larger file sizes than lossy
requires high bandwidth when streaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is run length encoding?

A

a form of data compression that condenses identical elements into s single value with a count

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

where is RLE used?

A

in bitmap images to compress sequences of the same colour

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is dictionary coding?

A

a compression which replaces recurring sequences with shorter, unique codes
a dictionary is compiled to map original sequences to special codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is encryption?

A

process of converting readable data into an unreadable format to provide security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is the purpose of keys in encryption?

A

they are specialised programs designed to scramble or unscramble data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

how does symmetric encryption work?

A

sender uses a key to encrypt the data before transmission
the receiver uses the same key to decrypt the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what are the benefits of symmetric encryption?

A

faster, making it ideal for encrypting large amounts of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are the drawbacks of symmetric encryption?

A

challenge of securely sharing the key, can be intercepted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

how does asymmetric encryption work?

A

uses 2 keys, public one for encryption, private one for decryption
receivers openly share their public key and senders use this public key to encrypt the data
receiver’s private key is the only key that can decrypt the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what are the benefits of asymmetric encryption?

A

secure, best for confidential transmissions
suitable for smaller data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what is hashing?

A

the method to convert any data into a fixed-size string of characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what is the general rule for hashing?

A

same input always produces same hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

how is hashing used in password storage?

A

the password a user provides is hashed, it is then stored in a database
when they log in they enter their password and the system hashed their input
it is then compared to the stored hash in the database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what are the benefits of hashing passwords?

A

adds extra layer of security
if database is compromised, the attacker can’t use the hashed passwords
users’ raw passwords are not exposed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

how is hashing used in data retrieval?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

how is data integrity linked to hashing?

A

when data is transferred, susceptible to loss of packets or interference, so if hashes are compared it allows the system to verify the integrity of the data

24
Q

what is a database?

A

an organised collection of data which allows easy storage and retrieval of information

25
what is a field?
a single piece of data in a record
26
what is a record?
a group of related fields representing one data entry
27
what is a table?
a collection of records with a similar structure
28
what is a primary key?
a unique identifier for each record in a table
29
what is a compound primary key?
a combination of 2 or more fields that is unique for all records
30
what is a foreign key?
a field in a table that refers to the primary key of another table used to link tables
31
what is a secondary key?
a field that is indexed for faster searching
32
what is a DBMS?
software used to manage databases
33
what is indexing?
a technique used to speed up data retrieval in a database which indexes a field
34
what is a flat file database?
a database that stores all data in a single table
35
what is a flat file suitable for?
simple and easy to understand, good for small uncomplicated datasets
36
what are the drawbacks of a flat file?
leads to data redundancy, inefficient storage and integrity issues
37
what is a relational database?
a database that organises data into multiple tables with relationships established between the tables
38
what are the advantages of a relational database?
uses key to reduce redundant data and improve integrity
39
what is normalisation?
the process of organising a database to reduce data duplication and improve data accuracy and consistency
40
what is 1NF?
contains atomic values (each column has single values) no repeating groups unique column names have a primary key
41
what is 2NF?
fulfil all 1NF requirements have no partial dependencies full functional dependency
42
what are no partial dependencies?
non-prime attributes must not depend on only part of the primary key separate tables should be created for partially dependent attributes
43
what is a one time pad?
one-time pad must be truly random, generated from a physical and unpredictable phenomenon
44
what are transitive dependencies?
when a non key attribute depends on another non key attribute rather than depending directly on the primary key
45
how do you delete a field from a table?
DELETE FROM table WHERE FIELD = ...
46
how do you create a join in a database?
INNER JOINE Table ON Table.ID = Table2.ID
47
what is transaction processing?
where a task is completed to ensure that a database is updated and data is consistent ensures integrity
48
what does the A in ACID stand for?
atomicity
49
what does the C in ACID stand for?
consistency
50
what does the I in ACID stand for?
isolation
51
what does the D in ACID stand for?
durability
52
what is record locking?
a method used to prevent data in a record being edited by 2 separate users simultaneously record locked by first user then unlocked when first user has finished transaction
53
what does the commit transaction mean?
where results of the transaction are permanently stored if all operations are successful
54
what does the rollback transaction mean?
an explicit command where the transaction changes are rolled back to original database if transactions were not sucessful
55
explain the cascading update of fields techniques
56
define data integrity
the correctness and consistency of data in a database
57
define referential integrity
ensures that relationships between tables remain consistent a foreign key matches a primary key