Unit 4 : Exchanging Data Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is compression

A

● The process used to reduce the storage space required by a file
● Particularly important for sharing files over networks or the Internet
● Increases the number of files that can be transferred in a given time
● Downloading a compressed file is faster than downloading the full version

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is lossy compression

A

● Lossy compression reduces the size of a file while also removing some information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is lossless compression

A

● Lossless compression reduces the size of a file without losing any information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is run length encoding

A

● A method of lossless compression
● Repeated values are removed and replaced with one occurrence followed by the number of times it should be repeated
● Relies on consecutive pieces of data being the same
● Doesn’t offer a great reduction in file size if there’s little repetition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is dictionary encoding

A

● A method of lossless compression
● Frequently occurring pieces of data replaced with an index
● Compressed data is stored alongside a dictionary
● Dictionary matches frequently occurring data to an index
● Original data can be restored using the dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is encryption

A

● Used to keep data secure when it’s being transmitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is asymmetric encryption

A

● Two keys are used: public and private
● The public key can be published anywhere
● The private key must be kept secret
● Together, the keys are known as a key pair
● The keys are mathematically related to one another
● Messages encrypted with the public key can only be decrypted with the corresponding private key
● Encrypting a message using your private key verifies that the message was sent by you. If your public key can decrypt a message, then it must have been encrypted with your private key, which only you have access to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Hashing

A

● An input (called a key) is turned into a fixed size value (called a hash)
● A vast number of algorithms, called hash functions, do this
● The output of a hash function can’t be reversed to form the key
● the keys, which can’t be reversed to gain the passwords.
● A hash table is a data structure which holds key-value pairs
● Hash tables can be used to lookup data in an array in constant time
● Hash tables are used extensively in situations where a lot of data needs to be stored with constant access times. For example, in caches and databases
● If two keys produce the same hash, a collision is said to occur
● Methods to overcome collisions include storing items together in a list under the hash value and using a second hash function to generate a new hash
● A good hash function should have a low chance of collision and should be quick to
calculate
● A hash function’s output should be smaller than the input it was provided

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a relational database

A

● A relational database is one which uses different tables for different entities.
● An entity is an item of interest about which information is stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a flat file

A

● A flat file database consists of a single file.
● The flat file will most likely be based around a single entity and its attributes.
● Attributes are the categories about which data is collected.
● Flat files are typically written out in the following way:

Entity1(Attribute1, Attribute2, Attribute3 …)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a primary key

A

● The unique identifier which is different for each object added to the database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a foreign key

A

● A foreign key is the attribute which links two tables together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a secondary key

A

● A secondary key is used to enable a database to be searched quickly
● This will allow the table to be sorted on this attribute.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the different types of entity relationship modelling

A

● One-to-one: Each entity can only be linked to one other entity.
● One-to-many: One table can be associated with many other tables.
● Many-to-many: One entity can be associated with many other entities and the same applies the other way round

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is normalisation

A

● The process of coming up with the best possible design for a relational database is called normalisation.
● Normalisation tries to accomplish the following things:
○ No redundancy (unnecessary duplicates)
○ Consistent data throughout linked tables.
○ Records can be added and removed without issues.
○ Complex queries can be carried out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 3 types of normalisation

A
  • First normal form
    (No attribute can contain more than a single value)
  • Second normal form
    (● No partial dependencies.
    ● Is in first normal form. )
  • Third normal form
    (● Is in second normal form.
    ● Contains no non-key dependencies.
    ● A non key dependency is when the attribute depends on the value of the primary key and nothing else. )
17
Q

What is indexing

A

● Method used to store the position of each record when ordered by a certain attribute.
● Used to look up and access data quickly.
● Primary key is automatically indexed.

18
Q

What is capturing data

A

● Data needs to be input into the database and there are various ways of doing this.
● The chosen method is always dependent on the context.
● Data may need to be manually entered or scanned using methods such as Magnetic Ink Character Recognition (MICR) which is used with cheques.

19
Q

What is selecting and managing data

A

● Selecting the correct data is an important part of data preprocessing.
● This could involve only selecting data that fits a certain criteria.
● Collected data can be managed using SQL to sort, restructure and select certain sections.

20
Q

What is exchanging data

A

● Exchanging data is the process of transferring the data that has been collected.
● One common example of this is EDI (Electronic Data Interchange).

21
Q

What is transaction processing

A

● A transaction is defined as a single operation executed on data.
● Transactions must be processed in line with ACID.

22
Q

What is ACID

A

Atomicity:
● A transaction must be processed in its entirety or not at all.
Consistency:
● A transaction must keep the referential integrity rules between linked tables.
Isolation:
● Simultaneous execution of transactions must lead to the same result as if they were executed one after the other.
Durability
● Once a transaction has been executed it will remain so.

23
Q

What is record locking

A
  • The process of preventing simultaneous access of records in a database.
  • This is used to prevent inconsistencies or a loss of updates.
  • If anyone tries to access the same record they will not be able to.
  • The biggest problem with this is deadlock.
24
Q

What is redundancy

A
  • The process of having one or more copies of the data in physically different locations.
  • This means that if there is any damage to one copy the others can be recovered.