Unit 4: Exchanging Data Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Describe Compression and it’s uses.

A

Compression is the process used to ​reduce the storage space ​required by a file.

It is important for sharing files ​over networks or the Internet because it increases the number of files that can be transferred (downloaded / uploaded) in a given time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the difference between Lossy vs Lossless Compression

A

Lossy compression​ reduces the size of a file ​while also​ removing some information (e.g MP3, OGG)

Lossless compression ​reduces the size ​of a file ​without losing any information (e.g WAV, FLAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Run Length Encoding?

A

Run Length Encoding is a ​method of lossless compression which repeated values are removed and replaced with ​one occurence​ followed by the number of times​ it should be repeated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the drawbacks of Run Length Encoding?

A

● Relies on consecutive pieces of data being the same

● Doesn’t offer a great reduction​ in file size if there’s little repetition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Dictionary Encoding?

A

Dictionary Encoding is a method of​ lossless compression where frequently occurring pieces of data replaced with an index.

Compressed data is stored alongside a ​dictionary. Because the dictionary matches frequently occurring data to an index, original data can be restored using the dictionary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the main use of encryption?

A

To​ keep data secure​ when it’s being transmitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe Symmetric Encryption.

A

● Both sender and receiver share the same​ private key

● The key is distributed in a process called a ​key exchange

As the key is used for both ​encrypting and decrypting​ data, the key must be kept ​secret; if the key is intercepted then any communications sent ​can be intercepted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe Asymmetric Encryption.

A

When sending information using asymmetric encryption, two keys are used: one public and a second, private, key. The public key can be published anywhere, free for the world to see, while the private key must be kept secret. Together, these keys are known as a key pair and are mathematically related to one another.

Messages encrypted with the recipient’s public key can only be decrypted with the recipient’s private key, which should only be in the possession of the recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Hashing?

A

Hashing is the name given to a process in which an input (called a key) is turned into a fixed size value (called a hash). There are a vast number of algorithms, called hash functions, which do this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe how Hashing can be used to store passwords.

A

Unlike encryption, the output of a hash function can’t be reversed to form the key. A password entered by a user can be hashed and checked against the key to see if it is correct, but a hacker would only gain access to the keys, which can’t be reversed to gain the passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a relational database?

A

A relational database is a database which recognises the differences between entities by creating different tables for each entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a flat file database?

A

A flat file is a database that consists of a single file. The flat file will most likely be based around a single entity and its attributes.

Flat files are typically written out in the following way:

Entity1(Attribute1, Attribute2, Attribute3…)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a primary key?

A

A primary key is a unique identifier for each record in the table. The primary key is shown by underlining it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a foreign key?

A

A foreign key is the attribute which links two tables together. The foreign key will exist in one table as the primary key and act as the foreign key in another. In example (1), DoctorID is the foreign key in the Patient table. The foreign key is shown using an asterisk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a secondary key?

A

A secondary key allows a database to be searched quickly. Looking at example (1), the patient is unlikely to remember their patientID but will know their surname. Therefore, a secondary index (secondary key) is set up on the surname attribute. This makes it possible to order and search by surname which makes it easier to find specific patients in the database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the three types of table relationships?

A
  • One-to-one
  • One-to-many
  • Many-to-many
17
Q

What are the four purposes of normalisation?

A
  • No redundancy (unnecessary duplicates).
  • Consistent data throughout linked tables.
  • Records can be added and removed without issues.
  • Complex queries can be carried out.
18
Q

What is a composite key?

A

A key that is both a primary key and a foreign key.

19
Q

Define the ‘1NF’ type of normalisation.

A

There must be no attribute that contains more than a single value.

20
Q

Define the ‘2NF’ type of normalisation.

A

A database which doesn’t have any partial dependencies and is in 1NF. Cannot depend on a composite key.

21
Q

Define the ‘3NF’ type of normalisation.

A