1.3 Exchanging Data Flashcards

(19 cards)

1
Q

Explain two characteristics you would look for in a hashing algorithm used for finding duplicate files by taking a hash of the file and comparing them to a list.

A
  1. A low chance of collision to reduce risk of different files being marked as the same.
  2. Quick to calculate as lots of files need to be hashed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

After running a program that uses hashing to find duplicate files a user finds that they still have apparent duplicates of some of their images. Explain why these apparent duplicates might still be present.

A

Hashing works on the bits and so two images may appear the same but not be identical at a bit level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An organisation decides to make a copy of Shakespeare’s entire works available as a downloadable text file from its website. It further decides to compress the file before making it available to download.
State an advantage to the website’s visitors of the file being compressed.

A

Downloads quicker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain why lossless compression should be used for text files and not lossy.

A

Lossy takes away some of the information from the original. Lossless preserves all the information from the original. With text the loss of small amounts of information will make it unreadable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain why asymmetric encryption is more suited to transactions over the internet than symmetric encryption.

A

Symmetric encryption would require both parties to have a copy of the key, this couldn’t be transmitted over the internet or an eavesdropper monitoring the message may see it.
Asymmetric gets round this requirement as there are two different keys.
One key encrypts the data and a different key decrypts it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe what is meant by the term primary key.

A

A field that has a unique identifier for every record in that table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A video table consists of the following fields: VideoID, VideoName, Presenter, Topic.
Write an SQL query that finds the name and presenter of all videos on the Topic of “The CPU”.

A

SELECT VideoName, Presenter
FROM Video
WHERE Topic = “The CPU”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A database stores information about songs on a music streaming service.
One of the tables called Song has the fields: Title, Artist, Genre and Length.
Explain why none of these fields would be suitable as a primary key.

A

A primary key must have a unique value for every record and the values for all these fields could repeat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A database stores information about songs on a music streaming service.
One of the tables called Song has the fields: Title, Artist, Genre and Length.
Give one advantage and one disadvantage of indexing the field Artist.

A

Advantage: Searches of Artist can be performed more quickly.
Disadvantage: The index takes up extra space in the database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A database stores information about songs on a music streaming service.
One of the tables called Song has the fields: Title, Artist, Genre and Length.
Write an SQL statement that will remove all songs by RandomBits from the table Song.

A

DELETE FROM Song

WHERE Artist = “RandomBits”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe what is meant by the term ‘hash’.

A

A result generated by applying an algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Describe one advantage to storing the password as a hash.

A

Hash functions can’t be reversed. If someone gains access to the database they cannot access the user’s password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

State the use of a bridge.

A

Provides a link between LANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

State the use of a gateway.

A

Provides a link between two dissimilar networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Give one advantage and one disadvantage to an architects’ firm of a client-server setup rather than a peer to peer setup.

A

Advantage: One location to back.
Disadvantage: Central point of failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe the term ‘firewall’.

A

A hardware device or piece of software that monitors packets going to and from a network.

17
Q

State one use of a firewall.

A

Preventing unauthorised access to a network.

18
Q

Explain the meaning of the HTML line:

A

Creates a text box which is referred to as username.

19
Q

A site’s owner notices that his site doesn’t come up high in the results from a search engine that uses the PageRank algorithm. State what would affect his site’s ranking.

A

The number of sites that link to their website and the PageRank of the linking sites.