1.3 Exchanging data Flashcards

1
Q

What is Asymmetric encryption?

A

An encryption technique where a public key available to everyone is used to encrypt the data and the data is decrypted by the paired private key known only by the recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is dictionary coding?

A

A type of lossless compression where text is searched for in entries that match the entries in a dictionary. Entries are substituted by a unique code which can then be translated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is hashing?

A

A one-way transformation of data into an abbreviated form called a hash value. The hash value is used to validate login credentials like passwords or pins without revealing the original data to hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is lossless compression?

A

A compression algorithm that retains all the data in the file by only storing the instructions needed to reconstruct the original file. No data is lost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is lossy compression?

A

A compression algorithm that removes non-essential data from a file leading to a noticeable decrease in accuracy of data. Data is lost and non-recoverable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is run-length encoding?

A

A type of lossless compression where repeated occurrences of the same data (like several pixels of the same colour in an image) are stored as single data values with their counts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is symmetric encryption?

A

An encryption technique where the same key is used to encrypt and decrypt data. A copy of the key must be transferred between both parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is atomicity?

A

All transactions should either succeed or fail and never only be partially processed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is consistency?

A

Each transaction must obey the defined validations rules of the database to maintain referential integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is durability?

A

Once a transaction has begun, it must be completed under all circumstances not lost under power loss.
guarantees that once the transaction completes and changes are written to the database, they are persisted. This ensures that data within the system will persist even in the case of system failures like crashes or power outages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is entity-relationship modelling?

A

A method of abstractly describing the data tables and the relationship between them visually. They can be used to reduce redundancy and construct a relational database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

1NF

A

A table with no repeating attributes. The intersection of each record and attribute produces exactly one value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Flat file database?

A

A database where a single table data structure is used to store all of the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Foreign key

A

A linking attribute that joins two table in a relational database by being a primary key in one and a foreign key in another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is indexing?

A

The process of creating an index of primary keys such that the location of any record can be retrieved given its primary key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is isolation?

A

No transaction should overwrite other transactions that are simultaneously occurring. The same results must be obtained if transactions are concurrently or sequentially processed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is normalisation

A

The formal process of optimally designing data tables by reducing data redundancy and repetition by converting them into normal forms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a primary key?

A

A unique identifier that identifies each RECORD in a table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is record locking?

A

A technique used to prevent simultaneous access to data in a database by locking a record when it is being edited or updated. Otherwise inconsistencies may arise in the database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is redundancy?

A

The unnecessary repetition of a field in multiple tables. Databases should have redundancy in the form of identical copies if part of the database gets lost and needs to be recovered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is referential integrity

A

The idea of keeping a database consistent by ensuring that any changes made to data or relationships associated with a table are accounted for in all the linked tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a relational database?

A

A database where separate tables are made for each entity and relationships between entities are represented by foreign keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a secondary key?

A

A key that can be used as an alternative index to access or sort records in the table in a quicker but less accurate way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

2NF

A

1NF needs to be completed and a table that has data that repeats across multiple records removed and put into a new table with appropriate relationships ( no partial dependencies)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
3NF
2NF needs to be completed where all attributes that are not the primary key are fully dependant on the primary key (no non-key dependencies)
26
What is transaction processing?
The idea of making sure that any logical operation or change in state of a database (transaction) conforms to ACID
27
What is ACID
Atomicity, consistency, isolation, durability
28
What is circuit switching?
A method for sending data between two nodes on a networks by creating a dedicated communication channel first. All data follows this path for the duration of communication.
29
What is a client-server network?
A type of network organisation where networked computers (clients) connect to one or more powerful central computers (servers) that handles service requests and has resources.
30
What is a domain name system?
A hierarchical naming system that maps human-readable domain names to IP addresses that locate and identify resources on a network
31
What is encryption?
The process of converting the original data (plaintext) into a form which cannot be understood by unauthorised users (cipher text) using an encryption algorithm
32
What are firewalls?
A security checkpoint application that monitors incoming and outgoing network traffic, designed to prevent external users from gaining unauthorised access between two networks
33
Local area networks
A network connecting a group of computing devices on a single geographical site
34
Packet switching
A method for sending data over a network by breaking data into several data packets which are sent independently and then reassembled once they all reach their destination
35
Peer to peer network
A type of network organisation where networked computers are connected to each other and share resources and workloads without a central server
36
Protocol layering
A technique the simplifies network design by dividing it into its functional layers and assigning protocols to each layer to complete tasks and communicate with adjacent layers
37
What are proxies?
A server application that intercepts all data packets entering and leaving a network to hide the true addresses of the source. Also restrict access to data and isolate the network from external networks
38
TCP/IP stack
Networking protocols that allow networked computers to communicate consisting of 4 connected layers. All incoming packets are passed through these layers
39
Wide area networks
A network connecting a group of computing devices over a large geographical area typically with the help of third party carriers
40
What does CSS stand for?
Cascading style sheets
41
CSS
A style language used to define the layout, design and presentation of a webpage written in a markup language
42
What is client-side processing
The data processing and operations performed by the clienton the clkienbts local computer
43
What resources are used for client-side processing
The user's local computer resources
44
What does HTML stand for?
HyperText Markup Language
45
HTML
A mark-up language used to write the contents of the webpages on the world wide web
46
What is JavaScript?
A interpreted, object oriented programming language used to create interactive elements within web browsers
47
Why is JavaScript used?
To add functionality to dynamic web pages
48
PageRank algorithm
A link analysis algorithm to rank web pages. Assesses number and quality of inbounded links to a page recalculates pagerank scores each time it crawls the web and rebuilds its index
49
Search engine indexing
A method of collecting, parsing and storing data from websites to facilitate fast and accurate information retrieval using an index of webpages
50
Server side processing
The data processing and operations performed by the web server. Data sent from the clients browser to the web server for secure processing, output is sent back to client
51
AAAAAABBBBBCCC in RLE
A6B5C3
52
What also has to be stored when using dictionary compression
The dictionary created
53
What is the process of the sender and receiver sharing the same private key in symmetric encryption?
Key exchange
54
What is the key used for in symmetric encryption?
Encrypting and decrypting the data
55
Why does the private key have to be kept secret in symmetric encryption?
As if the key is intercepted then any communications sent can be intercepted and decrypted using the key
56
How many keys are used for asymmetric encryption?
two
57
What are the two keys used in asymmetric encryption?
Public and private key, private key has to be kept secret
58
What are the two keys together called in asymmetric encryption and what type of relation do they have
key pair and they are mathematically related
59
What are messaged encrypted and decrypted with in asymmetric encryption?
The recipients public key and decrypted with the recipients private key which only the recipient should have
60
What happens if someone wants to send you a message?
they must first find your public key. There are a variety of websites which can do this for you. The message is then encrypted with your public key meaning that only you can decrypt it
61
How can you prove a message has been sent by you?
you can encrypt it using your private key. This means that anyone can decrypt it (as your public key is available to anyone) and by doing so, can guarantee that you encrypted the message, as only you have access to the private key. This forms the basis of a system called digital signatures.
62
What is the process of hashing?
an input (called a key) is turned into a fixed size value (called a hash). There are a vast number of algorithms, called hash functions, which do this
63
Describe a picture of hashing
64
Difference between encryption and hashing
Unlike encryption, the output of a hash function can’t be reversed to form the key. This quality makes hashing useful for storing passwords.
65
Why is hashing good for passwords?
A password entered by a user can be hashed and checked against the key to see if it is correct, but a successful hacker would only gain access to the keys, which can’t be reversed to gain the passwords.
66
What is another use of hashing?
Hash tables
67
What are hash tables
data structure which holds key-value pairs. Formed from a bucket array and a hash function, hash tables can be used to lookup data in an array in constant time.
68
What happens when data needs to be inserted into a hash table
When data needs to be inserted, it is used as the key for the hash function and stored in the bucket corresponding to the hash.
69
Where are hash tables used
in situations where a lot of data needs to be stored with constant access times. For example, in caches and databases.
70
What happens if two keys produce the same hash?
a collision is said to have occurred
71
How do you overcome hashing collisions
including storing items together in a list under the hash value, or using a second hash function to generate a new hash.
72
What should a good hash function have
low chance of collision and should be quick to calculate. A hash function should provide an output which is smaller than the input it was provided, otherwise searching for the hash could take longer than simply searching for the key
73
What is an entity?
item of interest about which information is stored
74
What is a relational database in link to entities?
database which recognises the differences between entities by creating different tables for each entity
75
What are attributes?
Attributes are characteristics of the entity; these are categories about which data is collected.
76
What do primary keys uniquely identify?
Each record
77
What needs to be set up for secondary keys
Secondary index
78
Why is the primary key often not queried?
It is not normally remembered
79
What is another way data is inputted into databases apart from manually when surveys are done
Magnetic Ink Character Recognition (MICR). All of the details excluding the amount are printed in a special magnetic ink which can be recognised by a computer but the amount must be entered manually
80
How is data from multiple choice questions entered into databases
Optical Mark Recognition (OMR)
81
What do other forms use to input data into databases
Other forms use Optical Character Recognition (OCR).
82
One way of exchanging data
EDI (Electronic Data Interchange). This doesn’t require human interaction and enables data transfer from one computer to another
83
What process is referential integrity?
Ensuring consistency
84
What does ensuring consistency ensure
information is not removed if it is required elsewhere in a linked database. If two database tables are linked, one of these tables cannot be deleted as the other table requires its contents.
85
What is record locking?
The process of preventing simultaneous access to records in a database is called record locking
86
Why is record locking used?
to prevent inconsistencies or a loss of updates. While one person is editing a record, this ‘locks’ the record so prevents others from accessing the same record
87
What is the biggest issue of record locking?
Deadlock
88
What is deadlock?
89
What is redundancy?
Redundancy is the process of having one or more copies of the data in physically different locations. This means that if there is any damage to one copy the others will remain unaffected and can be recovered.
90
What is physical topology?
the physical layout of the wires and components which form the network. Examples include bus, star and mesh.
91
What is logical topology?
the layout which shows how data flows
92
Bus topology diagram and explanation?
93
Advantages of bus topology?
● Relatively inexpensive to set up ● Doesn’t require any additional hardware
94
Disadvantages of bus topology
● If backbone cable fails, the entire network gets disconnected ● As traffic increases, performance decreases ● All computers can see the data transmission
95
Explanation of a star topology?
Star topologies use a central node, often a switch, to direct data through the network. MAC (Media Access Control) addresses, which are unique to a device, are used to identify each device on the network
96
Diagram of a star topology
97
Advantages of star topology
● Performance is consistent even with heavy network traffic ● If one cable fails, only that single terminal is affected ● Transmits data faster, giving better performance than bus topology ● Easy to add new stations. ● No data collisions
98
Disadvantages of star topology
● Expensive due to switch and cabling ● If the central switch fails, the rest of the network fails
99
Explain mesh topology
In a mesh topology, every node is connected to every other node. Mesh topologies are most commonly found with wireless technology such as Wi-Fi.
100
Diagram of mesh topology
101
Advantages of mesh topology
● If using a wireless network, there is no cabling cost ● As the number of nodes increase, the reliability and speed of network becomes better ● Nodes are automatically incorporated ● Nodes don’t go through a central switch, improving speed
102
Disadvantages of mesh topology
● If using a wireless network, devices with wireless capability (which increases cost) must be purchased ● If using a wired network, a large quantity of cable is required compared to other network topologies like bus and star. This is expensive. ● Maintaining the network is difficult
103
What is a protocol
set of rules defining how two computers communicate with each other. Protocols are standard so that all devices have a designated method of communicating with each other, regardless of manufacturer.
104
HTTP
(Hypertext Transfer Protocol) – Used for sending and receive access to web page information. version, HTTPS (Secure), is becoming more common
105
TCP/IP
(Transmission Control Protocol / Internet Protocol) – This is a networking protocol used in the routing of packets through networks
106
POP3
(Post Office Protocol) and IMAP (Internet Message Access Protocol) – Mailing protocols, used for email access
107
FTP
(File Transfer Protocol) – Used for the transmission of files over networks.
108
How are continents connected together?
large international backbone cables. Many of these pass underwater, linking continents to one another.
109
4 layers of the TCP/IP stack
Application layer Transport layer Network layer Link layer
110
Application layer
The application layer is based at the top of the stack. It specifies what protocol needs to be used in order to relate the application that’s being sent.
111
Protocols used in application layer
HTTP, POP3, FTP
112
Transport layer
The transport layer uses TCP to establish an end-to-end connection between the source and recipient computer. The transport layer splits data up into packets and labels these packets with their packet number, the total number of packets the original data was split up into and the port number being used for communication
113
What happens in the transport layer if any packets get lost?
the transport layer requests retransmissions of these lost packets
114
Network layer
○ The network layer adds the source and destination IP addresses. (The combination of the IP address and the port number is called a socket address.) ○ Routers operate on the network layer and the router is what uses the IP addresses to forward the packets.
115
What are the sockets used to do in the network layer?
The sockets are then used to specify which device the packets must be sent to and the application being used on that device.
116
Link layer
The link layer is the connection between the network devices, it adds the MAC address identifying the Network Interface Cards of the source and destination computers. ○ For devices on the same network, the destination MAC address is the address of the recipient computer, otherwise, it will be the MAC address of the router.
117
Diagram of stacks
118
What are the different sections of a packet?
Header, payload and trailer
119
Header
Sender and recipients IP address Protocols needed Order of packets Time to live
120
What is TTL (Time to live)
The time to live (TTL) tells the packet when to expire so that it does not travel forever
121
Payload
Raw data to be transmitted
122
Trailer
Checksum, or cyclic redundancy check The trailer contains a code used to detect whether any errors have occurred during transmission
123
What is packet switching?
packets are sent across the most efficient route, which can vary for each packet.
124
Advantages of packet switching
Packets can be transferred over very large networks, multiple routes can be used so if one breaks another can be used and there are multiple methods to ensure data is intact
125
Disadvantages of packet switching
Time is spent deconstructing and reconstructing the data packets Must wait for all packets to arrive before data can be received.
126
What is circuit switching
a direct link is created between two devices. This direct link is maintained for the duration of the entire conversation between devices
127
What does circuit switching require
Circuit switching requires the two devices to transfer and receive data at the same rate
128
Advantages of circuit switching
Data arrives in a logical order which results in a quicker reconstruction of the data Enables two users to hold a call without delay in speech
129
Disadvantages of circuit switching
Bandwidth is wasted when no data is being sent, devices must send and receive data at same rate and Using switches means electrical interference may be produced which can corrupt or destroy data
130
What does circuit switching tie up?
Ties up sections of the network which cannot be used by others data until transmission has been completed
131
What does a firewall consist of?
two network interface cards (NICs) between the user and the Internet
132
How do firewalls work?
firewall passes the packets between these two NICs and compares them against a set of rules set by the firewall software. The preconfigured rules are called packet filters
133
What happens when access is denied by a firewall
The packet can either be dropped or rejected. A rejected packet sends an alert to the sender to notify them of the error whereas a dropped packet will not.
134
What limits network access?
Packet filtering/ static filtering
135
How does packet/static filtering work
s in accordance with administrator rules and policies. It works by examining the source IP, destination IP and the protocols being used as well as the ports being requested
136
What does a proxy do
Collects and sends data on behalf of the user
137
Uses of proxies
The privacy of the user is protected and they remain anonymous - The proxy server can cache frequently used website data making it faster to load - Proxies can reduce overall web traffic - Can be used by administrators to prevent access to sensitive or irrelevant information at work or at school
138
What does an NIC do
Allows a device to connect to a network
139
How does a NIC work
assigns a unique media access control (MAC) address to each device. The MAC address is a 48-bit value coded into the device and is usually written as a twelve digit hexadecimal number
140
What is a switch
A switch is a device used to direct the flow of data across a network. Switches are most commonly used in networks using a star topology.
141
Wireless access point (WAP)
This is a device which allows a device to connect to a network. It is more commonly combined with a router to enable internet access. These are used in mesh networks
142
Routers
A router is used to connect two or more networks together. Routers allow private, home networks to connect to the Internet.
143
When is a gateway used
When protocols are not the same between networks
144
What does a gateway do
It translates the protocols so that networks can communicate with each other. Gateways work by removing the header from packets before adding the data to packets using the new protocol.
145
What does a client server consist of?
Terminals that are known as clients connected to a server which is a powerful, central computer
146
What does the terminal do in a client server
Holds all of the resources and important information that the clients can request
147
Advantages of a client server
More secure as data is stored in one location ● Central backups are carried out so there is no need for individual backups ● Data and resources can be shared between clients
148
Disadvantages of a client server
Relatively expensive to set up ● Functionality of terminals depends on the server; if this fails, performance falls ● Trained staff are required to maintain the server
149
Peer to peer
computers are connected to each other so that they can share files. Each device effectively acts as both a server and client, as it can both provide and request resources
150
Where are peer to peer networks used
. Peer-to-peer networks are used in piracy, since it’s almost impossible to trace the origin of files.
151
Advantages of a peer to peer network
Cheaper to set up ● Allows users to share resources ● Easy to maintain ● Not dependent on a central server ● Specialist staff are not required
152
Disadvantages of a peer to peer network
Impossible to trace the origin of files ● Backups must be performed separately ● Poorer security ● May be difficult to locate resources
153
What is HTML used to do
Write webpages
154
What does HTML allow a browser to do?
Interpret and render a webpage by describing the structure and order
155
Tags for heading styles in decreasing styles

,

,

156
Tag for the title
</div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":157,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386641},"returnTo":"/packs/22624965/subscribe"}' id='card-564386641'> <div class='header'> 157 </div> <div class='card-face question'> <div class='question-content'> Tag for the browser tab or window heading area </div> </div> <div class='card-face answer'> <div class='answer-content'> <head> </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":158,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386642},"returnTo":"/packs/22624965/subscribe"}' id='card-564386642'> <div class='header'> 158 </div> <div class='card-face question'> <div class='question-content'> Tag for a link for external files such as CSS style sheets </div> </div> <div class='card-face answer'> <div class='answer-content'> <link> </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":159,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386643},"returnTo":"/packs/22624965/subscribe"}' id='card-564386643'> <div class='header'> 159 </div> <div class='card-face question'> <div class='question-content'> Tag for the main content area </div> </div> <div class='card-face answer'> <div class='answer-content'> <body> </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":160,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386644},"returnTo":"/packs/22624965/subscribe"}' id='card-564386644'> <div class='header'> 160 </div> <div class='card-face question'> <div class='question-content'> main tag that everything is inside of </div> </div> <div class='card-face answer'> <div class='answer-content'> <html> </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":161,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386645},"returnTo":"/packs/22624965/subscribe"}' id='card-564386645'> <div class='header'> 161 </div> <div class='card-face question'> <div class='question-content'> Tag for paragraph </div> </div> <div class='card-face answer'> <div class='answer-content'> <p> </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":162,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386646},"returnTo":"/packs/22624965/subscribe"}' id='card-564386646'> <div class='header'> 162 </div> <div class='card-face question'> <div class='question-content'> Tag for images </div> </div> <div class='card-face answer'> <div class='answer-content'> <img> </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":163,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386647},"returnTo":"/packs/22624965/subscribe"}' id='card-564386647'> <div class='header'> 163 </div> <div class='card-face question'> <div class='question-content'> What is special about the tag for images </div> </div> <div class='card-face answer'> <div class='answer-content'> It is self closing </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":164,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386649},"returnTo":"/packs/22624965/subscribe"}' id='card-564386649'> <div class='header'> 164 </div> <div class='card-face question'> <div class='question-content'> Tag for hyper link </div> </div> <div class='card-face answer'> <div class='answer-content'> <a href="xxx"> </a> </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":165,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386650},"returnTo":"/packs/22624965/subscribe"}' id='card-564386650'> <div class='header'> 165 </div> <div class='card-face question'> <div class='question-content'> Tag for ordered list and how to use it </div> </div> <div class='card-face answer'> <div class='answer-content'> <ol> <li> Computer Science </li> <li> Maths </li> <li> Physics </li> </ol> </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":166,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386651},"returnTo":"/packs/22624965/subscribe"}' id='card-564386651'> <div class='header'> 166 </div> <div class='card-face question'> <div class='question-content'> Tag for unordered list and how to use it </div> </div> <div class='card-face answer'> <div class='answer-content'> <ul> <li> Computer Science </li> <li> Maths </li> <li> Physics </li> </ul> </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":167,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386652},"returnTo":"/packs/22624965/subscribe"}' id='card-564386652'> <div class='header'> 167 </div> <div class='card-face question'> <div class='question-content'> Tag for division </div> </div> <div class='card-face answer'> <div class='answer-content'> <div id= “page”> </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":168,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386653},"returnTo":"/packs/22624965/subscribe"}' id='card-564386653'> <div class='header'> 168 </div> <div class='card-face question'> <div class='question-content'> What else do you have to do for image tab </div> </div> <div class='card-face answer'> <div class='answer-content'> <img src=“Header-Physics-Maths-Tutor.png” width=“1000” height=“100”> </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":169,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386654},"returnTo":"/packs/22624965/subscribe"}' id='card-564386654'> <div class='header'> 169 </div> <div class='card-face question'> <div class='question-content'> What does CSS stand for? </div> </div> <div class='card-face answer'> <div class='answer-content'> Cascading style sheets </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":170,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386656},"returnTo":"/packs/22624965/subscribe"}' id='card-564386656'> <div class='header'> 170 </div> <div class='card-face question'> <div class='question-content'> What is CSS used for </div> </div> <div class='card-face answer'> <div class='answer-content'> a language which is used to describe the style of a webpage </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":171,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386657},"returnTo":"/packs/22624965/subscribe"}' id='card-564386657'> <div class='header'> 171 </div> <div class='card-face question'> <div class='question-content'> Two forms of CSS </div> </div> <div class='card-face answer'> <div class='answer-content'> internal/embedded CSS or external CSS </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":172,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386659},"returnTo":"/packs/22624965/subscribe"}' id='card-564386659'> <div class='header'> 172 </div> <div class='card-face question'> <div class='question-content'> What is internal/embedded CSS </div> </div> <div class='card-face answer'> <div class='answer-content'> Internal/embedded CSS is placed inside the style tags and is entered directly into the HTML document. </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":173,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386660},"returnTo":"/packs/22624965/subscribe"}' id='card-564386660'> <div class='header'> 173 </div> <div class='card-face question'> <div class='question-content'> External CSS </div> </div> <div class='card-face answer'> <div class='answer-content'> Meanwhile external CSS is written in a separate document and a link to this style sheet is added to the HTML document. </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":174,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386661},"returnTo":"/packs/22624965/subscribe"}' id='card-564386661'> <div class='header'> 174 </div> <div class='card-face question'> <div class='question-content'> What link is added whenever an external style sheet is used </div> </div> <div class='card-face answer'> <div class='answer-content'> <link href= “nameofstylesheet.css” rel= “stylesheet” type= “text/css”> </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":175,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386662},"returnTo":"/packs/22624965/subscribe"}' id='card-564386662'> <div class='header'> 175 </div> <div class='card-face question'> <div class='question-content'> What is JavaScript </div> </div> <div class='card-face answer'> <div class='answer-content'> JavaScript is a scripting language which primarily exists to add interactivity to websites </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":176,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386663},"returnTo":"/packs/22624965/subscribe"}' id='card-564386663'> <div class='header'> 176 </div> <div class='card-face question'> <div class='question-content'> Is JavaScript interpreted of compiled? </div> </div> <div class='card-face answer'> <div class='answer-content'> Interpreted </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":177,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386664},"returnTo":"/packs/22624965/subscribe"}' id='card-564386664'> <div class='header'> 177 </div> <div class='card-face question'> <div class='question-content'> What is JavaScript often used to do </div> </div> <div class='card-face answer'> <div class='answer-content'> validate input data on the client computer </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":178,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386665},"returnTo":"/packs/22624965/subscribe"}' id='card-564386665'> <div class='header'> 178 </div> <div class='card-face question'> <div class='question-content'> Advantages of JavaScript </div> </div> <div class='card-face answer'> <div class='answer-content'> Local computer can deal with invalid data before it is sent off to the servers, - Eases the load on busy servers - Reduces web traffic </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":179,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386666},"returnTo":"/packs/22624965/subscribe"}' id='card-564386666'> <div class='header'> 179 </div> <div class='card-face question'> <div class='question-content'> What is a search engine </div> </div> <div class='card-face answer'> <div class='answer-content'> A search engine is a program that searches through a database of internet addresses looking for resources based on criteria set by the client </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":180,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386668},"returnTo":"/packs/22624965/subscribe"}' id='card-564386668'> <div class='header'> 180 </div> <div class='card-face question'> <div class='question-content'> Why is the order in which web resources are displayed important </div> </div> <div class='card-face answer'> <div class='answer-content'> as it determines which websites users choose to visit and use. Therefore it is important that search engines display the most high-quality websites with relevant content at the top of the page </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":181,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386670},"returnTo":"/packs/22624965/subscribe"}' id='card-564386670'> <div class='header'> 181 </div> <div class='card-face question'> <div class='question-content'> What do search engines rely on </div> </div> <div class='card-face answer'> <div class='answer-content'> Search engines rely on an index of web pages. Web crawlers, occasionally termed spiders </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":182,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386671},"returnTo":"/packs/22624965/subscribe"}' id='card-564386671'> <div class='header'> 182 </div> <div class='card-face question'> <div class='question-content'> What are web crawlers used to do </div> </div> <div class='card-face answer'> <div class='answer-content'> to collect information about websites to build this index </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":183,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386672},"returnTo":"/packs/22624965/subscribe"}' id='card-564386672'> <div class='header'> 183 </div> <div class='card-face question'> <div class='question-content'> How do web crawlers work </div> </div> <div class='card-face answer'> <div class='answer-content'> by traversing the Internet, web page by web page using links on websites. The web crawlers collect keywords and phrases from the linked web pages and add this information to the indexW </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":184,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386674},"returnTo":"/packs/22624965/subscribe"}' id='card-564386674'> <div class='header'> 184 </div> <div class='card-face question'> <div class='question-content'> What do web crawlers also do </div> </div> <div class='card-face answer'> <div class='answer-content'> collect and add meta data from websites, which is the information specified by the website owner </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":185,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386675},"returnTo":"/packs/22624965/subscribe"}' id='card-564386675'> <div class='header'> 185 </div> <div class='card-face question'> <div class='question-content'> What does the pageRank algorithm do? </div> </div> <div class='card-face answer'> <div class='answer-content'> The page rank algorithm ranks web pages, determining the order in which web pages are displayed when a search is conducted. Higher ranked pages will show up first. </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":186,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386676},"returnTo":"/packs/22624965/subscribe"}' id='card-564386676'> <div class='header'> 186 </div> <div class='card-face question'> <div class='question-content'> What are the two factors which determine the page rank of a page </div> </div> <div class='card-face answer'> <div class='answer-content'> How many incoming links it has from other web pages The page rank of the web pages that link to it </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":187,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386678},"returnTo":"/packs/22624965/subscribe"}' id='card-564386678'> <div class='header'> 187 </div> <div class='card-face question'> <div class='question-content'> What data structure is used to display the information in a pageRanking Algorithmn </div> </div> <div class='card-face answer'> <div class='answer-content'> Directed graph </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":188,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386679},"returnTo":"/packs/22624965/subscribe"}' id='card-564386679'> <div class='header'> 188 </div> <div class='card-face question'> <div class='question-content'> Why is server side processing useful </div> </div> <div class='card-face answer'> <div class='answer-content'> Does not require plugins ● Can perform large calculations much faster than clients ● Not browser dependent, ● More secure </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":189,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386680},"returnTo":"/packs/22624965/subscribe"}' id='card-564386680'> <div class='header'> 189 </div> <div class='card-face question'> <div class='question-content'> What is client side processing </div> </div> <div class='card-face answer'> <div class='answer-content'> Client side processing is when a client processes the data on a local device. This means that all of the information is processed on the client computer </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":190,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386681},"returnTo":"/packs/22624965/subscribe"}' id='card-564386681'> <div class='header'> 190 </div> <div class='card-face question'> <div class='question-content'> What does client side processing use </div> </div> <div class='card-face answer'> <div class='answer-content'> Javascript </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":191,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386682},"returnTo":"/packs/22624965/subscribe"}' id='card-564386682'> <div class='header'> 191 </div> <div class='card-face question'> <div class='question-content'> Why us client side processing useful </div> </div> <div class='card-face answer'> <div class='answer-content'> Webpage can immediately respond to user actions ● Executes quickly ● Gives developers more control over the behaviour and look of the website </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":192,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386683},"returnTo":"/packs/22624965/subscribe"}' id='card-564386683'> <div class='header'> 192 </div> <div class='card-face question'> <div class='question-content'> What is a hub </div> </div> <div class='card-face answer'> <div class='answer-content'> A hub is a hardware device that connects multiple devices in a network. All traffic has to pass through the hub </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":193,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386684},"returnTo":"/packs/22624965/subscribe"}' id='card-564386684'> <div class='header'> 193 </div> <div class='card-face question'> <div class='question-content'> Hub v switch </div> </div> <div class='card-face answer'> <div class='answer-content'> Hub broadcasts to all devices and swithc uses mac adress and only does it to intended recipients </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":194,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386685},"returnTo":"/packs/22624965/subscribe"}' id='card-564386685'> <div class='header'> 194 </div> <div class='card-face question'> <div class='question-content'> Is it internet or network layer </div> </div> <div class='card-face answer'> <div class='answer-content'> INTERNET LAYER </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":195,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386686},"returnTo":"/packs/22624965/subscribe"}' id='card-564386686'> <div class='header'> 195 </div> <div class='card-face question'> <div class='question-content'> What is a repeater </div> </div> <div class='card-face answer'> <div class='answer-content'> a device used in computer networks to regenerate and amplify signals as they pass through the network </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":196,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386687},"returnTo":"/packs/22624965/subscribe"}' id='card-564386687'> <div class='header'> 196 </div> <div class='card-face question'> <div class='question-content'> What is an entity? </div> </div> <div class='card-face answer'> <div class='answer-content'> An object about what data is captured </div> </div> </div> <div class='flashcard-row thin-card is-blurrable' data='{"aSoundUrl":null,"cardIsBlurrable":true,"number":197,"qSoundUrl":null,"resources":{"deckId":17902431,"packId":22624965,"cardId":564386688},"returnTo":"/packs/22624965/subscribe"}' id='card-564386688'> <div class='header'> 197 </div> <div class='card-face question'> <div class='question-content'> </div> </div> <div class='card-face answer'> <div class='answer-content'> </div> </div> </div> </div> </div> </div> <div class='flashcards-sidebar'> <div class='sidebar-header'> <div class='react-component' id='flashcards-search-bar'> <div class='placeholder market-search-bar' id='flashcards-search-bar-placeholder'></div> </div> </div> <div class='sidebar-content'> <p class='deck-subject-heading'> <a class="decks-in-subject-link" href="/packs/computer-science_dest-22624965"><span class="pack-name">Computer Science_DEST</span> (33 decks) </a></p> <ul class='deck-list-items'> <a class='deck-link ' href='/flashcards/11-processors-17902420/packs/22624965'> <li class='deck-list-item'>1.1 Processors</li> </a> <a class='deck-link ' href='/flashcards/11-processors-extra-17902422/packs/22624965'> <li class='deck-list-item'>1.1 Processors extra</li> </a> <a class='deck-link ' href='/flashcards/12-software-17902426/packs/22624965'> <li class='deck-list-item'>1.2 Software</li> </a> <a class='deck-link ' href='/flashcards/12-software-extra-17902429/packs/22624965'> <li class='deck-list-item'>1.2 Software extra</li> </a> <a class='deck-link selected' href='/flashcards/13-exchanging-data-17902431/packs/22624965'> <li class='deck-list-item'>1.3 Exchanging data</li> </a> <a class='deck-link ' href='/flashcards/13-exchanging-data-extra-17902436/packs/22624965'> <li class='deck-list-item'>1.3 Exchanging data extra</li> </a> <a class='deck-link ' href='/flashcards/14-data-types-data-structures-and-algori-17902441/packs/22624965'> <li class='deck-list-item'>1.4 Data Types, Data Structures and Algorithms</li> </a> <a class='deck-link ' href='/flashcards/14-data-types-data-structures-and-algori-17902444/packs/22624965'> <li class='deck-list-item'>1.4 Data Types, Data Structures and Algorithms Extra</li> </a> <a class='deck-link ' href='/flashcards/15-legal-17902445/packs/22624965'> <li class='deck-list-item'>1.5 Legal</li> </a> <a class='deck-link ' href='/flashcards/sql-17902450/packs/22624965'> <li class='deck-list-item'>SQL</li> </a> <a class='deck-link ' href='/flashcards/software-methodoligies-17902452/packs/22624965'> <li class='deck-list-item'>Software methodoligies</li> </a> <a class='deck-link ' href='/flashcards/server-side-and-client-side-processing-17902454/packs/22624965'> <li class='deck-list-item'>Server side and client side processing</li> </a> <a class='deck-link ' href='/flashcards/psuedocode-html-css-and-javascript-and-n-17902483/packs/22624965'> <li class='deck-list-item'>Psuedocode, html, css and javascript and normalisation</li> </a> <a class='deck-link ' href='/flashcards/21-computational-thinking-17902486/packs/22624965'> <li class='deck-list-item'>2.1 Computational thinking</li> </a> <a class='deck-link ' href='/flashcards/21-computational-thinking-extra-17902488/packs/22624965'> <li class='deck-list-item'>2.1 Computational thinking Extra</li> </a> <a class='deck-link ' href='/flashcards/22-problem-solving-and-programming-17902489/packs/22624965'> <li class='deck-list-item'>2.2 Problem solving and programming</li> </a> <a class='deck-link ' href='/flashcards/22-problem-solving-and-programming-extra-17902493/packs/22624965'> <li class='deck-list-item'>2.2 Problem solving and programming extra</li> </a> <a class='deck-link ' href='/flashcards/23-algorithms-17902495/packs/22624965'> <li class='deck-list-item'>2.3 Algorithms</li> </a> <a class='deck-link ' href='/flashcards/23-algorithms-extra-17902499/packs/22624965'> <li class='deck-list-item'>2.3 Algorithms extra</li> </a> <a class='deck-link ' href='/flashcards/big-o-searching-sorting-algorithms-17902501/packs/22624965'> <li class='deck-list-item'>Big O/Searching/sorting/algorithms</li> </a> <a class='deck-link ' href='/flashcards/extra-general-17902505/packs/22624965'> <li class='deck-list-item'>Extra general</li> </a> <a class='deck-link ' href='/flashcards/extra-paper-1-17902510/packs/22624965'> <li class='deck-list-item'>Extra paper 1</li> </a> <a class='deck-link ' href='/flashcards/paper-2-extra-17902513/packs/22624965'> <li class='deck-list-item'>Paper 2 extra</li> </a> <a class='deck-link ' href='/flashcards/programming-paradigms-17902518/packs/22624965'> <li class='deck-list-item'>Programming paradigms</li> </a> <a class='deck-link ' href='/flashcards/recursion-17902519/packs/22624965'> <li class='deck-list-item'>Recursion</li> </a> <a class='deck-link ' href='/flashcards/miscellaneous-17902522/packs/22624965'> <li class='deck-list-item'>Miscellaneous</li> </a> <a class='deck-link ' href='/flashcards/extraaaa-17902524/packs/22624965'> <li class='deck-list-item'>extRAAAA</li> </a> <a class='deck-link ' href='/flashcards/xtra-1-17902527/packs/22624965'> <li class='deck-list-item'>XTRA 1</li> </a> <a class='deck-link ' href='/flashcards/xtra-2-17902531/packs/22624965'> <li class='deck-list-item'>XTRA 2</li> </a> <a class='deck-link ' href='/flashcards/extra-17902534/packs/22624965'> <li class='deck-list-item'>Extra</li> </a> <a class='deck-link ' href='/flashcards/errors-17902537/packs/22624965'> <li class='deck-list-item'>errors</li> </a> <a class='deck-link ' href='/flashcards/extra-extra-exra-17902539/packs/22624965'> <li class='deck-list-item'>extra extra exra</li> </a> <a class='deck-link ' href='/flashcards/extra-paper-2-17902542/packs/22624965'> <li class='deck-list-item'>Extra paper 2</li> </a> </ul> </div> </div> </div> <div id='tooltip-controller'></div> <div data='{"packId":22624965,"source":"spaced-repetition-modal","subject":"Computer Science_DEST","resources":{"deckId":17902431,"packId":22624965},"returnTo":"/packs/22624965/subscribe"}' id='spaced-repetition-modal-controller'></div> <div id='banner-controller'></div> <div id='dialog-modal-controller'></div> <div class='band band-footer'> <div class='footer-main'> <ul class='sections'> <li class='section key-links'> <p class='section-heading'> Key Links </p> <ul class='options-list'> <li class='option'> <a id="footer-pricing-link" class="option-link" href="/pricing?paywall=upgrade">Pricing</a> </li> <li class='option'> <a class="option-link" href="/companies">Corporate Training</a> </li> <li class='option'> <a class="option-link" href="/teachers">Teachers & Schools</a> </li> <li class='option'> <a class="option-link" target="_blank" rel="nofollow noopener noreferrer" href="https://itunes.apple.com/us/app/brainscape-smart-flashcards/id442415567?mt=8">iOS App</a> </li> <li class='option'> <a class="option-link" target="_blank" rel="nofollow noopener noreferrer" href="https://play.google.com/store/apps/details?id=com.brainscape.mobile.portal">Android App</a> </li> <li class='option'> <a class="option-link" target="_blank" rel="noopener" href="https://www.brainscape.com/faq">Help Center</a> </li> </ul> </li> <li class='section subjects'> <p class='section-heading'> Subjects </p> <ul class='options-list'> <li class='option'> <a class="option-link" href="/subjects/medical-nursing">Medical & Nursing</a> </li> <li class='option'> <a class="option-link" href="/subjects/law">Law Education</a> </li> <li class='option'> <a class="option-link" href="/subjects/foreign-languages">Foreign Languages</a> </li> <li class='option'> <a class="option-link" href="/subjects-directory/a">All Subjects A-Z</a> </li> <li class='option certified-classes'> <a class="option-link" href="/learn">All Certified Classes</a> </li> </ul> </li> <li class='section company'> <p class='section-heading'> Company </p> <ul class='options-list'> <li class='option'> <a class="option-link" href="/about">About Us</a> </li> <li class='option'> <a target="_blank" class="option-link" rel="nofollow noopener noreferrer" href="https://brainscape.zendesk.com/hc/en-us/articles/115002370011-Can-I-earn-money-from-my-flashcards-">Earn Money!</a> </li> <li class='option'> <a target="_blank" class="option-link" href="https://www.brainscape.com/academy">Academy</a> </li> <li class='option'> <a target="_blank" class="option-link" href="https://brainscapeshop.myspreadshop.com/all">Swag Shop</a> </li> <li class='option'> <a target="_blank" rel="nofollow noopener" class="option-link" href="/contact">Contact</a> </li> <li class='option'> <a target="_blank" rel="nofollow noopener" class="option-link" href="/terms">Terms</a> </li> <li class='option'> <a target="_blank" class="option-link" href="https://www.brainscape.com/academy/brainscape-podcasts/">Podcasts</a> </li> <li class='option'> <a target="_blank" class="option-link" href="/careers">Careers</a> </li> </ul> </li> <li class='section find-us'> <p class='section-heading'> Find Us </p> <ul class='social-media-list'> <li class='option twitter-badge group'> <a rel="nofollow noopener noreferrer" target="_blank" class="option-link" href="https://twitter.com/Brainscape"><img data-src="/pks/images/shared/twitterx-af917e8b474ed7c95a19.svg" alt="twitter badge" class="lazy-load" src="/pks/images/shared/placeholder-2f8e0834f3c4456dc1cc.jpg" width="24" height="24" /></a> </li> <li class='option linkedin-badge group'> <a rel="nofollow noopener noreferrer" target="_blank" class="option-link" href="https://www.linkedin.com/company/brainscape/"><img data-src="/pks/images/shared/linkedin-2f15819658f768056cef.svg" alt="linkedin badge" class="lazy-load" src="/pks/images/shared/placeholder-2f8e0834f3c4456dc1cc.jpg" width="24" height="24" /></a> </li> <li class='option facebook-badge group'> <a rel="nofollow noopener noreferrer" target="_blank" class="option-link" href="https://www.facebook.com/Brainscape"><img data-src="/pks/images/shared/facebook-1598a44227eabc411188.svg" alt="facebook badge" class="lazy-load" src="/pks/images/shared/placeholder-2f8e0834f3c4456dc1cc.jpg" width="24" height="24" /></a> </li> <li class='option youtube-badge group'> <a rel="nofollow noopener noreferrer" target="_blank" class="option-link" href="https://www.youtube.com/c/BrainscapeNY"><img data-src="/pks/images/shared/youtube-7f2994b2dc1891582524.svg" alt="youtube badge" class="lazy-load" src="/pks/images/shared/placeholder-2f8e0834f3c4456dc1cc.jpg" width="24" height="24" /></a> </li> <li class='option pinterest-badge group'> <a rel="nofollow noopener noreferrer" target="_blank" class="option-link" href="https://www.pinterest.com/brainscape/"><img data-src="/pks/images/shared/pinterest-04f51aa292161075437b.svg" alt="pinterest badge" class="lazy-load" src="/pks/images/shared/placeholder-2f8e0834f3c4456dc1cc.jpg" width="24" height="24" /></a> </li> <li class='option tiktok-badge group'> <a rel="nofollow noopener noreferrer" target="_blank" class="option-link" href="https://www.tiktok.com/@brainscapeu"><img data-src="/pks/images/shared/tiktok-644cf4608bd73fbbb24f.svg" alt="tiktok badge" class="lazy-load" src="/pks/images/shared/placeholder-2f8e0834f3c4456dc1cc.jpg" width="24" height="24" /></a> </li> <li class='option insta-badge group'> <a rel="nofollow noopener noreferrer" target="_blank" class="option-link" href="https://www.instagram.com/brainscape/"><img data-src="/pks/images/shared/insta-210cc2d059ae807961d2.svg" alt="insta badge" class="lazy-load" src="/pks/images/shared/placeholder-2f8e0834f3c4456dc1cc.jpg" width="24" height="24" /></a> </li> </ul> <div class='get-the-app'> <div class='qr-code'> <img data-src="https://www.brainscape.com/assets/cms/public-views/shared/shortio-from-homepage.png" alt="QR code" class="lazy-load" src="/pks/images/shared/placeholder-2f8e0834f3c4456dc1cc.jpg" width="130" height="130" /> </div> <div class='app-badges'> <div class='badge apple-badge'> <a rel="nofollow noopener noreferrer" target="_blank" class="option-link" href="https://apps.apple.com/us/app/brainscape-smart-flashcards/id442415567"><img data-src="/pks/images/shared/apple-badge-b6e4f380fb879821d601.svg" alt="apple badge" class="lazy-load" src="/pks/images/shared/placeholder-2f8e0834f3c4456dc1cc.jpg" width="124" height="50" /></a> </div> <div class='badge android-badge'> <a rel="nofollow noopener noreferrer" target="_blank" class="option-link" href="https://play.google.com/store/apps/details?id=com.brainscape.mobile.portal&utm_source=global_co&utm_medium=prtnr&utm_content=Mar2515&utm_campaign=PartBadge&pcampaignid=MKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1"><img data-src="/pks/images/shared/android-badge-a2251833dc7f6ca8879c.svg" alt="android badge" class="lazy-load" src="/pks/images/shared/placeholder-2f8e0834f3c4456dc1cc.jpg" width="124" height="50" /></a> </div> </div> </div> </li> </ul> </div> <div class='footer-blurb'> Brainscape helps you reach your goals faster, through stronger study habits. <br> © 2025 Bold Learning Solutions. <a class="option-link" href="/terms">Terms and Conditions</a> </div> </div> <script> if (typeof window.__REACT_DEVTOOLS_GLOBAL_HOOK__ === 'object') { __REACT_DEVTOOLS_GLOBAL_HOOK__.inject = function() {}; } </script> <script> window.addEventListener('load', () => { setTimeout(() => { const script = document.createElement('script'); script.src = "/pks/js/public-flashcards-page-9140413b5150ce9700f9.js"; script.defer = true; document.body.appendChild(script); }, 0); }); </script> <script src="https://appleid.cdn-apple.com/appleauth/static/jsapi/appleid/1/en_US/appleid.auth.js" defer="defer"></script> <script> document.addEventListener("mainSharedready", () => { GaHelper.setGaDimension("dimension1","No"); }); </script> <script type='application/ld+json'> {"@context":"https://schema.org/","@type":"Quiz","about":{"@type":"Thing","name":"1.3 Exchanging data"},"hasPart":[{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is Asymmetric encryption?","acceptedAnswer":{"@type":"Answer","text":"An encryption technique where a public key available to everyone is used to encrypt the data and the data is decrypted by the paired private key known only by the recipient"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is dictionary coding?","acceptedAnswer":{"@type":"Answer","text":"A type of lossless compression where text is searched for in entries that match the entries in a dictionary. Entries are substituted by a unique code which can then be translated"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is hashing?","acceptedAnswer":{"@type":"Answer","text":"A one-way transformation of data into an abbreviated form called a hash value. The hash value is used to validate login credentials like passwords or pins without revealing the original data to hackers"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is lossless compression?","acceptedAnswer":{"@type":"Answer","text":"A compression algorithm that retains all the data in the file by only storing the instructions needed to reconstruct the original file. No data is lost"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is lossy compression?","acceptedAnswer":{"@type":"Answer","text":"A compression algorithm that removes non-essential data from a file leading to a noticeable decrease in accuracy of data. Data is lost and non-recoverable"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is run-length encoding?","acceptedAnswer":{"@type":"Answer","text":"A type of lossless compression where repeated occurrences of the same data (like several pixels of the same colour in an image) are stored as single data values with their counts."}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is symmetric encryption?","acceptedAnswer":{"@type":"Answer","text":"An encryption technique where the same key is used to encrypt and decrypt data. A copy of the key must be transferred between both parties"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is atomicity?","acceptedAnswer":{"@type":"Answer","text":"All transactions should either succeed or fail and never only be partially processed"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is consistency?","acceptedAnswer":{"@type":"Answer","text":"Each transaction must obey the defined validations rules of the database to maintain referential integrity"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is durability?","acceptedAnswer":{"@type":"Answer","text":"Once a transaction has begun, it must be completed under all circumstances not lost under power loss. guarantees that once the transaction completes and changes are written to the database, they are persisted. This ensures that data within the system will persist even in the case of system failures like crashes or power outages."}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is entity-relationship modelling?","acceptedAnswer":{"@type":"Answer","text":"A method of abstractly describing the data tables and the relationship between them visually. They can be used to reduce redundancy and construct a relational database"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"1NF","acceptedAnswer":{"@type":"Answer","text":"A table with no repeating attributes. The intersection of each record and attribute produces exactly one value"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"Flat file database?","acceptedAnswer":{"@type":"Answer","text":"A database where a single table data structure is used to store all of the data"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"Foreign key","acceptedAnswer":{"@type":"Answer","text":"A linking attribute that joins two table in a relational database by being a primary key in one and a foreign key in another"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is indexing?","acceptedAnswer":{"@type":"Answer","text":"The process of creating an index of primary keys such that the location of any record can be retrieved given its primary key"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is isolation?","acceptedAnswer":{"@type":"Answer","text":"No transaction should overwrite other transactions that are simultaneously occurring. The same results must be obtained if transactions are concurrently or sequentially processed"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is normalisation","acceptedAnswer":{"@type":"Answer","text":"The formal process of optimally designing data tables by reducing data redundancy and repetition by converting them into normal forms"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is a primary key?","acceptedAnswer":{"@type":"Answer","text":"A unique identifier that identifies each RECORD in a table"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is record locking?","acceptedAnswer":{"@type":"Answer","text":"A technique used to prevent simultaneous access to data in a database by locking a record when it is being edited or updated. Otherwise inconsistencies may arise in the database"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is redundancy?","acceptedAnswer":{"@type":"Answer","text":"The unnecessary repetition of a field in multiple tables. Databases should have redundancy in the form of identical copies if part of the database gets lost and needs to be recovered"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is referential integrity","acceptedAnswer":{"@type":"Answer","text":"The idea of keeping a database consistent by ensuring that any changes made to data or relationships associated with a table are accounted for in all the linked tables"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is a relational database?","acceptedAnswer":{"@type":"Answer","text":"A database where separate tables are made for each entity and relationships between entities are represented by foreign keys"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is a secondary key?","acceptedAnswer":{"@type":"Answer","text":"A key that can be used as an alternative index to access or sort records in the table in a quicker but less accurate way"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"2NF","acceptedAnswer":{"@type":"Answer","text":"1NF needs to be completed and a table that has data that repeats across multiple records removed and put into a new table with appropriate relationships ( no partial dependencies)"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"3NF","acceptedAnswer":{"@type":"Answer","text":"2NF needs to be completed where all attributes that are not the primary key are fully dependant on the primary key (no non-key dependencies)"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is transaction processing?","acceptedAnswer":{"@type":"Answer","text":"The idea of making sure that any logical operation or change in state of a database (transaction) conforms to ACID"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is ACID","acceptedAnswer":{"@type":"Answer","text":"Atomicity, consistency, isolation, durability"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is circuit switching?","acceptedAnswer":{"@type":"Answer","text":"A method for sending data between two nodes on a networks by creating a dedicated communication channel first. All data follows this path for the duration of communication."}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is a client-server network?","acceptedAnswer":{"@type":"Answer","text":"A type of network organisation where networked computers (clients) connect to one or more powerful central computers (servers) that handles service requests and has resources."}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is a domain name system?","acceptedAnswer":{"@type":"Answer","text":"A hierarchical naming system that maps human-readable domain names to IP addresses that locate and identify resources on a network"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is encryption?","acceptedAnswer":{"@type":"Answer","text":"The process of converting the original data (plaintext) into a form which cannot be understood by unauthorised users (cipher text) using an encryption algorithm"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What are firewalls?","acceptedAnswer":{"@type":"Answer","text":"A security checkpoint application that monitors incoming and outgoing network traffic, designed to prevent external users from gaining unauthorised access between two networks"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"Local area networks","acceptedAnswer":{"@type":"Answer","text":"A network connecting a group of computing devices on a single geographical site"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"Packet switching","acceptedAnswer":{"@type":"Answer","text":"A method for sending data over a network by breaking data into several data packets which are sent independently and then reassembled once they all reach their destination"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"Peer to peer network","acceptedAnswer":{"@type":"Answer","text":"A type of network organisation where networked computers are connected to each other and share resources and workloads without a central server"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"Protocol layering","acceptedAnswer":{"@type":"Answer","text":"A technique the simplifies network design by dividing it into its functional layers and assigning protocols to each layer to complete tasks and communicate with adjacent layers"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What are proxies?","acceptedAnswer":{"@type":"Answer","text":"A server application that intercepts all data packets entering and leaving a network to hide the true addresses of the source. Also restrict access to data and isolate the network from external networks"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"TCP/IP stack","acceptedAnswer":{"@type":"Answer","text":"Networking protocols that allow networked computers to communicate consisting of 4 connected layers. All incoming packets are passed through these layers"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"Wide area networks","acceptedAnswer":{"@type":"Answer","text":"A network connecting a group of computing devices over a large geographical area typically with the help of third party carriers"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What does CSS stand for?","acceptedAnswer":{"@type":"Answer","text":"Cascading style sheets"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"CSS","acceptedAnswer":{"@type":"Answer","text":"A style language used to define the layout, design and presentation of a webpage written in a markup language"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is client-side processing","acceptedAnswer":{"@type":"Answer","text":"The data processing and operations performed by the clienton the clkienbts local computer"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What resources are used for client-side processing","acceptedAnswer":{"@type":"Answer","text":"The user's local computer resources"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What does HTML stand for?","acceptedAnswer":{"@type":"Answer","text":"HyperText Markup Language"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"HTML","acceptedAnswer":{"@type":"Answer","text":"A mark-up language used to write the contents of the webpages on the world wide web"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is JavaScript?","acceptedAnswer":{"@type":"Answer","text":"A interpreted, object oriented programming language used to create interactive elements within web browsers"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"Why is JavaScript used?","acceptedAnswer":{"@type":"Answer","text":"To add functionality to dynamic web pages"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"PageRank algorithm","acceptedAnswer":{"@type":"Answer","text":"A link analysis algorithm to rank web pages. Assesses number and quality of inbounded links to a page recalculates pagerank scores each time it crawls the web and rebuilds its index"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"Search engine indexing","acceptedAnswer":{"@type":"Answer","text":"A method of collecting, parsing and storing data from websites to facilitate fast and accurate information retrieval using an index of webpages"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"Server side processing","acceptedAnswer":{"@type":"Answer","text":"The data processing and operations performed by the web server. Data sent from the clients browser to the web server for secure processing, output is sent back to client"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"AAAAAABBBBBCCC in RLE","acceptedAnswer":{"@type":"Answer","text":"A6B5C3"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What also has to be stored when using dictionary compression","acceptedAnswer":{"@type":"Answer","text":"The dictionary created"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is the process of the sender and receiver sharing the same private key in symmetric encryption?","acceptedAnswer":{"@type":"Answer","text":"Key exchange"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is the key used for in symmetric encryption?","acceptedAnswer":{"@type":"Answer","text":"Encrypting and decrypting the data"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"Why does the private key have to be kept secret in symmetric encryption?","acceptedAnswer":{"@type":"Answer","text":"As if the key is intercepted then any communications sent can be intercepted and decrypted using the key"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"How many keys are used for asymmetric encryption?","acceptedAnswer":{"@type":"Answer","text":"two"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What are the two keys used in asymmetric encryption?","acceptedAnswer":{"@type":"Answer","text":"Public and private key, private key has to be kept secret"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What are the two keys together called in asymmetric encryption and what type of relation do they have","acceptedAnswer":{"@type":"Answer","text":"key pair and they are mathematically related"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What are messaged encrypted and decrypted with in asymmetric encryption?","acceptedAnswer":{"@type":"Answer","text":"The recipients public key and decrypted with the recipients private key which only the recipient should have"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What happens if someone wants to send you a message?","acceptedAnswer":{"@type":"Answer","text":"they must first find your public key. There are a variety of websites which can do this for you. The message is then encrypted with your public key meaning that only you can decrypt it"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"How can you prove a message has been sent by you?","acceptedAnswer":{"@type":"Answer","text":"you can encrypt it using your private key. This means that anyone can decrypt it (as your public key is available to anyone) and by doing so, can guarantee that you encrypted the message, as only you have access to the private key. This forms the basis of a system called digital signatures."}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is the process of hashing?","acceptedAnswer":{"@type":"Answer","text":"an input (called a key) is turned into a fixed size value (called a hash). There are a vast number of algorithms, called hash functions, which do this"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"Difference between encryption and hashing","acceptedAnswer":{"@type":"Answer","text":"Unlike encryption, the output of a hash function can’t be reversed to form the key. This quality makes hashing useful for storing passwords."}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"Why is hashing good for passwords?","acceptedAnswer":{"@type":"Answer","text":"A password entered by a user can be hashed and checked against the key to see if it is correct, but a successful hacker would only gain access to the keys, which can’t be reversed to gain the passwords."}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is another use of hashing?","acceptedAnswer":{"@type":"Answer","text":"Hash tables"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What are hash tables","acceptedAnswer":{"@type":"Answer","text":"data structure which holds key-value pairs. Formed from a bucket array and a hash function, hash tables can be used to lookup data in an array in constant time."}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What happens when data needs to be inserted into a hash table","acceptedAnswer":{"@type":"Answer","text":"When data needs to be inserted, it is used as the key for the hash function and stored in the bucket corresponding to the hash."}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"Where are hash tables used","acceptedAnswer":{"@type":"Answer","text":"in situations where a lot of data needs to be stored with constant access times. For example, in caches and databases."}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What happens if two keys produce the same hash?","acceptedAnswer":{"@type":"Answer","text":"a collision is said to have occurred"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"How do you overcome hashing collisions","acceptedAnswer":{"@type":"Answer","text":"including storing items together in a list under the hash value, or using a second hash function to generate a new hash."}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What should a good hash function have","acceptedAnswer":{"@type":"Answer","text":"low chance of collision and should be quick to calculate. A hash function should provide an output which is smaller than the input it was provided, otherwise searching for the hash could take longer than simply searching for the key"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is an entity?","acceptedAnswer":{"@type":"Answer","text":"item of interest about which information is stored"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is a relational database in link to entities?","acceptedAnswer":{"@type":"Answer","text":"database which recognises the differences between entities by creating different tables for each entity"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What are attributes?","acceptedAnswer":{"@type":"Answer","text":"Attributes are characteristics of the entity; these are categories about which data is collected."}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What do primary keys uniquely identify?","acceptedAnswer":{"@type":"Answer","text":"Each record"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What needs to be set up for secondary keys","acceptedAnswer":{"@type":"Answer","text":"Secondary index"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"Why is the primary key often not queried?","acceptedAnswer":{"@type":"Answer","text":"It is not normally remembered"}},{"@context":"https://schema.org/","@type":"Question","eduQuestionType":"Flashcard","text":"What is another way data is inputted into databases apart from manually when surveys are done","acceptedAnswer":{"@type":"Answer","text":"Magnetic Ink Character Recognition (MICR). All of the details excluding the amount are printed in a special magnetic ink which can be recognised by a computer but the amount must be entered manually"}}],"educationalAlignment":[{"@type":"AlignmentObject","alignmentType":"educationalSubject","targetName":"1.3 Exchanging data"}]} </script> </body> </html>