1.3 Exchanging Data Flashcards

(50 cards)

1
Q

What is the purpose of compression?

A

The purpose of compression is to increase the amount of files within the same amount of storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is lossy and lossless compression

A

Lossy compression is reducing the size of a file whilst completely removing some of its information
Lossless compression is reducing the size of a file less then lossy but doesn’t lose any of its information if returned to its normal size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the types of lossless compression?

A

Run Length Encoding
Dictionary Encoding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Run Length Encoding?

A

Repeated values are replaced to make one part of data followed by the amount of times it repeated.
For example AAAAAAAA is A8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is dictionary encoding?

A

Frequently appearing pieces of data are replace with a number and the data is then stored in a dictionary which matches the number that represents it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is encryption?

A

Encryption is used to make data secure especially when transmitting data to a destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the two types of encryption?

A

Symmetric
Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Symmetric encryption?

A

Both the sender and user share the same private key. With this they can encrypt and decrypt data. To access data they can exchange a private key in a key exchange meaning the user can then decrypt the data. This does cause potential issues such as if the private key were to be intercepted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the two types of encryption?

A

Symmetric
Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the two types of encryption?

A

Symmetric
Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is asymmetric encryption?

A

In this process two keys are used. A private key and public key. The public key can be used anywhere whilst the private key must be kept secret. They two keys are a pair and are mathematically related

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the relational database?

A

A database which recognises the difference between entities and therefore has different tables for each entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is hashing?

A

Hashing is a process where data is turned into a fixed size called a hash. In terms of encryption this is a one way encryption. Meaning it can not be hacked so easily ans can’t be reversed to form a key. Another way hashing is used is a hash table. A hash table takes the hashed numbers and forms it into an array. With this array data can be looked up using the hash function. An issue with hash tables is the chance of collisions where two different data’s are both hashed to the same figure. Ways to overcome are storing interns in a list or using a second hash function to generate a new hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are entities?

A

Entities are an item of interest where info is stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a flat file database?

A

A flat file database is a database which consists of a single file. Around a single entity and its attributes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a primary key?

A

A primary key is a unique identifier for a record in a table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a foreign key?

A

A foreign key is an attribute linking two tables together. In one table as a primary key in another as a foreign key in the other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a secondary key?

A

Secondary key allows for databases to be searched quickly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the different types of entity relationship models?

A

One to one
Many to one
Many to many

21
Q

What is normalisation?

A

Normalisation is the process of coming up with the best layout for a relational database.

22
Q

What does normalisation aim to accomplish?

A

1NF is there must be no attributes with more that one value
2NF is that 1NF must be accomplished and there are no partial dependencies. No attributes can depend on a part of a composite key
3NF is the 2NF must be accomplished and there is no non key dependencies. Attributes only depend on a composite key.

23
Q

What are the stages of normalisation?

A

1NF is there must be no attributes with more that one value
2NF is that 1NF must be accomplished and there are no partial dependencies. No attributes can depend on a part of a composite key
3NF is the 2NF must be accomplished and there is no non k

24
What is indexing ?
It is a method of storing data by a certain attribute to make searching in the table easier
25
What is indexing ?
It is a method of storing data by a certain attribute to make searching in the table easier
26
What are the different ways of capturing data?
Magnetic Ink Character Recognition (MICR) Optical Mark Recognition (OMR) Optical Character Recognition (OCR)
27
What are ways of exchanging data?
The safest way is Electronic Data Interchange (EDI) as it doesn’t require human interaction.
28
What is SQL?
SQL is a declarative language that is used to manipulate databases.
29
What is referential integrity?
Is ensuring there is consistency in a database. This includes data that is required in two tables. One table can not be deleted if another table requires its contents.
30
What is transactional processing?
It is a single operation executed on data !
31
There are rules for transaction processing what are these?
ACID
32
what does ACID stand for and mean
Atomicity - A transaction must be processed entirely Consistency - Referential integrity must be kept Isolation - Same results must be shown on both sides Durability - Regardless of a power cut transaction will stay in tact
33
34
What is record locking?
It is one of the ways of preventing inconsistencies. It prevents simultaneous access to records. If one user is using the record it locks it off to everyone else.
35
What is redundancy ?
Redundancy is having physical data at different locations.
36
What is a network ?
A network is electronic devices connected together with the ability to transmit data.
37
What are the two types of networks?
LAN - local area network WAN - wide area network
38
What is the difference between WAN and LAN?
LAN is for a small geographical area where you own all hardware WAN is for a large geographical area where you own some of the hardware
39
What are protocols?
It is a set of rules defining how computers communicate with one another.
40
What are commonly used protocols?
HTTP/HTTPS - hyper text transfer protocol - used for web page rendering TCP/IP - networking protocol used in the routing of packets through networks POP/IMAP - emailing and mailing protocols FTP - used for the transmission of files over a network
41
What is the internet ?
It is a network of networks which allows people access globally to communicate with one another. This is done using cables across the water linking continents to one another.
42
What is the TCP stack and protocol layering for networks?
Application layer - states the protocol layer that needs to be used Transport layer - establishes a connection between the source and user Network layer - adds the IP
43
What is the Domain Name System (DNS)
It is the system used to name and organise resources across the internet. There are two domains in particular TLD (top level domain) and 2LD (2nd Level Domain)
44
What are data packets?
These are segments of data They are split up into 3 things: Header - stores the sender and recipient IP address, protocol it requires, size and time to live Payload - stores the raw data Trailer. - checks for errors and redundancy check
45
What are the two techniques when networks exchange data?
Circuit switching Packet switching
46
What is packet switching?
It is a method of communication. Packets are sent across the most efficient route, varying for each packet.
47
What is circuit switching?
It is creating a direct link between networks maintaining connection during the entire conversation between devices and transfer.
48
What are disadvantages and advantages of packet switching?
+ Multiple ways for data to reach + there is a trailer meaning error checks etc + packets can be transferred over long distances - time is spent deconstructing and constructing data - have to wait for all the packets to arrive for data to be composed
49
What are advantages of circuit switching?
-Data arrives in logical order making it easy to construct -Has no delay between calls etc -Bandwidth can be wasted -Devices must have the same rate