5. Fundamentals of Data Representation Flashcards

1
Q

Define the following types of number, giving examples: Natural, Integer, Rational, Irrational, Real

A

Natural - the set of positive whole numbers starting at zero, {0, 1, 2, 3, 4…}
Integer - the set of positive and negative whole numbers, {… -3, -2, -1, 0, 1, 2, 3…}
Rational - the set of numbers which can be expressed as a fraction, {1/2, 1/3, 2/3…}
Irrational - the set of numbers which cannot be expressed as a fraction, e.g. π = 3.14159265359…
Real - the set of all non-Complex numbers including the Naturals/Integers/Rationals/Irrationals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an Ordinal Number?

A

An Ordinal Number identifies a position. Ordinal Numbers are used as indexes into Arrays and Lists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Binary?

A

Binary is the representation of data using 0’s and 1’s. If a number is being represented this is called Base-2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Hexadecimal?

A

Hexadecimal is the representation of numbers using Base-16. Hexadecimal is commonly used as a compact representation of large numbers. For example Hexadecimal is used to represent colours, and memory addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define the following data units: bit, byte, Kilobyte (Kb), Kibibyte (Kib), Megabyte (Mb), Mebibyte (Mib), Gigabyte (Gb), Gibibyte (Gib), Terabyte (Tb), Tebibyte (Tib).

A

bit - a single 0 or 1
byte - 8 bits
Kilobyte (Kb) - 1000 (10^3) bytes
Kibibyte (Kib) - 1024 (2^10) bytes
Megabyte (Mb) - 1,000,000 (10^6) bytes
Mebibyte (Mib) - 1,048,576 (2^20) bytes
Gigabyte (Gb) - 1,000,000,000 (10^9) bytes
Gibibyte (Gib) - 1,073,741,824 (2^30) bytes
Terabyte (Tb) - 1,000,000,000,000 (10^12) bytes
Tebibyte (Tib) - 1,099,511,627,776 (2^40) bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the difference between a Signed and Unsigned number?

A

A Signed number can store both positive and negative values, an Unsigned number can only store positive values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is ASCII?

A

ASCII is the American Standard Code for Information Interchange. It is an encoding of American English characters using a 7-bit Binary encoding. The last bit is used as a Parity Bit. Extended-ASCII uses all 8-bits for encoding a character, doubling the number of available characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Unicode?

A

Unicode is a character encoding which builds on ASCII by supporting non-American text by using more bits per character. There are 8-bit (UTF-8), 16-bit (UTF-16) and 32-bit (UTF-32) versions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Error Detection/Checking?

A

Error Detection/Checking is a family of techniques which are used to identify whether transmitted data has become corrupted in transmission. Examples include Parity Bits and Checksums.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Error Correction?

A

Error Correction is a family of techniques which are used to correct detected errors in transmission. An example is Majority Voting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How are Parity Bits used?

A

Parity Bits are a form of Error Detection.

Before transmission of data the sender and receiver will agree on whether to use Odd Parity or Even Parity. The Parity Bit is set so that the number of 1’s in the transmitted data are odd (Odd Parity) or even (Even Parity). When the data is received the number of 1’s is counted and if they don’t match the agreed Parity then an error must have occurred in transmission.

Parity Bits can only be used to detect an odd number of bits flipping, if an even number of bits flip then the Parity will be unaffected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does Majority Voting work?

A

Majority Voting is a form of Error Detection and Correction.

The sender will send an odd number of repetitions of the same message to the receiver. For each bit in the message there will be several received bits, if they are not all the same then an error must have occurred in transmission and the majority in the received bits will be used (1 if more received 1’s, 0 if more 0’s).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How are Checksums used?

A

Checksums are used for Error Detection.

A Checksum is a value (number) calculated using a mathematical function (a Hash Function) from the data to be transmitted. The Checksum is sent to the receiver along with the data. The receiver then applies the same mathematical function to the received data, and if the calculated Checksum matches the received Checksum then no error has occurred in transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Check Digit?

A

A Check Digit is a similar technology to a Checksum. It is a number calculated from the numbers in a Barcode used to determine whether or not the Barcode has been read correctly by the Scanner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define the following terms related to Bitmap Images: Pixel, Resolution, Colour Depth.

A

Pixel (Picture Element) - the colour at a grid location in an image.
Resolution - the number of Pixels in an image (width x height).
Colour Depth - the number of bits used to represent the colour of a Pixel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How do you calculate the size in data of a Bitmap Image?

A

Resolution x Colour Depth = Width x Height x Bits Per Pixel

17
Q

What is Metadata?

A

Metadata is data associated with a file which contains information about that file. Examples of Metadata might be: author, creation date, software used, GPS location.

18
Q

How is a Vector Image different from a Bitmap Image?

A

A Vector Image consists of data which describes the constituent elements (shapes) in the image. This is a parameterised representation of an image where different shapes will have different parameters to represent their location, size, geometry, and colour. For example a circle could be represented by the location of its center, its radius, and the colour. A Vector Image must be rasterised into a Bitmap Image to be displayed on the screen. Vector Images scale much better than Bitmap Images, but are poor at representing photographic images.

19
Q

Define the following terms related to Sampled Sound: Sample Rate, Sample Resolution.

A

Sample Rate - the number of samples per second of audio.
Sample Resolution - the number of bits per sample of audio.

20
Q

How do you calculate the size in data of a Sampled Sound?

A

Sample Rate x Sample Resolution x Length of Sound

21
Q

What does Nyquist’s Theorem say about recording Sampled Sound?

A

Nyquist’s Theorem states that the Sample Rate must be chosen to be at least double the highest frequency that exists in the audio to be recorded.

22
Q

What is MIDI?

A

MIDI is the Musical Instrument Digital Interface. MIDI is a parameterised representation of music which can be used to transmit and synthesise music. Parameters may represent properties such as the instrument, pitch, duration, tempo, volume etc.

23
Q

What is Compression? How do Lossy and Lossless Compression differ?

A

Compression is a family of techniques which reduce the size of data. Compression is important for saving system resources (Hard Disk space), and increasing the speed of data transmission over Networks.

Lossy Compression will lose some quality in the original data when compressing, but usually creates a higher Compression ratio (i.e. smaller files). The lost data may be exhibited as artifacts in image files. Lossless Compression loses none of the quality of the original data, but has a lower Compression ratio.

24
Q

How does Run Length Encoding Compress data?

A

Run Length Encoding (RLE) is used to compress data which has consecutive repetitions of the same symbol. It represents the data as a series of symbols and the number of times they repeat. For example the data:

AAAAAAAABBBBBBBCCCAAAAAABBCCCC

would be encoded as:

A8B7C3A6B2C4

Data, such as text, which does not have many consecutive repetitions will not compress well with RLE.

25
Q

How does Dictionary Compression Compress data?

A

Dictionary Compression is used to compress data which has repeating words (like text). The words are stored in a Dictionary, with each word allocated a unique numeric index. The text is then replaced by a sequence of indexes into the Dictionary. This will compress the text if words repeat often.

26
Q

What is Encryption? What is the difference between Symmetric and Asymmetric Encryption?

A

Encryption is a family of techniques used to hide the content of a message from third parties. Symmetric Encryption uses the same Encryption Key both for encrypting and decrypting the message. Asymmetric Encryption uses a different Encryption Key for encrypting than for decrypting the message. Symmetric Encryption requires the sender to pass the key to the receiver, when it may be intercepted, this is called the Key Exchange Problem.

27
Q

How does the Caeser Cipher work?

A

A Caeser Cipher is a shift cipher which changes each character by moving a certain number of characters to the left or right. The number of places to move each character is the Encryption Key, and this is a type of Symmetric Encryption. For example, the text ‘Hello World’ shifted by 3 characters would give the ciphertext ‘Khoor Zruog’.