Unit 5 Flashcards

(38 cards)

1
Q

Bit

A

1 or 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Byte

A

group of 8 bits, 2n different values can be represented with n bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

binary units

A

kibibyte 2^10
mebibyte 2^20
gibibyte 2^30
tebibyte 2^40 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ASCII Code

A

7 bits originally then expanded to 8 bit with Extended ASCII giving an extra 128 values but still only American / Western European alphabets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Unicode

A

originally 16-bit (UTF-16) to allow a greater range of characters to be included then expanded further to 32 bit (UTF-32) to include almost all international alphabets and emojis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ASCII und Unicode

A

same value for any character that exists in both

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Parity Bit

A

checks if there are an odd or even number of 1s, uses Most Significant Bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Majority Voting

A

sends each bit multiple times, majority value is accepted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Checksum

A

hashing algorithm carried out on the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Check Digit

A

hashing algorithm produces a check digit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

overflow

A

is where a number (usually the result of a calculation) is too large to fit into the number of bits available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

underflow

A

number too small

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

normalised floating point

A

consists of mantissa and exponent and always starts with 1.0 or 0.1, can be signed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

signed binary

A

most significant bit is negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Resolution

A

width * height in pixels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Colour Depth

A

number of binary bits per pixel

17
Q

File size

A

resolution * colour depth

18
Q

Vector Images

A

the data defining the image is stored in a Drawing List containing the relevant properties

19
Q

Nyquist’s Theorem

A

the sampling frequency must be at least double that of the highest frequency in the original signal

20
Q

Sound File Size

A

sample frequency * bit depth * length of sample (multiply by num of chanels)

21
Q

Bit Depth

A

it’s the number of bits used to record the amplitude at each sample point, also known as sample resolution

22
Q

MIDI

A

a protocol providing a standard for electrical musical instruments, recording devices, computers to connect and communicate with each other, it carries event messages

23
Q

event messages

A

-pitch and duration of note
-volume changes
- synchronisation of tempo between classes

24
Q

MIDI file

A

a list of instructions that tell the controller how to synthesise a sound based on digital sound samples and pre-recordings

25
Data Compression
-Reduces file sizes in a variety of ways depending on type of data -Needed not so much to reduce storage space as memory is cheap but to reduce data transmission time
26
Compression Ratio
compressed file / original file size
27
Lossy
the file is compressed to a smaller size but some data is lost during the process
28
Lossless
reduces a files’ size without losing any data
29
Run Length Encoding (RLE)
repeating data is replaced by a marker, the data and the number of times it is repeated
30
Dictionary-based compression
a dictionary of commonly occurring data is created and referenced, the reference replaces the data and because the reference is shorter than the data itself, file size is reduced
31
Encryption
the transformation of data from one form to another to prevent an unauthorised 3rd party from being able to understand it
32
Plaintext
original text/message
33
Ciphertext
encrypted version of the message
34
Cipher
method or algorithm used to encrypt a message
35
Key
the secret information needed to lock or unlock the message
36
brute force attack
trying everything until it works
37
cryptanalysis
called frequency analysis could be used by looking at the most commonly occurring letter and assuming it is an ‘e’ or other common letter and working from there
38
one-time pad
ciphers with a key that only works once and changes every time you want to access the information