Fundamentals of Data Representation

0.0(0)
studied byStudied by 6 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/49

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

50 Terms

1
New cards

Abstraction

The process of simplifying complex data into a more general or easier-to-understand format.

2
New cards

Digital Information

Data that represents other forms of data, such as text, images, or sounds, in a format that computers can process.

3
New cards

Number System

A system for expressing numbers using a consistent set of symbols or digits.

4
New cards

Number Base

The number of unique digits or symbols used in a number system.

5
New cards

Decimal Number System

A base-10 number system that uses digits 0 through 9.

6
New cards

Binary Number System

A base-2 number system that uses only the digits 0 and 1.

7
New cards

Bit

The smallest unit of data in computing, represented as either 0 or 1.

8
New cards

ASCII

A character encoding standard that uses binary codes to represent text and control characters.

9
New cards

Pixel

The smallest unit of an image displayed on a screen, each representing a single color.

10
New cards

Pixel Image

An image composed of many tiny pixels, each with a specific color value.

11
New cards

Hexadecimal

A base-16 number system using digits 0-9 and letters A-F.

12
New cards

RGB Color Encoding

A method for encoding colors using values for red, green, and blue, each ranging from 0 to 255.

13
New cards

Data Compression

The process of reducing the size of data to save storage space or improve transmission efficiency.

14
New cards

Lossless Compression

A type of data compression where no information is lost, allowing the original data to be fully restored.

15
New cards

Lossy Compression

A type of data compression that reduces file size by removing some data, which may result in a loss of quality.

16
New cards

Cryptography

The practice of encoding information to protect it from unauthorized access.

17
New cards

Caesar Cipher

A simple encryption method that shifts letters in the alphabet by a fixed number of places.

18
New cards

Symmetric Encryption

An encryption method using a single key for both encryption and decryption.

19
New cards

Asymmetric Encryption

An encryption method that uses two keys: a public key for encryption and a private key for decryption.

20
New cards

Public Key Encryption

A component of asymmetric encryption where the public key is used to encrypt data and can be shared openly.

21
New cards

Key (cyber)

A piece of information used to encrypt or decrypt data.

22
New cards

Decryption

The process of converting encrypted data back into its original format.

23
New cards

Byte

A unit of digital information consisting of 8 bits. A byte can represent 256 different values (0-255).

24
New cards

Bits in a Byte

There are 8 bits in a byte.

25
New cards

Hexadecimal Digit

A single character in the hexadecimal number system, ranging from 0 to F, where A-F represent values 10-15.

26
New cards

Convert Binary to Decimal

To convert binary to decimal, multiply each bit by 2 raised to its position power (starting from 0 on the right), then sum the results.

27
New cards

Decimal Conversion Example

To convert binary 1111 to decimal: 1Ă—23+1Ă—22+1Ă—21+1Ă—20=151 \times 2^3 + 1 \times 2^2 + 1 \times 2^1 + 1 \times 2^0 = 151Ă—23+1Ă—22+1Ă—21+1Ă—20=15.

28
New cards

Pixel Color Representation

Colors in a pixel are represented using combinations of RGB values, where each color channel (Red, Green, Blue) ranges from 0 to 255.

29
New cards

Data Compression Techniques

Compression techniques reduce file size by either removing redundant data (lossy) or compressing data without loss (lossless).

30
New cards

Example of Lossy Compression**

JPEG image format, which reduces file size by discarding some image data, resulting in a potential loss of quality.

31
New cards

Example of Lossless Compression**

PNG image format, which compresses files without losing any image data, allowing for exact restoration.

32
New cards

Encryption Key**

A piece of information used in cryptography to encode or decode data, ensuring that only authorized parties can access the information.

33
New cards

Easy vs. Hard Encryption**

Easy encryption can be quickly broken with minimal effort, while hard encryption requires significant computational resources to decrypt.

34
New cards

Example of Easy Encryption**

A Caesar Cipher with a shift of 1, which can be easily decrypted by trying all possible shifts.

35
New cards

Example of Hard Encryption**

AES (Advanced Encryption Standard) with a 256-bit key, which is highly secure and difficult to break due to its complexity.

36
New cards

Fast Food Systems (Encoding Protocol Example)

Fast food systems use numerical or coded entries to identify menu items and process orders efficiently, similar to how computers use encoding protocols.

37
New cards

Image Resolution

The amount of detail an image holds, determined by the number of pixels in the image. Higher resolution means more pixels and greater detail.

38
New cards

Bit Depth

The number of bits used to represent the color of a single pixel. Higher bit depth allows for more colors and shades, improving image quality.

39
New cards

Hexadecimal Conversion Example

To convert hexadecimal 1F to decimal: 1Ă—161+15Ă—160=311 \times 16^1 + 15 \times 16^0 = 311Ă—161+15Ă—160=31.

40
New cards

Data Integrity

Ensuring that data remains accurate and unaltered during storage, transmission, or processing.

41
New cards

Encryption Algorithm

A set of rules or procedures used for encrypting and decrypting data. Examples include AES, RSA, and DES.

42
New cards

RSA (Rivest-Shamir-Adleman)

A widely used asymmetric encryption algorithm that uses two keys: a public key for encryption and a private key for decryption.

43
New cards

DES (Data Encryption Standard)

An older symmetric encryption algorithm that uses a 56-bit key. It has been largely replaced by more secure algorithms like AES.

44
New cards

Public Key Infrastructure (PKI)

A framework for managing digital certificates and public-key encryption, ensuring secure communications over networks.

45
New cards

Hash Function

A function that converts input data into a fixed-size string of bytes, typically a hash code. Hash functions are used for data integrity and password storage.

46
New cards

Pixel Density

The number of pixels per inch (PPI) in a display or image. Higher pixel density means clearer and more detailed images.

47
New cards

Metadata

Data that provides information about other data, such as file size, format, and creation date, but is not the actual content itself.

48
New cards

Image Filtering

The process of applying algorithms to modify an image, such as blurring, sharpening, or color adjustments.

49
New cards

Compression Ratio

The ratio of the size of the compressed data to the size of the original data. A higher ratio indicates greater compression.

50
New cards

Data Redundancy

The duplication of data within a dataset or storage system to ensure reliability and data integrity.