Unit - 4, Exchanging data

studied byStudied by 1 person
0.0(0)
Get a hint
Hint

Lossy Compression

1 / 32

flashcard set

Earn XP

Description and Tags

33 Terms

1

Lossy Compression

Non-essential data is permanently removed, for example, different shades of the same colour in an image or frequencies of sound outside the range of human hearing

New cards
2

Lossless compression

Patterns in the data are spotted and summarised in a shorter format without permanently removing any information.

New cards
3

Run length encoding

A basic method of compression that sumarises consecutive patterns of the same data.

New cards
4

Dictionary compression

Spots regular occurring data and stores it separately to be referenced

New cards
5

Encryption

A way of making sure data cannot be understood if you are not meant to see it.

New cards
6

Caesar cipher

A basic for of encryption that shifts letters of the alphabet by a set amount.

New cards
7

Brute force attack

Try every possible combination till you find the correct one.

New cards
8

Vernam cipher

Uses a one-time pad to encrypt, then destroy it. The one form of cipher proven to be unbreakable

New cards
9

Symmetric encryption

The same key is used to encrypt and decrypt the data/message

New cards
10

Asymmetric encryption

This uses two different keys, one to encrypt and one to decrypt.

New cards
11

Hashing

One way encryption that using a formula, commonly used to store passwords and pins.

New cards
12

ACID

Atomicity, Consistency, Isolation, Durability, This is a set of properties to ensure that the integrity of the database

New cards
13

Atomicity

This property requires that a transaction is processed in its entirety or not at all

New cards
14

Consistency

This property ensures that no transaction can violate any of the defined validation rules.

New cards
15

Isolation

This property ensures that concurrent execution of transactions leads to the same result as if transactions were processed one after the other

New cards
16

Durability

This ensures that once a transaction has been committed, it will remain so, even in the even of a power cut.

New cards
17

Multi -user databases

Allows multiple users to simultaneously access a database

New cards
18

Record Locking

This prevents simultaneous access to objects in a database in order to prevent updates being lost or inconsistencies in the data arising

New cards
19

Deadlock

If two users are attempting to update each others records so record locking prevents them from proceeding

New cards
20

Serialisation

This ensures that transactions do not overlap in time, so cannot interfere with each other or lead to loss of updates. e.g. Timestamp ordering; Commitment ordering

New cards
21

Timestamp ordering

Each object in the database will have a read and write marker. If user tries to save an update with the read markers differing they will be denied.

New cards
22

Redundancy

The duplication of hardware, and servers in different geographical locations to protect against a possible failure

New cards
23

Normalisation

A process used to come up with the best possible database design.

New cards
24

First normal form

  • No repeating attributes

  • All attributes are atomic

New cards
25

Second normal form

  • Is in first normal form

  • contains no partial dependencies

New cards
26

Third normal form

All attributes are dependent on the key, the whole key and nothing but the key

  • Is in second normal form

  • contains no non-key dependencies

New cards
27

Link tables

A table that links a primary key in one table to many primary keys in another table.

A table that makes a many to many relationship possible.

New cards
28

Entities

A table in a database. Each one needs an identifier that will uniquely identify a specific record that they hold.

New cards
29

Natural Primary keys

Unique identifiers that occur naturally in the data. e.g. phone numbers, national security number and email

New cards
30

Composite primary key

When two or more attributes are used to uniquely identify a record.

New cards
31

Secondary key

A field that isn’t the primary key that is often search and therefore will be indexed for faster look up.

New cards
32

Entity relationship diagrams

A way of representing how tables are connected in a database

New cards
33
New cards

Explore top notes

note Note
studied byStudied by 17 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 13 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 17 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 13 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 18 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 154 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 24 people
Updated ... ago
4.0 Stars(2)
note Note
studied byStudied by 485 people
Updated ... ago
5.0 Stars(1)

Explore top flashcards

flashcards Flashcard27 terms
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
flashcards Flashcard42 terms
studied byStudied by 74 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard40 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard105 terms
studied byStudied by 2 people
Updated ... ago
4.0 Stars(283)
flashcards Flashcard35 terms
studied byStudied by 229 people
Updated ... ago
5.0 Stars(3)
flashcards Flashcard26 terms
studied byStudied by 12 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard66 terms
studied byStudied by 42 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard45 terms
studied byStudied by 28 people
Updated ... ago
5.0 Stars(1)