Non-essential data is permanently removed, for example, different shades of the same colour in an image or frequencies of sound outside the range of human hearing
2
New cards
Lossless compression
Patterns in the data are spotted and summarised in a shorter format without permanently removing any information.
3
New cards
Run length encoding
A basic method of compression that sumarises consecutive patterns of the same data.
4
New cards
Dictionary compression
Spots regular occurring data and stores it separately to be referenced
5
New cards
Encryption
A way of making sure data cannot be understood if you are not meant to see it.
6
New cards
Caesar cipher
A basic for of encryption that shifts letters of the alphabet by a set amount.
7
New cards
Brute force attack
Try every possible combination till you find the correct one.
8
New cards
Vernam cipher
Uses a one-time pad to encrypt, then destroy it. The one form of cipher proven to be unbreakable
9
New cards
Symmetric encryption
The same key is used to encrypt and decrypt the data/message
10
New cards
Asymmetric encryption
This uses two different keys, one to encrypt and one to decrypt.
11
New cards
Hashing
One way encryption that using a formula, commonly used to store passwords and pins.
12
New cards
ACID
Atomicity, Consistency, Isolation, Durability, This is a set of properties to ensure that the integrity of the database
13
New cards
Atomicity
This property requires that a transaction is processed in its entirety or not at all
14
New cards
Consistency
This property ensures that no transaction can violate any of the defined validation rules.
15
New cards
Isolation
This property ensures that concurrent execution of transactions leads to the same result as if transactions were processed one after the other
16
New cards
Durability
This ensures that once a transaction has been committed, it will remain so, even in the even of a power cut.
17
New cards
Multi -user databases
Allows multiple users to simultaneously access a database
18
New cards
Record Locking
This prevents simultaneous access to objects in a database in order to prevent updates being lost or inconsistencies in the data arising
19
New cards
Deadlock
If two users are attempting to update each others records so record locking prevents them from proceeding
20
New cards
Serialisation
This ensures that transactions do not overlap in time, so cannot interfere with each other or lead to loss of updates. e.g. Timestamp ordering; Commitment ordering
21
New cards
Timestamp ordering
Each object in the database will have a read and write marker. If user tries to save an update with the read markers differing they will be denied.
22
New cards
Redundancy
The duplication of hardware, and servers in different geographical locations to protect against a possible failure
23
New cards
Normalisation
A process used to come up with the best possible database design.
\
24
New cards
First normal form
* No repeating attributes
* All attributes are atomic
25
New cards
Second normal form
* Is in first normal form * contains no partial dependencies
26
New cards
Third normal form
All attributes are dependent on the key, the whole key and nothing but the key
* Is in second normal form * contains no non-key dependencies
27
New cards
Link tables
A table that links a primary key in one table to many primary keys in another table.
\ A table that makes a many to many relationship possible.
28
New cards
Entities
A table in a database. Each one needs an identifier that will uniquely identify a specific record that they hold.
29
New cards
Natural Primary keys
Unique identifiers that occur naturally in the data. e.g. phone numbers, national security number and email
30
New cards
Composite primary key
When two or more attributes are used to uniquely identify a record.
31
New cards
Secondary key
A field that isn’t the primary key that is often search and therefore will be indexed for faster look up.
32
New cards
Entity relationship diagrams
A way of representing how tables are connected in a database