CompSci 1.3: Exchanging Data

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/44

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards covering key concepts from the lecture on data exchange, databases, networks, and web technologies.

Last updated 12:20 PM on 1/24/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

45 Terms

1
New cards

Asymmetric Encryption

An encryption technique where a public key is used to encrypt data, and a paired private key is used to decrypt it.

2
New cards

Dictionary Coding

A type of lossless compression where text entries are substituted by unique codes based on a dictionary.

3
New cards

Hashing

A one-way transformation of data into a hash value, used to validate credentials without revealing original data.

4
New cards

Lossless Compression

A compression algorithm that retains all data in the file, allowing for the original to be reconstructed without loss.

5
New cards

Lossy Compression

A compression algorithm that removes non-essential data, leading to unrecoverable data loss.

6
New cards

Run-Length Encoding

A type of lossless compression that stores repeated data occurrences as single values with their counts.

7
New cards

Symmetric Encryption

An encryption technique that uses the same key for both encryption and decryption.

8
New cards

Atomicity

In databases, all transactions should either completely succeed or completely fail.

9
New cards

Consistency

Each transaction must adhere to defined validation rules to maintain data integrity.

10
New cards

Durability

Once initiated, a database transaction must be completed under all circumstances.

11
New cards

Entity-Relationship Modelling

A visual method for describing data tables and relationships to reduce redundancy.

12
New cards

First Normal Form (1NF)

A database table with no repeating attributes, ensuring each record and attribute produce exactly one value.

13
New cards

Flat File Database

A database that uses a single table to store all data.

14
New cards

Foreign Key

An attribute that links two tables in a relational database, serving as a primary key in one and foreign key in another.

15
New cards

Indexing

The process of creating an index of primary keys for quick record retrieval.

16
New cards

Isolation

Ensuring no transaction overwrites others occurring simultaneously, maintaining consistent results.

17
New cards

Normalisation

The formal process of designing data tables to reduce redundancy and repetition.

18
New cards

Primary Key

A unique identifier for each record in a database table.

19
New cards

Record Locking

A technique that prevents simultaneous access to database records during editing or updating.

20
New cards

Redundancy

Unnecessary repetition of a data field in multiple tables, but needed for recovery purposes.

21
New cards

Referential Integrity

Ensuring that any changes to data are reflected in all linked tables.

22
New cards

Relational Databases

Databases with separate tables for each entity, linked by foreign keys.

23
New cards

Secondary Key

An alternative index for accessing or sorting records, less accurate than the primary key.

24
New cards

Second Normal Form (2NF)

A table in 1NF with removed repeating data across records, placed in a new table.

25
New cards

Third Normal Form (3NF)

A table in 2NF where all non-primary key attributes depend only on the primary key.

26
New cards

Transaction Processing

Ensuring logical operations in a database conform to ACID rules (Atomicity, Consistency, Isolation, Durability).

27
New cards

Circuit Switching

A data transmission method creating a dedicated channel between two network nodes.

28
New cards

Client-Server Network

A network structure where clients connect to central servers for resource management.

29
New cards

Domain Name System (DNS)

A hierarchical system that maps domain names to IP addresses.

30
New cards

Encryption

The process of converting plaintext data into ciphertext to prevent unauthorized access.

31
New cards

Firewalls

Applications that monitor and control network traffic to prevent unauthorized access.

32
New cards

Local Area Networks (LANs)

Networks connecting devices in a single geographical area.

33
New cards

Packet Switching

A method of data transmission that divides data into packets for independent delivery.

34
New cards

Peer-to-Peer Network

A network where computers connect directly and share resources without a central server.

35
New cards

Protocol Layering

A method dividing network system functions into layers with specific protocols.

36
New cards

Proxies

Servers that intercept data packets to hide source addresses and control access.

37
New cards

Transmission Control Protocol / Internet Protocol (TCP/IP) Stack

A suite of protocols allowing networked computers to communicate across connected layers.

38
New cards

Wide Area Networks (WANs)

Networks connecting devices over large geographical areas, often via third parties.

39
New cards

Cascading Style Sheets (CSS)

A style language for defining the layout and design of webpages.

40
New cards

Client-Side Processing

Data processing performed by the client’s browser using local resources.

41
New cards

HyperText Markup Language (HTML)

A markup language for writing the content of webpages.

42
New cards

JavaScript

A programming language for creating interactive web page elements.

43
New cards

PageRank Algorithm

An algorithm used by Google to rank websites based on the number of links.

44
New cards

Search Engine Indexing

Collecting and storing website data to enable fast information retrieval.

45
New cards

Server-Side Processing

Data processing performed by the web server, with requests sent from the client.