exchanging data

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/85

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

86 Terms

1
New cards

what is compression

reducing file size to reduce sotrage space so that more files can be stored within the same amount of storage

2
New cards

why compress files

it takes less time to transfer them over the internet so more files can be transferred in a given time; less bandwidth is used as transfer limits may apply; buffering on audio is less likely ot occur

3
New cards

what is lossy compression

non essential data is removed permanently. This reduces file size signifcantly

4
New cards

what is lossless compression

Does not lose any information and original file can be recovered

5
New cards

why shouldnt lossy be used on text fi;es

lossy takes some info from the original. This will maek text files unreadable

6
New cards

What is RLE

Repeated values are removed and replaced with one occurrence of the data followed by the number of times it should be repeated

7
New cards

When does RLE not make a significant difference

when theres little repitition as it relies on adjacent pieces of data being the same

8
New cards

What is dictionary encoding

frequently occuring groups of data are replaced with an index and the compressed data is stored alongside a dctionary which matches the frequently occuring data to an index. When decompressed, the dictionary is used to replace the indexes with the original text

9
New cards

What is a limitation of dictionary encoding

requires the copressed data to be transferred alongside the dicitionary

10
New cards

what is encryption

The transformation of data from one form to another to prevent an unauthorised third party from being able to undersand it

11
New cards

What is plaintext

the original fata

12
New cards

what is cipher text

the encrypted data

13
New cards

What is the cipher

the encryption method

14
New cards

What is te ceasar cipher

a type of substitution cipher that works by shifting the letters of the alphabet along by a given number of characters

15
New cards

What is the vernam cipher

Unbreakable cipher that uses a one-time pad thay is complete;ly random and the same length as the plaintext. These pads are used in pads where the sender and the recipient are both party to the key. Both must meet in person and securely share the key and destroy it after encryption/decryption.

16
New cards

What is symmetric encryption

Uses the same key to encrypt and decrypt data so both parties require a copy of the key. The key must be exchanged, causing security issues as the key can be intercepted

17
New cards

asymmetric encyryption

uses two separate keys for encryption and decryption. Data is encrypted used one key, which is publically distributed. It is decrypted using a different key that is kept private.

18
New cards

problem and solution ot this for asymmetric encryption

a message could be encrypted using your pulic key and set by a malicious third party impersonating a trusted individual. To prevent this, a message can be digitally signed to authenticate the sender

19
New cards

what is hashing

the process in which an input is turned into a fixed size value using a hashing function. This is one way so you cannot get back to the original.

20
New cards

how is hashing used for passwords

Used for encrypted passwords. To verify a user’s password, the sofware applies the hash function to the user input and compares the hash total/checksum to the one stored.

21
New cards

adv of storing a password as a hash

it is one-way so hackers that have access to the database cannot decrypt the hash to find the password

22
New cards

properties of a good hashing algorithm (de duplicator app)

low chance of collisions so different inputs do not give the same output ; quick to calculate as lots of files need to be hashed

23
New cards

how is hashing used for hash tables

Hash tables can be used to look up data in an array in the same amount of time, regardless of the number of values in the table. To insert data, the data is used as the key for the hash function and stored in the array corresponding to the hash, If two keys produce the same hash, a collusion occurs

24
New cards

what is a hash

a result generated by applying an algorithm to a value

25
New cards

What is a digital signature

the sender uses their own private key to encrypt the hash total and this becomes the digital signature since only the sender could have encrypted it. The signature is attatched to the message and the whole message is encrypted using the recipient’s public key and then sent. The recipient decrypts this using their private key and decrypts the digital signature using the sender’s public key. The hash total is then reproduced based on the message data and if this matches the digital signature, no parts of the message were changed during transmission.

26
New cards

what is a digital certificate

it verifies that a sender’s public key is formally registered to that particular sender to avoid hoax digital signatures.

27
New cards

Entity

a category of object, person, event or thing of interest to an organisation about data which is being recorded

28
New cards

Flat file database

consists of a single file

29
New cards

Primary key

an entity identifier in a relational database

30
New cards

foreign key

an attribute in one table that is the primary key of another table, joining them together

31
New cards

composite primary key

a primary key which consists of more than one attribute

32
New cards

what is referential integreity

ensures that changes are consistent across a database. if a record is removed, all references to it are removed. eg if a customer is removed, their reviews will also be removed

33
New cards

secondary key

allows a database to be searched quickly

34
New cards

relational database

a collection of tables in which relationships are modelled by shared attributes

35
New cards

what is normalisation

the process used to come up with the best possible design for a relational database

36
New cards

first normal form

contains no repeating attributes ; each attribute name is unique; all data in attributes mist be atomic

37
New cards

second normal form

is in first normal form and contains no partial dependencies, (when one or more of the attributes depends on only part of the primary key, which can only occur if the primary key is a composite key)

38
New cards

third normal form

contains no non-key dependencies, which is one where the value of an attribute is determined by the value of another attribute which is not part of the key.

39
New cards

advantages of normalsiation

  1. less data redundancy (data that appears in more than one database table) so easier to maintain and change

  2. improves consistency of data

  3. allows for complex queries

40
New cards

how to select records from table

SELECT FROM WHERE ORDER BY

41
New cards

SQL operator for a value within a set of values

IN (‘ABC’,’DEF’)

42
New cards

SQL operator for similar to

LIKE

43
New cards

SQL operator for within a range, including the limits

BETWEEN … AND …

44
New cards

SQL operator for a field that does nit contain a value

IS NULL

45
New cards

How to create a database table

CREATE TABLE Name

(

attribute1 DATA TYPE , PRIMARY KEY ,

etc

)

46
New cards

what is the data type for character string of fixed length

CHAR(n)

47
New cards

what is the data type for character string of variable length, max n

VARCHAR(n)

48
New cards

what is the data type for true or false

BOOLEAN

49
New cards

what is the data type for integer

INTEGER

50
New cards

what is the data type for number with a floating decimal point

FLOAT ( max num of digits, max num of digits after decimal point)

51
New cards

what is the data type for date

DATE

52
New cards

what is the data type for time

TIME

53
New cards

what is the data type for currency

CURRENCY

54
New cards

how to add a column

ALTER TABLE table name

ADD field name DATA TYPE

55
New cards

how to delete a column

ALTER TABLE table name

DROP COLUMN field name

56
New cards

how to change the data type of a column

ALTER TABLE table name

MODIFY COLUMN field name DATA TYPE

57
New cards

how to insert a new record

INSERT INTO tablename (column1, colum2 …)

VALUES (value1, value 2 …)

58
New cards

how to update a record

UPDATE tablename

SET column 1 = value 1, column 2 = value.2, …

WHERE column X = value

59
New cards

how to delete a record

DELETE FROM tablename

WHERE columnX = value

60
New cards

how can data be captured

manual methods ; magnetic ink character recognition -cheques; optical mark recognition - lottery tickets, multiple choice exams; barcode readers and scanners

61
New cards

adv of using an online form to capture data

can be done in remote locations; can use validation to check for common errors

62
New cards

identify mehtods of exchanging data

EDI, SQL

63
New cards
64
New cards

what is EDI

65
New cards

what is a transaction

a single operation on data

66
New cards

what is acid

Aomicity, consistency, isolation, durability - these are the properties that guarantees that transactions are processed reliably

67
New cards

what is atomicity

requires that a transaction must be processed in its entirety or not at all. It guarantees that in any situation including power cuts, it is not possible to process only part of a transaction

68
New cards

consistency in trnasaction processing

Ensures that no transaction can violate any of the defined validation rules for maintaining the integrity of the database

69
New cards

how could referential integrity potentially be broken

if primary key is deleted/updated

70
New cards

what is isolation

ensures that concurrent execution of transactions leads to the same results as if transactions were processed one after the other

71
New cards

what is durablity

ensures that once a transaction has been committed, it will not be lost, even in the event of a power cut

72
New cards

how can durability be achieved for a completed transaction

storing the completed transaction in secondary storage

73
New cards

what are prroblems with multi-user databases

if multiple users simultaenously update the database, it may cause on of the updates to be lost

74
New cards

how to prevent updates being lost

Record locking- locks records whenever a user retrieves it for updating. It ensures isolation, which means the outcome of concurrent transactions is the same as if they were completed sequentially. Record locking allows one user to modify record level data at any one time so data that is being used elsewhere cannot be modified. Anyone else retrieving the same record is denied access until the transaction is completed or cancelled

75
New cards

problems with record locking

can cause deadlock - If two users are attempting to update two records, a situation can arise in which neiter can proceed; can cause delays - as users wait for access

76
New cards

What is serialisation

ensures that transactons do not overlap in time and therefore cannot interfere which each other or lead to updates being lost. A transaction cannot start before the previous one is finished.

77
New cards

what is time stamp ordering

Every object in the database has a read timestamp and a write timestamp, which are updated whenever an object is read or written. When a transaction starts, it reads the data from a record causing the read timestamp to be set. When it writes the updated data back to the record it will check the read timestamp. If this is not the same as the value that was saved when the transaction started, it will know that another transaction is also taking place on the record. The transaction with the earler timestamp should be applied first.

78
New cards

what is commitment ordering

Transactions are ordered in terms of their dependencies on each other as well as the time they were intiated. It can be used to prevent deadlock by blocking one request until another is completed and ensures that transactions are not lost when two or more users are simultaneously accessing the same object.

79
New cards

built in hardware redundancy

many organisations cannot afford to have their computer systems go down with the consequent loss of transaction data. These organisations maintain many identical systems in different geographical locations, so that every transaction is written to different storage facilities, protecting against loss of data in event of power failure and if one system fails, te backup sysrem automatically takes over.

80
New cards

why might title, artist, genre or length not be a suitable primary key

the values fir all these fields could repeat but primary keys mist be unique

81
New cards

advantage of indexing the field Artist

searches for an artist can be performed quickly

82
New cards

disadvantage of indexing with the field Artist

the index takes up extra space in the database

83
New cards

what is an IP address

a numerical address made of 4 numbers, each between 0 and 255, that uniquel identifies a network

84
New cards

describe what happens after the SQL statement:

DROP TABLE users

deletes the table called users

85
New cards

lossy vs lossless for streaming videos

Lossy permanently removes data but lossless rewrites original data is a more efficient format. Lossless is able to recreate the original file so keeps original quality. Lossy file size is smaller than lossless but there is a noticeable decrease in quality,

86
New cards

how can hashing be used in a hotel database

for security- to store passwords in database to make sure they cannot be read if they are stolen

for direct access- booking records can be quickly accessed by using hash of index as address