Definitions: 1.3 Exchanging Data: Computer Science A-Level OCR

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/43

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

44 Terms

1
New cards

Asymmetric Encryption

An encryption technique where a public key available to everyone is used to encrypt the data, and the data is decrypted by the paired private key known only by the recipient.

2
New cards

Dictionary Coding

A type of lossless compression where text is searched for entries that match the entries in a dictionary. Entries are substituted by a unique code which can then be translated.

3
New cards

Hashing

A one-way transformation of data into an abbreviated form called a hash value. The hash value is used to validate login credentials like passwords or PINs without revealing the original data to hackers.

4
New cards

Lossless Compression

A compression algorithm that retains all the data in the file by only storing the instructions needed to reconstruct the original file. No data is lost.

5
New cards

Lossy Compression

A compression algorithm that removes non-essential data from a file leading to a noticeable decrease in accuracy of the data. Data lost is non-recoverable.

6
New cards

Ren-Length Encoding

A type of lossless compression where repeated occurrences of the same data (like several pixels of the same colour in an image) are stored as single data values with their counts.

7
New cards

Symmetric Encryption

An encryption technique where the same key is used to encrypt and decrypt data. A copy of the key must be transferred between both parties.

8
New cards

Atomicity

Each transaction must obey the defined validation rules of the database to maintain referential integrity.

9
New cards

Durability

Once a transaction has begun, it must be completed under all circumstances.

10
New cards

Entity-Relationship Modelling

A method of abstractly describing the data tables and the relationships between them visually. They can be used to reduce redundancy and construct a relational database.

11
New cards

First Normal Form (1NF)

A table with no repeating attributes. The intersection of each record and attribute produces exactly one value.

12
New cards

Flat File Database

A database where a single table data structure is used to store all the data.

13
New cards

Foreign Key

A linking attribute that joins two tables in a relational database by being a primary key in one and a foreign key in the other.

14
New cards

Indexing

The process of creating an index of primary keys such that the location of any record can be retrieved given its primary key.

15
New cards

Isolation

No transaction should overwrite other transactions that are simultaneously occurring. The same results must be obtained if transactions are concurrently or sequentially processed.

16
New cards

Normalisation

The formal process of optimally designing data tables by reducing data redundancy and repetition by converting them into normal forms.

17
New cards

Primary Key

A unique identifier that identifies each record in a table.

18
New cards

Record Locking

A technique used to prevent simultaneous access to data in a database by locking a record when it is being edited or updated. Otherwise, inconsistencies may aries in the database.

19
New cards

Redundancy

The unnecessary repetition of a field in multiple tables. Databases should have redundancy in the form of identical copies if part of the database gets lost and needs to be recovered.

20
New cards

Referential Integrity

The idea of keeping a database consistent by ensuring that any changes made to data or relationships associated with a table are accounted for in all the linked tables.

21
New cards

Relational Databases

A database where separate tables are made for each entity, and relationships between entities are represented by foreign keys.

22
New cards

Secondary Key

A key that can be used as an alternative index to access or sort records in the table in a quicker, but less accurate way than the primary key.

23
New cards

Second Normal Form (2NF)

A table in 1NF that has data that repeats across multiple records removed and put into a new table with appropriate relationships (no partial dependencies).

24
New cards

Third Normal Form (3NF)

A table in 2NF where all attributes that are not the primary key are fully dependent on the primary key (no non-key dependencies).

25
New cards

Transaction Processing

The idea of making sure that any logical operation or change in state of a database (transaction) conforms to ACID(Atomicity, Consistency, Isolation, Durability) rules for reliable processing.

26
New cards

Circuit Switching

A method for sending data between two nodes on a network by creating a dedicated communication channel first. All data follow this same path for the duration of communication.

27
New cards

Client-Server Network

A type of network organisation where networked computers (clients) connect to one or more powerful central computers ( servers) that handles service requests and has resources.

28
New cards

Domain Name System (DNS)

A hierarchical naming system that maps human-readable domain names to IP addresses that locate and identify resources on a network.

29
New cards

Encryption

The process of converting the original data (plaintext) into a form which cannot be understood by unauthorised users (ciphertext), using an encryption algorithm (cipher).

30
New cards

Firewalls

A security checkpoint application that monitors incoming and outgoing network traffic, designed to prevent external users from gaining unauthorised access between two networks.

31
New cards

Local Area Networks (LANs)

A network connecting a group of computing devices on a single geographical area/site.

32
New cards

Packet Switching

A method for sending data over a network by breaking data into several data packets which are sent independently and then reassembled once they all reach their destination.

33
New cards

Peer-to-Peer Network

A type of network organisation where networked computers are connected to each other and share resources and workloads without any central server.

34
New cards

Protocol Layering

A technique that simplifies network design by dividing a complex system into its component functional layers and assigning protocols for each layer to perform tasks and communicate with adjacent layers.

35
New cards

Proxies

A server application that intercepts all data packets entering and leaving a network to hide the true network addresses of the source from the recipient. They also restrict authorised users’ access to data and isolates the network from external networks (like the internet).

36
New cards

Transmission Control Protocol / Internet Protocol (TCP/IP) Stack

A suite of networking protocols that allow networked computers to communicate, consisting of 4 connected layers. Incoming and outgoing data packets are passed through these layers.

37
New cards

Wide Area Networks (WAN

A network connecting a group of computing devices over a large geographical area, typically with the help of third party carriers.

38
New cards

Cascading Style Sheets (CSS)

A style language used to define the layout, design and presentation of a webpage written in a markup language.

39
New cards

Client-Side Processing

The data processing and operations performed by the client. The client’s browser runs the processing using the user’s local computer resources. Typically used to run less critical code.

40
New cards

HyperText Markup Language (HTML)

A markup language used to write the contents of webpages on the World Wide Web.

41
New cards

JavaScrip

An interpreted, object-oriented programming language used to create interactive elements within web browsers for adding functionality to dynamic web pages.

42
New cards

PageRank Algorithm

An algorithm developed by Google to rank websites in their search results by their usefulness. It ranks a webpage’s quality and importance by counting the number of links to that webpage.

43
New cards

Search Engine Indexing

A method of collecting, parsing and storing data from websites to

facilitate fast and accurate information retrieval by the search engine. The search engineer relies on an index of webpages to accomplish this.

44
New cards

Server-Side Processing

The data processing and operations performed by the web server. Data is sent from the client’s browser to the web server for secure processing, and the output is sent back to the client.