1.3.1 Compression, Encryption, Hashing

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions
Get a hint
Hint

loseless compression

1 / 33

flashcard set

Earn XP

34 Terms

1

loseless compression

reduces the file size that when it is decompresses all the data is retrieved

New cards
2

use of lossless

code, text, architercural plans

New cards
3

lossy compression

reduces a fee size so that when it is decompressed some of the data has been lost

New cards
4

use of lossy

colour depth reduction, resolution reduction

New cards
5

what is lossy compression ?

removes all none essential information

New cards
6

example of lossy compression

MP3 format file is 10% smaller than original, quiet sounds and high frequencies are cut out

New cards
7

2 examples of lossy compression

voice transmission, mp3

New cards
8

run length encoding and dictionary encoding are 2 types of …

lossless compression

New cards
9

what is lossless compression

records patterning in the data rather than the actual data

New cards
10

run length encoding

compression where data is stored as frequency data pairs.

New cards
11

what is compression?

the process of reducing space needed to store a file

New cards
12

what is a frequency data pair?

single instance of a pattern and how many repetitions of the pattern

New cards
13

con of dictionary encoding

not useful for smaller bodies of text as it requires text in dictionary to be stored.

New cards
14

con of RLE

doesn’t work well for Digital images because the repetitions aren’t frequent.

New cards
15

plaintext

the original data

New cards
16

ciphertext

encrypted data

New cards
17

cipher

encryption method

New cards
18

key

information needed to lock or unlock the data

New cards
19

encryption

transformation of data from one form to another to prevent unwanted 3rd parties from accessing information

New cards
20

symmetric encryption

private key

New cards
21

conditions of symmetric encryption

same key used to encrypt and decrypt text

New cards
22

cons of symmetric encryption

less secure key exchange means that in easily susceptible to interceptions that can lead to cipher text being decrypted.

New cards
23

conditions for asymmetric encryption

uses two seperate but indistinguishable keys; public key for encryption; private key to decrypt.

New cards
24

What is the purpose of compress

Reduce size, download time and storage requirements. Make best use of the bandwidth.

New cards
25
New cards
26
New cards
27
New cards
28
New cards
29
New cards
30
New cards
31
New cards
32
New cards
33
New cards
34
New cards
robot