Measure the amplitude of the wave at regular intervals per second and store as a binary value
Naturally occurs
Continuous form
Smooth curves
Converted from analogue to a discrete format
Looks boxy
Still continuous
Stored by sound samples – taken at regular intervals
Graphs:
Y = bit depth – number of binary values
Higher bit depth – more accuracy
X = Sample rate/ frequency = Hz – 1 Hz = 1 sample/second
Nyquist's Theorem: Bit depth = double the frequency we can hear
Frequency x Bit Depth x Seconds = File Size
MIDI
Computer generated sound – ex. EDM
Musical Instrument Digital Interface
Need to know what it can control:
Event messages
Pitch
Duration
Timbre
Vibrato
Volume
Tempo
Smaller file size than analogue
Easy to learn – drag and drop interface
Doesn't sound as authentic
Reduce file size – create free space
Not needed as much now – more built in storage
Needed to send/ upload files – can be too large upload
Needed on websites – otherwise it will load slowly
Mobile phone networks and ISPs
Streaming sites – music and videos
Permanently loses data
If too much detail is lost – it becomes unusable – e.g. on a text file the loss of letters will cause confusion
Saves more space than lossless but reduces quality
Group together pixels with a similar colour – loss of quality is not very noticeable
Doesn’t work on vector images – drawing list
Sound – removes sounds outside the frequency we can hear - MP3
Data isn't removed permanently so an algorithm can be used to restore the original
Uses repeated data – doesn't compress much so file size is larger than lossy
File quality is exactly the same
Run Length Encoding – lossless technique - 2 white, 6 black, 8 white...
Records the value and how many times it repeats
Compresses less with more colours – could have a row which cannot be compressed – each pixel is a different colour
Can't be used with vector images
Dictionary based – each repeated pattern is given a binary value and these are stored in a “dictionary”
Transformation of data from plaintext to ciphertext – prevents unauthorised access
Use a key to undo the cipher – key is generated from the type of encryption algorithm
Cracking – if you do not have the key but try to decrypt the cipher
Caeser cipher (shift cipher)– invented by Julius Caeser – shift the alphabet n positions – n is the key – needs a maximum of 25 attempts in a brute force attack
Good cipher – resources(examples, key) , time, can a human work out the cipher
Cryptanalysis – the process of cracking a cipher using time and resources
a cipher with a non-random key is susceptible to cryptanalysis attacks if given enough time and resources
Random keys are not random – mathematically generated and so can be solved
Truly random keys: collected from something physical - could be called a phenomenon
White noise
Radioactive decay
Timing of a hard disk read/write head
Vernam cipher:
Created one-time pad ciphers – offer perfect security if correctly used
Three conditions must be met for the one-time pad ciphers to run:
Key is equal to or longer than the plaintext message
The key is truly random
The key is used once, then destroyed – must be shared securely in person