AS/A-Level Computing - Compression and Encryption Definitions

?
  • Created by: TB001
  • Created on: 22-05-17 12:20
Compression
Reducing the size of a file so that it can be stored using less memory or transmitted using less bandwidth.
1 of 11
Lossy Compression
Compression by removal of non-essential data from a file, such as reducing the number of pixels in an image or removing sound outside the range of human hearing. Can result in large reduction of file size, but also reduce the quality of the file.
2 of 11
Lossless Compression
Compression of a file with no data loss, allowing the file to be fully recreated from the compressed version with no quality reduction. For example, run-length encoding or dictionary coding.
3 of 11
Run-Length Encoding
A method of lossless compression in which a repeated item of data (such as a character) is stored once, alongside the number of times it is repeated, instead of being stored multiple times consecutively.
4 of 11
Dictionary Coding
A method of lossless compression in which a frequently used pattern of data is stored in a dictionary, and then represented in the main body of the file as a single symbol or token.
5 of 11
Encryption
The alteration of a file for storage or transmission so that it cannot be read or understood by people who do not have the means to decode it.
6 of 11
Symmetric Encryption
Encryption in which a file is decrypted using the same key as was used to encrypt it initially.
7 of 11
Asymmetric Encryption
Encryption in which a file is encrypted using a public key, but decrypted using a private key available only to the intended recipient of the file.
8 of 11
Caesar Cipher
An encryption method in which every character in a file is offset by a consistent factor (e.g 'abcd' offset by 3 to 'defg'). Spaces are also sometimes removed to mask word length.
9 of 11
Verman Cipher (AKA 'One-Time Pad')
Considered the only truly unbreakable encryption. Each character in a file is offset by a different amount, dictated by a single-use key that is generated by a truly random natural phenomenon and transferred by hand to prevent it from being stolen.
10 of 11
Hashing
A similar concept to encryption, but the conversion of the input data into a hashed form (using a hash function) is irreversible, making it impossible to retrieve the original data. Often used for the storage of PINs or passwords.
11 of 11

Other cards in this set

Card 2

Front

Compression by removal of non-essential data from a file, such as reducing the number of pixels in an image or removing sound outside the range of human hearing. Can result in large reduction of file size, but also reduce the quality of the file.

Back

Lossy Compression

Card 3

Front

Compression of a file with no data loss, allowing the file to be fully recreated from the compressed version with no quality reduction. For example, run-length encoding or dictionary coding.

Back

Preview of the back of card 3

Card 4

Front

A method of lossless compression in which a repeated item of data (such as a character) is stored once, alongside the number of times it is repeated, instead of being stored multiple times consecutively.

Back

Preview of the back of card 4

Card 5

Front

A method of lossless compression in which a frequently used pattern of data is stored in a dictionary, and then represented in the main body of the file as a single symbol or token.

Back

Preview of the back of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Communication and networking resources »