Save
...
Terms
1
1.3
Save
Share
Learn
Content
Leaderboard
Learn
Created by
kayzz
Visit profile
Cards (46)
What is asymmetric
encryption
?
An
encryption
technique where a
public
key is used to encrypt data and a
private
key is used to
decrypt
it.
View source
How does asymmetric encryption ensure security?
It uses a
public
key for
encryption
and a
private
key for decryption, ensuring only the recipient can decrypt the data.
View source
What is dictionary coding?
A type of
lossless compression
where text is matched with
entries
in a dictionary and substituted with
unique
codes.
View source
What is the purpose of hashing?
To
transform data
into a
hash
value for
validating credentials
without revealing the
original
data.
View source
What is lossless compression?
A
compression
algorithm that
retains
all
data
in the
file without losing
any
information.
View source
How does lossy compression differ from lossless compression?
Lossy
compression removes
non-essential
data, leading to a
decrease
in
accuracy
, while
lossless
retains
all
data.
View source
What is run-length encoding?
A type of
lossless compression
that stores
repeated
data occurrences as
single
values with their
counts.
View source
What is symmetric encryption?
An
encryption technique
that uses the same
key
for both
encryption
and
decryption.
View source
What does atomicity mean in database transactions?
All transactions should either
succeed
or
fail
,
never partially processed.
View source
Why is consistency important in database transactions?
Each
transaction
must
obey
defined validation
rules
to maintain
referential
integrity.
View source
What does durability mean in the context of database transactions?
Once a transaction has
begun
, it must be
completed under all circumstances.
View source
What is entity-relationship modeling?
A method of
visually
describing data tables and their relationships to reduce
redundancy
in a
relational
database.
View source
What is first normal form (1NF) in databases?
A
table
with no
repeating attributes
where each
record
and
attribute
intersection produces
exactly one value.
View source
What is a flat file database?
A database that uses a
single table data structure
to store all
data.
View source
What is a foreign key in a relational database?
A
linking attribute
that joins
two tables
by being a
primary key
in one and a
foreign key
in the other.
View source
What is indexing in databases?
The process of creating an
index
of
primary keys
to
retrieve records
based on their
primary key location.
View source
What does isolation mean in database transactions?
No transaction should
overwrite
other transactions that are occurring
simultaneously.
View source
What is normalization in databases?
The formal process of
optimally
designing data tables by reducing
redundancy
and
repetition.
View source
What is a primary
key
?
A
unique identifier
that identifies each record in a
table.
View source
What is record locking in databases?
A technique used to prevent simultaneous access to data by
locking
a record during
editing
or
updating.
View source
What is
redundancy
in databases?
The
unnecessary repetition
of a field in
multiple
tables.
View source
What is referential integrity?
The idea of keeping a database
consistent
by ensuring
changes
are accounted for in all
linked
tables.
View source
What are relational databases?
A database where separate
tables
are made for each entity, with relationships represented by
foreign keys.
View source
What is a secondary key?
A key that can be used as an
alternative
index to
access
or
sort
records in a
table.
View source
What is second normal form (2NF)?
A
table
in
1NF
that has
repeating
data removed and put into a new table with appropriate
relationships.
View source
What is third normal form (3NF)?
A
table
in
2NF
where all
attributes
not the
primary key
are
fully dependent
on the
primary key.
View source
What is
transaction processing
?
The idea of ensuring that any
change
in the
state
of a
database
conforms to
ACID
rules.
View source
What is circuit switching?
A method for
sending
data by creating a
dedicated
communication
channel
between two
nodes.
View source
What is a client-server network?
A type of network where clients
connect
to one or more
central servers
that handle
service requests.
View source
What is the Domain Name System (DNS)?
A hierarchical naming system that maps
domain
names to
IP
addresses.
View source
What is encryption?
The process of converting
original data
into a
form
that cannot be
understood
by
unauthorized
users.
View source
What are firewalls used for?
To monitor network
traffic
and prevent
unauthorized
access between networks.
View source
What are Local Area Networks (LANs)?
A network connecting a group of
computing
devices in a single
geographical
area.
View source
What is packet
switching
?
A method for sending data by breaking it into
packets
that are sent
independently
and
reassembled
at the destination.
View source
What is a peer-to-peer network?
A type of network where
computers
are
connected
to each other and share resources without a
central server.
View source
What is protocol layering?
A technique that divides a
complex
system into
functional layers
and assigns
protocols
for each layer.
View source
What are proxies in networking?
A server
application
that
intercepts
data
packets
to hide true
network addresses
and
restrict
access.
View source
What is the Transmission Control Protocol / Internet Protocol (TCP/IP) stack?
A suite of
networking protocols
that allow networked
computers
to communicate through
connected layers.
View source
What are Wide Area Networks (WANs)?
A
network
connecting
computing
devices over a large
geographical
area, typically using
third-party
carriers.
View source
What are
Cascading Style Sheets
(
CSS
)?
A
style language
used to define the
layout
and
design
of a
webpage.
View source
See all 46 cards