Exchanging Data Quiz

Test your knowledge of Exchanging Data with these A-Level Computer Science exam style questions.

This quiz consists of 15 questions. Scroll down to start the quiz!

Questions

Compare lossy and lossless compression, including their advantages, disadvantages, and typical uses.

Lossy compression reduces file size by permanently removing some data, resulting in a loss of quality. It is commonly used for media files such as images and audio where perfect accuracy is not essential. Lossless compression reduces file size without losing any data, allowing the original file to be perfectly reconstructed. It is used for text and data files where accuracy is critical. 

Explain how Run Length Encoding (RLE) and dictionary coding achieve lossless compression.

Run Length Encoding (RLE) compresses data by replacing sequences of repeated values with a single value and a count, making it efficient for data with many repeated elements. Dictionary coding replaces repeated patterns with shorter codes stored in a dictionary, allowing recurring sequences to be represented more efficiently. 

Compare symmetric and asymmetric encryption, including their strengths and weaknesses.

Symmetric encryption uses a single key for both encryption and decryption, making it fast and suitable for large data volumes, but it requires secure key distribution. Asymmetric encryption uses a public and private key pair, providing greater security for communication, although it is slower and more computationally intensive. 

Explain the different uses of hashing in computer science.

Hashing converts data into a fixed-length value, which represents the original data. It is used for securely storing passwords, verifying data integrity by comparing hashes, and improving search efficiency through hash tables. 

Describe the structure of a relational database and explain the roles of primary keys, foreign keys, and secondary keys.

A relational database organises data into tables with rows and columns. A primary key uniquely identifies each record. A foreign key links one table to another by referencing a primary key. A secondary key is used for searching but does not uniquely identify records. 

Compare flat file databases with relational databases.

Flat file databases store all data in a single table, which can lead to redundancy and anomalies. Relational databases use multiple related tables, reducing redundancy and improving data integrity through structured relationships. 

Explain the process of normalisation and describe the requirements of First, Second, and Third Normal Form (1NF, 2NF, 3NF).

Normalisation is the process of organising a database to reduce redundancy. First Normal Form requires atomic data and no repeating groups. Second Normal Form removes partial dependencies on composite keys. Third Normal Form removes transitive dependencies, ensuring all non-key attributes depend only on the primary key. 

Describe the purpose of indexing in databases and how it improves performance.

Indexing creates a data structure that allows faster searching of records. It improves query performance by reducing the amount of data that must be scanned, although it may increase storage requirements. 

Explain how SQL can be used to retrieve and modify data in a database.

SQL is used to interact with databases. SELECT retrieves data, INSERT adds new records, UPDATE modifies existing data, and DELETE removes records. These commands allow efficient data manipulation and retrieval. 

Describe referential integrity and explain why it is important in relational databases.

Referential integrity ensures that relationships between tables remain consistent. Foreign keys must match existing primary keys, preventing invalid or orphaned records and maintaining data accuracy. 

Explain the concept of ACID properties in transaction processing.

ACID properties ensure reliable transaction processing. Atomicity ensures transactions are all-or-nothing. Consistency ensures valid database states. Isolation prevents interference between transactions. Durability ensures completed transactions are permanently stored. 

Compare packet switching and circuit switching in network communication.

Packet switching divides data into packets that travel independently across a network and are reassembled at the destination, improving efficiency and reliability. Circuit switching establishes a dedicated communication path, which remains reserved for the duration of the transmission, but can be inefficient. 

Describe the structure of the TCP/IP stack and the role of each layer.

The TCP/IP stack consists of four layers. The application layer handles user-level protocols, the transport layer ensures reliable communication, the network layer manages addressing and routing, and the link layer handles physical transmission of data. 

Compare client-server and peer-to-peer network models.

Client-server networks use a central server to manage resources and provide services to clients, offering better security and control. Peer-to-peer networks allow devices to share resources directly without a central server, making them simpler but less secure and harder to manage. 

Explain the difference between client-side and server-side processing in web technologies.

Client-side processing occurs in the user’s browser, providing faster interaction and reducing server load. Server-side processing occurs on the web server, handling tasks such as database queries and authentication, ensuring security and centralised control.

sign up to revision world banner
Slot