OCR H446/01 – 1.3 Exchanging data

1.3 Exchanging data - Overview / Checklist
1.3.1 Compression, Encryption and Hashing
(a) Lossy vs Lossless compression.
(b) Run length encoding and dictionary coding for lossless compression.
(c) Symmetric and asymmetric encryption.
(d) Different uses of hashing
1.3.2 Databases
(a) Relational database, flat file, primary key, foreign key, secondary key, entity relationship modelling, normalisation and indexing.
(b) Methods of capturing, selecting, managing and exchanging data.
(c) Normalisation to 3NF.
(d) SQL – Interpret and modify.
(e) Referential integrity.
(f) Transaction processing, ACID (Atomicity, Consistency, Isolation, Durability), record locking and redundancy.
1.3.3 Networks
(a) Characteristics of networks and the importance of protocols and standards.
(b) The internet structure:

    The TCP/IP Stack.
    DNS
    Protocol layering.
    LANs and WANs.
    Packet and circuit switching.

(c) Network security and threats, use of firewalls, proxies and encryption.
(d) Network hardware.
(e) Client-server and peer to peer.

1.3.4 Web Technologies
(a) HTML, CSS and JavaScript.
(b) Search engine indexing.
(c) PageRank algorithm.
(d) Server and client side processing.

Recommended Resources

1.3.1 Compression, Encryption and Hashing
Symmetric and asymmetric encryption

Symmetric vs. Asymmetric Encryption

Cryptography is the art of encoding and decoding secret messages. Cryptographic techniques have been used for thousands of years, well before the introduction of computers, and the techniques have evolved since. (e.g. See how the Caesar Cipher was used by … Continue reading


Cryptography Challenges


Hashing Algorithms

Hashing Algorithms for Integrity Validation

Imagine working for the British Secret Services during World War 2 or during the cold war. As part of your role, you would be expected to exchange secret messages with your allies. Your messages would most likely be encrypted using … Continue reading


Hashing Algorithms for Storing Sensitive Data

More and more online systems such as e-commerce websites, online banking apps, or social networks need to access some sensitive data about you including your password, your credit card details and more recently, some biometric data (e.g. for fingerprint authentication … Continue reading


Hashing Algorithms for Memory Addressing

In this blog post, we will investigate the use of hashing algorithms to quickly locate a record in a large database. Let’s consider the database of members of a social network such as Instagram, Twitter or Facebook. Every time the … Continue reading


Luhn Algorithm UPC Barcode Check Digit Algorithm


Lossy and Lossless Compress

Lossless Compression: Huffman Coding Algorithm

The Huffman Coding algorithm is used to implement lossless compression. For the purpose of this blog post, we will investigate how this algorithm can be implemented to encode/compress textual information. The principle of this algorithm is to replace each character … Continue reading


Lossless Compression Poem Decoding Challenge

Did you like this challenge?

Click on a star to rate it!

Average rating 5 / 5. Vote count: 6

No votes so far! Be the first to rate this post.

As you found this challenge interesting...

Follow us on social media!