Nt1110 Part 1 Data Compression

Improved Essays
Part 1
What is data compression?
Data compression is where a file is made smaller by shortening code where it is similar. This is helpful when transmitting files over the net, or in general just saving space of a SSD or Normal Hard drive.
Data compression comes in two forms:
Lossless Compression: Lossless compression is where similar parts of a file, are compressed by their similarities, however, the frequency is recorded and can be uncompressed without losing any extra data. This is usually used for games found on a DVD, where you will run an .exe to extract all files that are compressed. Same for downloading the files online as it is more efficient than other methods.
Lossy Compression: usually used in pictures, videos and sounds effects, by removing what the eye or ear can hear/see. This removes any unnecessary
…show more content…
This can be done by setting a password on your computer, adding timeouts for when not in use for a period of time, and turning it off in general when not in use. These simple precautions stop local attacks, such as USB rubber ducky attacks. Many physical components can be taken by simply having access to the parts. And able to reset basic password by removing the CMOS battery from the BIOS, resetting the BIOS entirely, removing the password as well. A computer can also have physical damage when not supervised. This means that keeping your computer safe physically, is to keep it supervised, or kept away from others. However, with software protection, it is easy to pick up viruses, Trojans, rats etc. this can be fixed by using common knowledge on websites as well as having Anti-Malware software, as well as software and protection from UAC (User Access Certificate) Other problems that are you will get unwanted software by rushing through installation of other software’s. This can simply be avoided by looking at what you are clicking “accept” button, as they may not be just terms and

Related Documents

  • Improved Essays

    The lock should require multi-factor authentication, such as a card swipe and an access PIN, or a biometric id check and a PIN. Preferably, the PIN entry keypad would randomize the position of the digits for each PIN entry attempt. The system should be connected to the network, be centrally configured and record all access attempts in a log. c) Video Surveillance System: In order to keep records of who is physically accessing critical areas and devices, video monitoring cameras should be installed with good views of those areas. At a minimum, cameras should have a view of the inside of the wiring closet / server room, the entry point to the wiring closet / server room, and the main entrance to the company…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Professor Doupé, Thank you for your reply, and for your questions. We are excited to potentially have your guidance in our research, and hope we have provided clear explanations to your questions below: 1. SSL/TLS encryption secures data flowing between client and server. Using SSL during an authentication attempt could provide a secure way for a non malicious server to authenticate with the device, while blocking out sign in attempts from malware. 2.…

    • 682 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    3.2 Simulator Various methods available to measure the performance of data communication protocols involving live network tests, hardware emulation, test-beds and mathematical models. Software simulation, since, is usually a time effective and cost efficient method. Researchers around the globe are utilizing software simulation tools because it offers a controlled atmosphere within which any network model performance can be measured easily and efficiently. Nowadays, the popularity of the available network simulators and specifically that of Ad Hoc networks varies from one simulator to another.…

    • 1180 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3

    • 271 Words
    • 2 Pages

    Read about the security risks of using a public computer. This is a private computer Select this option if you are the only person using this computer. This option provides additional time of inactivity before automatically logging you off. Warning:…

    • 271 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Humanities 1020 Study Guide Chapter 15-17. Identify each in complete sentences: 1. Council of Trent The main principal of the counter reformation, the Council of Trent was one of the Roman Catholic Church’s most regal councils 2.…

    • 1110 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    c. Data computing The IoT devices are going to handle a lot of information for better consumer experience. This information needs to be analyzed and processed in real time. If the data is not processed in an appropriate time frame, then that would lead to consumer dissatisfaction. Moreover, the issue lies in the amount of data that will be generated from the IoT devices.…

    • 1436 Words
    • 6 Pages
    Great Essays
  • Great Essays

    In data communication, they are always striving to increase throughput, this would include allowing nodes to transmit information over a single broadcast link without interfering with each other. To achieve this, multiple access protocols coordinate the transmission. The three classes of multiple access protocols are, random access, taking-turns and channel partitioning. With random access protocol, each node tries to randomly to use the complete broadcast link, without any regard to the other nodes. Taking-turns protocol uses some type of turning mechanism, which designates which node is allowed to transmit.…

    • 944 Words
    • 4 Pages
    Great Essays
  • Decent Essays

    3- Specify alternative courses of action. 1- the anti-virus and fire-wall programs use the anti-virus and fire-wall programs for protection from hacking and the need of updating it constantly Because of that viruses are developed continuously and periodically, and don't think that anti-virus alone enough to protect you from penetration. 2- anti-loggers programs One of the most important programs that you need to have are the anti-loggers programs and its mission is to protect Your personal data such as passwords, data of bank cards, even your device can't figure out what you are writing.…

    • 253 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    In his essay “Undercover Parent,” Harlan Coben supports the idea of using spyware on teenager’s electronics by parents. Using this spyware you have the ability to “log every keystroke your child makes” (2) and invading their private space. While this idea is valid because most parents who do this are loving and only want to protect their children from harm, by placing this spyware on a teen’s electronics you are not only evading their privacy but also their trust. This is because more than likely parents are doing this behind the child’s back, which could ultimately lead to distrust and resentment due to the lack of trust in the teen to be able to make their own decisions. However, spyware on computers would, in fact, help to prevent situations…

    • 259 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Problem Statement Communication is key, regardless of where you work. Communication can be between people or a computer communicating data to a person. When obtaining data from a computer, people want to be able to trust the data that they are receiving and that none of the packets got lost somewhere along the way. Packets are units of data that are routed between an origin and a destination on the Internet. Networks use Ethernet cables, called Category (more commonly referred to as CAT) cables to send packets to one another.…

    • 460 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    On the surface, medical coding seems simple enough. Assign a specific code to a medical diagnosis, treatment, symptom, drug reaction, or procedure. But, when you start digging into the details of how medical coding works and what it can affect, the liability potential of applying the wrong medical codes becomes apparent. Mismatched Coding Can Lead to Insurance Fraud Claims…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    This time increment begins with the explanation of how the encoding process is logical for the first generation that has had access to computers to now. An example displayed to show the encoding process was regarding simply riding the bus. During a ride on the bus, riders take in a lot of information that needs to be processed. Michael Rugg says that a majority of information society has to remember is not what we assumed we were going to have to remember. There is a correlation between the length of time learned and how long you remember the material.…

    • 207 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Memory In Inside Out

    • 788 Words
    • 4 Pages

    The first step, encoding is the rendering information into a way in which it can be used. This means that encoding is a way of processing information.…

    • 788 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    P2 Assess the health and safety risks facing the practitioner when maintaining computer systems. Health and safety risks When carrying out and performing computer maintenance there are many health and safety risks that are involved with different steps of the process. There are many ways that the technician or practitioner can overcome these risks and minimise the health and safety effects on all users. The safety equipment available helps reduce the risks to the user and technician performing the maintenance. Electrocution – This risk is a frequent health and safety issue that all technicians have to deal with when carrying out computer maintenance.…

    • 826 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Advanced Activity File Sharing is a practice of distributing or providing access to digital media, such as computer programs. For example, sending emails to other colleges. Like iCloud lets you save all your work to all you apple devices and lets you share the work. All file sharing, P2P, and bittorrent are all related.…

    • 356 Words
    • 2 Pages
    Decent Essays

Related Topics