Unit 6 Essential Questions
Unit 6 Essential Questions
How is encryption accomplished to safeguard data exchange?
Encryption is a safeguard for data exchange because the hacker is unable to read the message unless they have the key to decode it. Because of this, encryption is very safe unless the hacker/ eavesdropper finds the key to your encrypted message

What methods are used to compress data?
Data compression is the process of modifying, encoding or converting the bits structure of data in such a way that it consumes less space on disk. It enables reducing the storage size of one or more data instances or elements. There are two types of compression: lossy and lossless. Like the name implied, lossless does not lose any space, making the file size big. The tradeoff is that the image will have excellent results as in that the image, audio, the video will be much clearer. The lossy compression, on the other hand, will have a much smaller file size with the trade-off that the image, audio, the video will be less clear than lossless.
What is lossy and lossless data compression?
Lossy compression is when the file is compressed smaller. Lossless compression is when every single data/ pixel is stored and not compressed. For example, the picture below of the dragonfly on a twig. The lossless compression is much clearer. That is due to the file size, where the whole file is not reduced to make the file size compressed. On the other hand, the lossy compression, you can see the image, but it is not as beautiful as the Lossless. It is because that in lossy compression, the trade-off of having smaller file size is that the image, audio, audio clip will be less clear.
What ethical dilemmas are created from access to data?
Some ethical dilemmas are privacy and hacking. An example is like when Google asks if you want to save your password on Chrome. Because of this, you are prone to have privacy issues. Hackers can find out your passwords simple by looking through your Chrome tabs and that can lead to credit cards being stolen or just private information.

Comments
Post a Comment