Compression & Encryption

Vital algorithms that shrink files and scramble data for secure network transmission.

Examiner's Eye - Avoid the Trap!

The "Encryption Prevention" Trap: Do not write that encryption "stops data from being intercepted" or "stops hackers stealing data". It doesn't! Hackers can still intercept the data packets effortlessly. To get the mark, you must explicitly state that encryption "makes the intercepted data meaningless or entirely unreadable without the specific decryption key".

Data Compression

Utility software that permanently or temporarily uses advanced mathematical algorithms to vastly reduce the file size of data (e.g. converting a heavy `.wav` song into a lightweight `.mp3`).

  • Impact 1: Rapidly saves crucial secondary storage space.
  • Impact 2: Allows massive files to be transmitted much faster across a network / the Internet, lowering bandwidth consumption.

Encryption

Software that heavily protects highly sensitive data by running it through a scrambling algorithm, turning readable "plaintext" into unreadable "ciphertext".

Legitimate users are given a mathematical Decryption Key by the software to magically unscramble the data back into its original state. Intercepting hackers simply see gibberish.

SysAdmin Dashboard Simulator (AO2)

Read the live crisis alerts from the school terminal. Toggle the perfect combination of utility tools to resolve the specific issues occurring right now, without wasting CPU resources on unnecessary software.

LIVE SERVER LOG [192.168.1.5]

[WARN_1] Local server hard-drive storage capacity is reaching 98% full. Space is running out rapidly!

[WARN_2] A teacher is attempting to email sensitive student grading/medical data across the public internet to an examiner.

[WARN_3] Teachers report that attaching large 4K video files to the VLE takes over 5 minutes to fully upload across the network bandwidth.

Utility Software Toggles

Awaiting Command

Activate the correct utilities to solve the exact symptoms displayed on the terminal.

Check Your Understanding

1. What is the fundamental advantage of compressing a massive .wav file before emailing it to a colleague?

2. An examiner asks you what happens when strongly encrypted data is intercepted blindly by an attacker without the password. What is the precise consequence?

Written Exam Scenario (AO2/AO3)

1 / 3

"A remote architect needs to send a package of 40 high-resolution architectural blueprints to an overseas secure client. The files total over 5GB, making them too large to attach normally, and the plans contain highly confidential corporate material. Recommend a combined utility software approach the architect should use before transmitting the data over the public Internet." (4 marks)

Previous: Defrag Complete 1.5 Theory!