TECHNOLOGY #1

WHAT ARE COOKIES ? WHAT IS ENCRYPTION AND DECRYPTION ? WHAT IS CIPHERTEXT? WHAT IS CRYPTOGRAPHY? WHAT IS 404 ERROR PAGE? WHAT IS A ZIP FILE? HTTP OR HTTPS? LET'S EXPLORE!!!

WHAT ARE COOKIES?


Image Source - Google | Image by - Jennifer L.


Cookies are small files that websites send to your device that the sites then use to monitor you and remember certain information about you — like what’s in your shopping cart on an e-commerce site, or your login information. These pop-up cookie notices all over the internet are well-meaning and supposed to promote transparency about your online privacy.


There are a number of advantages to using cookies, but here are a few that stand out:

  • They remember your preferences, so you'll only typically see ads that are relevant to you
  • They save your passwords and usernames so there's no need for you to remember these details when you log onto different websites
  • Once you know where to find them, they're easy to delete and control. 
  • Cookies remember your browsing behavior, so you'll often see search results that are most relevant to you when you're using Google or other search engines.


ENCRYPTION  AND DECRYPTION


Encryption is the process of converting data to an unrecognizable or "encrypted" form. It is commonly used to protect sensitive information so that only authorized parties can view it.Every time someone uses an ATM or buys something online with a smartphone, encryption is used to protect the information being relayed. Businesses are increasingly relying on encryption to protect applications and sensitive information.

The conversion of encrypted data into its original form is called Decryption. It is generally a reverse process of encryption. It decodes the encrypted information so that an authorized user can only decrypt the data because decryption requires a secret key or password. 

Image Source - Google | Image by - ICO

The science of encrypting and decrypting information is only called CRYPTOGRAPHY

WHAT IS CIPHERTEXT?


What is ciphertext? In a simple language, cipher is an algorithm which is applied to plain text to get ciphertext. It is actually the unreadable form of the encryption. It is not understood until it is decrypted by a private key. The sender uses a public key (open to anyone in the system) to encrypt the data into ciphertext and the receiver uses a private key (It is stored on user’s device) to decrypt it . 

HTTP  OR  HTTPS?


You probably recognize the commonly used “HTTP” that appears in a browser’s address bar, but do you know what it stands for?
HTTP is Hypertext Transfer Protocol.In simpler terms, it is the protocol over which information is sent from a user’s web browser to the website they are visiting. The data that is being communicated between the browser and the website is sent over in plain text, meaning that if someone intercepted the connection between the two, they would easily be able to see the information you were both viewing and sending on the website.
While HTTPS is essentially the same concept as HTTP, the “S” harbors one big difference between the two: security. HTTPS stands for Hypertext Transfer Protocol Secure.HTTPS ensures that the information travels through a safe tunnel to its destination. 

ERROR 404 PAGE

A 404 page is the webpage served to a user who tries to access a page that is unavailable. The 404 error indicates that the server where the page should reside has been contacted but that the page is does not exist at that address. 404 errors can result when pages or files are moved or deleted or when URLS are mistyped.

ZIP FILES


These are generally the files with the extension .ZIP . But, what is it ?
In simple words, it is a common file format that is used to compress one or more files together. Mainly, we can say that it reduces the file size and makes it easier to transport or store. A user can unzip or extract a zip file after transport and can use the file in the original format.

 
HOW IT WORKS ?

Most of the files are redundant (they have the same information listed over and over again). So, during the compression , the program simply get rid of the redundancy.

Imagine a file that contains the following sentences:

=> best sharing and storage solution for your business
=>Your business solution for the best sharing and storage
Each word in this file appears twice. Each letter and space equals one unit of memory. Then total memory will be 110 units. But you can create a numbered code to express the data in a different way:

=>The best sharing and storage solution for your business
=>123456789
This means that the initial file size of 110 units is reduced to 18 units, which is a massive saving. 

Post a Comment (0)
Previous Post Next Post