This internal component is known as the "brain" of the computer, responsible for executing instructions.
CPU
The most common type of cyber attack, utilizing fake emails.
Phishing
Resendiz most recently received this kind of surgery.
Hip
The action completed by the command "mkdir"
Create new folder/directory
The Protocol number for HTTP
80
This specific type of storage is "volatile," meaning it loses all its data the moment the power is turned off.
RAM
A Fake scenario created to trick someone into sending personal data.
Pretexting
This is the number of years Resendiz has been teaching.
16
Command Line Interface
The acronym/saying to remember the OSI Models
Please Do Not Throw Sausage Pizza Away
This type of cabling uses light to transmit data and is immune to electromagnetic interference.
Fiber Optic Cabling
The two main types of biometrics.
Face ID, Fingerprint
This is the year Resendiz received his Bachelor of Science for Mathematics Education in Norther Illinois University.
2008
The action completed by the command "cat"
Displays texts on screen
This OSI Model handles logical addressing, Routing, and Packet forwarding.
Network (Layer 3)
This type of storage is faster, and more durable than its counterpart.
SSD
Term used to refer to methods hackers use to trick others.
Social Engineering
According to the Tom-Tom, Resendiz speaks the following languages. (Besides English)
Spanish, French, German, Italian, Polish, Lithuanian.
This command lists filed or directories
ls/dir
This layer acts as a bridge for the user to the system.
Application
This type of wiring is more susceptible to interference.
Wireless
Term used to describe the hardware/software that monitors and filters incoming and outgoing network traffic.
Firewall
Resendiz has Three degrees, a M.A in Curriculum & Instruction, a B.S in Mathematics Education, and this other one.
B.M in Vocal Performance.
This command creates duplicate files/directories.
cp
This OSI Model is responsible for data segmentation
Transport (Layer 4)