Convert 11111000 from binary to decimal
248
What is the primary purpose of encryption?
B
What is a protocol? (In the context of the internet)
A set of rules for formatting and processing data
What is TCP?
TCP or Transmission Control Protocol is the protocol followed by all computers that splits data into Packets and sends them between devices. It ensures reliable communication between devices.
Who is objectively the best TA at HKIS?
Jaiman
Convert 252 from decimal to binary
11111100
What is the purpose of a digital certificate in a website?
A digital certificate is used to verify the authenticity of a website - it is used to confirm possession of encrypted keys.
What is the maximum number of devices that can be supported on an IP adress?
1
What is the contents of a packet? Describe each part of a packet.
Main data + meta data used for routing and identifying the data.
How many student got a 5 on the AP exam last year? Out of 15 Student
8
Convert 20 from decimal to hexadecimal
14
Which of the following statements best describes the properties of public key encryption?
B
How many bits does an IPv4 address have?
32
What format of the data contained in packets?
A) HexaDecimal
B) ASCII
C) Binary
C) Text
C
How many APCSP lessons have you had so far this year?
43
Convert A4 from Hexadecimal to Decimal
164
Why is public key encryption considered secure?
A
Name 3 different levels of authentication and provide examples for each.
Single Factor Authentication - Password
Two Factor Authentication - Password + Email
Multi Factor Authentication - Password + Email+ Fingerprint
What makes TCP Flexible and efficient?
Each packet can take different paths to reach its destination, which helps in optimizing routing and managing network congestion. This flexibility ensures that data can still be delivered even if some paths are slower or unavailable.
Convert C1 from Hexadecmial to Binary
11000001
What is the difference between a asymmetric encryption and symmetric encryption?
Symmetric encryption: A technique for encrypting data where the same key is used to both encrypt and decrypt data. Asymmetric encryption: A technique that uses different keys for encrypting versus decrypting data.
How many unique IP addresses can IPV4 support? (Speed doesn't matter, closest answer wins)
4,294,967,296
How is TCP fault tolerant?
Since packets hold relatively smaller amounts of data, if one is lost it can be easily re-requested.