Lists the total occurrences of data in a column
Count
Decimal representation of binary number 101
5
Algorithm generates an almost-unique, fixed size 256-bit (32-byte) hash
SHA-256
The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
Phishing
She is known as the first computer programmer.
Ada Lovelace
Used to make a table of my own
Create Table
Decimal 0xFF?
255
Continues to be widely used, in spite of its well-documented weaknesses and deprecation by security experts
MD5
The fraudulent practice of sending emails ostensibly from a known or trusted sender in order to induce targeted individuals to reveal confidential information.
Spearphishing
He researched and broke many cyphers during WWII and created the Automatic Computing Engine
Alan Turning
Query data and filter rows with a condition
Where
Binary representation of decimal number 38
100110
How many bytes is a MD5 hash?
16 bytes 32 hex character
What are the four steps in the Social Engineering Cycle?
Information Gathering, Developing Relationship, Exploitation, Execution
She developed the world's first complier and coined the term of debugging.
Admiral Grace Hopper
Command used to insert rows into a table
INSERT INTO
What is 00010011 00110111 in hex?
0x1337
What is the MD in hashing stands for?
Message digest
What are the three basic types of tactics used to gather information?
Phone, In-Person, Digital
He invented the World Wide Web
Tim Berners-Lee
Contains a lot of tables put together for data storage and access
DATABASE
42 in hex?
0x2a
Difference between Encryption and hashing?
Encryption is reversible, hashing is one-way
Attack that often involves using a faked phone number to create a sense of trust
Spoofing
Her calculations helped NASA launch astronauts into space, and eventually on the moon.
Katherine Johnson