What is the network?
A network, in general terms, is an interconnected system of devices that can communicate and share resources. In computing, this means connecting two or more computers or other devices to exchange data and share resources like printers or files. This can be achieved through wired connections like Ethernet cables or wireless technologies like Wi-Fi.
What is phishing?
the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
What is ports & Protocols?
In networking, ports act as virtual doorways, and protocols are the rules for communication. Ports are numbered, and they are used to identify specific services or applications on a computer, while protocols define how data is formatted and exchanged.
What is computer hardware?
Computer hardware refers to the physical components of a computer system, such as the CPU, RAM, hard drive, and peripherals like a monitor, keyboard, and mouse. It's the tangible part of the computer that you can see and touch, while software is the intangible instructions and programs that run on the hardware.
What is LeBron's Jersey Number
What does "IP" stand for in networking?
IP stands for Internet Protocol. It is a set of rules governing the format of data sent over the internet or local network.
What is phishing?
Phishing is a type of cyberattack where attackers trick people into revealing sensitive information (like passwords or credit card numbers) by pretending to be a trustworthy source, usually through emails, messages, or fake websites.
What is a port in computer networking?
A port is a logical endpoint for communication used by protocols to distinguish different types of traffic on the same device. For example, web traffic typically uses port 80 or 443.
What does CPU stand for and what is its function?
CPU stands for Central Processing Unit. It’s the “brain” of the computer that processes instructions from programs and manages most operations of the system.
did noah get more minuets than canyon
no
What is the difference between a switch and a router?
A switch connects devices within the same local network (LAN) and uses MAC addresses to forward data to the correct device.
A router connects different networks (e.g., your home network to the internet) and uses IP addresses to route data between networks.
What are common signs of a phishing email?
Urgent or threatening language ("Your account will be closed!")
Suspicious links or attachments
Misspellings or poor grammar
Sender’s email address doesn’t match the organization
Requests for personal information or credentials
What port does HTTP and HTTPS use?
HTTP uses port 80
HTTPS (secure version of HTTP) uses port 443
What is the difference between RAM and a hard drive (HDD/SSD)?
RAM (Random Access Memory) is temporary, fast memory used while the computer is running to store active data.
A hard drive (HDD) or solid-state drive (SSD) is permanent storage used to keep files and programs even when the computer is turned off.
what do you do to start a car engine?
What is the purpose of subnetting in networking?
Subnetting divides a larger network into smaller, more manageable sub-networks or subnets. It improves performance and security by limiting broadcast domains and optimizing IP address allocation.
How does spear phishing differ from regular phishing?
Spear phishing is a more targeted form of phishing. Instead of sending generic messages to many people, attackers customize messages to a specific individual or organization using personal details to make it more convincing.
What is the difference between TCP and UDP?
TCP (Transmission Control Protocol) is connection-oriented, ensuring reliable delivery with error checking and retransmission.
UDP (User Datagram Protocol) is connectionless, faster, but doesn’t guarantee delivery or order, often used for real-time applications like streaming or gaming.
What component is responsible for rendering graphics in a computer?
The GPU (Graphics Processing Unit), often called a graphics card, is responsible for rendering images, video, and animations, especially in gaming or video editing tasks.
Is it Noah's birthday on May 6th
yes
What is the three-way handshake in TCP and why is it important?
The three-way handshake is the process TCP uses to establish a reliable connection between a client and server:
SYN – Client sends a synchronize request.
SYN-ACK – Server acknowledges and responds with its own synchronize.
ACK – Client acknowledges the server's response.
This ensures both sides are ready to transmit and receive data, preventing errors and confirming the connection is valid.
What technical methods can organizations use to protect against phishing attacks?
Email filtering systems that detect phishing attempts
Multi-factor authentication (MFA) to protect accounts
DMARC, DKIM, and SPF protocols to verify email authenticity
Security awareness training for employees
Sandboxing to safely analyze attachments and links before delivery
Match these common protocols to their default ports:
SSH – Port 22
DNS – Port 53
FTP – Ports 20 (data) and 21 (control)
SMTP – Port 25 (commonly), also 465/587 for secure sending
What are the main differences between SSD and HDD in terms of performance and technology?
SSD (Solid State Drive):
Uses flash memory, no moving parts
Much faster read/write speeds
More durable and energy-efficient
HDD (Hard Disk Drive):
Uses spinning magnetic disks
Slower but usually cheaper for large storage
More prone to physical damage due to moving parts
Is zumbo/ Adrian / AdrianTheMu / Gumbo/ Boy what the helli/ Dutch Bros Cup vet 3?
yes