-
Introduction to the BootCamp 3
-
Lecture1.1
-
Lecture1.2
-
Lecture1.3
-
-
Understanding The Internet 14
-
Lecture2.1
-
Lecture2.2
-
Lecture2.3
-
Lecture2.4
-
Lecture2.5
-
Lecture2.6
-
Lecture2.7
-
Lecture2.8
-
Lecture2.9
-
Lecture2.10
-
Lecture2.11
-
Lecture2.12
-
Lecture2.13
-
Quiz2.1
-
-
Intro to HTML - HyperText Markup Language 73
-
Lecture3.1
-
Lecture3.2
-
Lecture3.3
-
Lecture3.4
-
Lecture3.5
-
Lecture3.6
-
Lecture3.7
-
Lecture3.8
-
Lecture3.9
-
Lecture3.10
-
Lecture3.11
-
Lecture3.12
-
Lecture3.13
-
Lecture3.14
-
Lecture3.15
-
Lecture3.16
-
Lecture3.17
-
Lecture3.18
-
Lecture3.19
-
Lecture3.20
-
Lecture3.21
-
Lecture3.22
-
Lecture3.23
-
Lecture3.24
-
Lecture3.25
-
Lecture3.26
-
Lecture3.27
-
Lecture3.28
-
Lecture3.29
-
Lecture3.30
-
Lecture3.31
-
Lecture3.32
-
Lecture3.33
-
Lecture3.34
-
Lecture3.35
-
Lecture3.36
-
Lecture3.37
-
Lecture3.38
-
Lecture3.39
-
Lecture3.40
-
Lecture3.41
-
Lecture3.42
-
Lecture3.43
-
Lecture3.44
-
Lecture3.45
-
Lecture3.46
-
Lecture3.47
-
Lecture3.48
-
Lecture3.49
-
Lecture3.50
-
Lecture3.51
-
Lecture3.52
-
Lecture3.53
-
Lecture3.54
-
Lecture3.55
-
Lecture3.56
-
Lecture3.57
-
Lecture3.58
-
Lecture3.59
-
Lecture3.60
-
Lecture3.61
-
Lecture3.62
-
Lecture3.63
-
Lecture3.64
-
Lecture3.65
-
Lecture3.66
-
Lecture3.67
-
Lecture3.68
-
Lecture3.69
-
Lecture3.70
-
Lecture3.71
-
Lecture3.72
-
Lecture3.73
-
-
Advanced HTML 28
-
Lecture4.1
-
Lecture4.2
-
Lecture4.3
-
Lecture4.4
-
Lecture4.5
-
Lecture4.6
-
Lecture4.7
-
Lecture4.8
-
Lecture4.9
-
Lecture4.10
-
Lecture4.11
-
Lecture4.12
-
Lecture4.13
-
Lecture4.14
-
Lecture4.15
-
Lecture4.16
-
Lecture4.17
-
Lecture4.18
-
Lecture4.19
-
Lecture4.20
-
Lecture4.21
-
Lecture4.22
-
Lecture4.23
-
Lecture4.24
-
Lecture4.25
-
Lecture4.26
-
Lecture4.27
-
Lecture4.28
-
-
Intro to CSS - Cascading Style Sheet 71
-
Lecture5.1
-
Lecture5.2
-
Lecture5.3
-
Lecture5.4
-
Lecture5.5
-
Lecture5.6
-
Lecture5.7
-
Lecture5.8
-
Lecture5.9
-
Lecture5.10
-
Lecture5.11
-
Lecture5.12
-
Lecture5.13
-
Lecture5.14
-
Lecture5.15
-
Lecture5.16
-
Lecture5.17
-
Lecture5.18
-
Lecture5.19
-
Lecture5.20
-
Lecture5.21
-
Lecture5.22
-
Lecture5.23
-
Lecture5.24
-
Lecture5.25
-
Lecture5.26
-
Lecture5.27
-
Lecture5.28
-
Lecture5.29
-
Lecture5.30
-
Lecture5.31
-
Lecture5.32
-
Lecture5.33
-
Lecture5.34
-
Lecture5.35
-
Lecture5.36
-
Lecture5.37
-
Lecture5.38
-
Lecture5.39
-
Lecture5.40
-
Lecture5.41
-
Lecture5.42
-
Lecture5.43
-
Lecture5.44
-
Lecture5.45
-
Lecture5.46
-
Lecture5.47
-
Lecture5.48
-
Lecture5.49
-
Lecture5.50
-
Lecture5.51
-
Lecture5.52
-
Lecture5.53
-
Lecture5.54
-
Lecture5.55
-
Lecture5.56
-
Lecture5.57
-
Lecture5.58
-
Lecture5.59
-
Lecture5.60
-
Lecture5.61
-
Lecture5.62
-
Lecture5.63
-
Lecture5.64
-
Lecture5.65
-
Lecture5.66
-
Lecture5.67
-
Lecture5.68
-
Lecture5.69
-
Lecture5.70
-
Lecture5.71
-
-
Advanced CSS 49
-
Lecture6.1
-
Lecture6.2
-
Lecture6.3
-
Lecture6.4
-
Lecture6.5
-
Lecture6.6
-
Lecture6.7
-
Lecture6.8
-
Lecture6.9
-
Lecture6.10
-
Lecture6.11
-
Lecture6.12
-
Lecture6.13
-
Lecture6.14
-
Lecture6.15
-
Lecture6.16
-
Lecture6.17
-
Lecture6.18
-
Lecture6.19
-
Lecture6.20
-
Lecture6.21
-
Lecture6.22
-
Lecture6.23
-
Lecture6.24
-
Lecture6.25
-
Lecture6.26
-
Lecture6.27
-
Lecture6.28
-
Lecture6.29
-
Lecture6.30
-
Lecture6.31
-
Lecture6.32
-
Lecture6.33
-
Lecture6.34
-
Lecture6.35
-
Lecture6.36
-
Lecture6.37
-
Lecture6.38
-
Lecture6.39
-
Lecture6.40
-
Lecture6.41
-
Lecture6.42
-
Lecture6.43
-
Lecture6.44
-
Lecture6.45
-
Lecture6.46
-
Lecture6.47
-
Lecture6.48
-
Lecture6.49
-
-
Introduction to JavaScript 30
-
Lecture7.1
-
Lecture7.2
-
Lecture7.3
-
Lecture7.4
-
Lecture7.5
-
Lecture7.6
-
Lecture7.7
-
Lecture7.8
-
Lecture7.9
-
Lecture7.10
-
Lecture7.11
-
Lecture7.12
-
Lecture7.13
-
Lecture7.14
-
Lecture7.15
-
Lecture7.16
-
Lecture7.17
-
Lecture7.18
-
Lecture7.19
-
Lecture7.20
-
Lecture7.21
-
Lecture7.22
-
Lecture7.23
-
Lecture7.24
-
Lecture7.25
-
Lecture7.26
-
Lecture7.27
-
Lecture7.28
-
Lecture7.29
-
Lecture7.30
-
This content is protected, please login and enroll course to view this content!
Leave A Reply Cancel reply
You must be logged in to post a comment.
12 Comments
(1)Internet protocol
(2)DNS : Domain name system
TCP: Transmission Control Protocol
UDP:User datagram protocol
(3)The DNS is used to translate domain names into IP addresses.
(4)DNS spoofing is when hacker taps into an internet server like google and change it into a domain name with the wrong IP address. And when you use that domain name you will be in trouble because you are using the wrong site.
1. What is the most important design philosophy that makes the internet possible?
It is called the Internet Protocols
2. Write down the acronym of any three protocols you learned about, and their full meaning.
a) TCP – Transmission Control Protocol
b) UDP – User Datagram Protocol
c) DNS – Domain Name System
3. What is the relationship between IP address and Domain Name Service (DNS)?
The Domain Name Service translates domain names to IP addresses so browser can load internet seamlessly. All devices that could be connected with internet, will have its unique IP address.
4. Explain DNS Spoofing in your own words.
In my own words, I will say that DNS spoofing is a form of computer security hacking in which corrupt Domain Name System data is introduced into the DNS resolver’s cache, causing the name server to return an incorrect result record.
(1) Protocols
(2) IP (Internet Protocol)
DNS (Domain Name System)
HTTP (Hypertext Transfer Protocol)
IP is like a system of addresses for computers on the internet.It helps in sending and receiving information between different devices connected to the internet.
DNS is like a phone book for the internet.It translates the names we use for websites into numbers that computers understand, so we can find and access websites easily
HTTP is the way our computers ask for things from the internet, and then the internet sends those things back to us . It’s like a special language that helps us get all the stuff from the internet,like videos , games and stories
(3) The relationship between an IP address and DNS is that DNS allows us to map server names to IP addresses.When we type a websites’ name into a web browser,the DNS translates that name into the corresponding IP address, allowing the browser to locate the website on the internet.
(4) DNS Spoofing is a malicious activity where an attacker (hacker) manipulates the records in a DNS server to redirect users to a fraudulent website.
1. What is the most important design philosophy that makes the internet possible
Ans- Protocols
2. Write down the acronym of any three protocols you learned about,and their full meaning.
A. IP- Internet Protocols is a protocol responsible for routing packets of data to their right destination.
B. DNS-(Domain Name System): It is a translator of domain names into IP addresses.
C. HTTP-(Hyper-Text Transfer Protocol): This protocol helps data transfer possible between servers & clients.
3. What is the relationship between IP Address & Domain Service)
Their relationship is interwoven.
A user trying to access information on the internet cannot be cramming bits of numbers for whatever websites. But that user can remember a website address via strings of alphabets very easily & quickly e.g http://www.example.com
Hence when the website address is entered in the address bar of the browser already the website address which is also the domain name has been linked up to an Ip address so that at the back end the Domain Name is translated to what the system understands which can be 172.121.5.1 and the data needed is fetched & sent back to the user who requested for such information.
4. Explain DNS SPOOFING in your own words:
DNS Spoofing is the process of a hacker tapping into a DNS server & changing the domain name to matching a wrong Ip address thereby redirecting a user to a fake website
1). IP address is the most important philosophy that makes the Internet possible.
2). Acronym for 3 protocols
IP= Internet Protocol
TCP = Transmission Control Protocol
DNS = Domain Name System
3). Many IP addresses are housed by the DNS. The DNS helps any connected device to locate specific assigned IP address.
4). DNS spoofing is a cyber attack. This is a situation where a DNS is been possessed/accessed by a bad or criminal cyber hacker.
(1). Sets of internet protocols.
(2). IP. (Internet protocol)
TCP (Transmission control protocol)
DNS. (Domain name system).
(3). IP address is a unique numerical label assigned to each device connected to the internet.
A domain name service is a system that translate human readable domain name into corresponding IP address.
(4). DNS. spoofing is a type of cyberattack . Hackers attack websites nd change the IP address so that they redirect the website customers.
1. What is the most important design philosophy that makes the internet possible.
It is the Internet Protocol (IP)
2. Write down the acronym of any three protocols you learned about, and their full meaning.
TCP – Transmission Control Protocol
UDP – User Datagram Protocol
DNS – Domain Name System
3. What is the relationship between IP address and Domain Name Service (DNS)?
The DNS are used to give pacific name to
computer IP addresses. In this case each internet website or server has a unique name that is associated with its IP address.
4. Explain DNS Spoofing in your own words.
This is a cyber attack, when a hacker changes the name IP address of a specific DNS and leads users to a fake site or servers and people uses this fake server as if it the real one not knowing.
1. The most important philosophy that makes the internet possible is the IP address
2. i. IPv4 – Internet Protocol version 4
ii. IP- internet protocol
iii. DNS- Domain Name System
3. DNS link server names to IP addresses, When a website’s name is typed into a web browser, DNS converts that name into the appropriate IP address, enabling the browser to locate the website on the internet.
4. DNS spoofing is a cyber attack where a hacker modifies a DNS server to redirect users from a legitimate website to a fake one, facilitating the theft of personal information or the spread of malware.
1. What is the most important design philosophy that makes the internet possible?
Ans: Protocol
2. Write down the acronym of any three protocols you learned about, and their full meaning.
IP: Internet protocol
TCP: Transmission Control Protocol
DNS: Domain Name System
3. What is the relationship between IP address and Domain Name Service (DNS)?
Ans: The Domain Name Service transmit domain names to IP addresses
4. Explain DNS Spoofing in your own words.
Ans: DNS Spoofing is a type of cyber attack in which hackers corrupt Domain Name System.
1. The Internet Protocol
2.
a. HTTP – HyperText Transfer Protocol
b. TCP – Transmission Control Protocol
c. UDP – User Datagram Protocol
3. An IP address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. It identifies the host or network interface and its location in the network.
DNS (Domain Name Service) on the other hand translates human-readable domain names (like http://www.millionairesacademy.org) into IP addresses (like 192.168.1.1). This translation allows users to access websites using easy-to-remember domain names instead of complex numerical IP addresses.
4. DNS Spoofing, is a cyber attack where an attacker corrupts the DNS server’s cache by inserting false address records. This causes the server to return an incorrect IP address, redirecting traffic intended for a legitimate website to a malicious one. As a result, users may unknowingly visit fraudulent websites, potentially exposing them to phishing attacks or malware.
1. Internet protocol
2. Transmission control protocols TCP
User datagram protocol UDP
Domain name system DNS
3. The relationship is that the DNS is used to convert domain names to IP addresses
4. DNS spoofing is when a hacker creates and imposter website with the same domain name and different IP address
1. Internet Protocol is important design philosophy.
2. IP (Internet Protocol)
DNS (Domain Name System)
TCP (Transmission Control Protocol)
3. DNS is the version of address that is easy for humans to understand and call. IP address on the other hand is what the computer prefers.
So, DNS systems help humans relate with other humans/systems by calling up the appropriate IP address behind the scene.
4. DNS spoofing is when a hacker changes the IP address of a DNS. Using the original domain name for malicious purpose.