Isabelle Tubbs
Forum Replies Created
-
AuthorPosts
-
Isabelle Tubbs
ParticipantThe centurion’s faith in this passage is amazing, because even though he was not of the Jewish community, he trusted in Jesus, in His power, and in His authority. The centurion understood how authority worked because of his own experience and believed that Jesus had the heavenly authority to heal his servant.
The centurion was humble enough to ask Jesus for help, even though the Romans were the ones occupying the Hebrew land at the time. He was so humble that he felt he did not deserve to have Jesus come to his home.
Also, the centurion was kind enough to want his servant to get better and be healed. It is amazing that both Jesus and the centurion cared about a servant, who was considered as a lower status during that time period.
Later, Jesus tells him to go home because his servant is healed. When the centurion goes back, he finds out that the servant was healed at the time when Jesus told him. Jesus does have the heavenly authority, and because the centurion believed, he and his servant were blessed.Isabelle Tubbs
ParticipantAlso, I just wanted to share Matthew 7:1-2 (NIV) because I think it is key to this week’s discussion as well: “‘Do not judge, or you too will be judged. For in the same way as you judge others, you will be judged, and with the measure you use, it will be measured to you.” If we want to help someone improve and grow, we must correct them with God’s love in our hearts because we would want people to lovingly correct us as well.
Isabelle Tubbs
ParticipantHello, Carlos! Nice work on your explanation of AES, RSA, and ECC. Elliptic Curve Cryptography was a type of encryption I did not encounter before this discussion, so it was interesting to learn about it from your post. It makes sense for smaller devices to have a specific type of encryption for data, especially with the widespread use of mobile devices today.
Isabelle Tubbs
ParticipantEncryptions are vital for securing data because they scramble that data using an encryption algorithm, which often involves the use of a pre-shared key (PSK) to secure, unlock, and unscramble the information. Three types of encryptions include RSA, 3DES, and AES. RSA (Rivest-Shamir-Adleman) encryption uses cryptography algorithms with two keys and are great to use with VPNs and services with email and communication (Human, 2023). Its purpose is based more on the type of information that needs to be secured rather than the type of organization. 3DES (Triple Data Encryption Standard) encryption, which can use two keys or three keys, uses a process of encrypting, decrypting, and encrypting again; it is often used for financial companies (Human, 2023). Finally, AES (Advanced Encryption Standard) encryption uses a block cipher that is symmetric and should mainly be used for classified data, like data from large organizations or the government (Human, 2023).
References
Human, H. (2023, February 2). Types of Encryption [Explanations, Examples, Significance] https://review42.com/resources/types-of-encryption/Isabelle Tubbs
ParticipantHello, James! This is a great, concise explanation of how TCP and IP work together as TCP/IP. I also found it quite interesting to learn the differences between the two. Thanks for sharing the reference you used; it does tie in with what we have learned, like UDP, FTP, POP, etc. UDP is an alternative to TCP/IP, but it is not as reliable. Is there a situation that you think would warrant using UDP over TCP/IP?
Isabelle Tubbs
ParticipantTCP/IP contains the protocols from Transmission Control Protocol and Internet Protocol. When exchanging data on a network, there needs to be specified rules concerning how it should be transported, where it is going, and what should happen when a failed data transfer occurs (Yasar, n.d.). Thus, the TCP/IP gives control over these processes to aid in data transmissions and network connections.
Because we are focusing on TCP and IP in this discussion, I was curious about what the difference between the two are. Although they are grouped together for functionality, there are a few differences. TCP uses a higher-level protocol to run checks to make sure that the connection is working, that the data are transferred in the right order, and that ultimately the data are delivered (Yasar, n.d.). IP delivers the data and makes sure it goes to the right place, but it does not run checks like TCP does (Yasar, n.d.).
References
Yasar, K. (n.d.). What is TCP/IP? Informa TechTarget. Retrieved April 19, 2025 from https://www.techtarget.com/searchnetworking/definition/TCP-IPIsabelle Tubbs
ParticipantI would not say that I am always patient nor always judgmental toward people. With God’s help, I try to be gracious to people, especially because God has been so gracious to me, but even just recently I judged someone who I did not know until God pointed out that I really had no idea about the situation and honestly there was not much evidence even later to say that my thought was correct. In moments like that, the only thing to do is repent, reset, and ask God for help in not being so quick to judge.
Isabelle Tubbs
ParticipantHello, Misty! In your post, there was a network that you mentioned that I did not talk about in my post, which was the Content Delivery Network (CDN). It was great to read about it, and I can see how this would be another great option for network systems. Overall, this was a great overview of the different types of networks.
Isabelle Tubbs
ParticipantThere are several different categories of networks which have different purposes. A personal area network (PAN) spans a small space, ranging from a few inches or centimeters to a few yards or meters. A local area network (LAN) connects computers in a specified area. This could be used for universities, office buildings, etc. One similar category is the campus area network (CAN), which connects the campus buildings of, for example, a school or university so that all the devices on the campus are connected to the network. To reach an even greater distance, a wide area network (WAN) can go across several cities or even different countries using nodes. A metropolitan area network (MAN) is a type of network that spans across a city or at least part of a city. Finally, a storage area network (SAN) connects storage devices by using network technology. Thus, choosing a network depends on the size of the area that needs the network connection.
Isabelle Tubbs
ParticipantHello, Carlos! I like how you organized the benefits of command lines. It makes sense how command lines are efficient tools, but sometimes it can be hard to word the exact reasons. Although graphical user interfaces can sometimes be easier, the advanced tasks and smaller use of system resources do show the advantages of command line interfaces over graphical user interfaces. Is there a command that you think is used most often or that you use the most?
Isabelle Tubbs
ParticipantCommand lines allow IT professionals an efficient way to interact with the computer and give it commands by just entering a few lines of text. Some notable functions of command lines include showing information, editing information, and testing connections. To show a list of a computer’s directories, Linux uses the ls command. With commands like these, those in the IT field can gain the information they need. In fact, using the help command in Windows can even help someone to know the commands they are able to use. If someone wants to delete a file or directory in Linux, they must enter rm. This exemplifies the ability to edit information using command lines. Finally, to test a connection in Command Prompt/Windows Powershell, the ping command must be used. Testing a connection is extremely important for deciding what to do based on the results. Thus, command lines are vital tools for managing a computer and computer network.
Isabelle Tubbs
ParticipantForgiveness can be so hard because it feels like unjustly forgetting what someone has done, but it is not about forgetting but rather letting go of the bitterness toward that person. That is freeing and lets us move on. Again, this is in no way easy; it may involve forgiving some people several times a day, but it is done through God’s help and through remembering how much God has forgiven us.
Isabelle Tubbs
ParticipantHello, Carlos! This is a great introduction to some system utilities that are available with operating system applications. I also mentioned File Explorer and Task Manager in my post, which I think just shows how important a lot of these tools are. Also, I like that you mentioned Control Panel because it can take you to so many important settings and controls from security controls to hardware or even to the internet. It is great to have several different groups of options to work with. For anyone in the IT field or even anyone doing something related to it, all of the tools you mentioned are essential.
Isabelle Tubbs
ParticipantThere are many different types of applications and scenarios that an operating system is useful. If a user wants to connect a computer to a printer, the operating systems lets the computer interact with the printer hardware. Downloading an app like HP’s printer app can further help devices connect to a specific printer.
Operating systems also control the use of files in a system so that they can stay organized. For Windows, these files can easily be seen on File Explorer. There are apps, like Files by Google, that allow you to copy files to your Google Account.
Device Manager is a platform for managing some components of a computer, allowing an IT to analyze what is going on with the computer’s devices through the operating system. When I access my laptop’s Device Manager, it shows several devices and even displays the fact that I have the app Microsoft OneNote installed.
Similarly, using Task Manager allows IT professionals to see what applications are running or are currently using the CPU/Memory. This is important for troubleshooting any issues with the software which would affect the operating system as a whole. For example, if I have the Microsoft Teams app opened, then I could see how much CPU and Memory it is using.
-
AuthorPosts