This visual execution shows how Kubernetes manages three secret types: opaque, docker-registry, and TLS. First, secrets are created using kubectl commands with specific flags for each type. The secret data is stored encoded in base64 inside Kubernetes. Pods can then reference these secrets to access sensitive information like passwords, certificates, or registry credentials. The execution table traces each step from creation to pod usage, showing how secrets change state and how pods consume them securely. Key moments clarify why data is base64 encoded, the difference between opaque and TLS secrets, and how docker-registry secrets enable private image pulls. The quiz tests understanding of secret types, pod usage, and data changes.