A big question or problem in the tech field that i would like to solve is Data security.
<h3>What is Data security ?</h3>
Data security can be regarded as process of protecting data from unauthorized user as well as protection from data corruption .
I will like to solve this problem because as advances in technology, the data of individual or organization is not been total secured and this is posing so much loss to individuals.
public class RegularPolygon extends java.lang.Object{
public void randomize(RegularPolygon c){
int min = 10, max1 = 20;
double min1 = 5, max1 = 12;
double range = (max - min) + 1;
double range1 = (max1 -min1) + 1
int side = (Math.random() * range) + min;
double len = (Math.random() * range1) + min1;
c.setNumSides(side);
c.setSideLength( len);
}
public static void main(String[] args) {
RegularPolygon r = new RegularPloygon();
randomize(r);
}
}
Explanation:
The randomize method accepts a regular polygon class as its only parameter and assigns a random number of sides and the length of these sides with the 'Math.random' function.
The audience development technique that best describe the process Nicolal wants to implement is;
C Pull technology
Explanation:
Pull technology is a form of network mode of communication in which the initial data request comes from the client side of the network for it to be handled by the server side of the network.
Given that Nicola wants a demand-based content to his website for customers to access information when they wish to, the process is similar t the podcasting in which each new content is posted to a specific RSS feed from where it can be requested by a mobile app, directory or a RSS feed reader
The counter technology is a push technology where the servers push content to intended clients, such as for an incoming call, instant messaging, synchronous conferencing (online c h a t) and files.