Answer:
Answered below
Explanation:
With the evolution and growth of technology, and as we are increasingly having our everyday lives dependent on technology, there arise problems that shouldn't be ignored.
Security of people's personal data and information is of paramount importance. Access to personal information and the sale of these information to companies without the owner's permission is a breach of privacy and one of the challenges we face today.
With the growth of data, there are newer threats and attacks on software security systems to steal these data and therefore there's a need for everyday assessment and improvement in security of data.
Answer:
I think it's false
Explanation:
I don't think so. What makes me hesitate is that you may have been told that in your text or in the classroom.
Here are the steps as I understand them.
- Understand the problem you are trying to solve.
- Design a solution.
- Draw a flow chart.
- Write pseudo-code.
- Write code.
- Test and debug.
I think you've done the designing long before you start writing code or even pseudo-code.