A big question or problem in the tech field that i would like to solve is Data security.
<h3>What is Data security ?</h3>
Data security can be regarded as process of protecting data from unauthorized user as well as protection from data corruption .
I will like to solve this problem because as advances in technology, the data of individual or organization is not been total secured and this is posing so much loss to individuals.
Data security are;
- data encryption
- hashing
- tokenization
Learn more about Data security at;
brainly.com/question/17493537
Answer:
Relationship vs N-ary Relationship
Explanation:
It is not part of the design choice in ER model because N-ary reflects an indefinite form or better still creates an identifying attribute in an ER relationship. Example is the process of creating an auto-generated ID value
Answer:
c.
Explanation:
People trust open-source software - if they can see how it works and understand it, they can help improve it and build applications using it. If these protocols were not publicly available - then nobody would have implemented services using them - so nobody would be adopting it.
Answer:
Top down design
Explanation:
Top-down design is an approach that is used to break down the problem into the smaller subpart so that it can be manageable into more clear form.
C programming is the example of a top-down approach while C++ is the example of the bottom-up approach.
The advantages of the top-down design approach are:
1) easy to manage
2) easy to find the error
3) easy to debug
The decimal form of the 11001101.00111001.10101001.01000010 binary ip address is 205.57.169.66.
An IP address is a binary number with 32 bits. The 32 bits are divided into four octets, which are groupings of 8 bits each. An IP address, however, is shown as a dotted decimal number (for example: 205.57. 32.9).
Memory regions are given binary addresses by the computer system. But in order to access a memory location, the system utilises a certain number of bits. We can address two memory regions with 1 bit. We can address 4 memory locations with 2 bits and 8 memory locations with 3 bits.
The 4 sets of 8 bits in each of the 4 directions are simply written down to create the 32-bit binary IP address.
Learn more about binary ip address:
brainly.com/question/14541891
#SPJ4