1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natima [27]
2 years ago
6

What's a big question or problem in the tech field you'd like to solve and why?

Computers and Technology
1 answer:
aleksandrvk [35]2 years ago
5 0

A big question or problem in the tech field that i would like to solve is Data security.

<h3>What is Data security ?</h3>

Data security  can be regarded as process of protecting data from unauthorized user as well as protection from  data corruption .

I will like to solve this problem because as advances in technology, the data of individual or organization is not been total secured and this is posing so much loss to individuals.

Data security are;

  • data encryption
  • hashing
  • tokenization

Learn more about Data security at;

brainly.com/question/17493537

You might be interested in
Select the correct answer.
melomori [17]

A. a next generation car

8 0
3 years ago
How many tables are needed to implement an REA data model that has five distinct entity-sets, two many-to-many relationships and
azamat

Answer:

B

Explanation:

Im not sure tho so please dont get mad if its wrong

8 0
3 years ago
HI PLZ HELP 11 POINTS!!!
bonufazy [111]

Probably gonna wanna determine the table title first

6 0
3 years ago
Read 2 more answers
Max magnitude Write a method maxMagnitude() with two integer input parameters that returns the largest magnitude value. Use the
Ira Lisetskai [31]

Answer:

The java program is as follows.

import java.lang.*;

public class Numbers

{

   //variables to hold two numbers

   static int num1=-8, num2=-2;

   //method to return integer with higher magnitude

   public static int maxMagnitude(int userVal1, int userVal2)

   {

       if(Math.abs(userVal1) > Math.abs(userVal2))

           return userVal1;

       else    

           return userVal2;

   }

public static void main(String[] args) {

    int max = maxMagnitude(num1, num2);

 System.out.println("The number with higher magnitude among "+num1+ " and "+num2+ " is "+max);

}

}

OUTPUT

The number with higher magnitude among -8 and -2 is -8

Explanation:

1. Two integer variables are declared to hold the two numbers. The variables are declared at class level (outside main()) and declared static.

2. The variables are initialized with any random value.

3. The method, maxMagnitude(), takes the two integer parameters and returns the number with higher magnitude. Hence, return type of the method is int.

public static int maxMagnitude(int userVal1, int userVal2)

4. This method finds the number with higher magnitude using the Math.abs() method inside if-else statement.

               if(Math.abs(userVal1) > Math.abs(userVal2))

                   return userVal1;

        else    

                   return userVal2;

5. Inside main(), the method, maxMagnitude(), is called. This method takes the two variables as input parameters.

6. The integer returned by the method, maxMagnitude() is assigned to a local integer variable, max, as shown.

      int max = maxMagnitude(num1, num2);

7. The result is displayed to the user as shown.

System.out.println("The number with higher magnitude among "+num1+ " and "+num2+ " is "+max);

8. The class variables and the method, maxMagnitude(), are declared static so that they can be used and called inside main().

9. The variable, max, is called local variable since it can be used only within the main() where it is declared. It is not declared static.

10. The class is declared public since it has the main() method and execution begins with main().

11. The program is saved with the same name as the name of the public class having main(). In this case, the program is saved as Numbers.java.

12. No user input is taken for the two input parameter values. The static variables can be assigned any integer value and the program can be tested accordingly.

8 0
4 years ago
You are the network administrator for Slimjim, a peripheral device company. The network uses Linux, and you need information on
oksano4ka [1.4K]

Step 1 of 4

What command did you use to accomplish this task?

First of all, let us ask ourselves what manual pages or man pages are. Manual pages in Unix/Linux are sometimes referred to as an online form of software documentation. They are a set of pages that try to explain and expound every command available on your system. Further, these pages explain to you the specifics of what each command does and how to run them. And in this case, we can use two commands to search for all the commands that have the word "copy" in their name or description. The commands are “man –k copy” or “apropos copy”

Step 2 of 4

Are there any commands in this list that only a root user can execute? How are they indicated?

Yes. There are several commands in this list that only a root user can execute. If you would want to find out what these commands are, the best way to do that is to look at those manual pages that are indicated by the manual page section number. If it has a number 8, then a root user can execute this command

Let’s compare the cp command and the cpio command

If you do an apropos or a man page on the commands above, you will spot a few differences. The cp command is used to copy files and directories from source to target location while the cpio command copies files to and from archives. The available options are –a –b –d –f –i –l –L –p and several others. On the other hand, the available options for cpio are –0 –a –A –b –B –C –c –d –E and more.

Access and read the manual pages on three other commands that interest you either by using the command name or searching for them by related keyword (try using apropos)

affcopy command

NAME

      affcopy - reorder and recompress AFF files

SYNOPSIS

      affcopy [options] file1 file

      affcopy [options] file1 file2 file3 ... dir

      affcopy [options] file1 file2 file3 ... dir1 dir2...

OPTIONS

General options:

             -d     Print debugging information as well.

             -h     Help, print this message.

             -L     Recompress pages (preen) with LZMA (smaller but slower).

             -m     Just copy the missing segments.

bcopy command

NAME

      bcopy - copy byte sequence

SYNOPSIS

      #include <strings.h>

      void bcopy(const void *src, void *dest, size_t n);

DESCRIPTION

      The bcopy() function copies n bytes from src to dest.  The result is correct, even when both areas overlap.

RETURN VALUE

      None.

cifssd command

NAME

      cifsdd - convert and copy a file over SMB

SYNOPSIS

      cifsdd [OPERAND]...

      cifsdd OPTION

DESCRIPTION

      This tool is part of the samba(7) suite.

      Copy a file, converting and formatting according to the operands.

      bs=BYTES

          read and write up to BYTES bytes at a time (default: 4096)

      ibs=BYTES

          read up to BYTES bytes at a time (default: 4096)

      obs=BYTES

          write BYTES bytes at a time (default: 4096)

6 0
3 years ago
Other questions:
  • What is information reach? A. A global public network of computer networks that pass information from one to another using commo
    5·1 answer
  • Which directory in the FHS stores programs and configuration information that can only be executed and modified by the root user
    10·1 answer
  • How long after you install a new toilet until you can use it?
    15·1 answer
  • Can you please help me at question two
    13·1 answer
  • A network administrator is attempting to troubleshoot an issue regarding certificates on a secure website. During the troublesho
    8·1 answer
  • You need to implement a web application that is split in three parts, namely, Webpage, PHP and MySQL. Each of them will be used
    13·1 answer
  • The length of the hypotenuse of a right-angled triangle is the square root of the sum of the squares of the other two sides. Wri
    7·1 answer
  • What one main difference between social media and traditional media such as television?
    12·2 answers
  • Convert one billion byte into one storage unit​
    6·1 answer
  • I have this project and I can't do anything about it, I do really need help ASAP
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!