(20 MARKS)
4.1 List and describe (FIVE) 5 security technologies applied in Big data.
(10)
4.2 List five ethics and (FIVE) 5 polies that governs the use and implementation of Big data (10)
Fig: 1