Search for question
Question

QUESTION FOUR

(20 MARKS)

4.1 List and describe (FIVE) 5 security technologies applied in Big data.

(10)

4.2 List five ethics and (FIVE) 5 polies that governs the use and implementation of Big data (10)

Fig: 1