Please enable JavaScript.
Coggle requires JavaScript to display documents.
Part 1 - Coggle Diagram
Part 1
Data specification
-
-
-
-
-
-
-
-
AJAX approach could be used to provide the basic information and use an animated graphic while waiting for asynchronous data
-
-
-
Data security
Symmetric
-
symmetric encryption may have worked in Caesar's time, and does work when the key is predetermined and carefully shared within an organisation.
Asymmetric
A vital method of security on the Internet. Banks, governments, and other organisations rely on asymmetric encryption to complete financial transactions safely and securely, access and exchange sensitive information and stop snooping information by third parties.
In asymmetric text cryptography, a system will develop two separate but linked keys - a public key, which is given to users who wish to send the system encrypted information. A private key is kept totally secret and is used to decrypt what is received from others.
Data exchange
Synchronous
-
-
With synchronous learning, participants can receive immediate feedback.
-