To ensure information security, we need the hash function to encrypt them.

Type

Three types of hash functions:

  • SHA1: sha-1 will generate 160-bit (20-byte) 40 int hash.
  • SHA2: 256, 224, and so on…
  • SHA3: Subset of the broader family of algorithms called Keccak. Not included in this course.
Read more »

Agile has becomes a famous interactive process for developing software.

Why Agile

Why not Waterfall

In a waterfall, every stage depends on the previous stage.

  • Con: no variation, adaptability, or other error once a waterfall project is set in motion.
  • Pro: clear, productive, good time management, and available progress tracing.

Agile is more flexibility, adaptivity, and error tolerable.

Read more »

It is a good code-writing habit for code understanding and development.

Why

Over time, code evolves, whereas code comments go stale.

Read more »
0%