Skip to content

Commit c7e209e

Browse files
authored
Merge pull request #31 from KidiIT/revert-30-revert-29-revert-28-revert-27-revert-26-revert-25-revert-24-revert-23-revert-22-revert-21-revert-20-KidiIT-patch-13
Revert "Revert "Revert "Revert "Revert "Revert "Revert "Revert "Revert "Revert "Revert "Update README.md"""""""""""
2 parents db648b0 + a86a09e commit c7e209e

File tree

1 file changed

+3
-4
lines changed

1 file changed

+3
-4
lines changed

README.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -23,12 +23,11 @@ How to use and the purpose of this project:
2323

2424
10: lastly, you can clear your timer by mutiplying the varibale time(value) which 200 * 1000(timer) to be able to iterate and excute its expected function at the right time. I presumed that we must've assimilated alot today.
2525

26-
Just a recap for quick understanding, to solve this problem you only need two responsive functions which are the setinterval function that take care of the timer while the settimeout function will be responsible to execute any function for clearing of the time that's been assign by the programmer at the initial stage.
26+
Just a recap for quick understanding, to solve this problem you need two responsive functions which are the setinterval function that take care of the timer while the settimeout function is responsible to execute any function for clearing of the time that's been assign by the programmer at the initial stage.
2727

28-
furthermore, In reference to the development of a proactive security software that will be used to protect an organization infrastructure. however, this is where this problem solving or project will be applied. for instance, If a cybersecurity analyst is given a task to develop a software that will helps to protect an organization from their potential threats, risks and vulnerabilities. the dveloper can apply this method by using setinterval function method to set a timer and the SetTimeout function to clear the time on the program that will execute the software functionality. this method can be a very effective and essential way in validating and creating a software that will protect the financial aspect of an organization by detecting and clearing any found threats or risksa nd vulnerabilities that can be harmful to the organization and prevent them from happening at the first place.
28+
furthermore, In reference to the development of a proactive security software that will be used to protect an organization infrastructure, this is where this problem solving or project will be of help. for instance, If a cybersecurity analyst personnel is developing a software that helps to protect an organization from their potential threats, risks and vulnerabilities. Making the use setinterval function to set a timer and the SetTimeout function to clear the time of which the program that will execute the software functionality will a very effective and essential way in validating and creating a software that will protect the financial aspect of an organization by detecting and clearing any found threat or risk that will compromised the security standard or confidential information of an organization. Most importantly, It'll protect the company's reputation by making them meeting up to the regulatory policy in cyber security.
2929

30-
By doing this, It'll protect the assets of an organization from been compromised of their the security standard and leaking of confidential informations that will lead to damage of the brand or company. Most importantly, It'll protect the company's reputation by making them meeting up to the regulatory policy in cyber security.
31-
Also, the last part of this algorithm deals with the EventListener in javascript. which will be attached soonest. do well to reach if experience any issue on your progress.
30+
Also, the last part of this algorithm deal with the eventlistener in javascript. which will be attached soonest. do well to reach if experience any issue on your process.
3231

3332

3433

0 commit comments

Comments
 (0)