Sign Up Sign Up

1,111,111 TRP = 11,111 USD

Captcha Click on image to update the captcha.

Have an account? Sign In Now

Sign In Sign In

1,111,111 TRP = 11,111 USD

Forgot Password?

Need an account? Sign Up Here

Forgot Password Forgot Password

Reset Your New Password Now!

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Captcha Click on image to update the captcha.

Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question. Please subscribe to paid membership

Forgot Password?

Don't have an account? Sign Up Here
Please subscribe to paid membership

You must login to ask a question.

Forgot Password?

Don't have an account? Sign Up Here
Please subscribe to paid membership

Sorry, you do not have permission to add post. Please subscribe to paid membership

Forgot Password?

Don't have an account? Sign Up Here
Please subscribe to paid membership

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this memory should be reported.

Please briefly explain why you feel this user should be reported.

Memoir Logo Memoir Logo
Sign InSign Up

Memoir

Search
Release A Thought

Mobile menu

Close
Release A Thought
  • Knowledge
  • Passive Income
  • Assets
  • Memoir Help

Korsah_solomon

Ask Korsah_solomon
10 Followers
0 Thoughts
  • Overview
  • Questions
  • Answers
  • Best Answers
  • O3T Connect
  • Posts
  • Followers Answers
  1. Asked: October 8, 2021In: Science & Tech

    ai vs api

    Barry Bodhi
    Barry Bodhi Software Developer at Meiu Dev.
    Added an answer on October 8, 2021 at 11:59 pm

    APIs are the open door to sensitive data from a third party provider and require a great effort to secure. AI can help in analyzing secure threats and detect cyberattacks. AI can detect attacks such as Data Exfiltration, Advanced Persistent Threats (APT), Data Integrity, Memory Injection, DDoS API aUnfold thinking...

    APIs are the open door to sensitive data from a third party provider and require a great effort to secure. AI can help in analyzing secure threats and detect cyberattacks. AI can detect attacks such as Data Exfiltration, Advanced Persistent Threats (APT), Data Integrity, Memory Injection, DDoS API attacks, DDoS Login skimming, DDoS Payment API attacks / hacked, and so on.

    See less
      • 2
    • Share
      Share
      • Share on Facebook
      • Share on LinkedIn
      • Share on Twitter
      • Share on WhatsApp
  2. Asked: October 8, 2021In: General Reference

    google vs quora

    Barry Bodhi
    Barry Bodhi Software Developer at Meiu Dev.
    Added an answer on October 8, 2021 at 11:40 pm

    With Quora, the process is just as simple as Google's: You type in the question you have and you receive an answer. The difference? You may have to wait a bit longer for the answers. With Google, you have access to thousands of results within a matter of seconds. Although each of these platforms havUnfold thinking...

    With Quora, the process is just as simple as Google’s: You type in the question you have and you receive an answer. The difference? You may have to wait a bit longer for the answers. With Google, you have access to thousands of results within a matter of seconds.

    Although each of these platforms have their various algorithm, as well as site goals, Quora is a good place to get communal answers, while Google is good for wide scope of answers.

    Over all is, Google is better than Quora, just as Quora is better than Google in its own domain and purpose.

    See less
      • 2
    • Share
      Share
      • Share on Facebook
      • Share on LinkedIn
      • Share on Twitter
      • Share on WhatsApp
  3. Asked: September 20, 2021In: General Reference

    weed effects on sperm

    Still CAREEN
    Still CAREEN Skincare Technician at MICAN FASHION AND BEAUTY
    Added an answer on October 1, 2021 at 8:23 am

    SPERM has cannabinoid receptors on them, which is being suggested that CANNABIS has the ability to disrupt sperm function. Men who use weed more than once a week have 30% reduction in their sperm count and concentration. Recent studies have shown that men who have been on WEED for three months priorUnfold thinking...

    SPERM has cannabinoid receptors on them, which is being suggested that CANNABIS has the ability to disrupt sperm function. Men who use weed more than once a week have 30% reduction in their sperm count and concentration.
    Recent studies have shown that men who have been on WEED for three months prior to giving a semen sample have abnormal SPERM shape, also known as MORPHOLOGY most cases in younger men. High dosage of cannabis also shows a reduction in SPERM MOTILITY, the SPERM movement efficiency and how long the SPERM lives.
    To much use of cannabis causes TESTES to diminish in size and in a long run the male would not be able to function. WEED affect the hormones which helps in reproduction of SPERMS.

    See less
      • 4
    • Share
      Share
      • Share on Facebook
      • Share on LinkedIn
      • Share on Twitter
      • Share on WhatsApp
  4. Time-Monetization
    Advertisement
  5. Asked: September 23, 2021In: General Reference

    human brain vs phone os

    Mystikal ET0016
    Mystikal ET0016 Spiritual Monk and Mythologist
    Added an answer on September 23, 2021 at 1:03 pm

    Basically, from my accrued study, research, and personal UNILEX. The human brain operates on 01, or (0 and 1) just like your phone or computer device. But the prime difference between them is, when your brain is on 0 “that is when you’re sleeping” or "unaware of physical existence" it still functionUnfold thinking...

    Basically, from my accrued study, research, and personal UNILEX. The human brain operates on 01, or (0 and 1) just like your phone or computer device. But the prime difference between them is, when your brain is on 0 “that is when you’re sleeping” or “unaware of physical existence” it still functions properly. But your phone or computer don’t function when they’re on 0 “that is when they’re turned off”.

    The 0 and 1 symbol found in all electronics such as phones and computers, represent “on and off”, where “0” stands for off, and “1” stands for on, which then powers the device operating system (OS) to function. Same goes with the human brain. When you’re awake or aware of the physical existence, it means your brain is on “1”. And when you’re sleeping or unaware of the physical existence, it means your brain is off “0”.

    See less
      • 6
    • Share
      Share
      • Share on Facebook
      • Share on LinkedIn
      • Share on Twitter
      • Share on WhatsApp
  6. Asked: September 12, 2021In: General Reference

    what are the 3 types of computer hackers

    Barry Bodhi
    Barry Bodhi Software Developer at Meiu Dev.
    Added an answer on September 12, 2021 at 3:38 am

    According to a Thinking that was drip by @teddy010, he mentioned there are three types of computer hackers, which are as I list below for you; Three types of computer hackers - The white hat hackers - The grey hat hackers - The black hat hackers Then he quotes"-" "Each of those computer hackers execUnfold thinking...

    According to a Thinking that was drip by Teddy Lloyd, he mentioned there are three types of computer hackers, which are as I list below for you;

    Three types of computer hackers
    – The white hat hackers
    – The grey hat hackers
    – The black hat hackers

    Then he quotes”-”

    “Each of those computer hackers execute their hacking activities with different intend and motives, as you can well differentiate their intentions by their hats — as you read above. However, the black hat hackers are the most dangerous of all. Cheers!”.

    In my own words… I hope this was able to help answer your Thought.

    See less
      • 2
    • Share
      Share
      • Share on Facebook
      • Share on LinkedIn
      • Share on Twitter
      • Share on WhatsApp
  7. Asked: September 24, 2020In: Computers & Electronics

    who is a computer hacker

    Barry Bodhi
    Barry Bodhi Software Developer at Meiu Dev.
    Added an answer on September 12, 2021 at 3:18 am

    Computer hackers are unauthorized users who break into computer systems in order to steal, change or destroy information, often by installing dangerous malware without your knowledge or consent. Their clever tactics and detailed technical knowledge help them access the information you really don't wUnfold thinking...

    Computer hackers are unauthorized users who break into computer systems in order to steal, change or destroy information, often by installing dangerous malware without your knowledge or consent. Their clever tactics and detailed technical knowledge help them access the information you really don’t want them to have.

    See less
      • 3
    • Share
      Share
      • Share on Facebook
      • Share on LinkedIn
      • Share on Twitter
      • Share on WhatsApp
  8. Asked: June 17, 2021In: General Reference

    what is money

    Mystikal ET0016
    Mystikal ET0016 Spiritual Monk and Mythologist
    Added an answer on September 10, 2021 at 9:07 pm

    Money is anything of value, which can be used to obtain anything of cost, in the case where both things or services in the term of worth and quality are the same, or regarded as equal, and agreed upon. So in a more simple term, in my own English language understanding. Money is anything you can useUnfold thinking...

    Money is anything of value, which can be used to obtain anything of cost, in the case where both things or services in the term of worth and quality are the same, or regarded as equal, and agreed upon.

    So in a more simple term, in my own English language understanding. Money is anything you can use to buy anything.

    Nowadays we have money in various forms, from;

    – paper money, which are known today as fiats. $USD
    – online money, which are commonly known as digital currencies. or crypto. $BTC
    – liquid money, which is fast becoming known as bainoil. $TRP

    1 unit of the various form of money above is equivalent to another, at a specific amount based on basic mathematic calculations laws and protocols, and sometimes on each unique’s current exchange rates to another.

    See less
      • 2
    • Share
      Share
      • Share on Facebook
      • Share on LinkedIn
      • Share on Twitter
      • Share on WhatsApp
  9. Asked: September 8, 2021In: General Reference

    what is online trafficking

    John Nate
    John Nate
    Added an answer on September 8, 2021 at 1:20 am

    Traffickers are using the Internet as a means to target unsuspecting and vulnerable youth for their own personal financial gain as targets are seen as none other than a dollar sign. Sex trafficking is a form of modern slavery and online trafficking that exists throughout the United States and globalUnfold thinking...

    Traffickers are using the Internet as a means to target unsuspecting and vulnerable youth for their own personal financial gain as targets are seen as none other than a dollar sign. Sex trafficking is a form of modern slavery and online trafficking that exists throughout the United States and globally.

    See less
      • 1
    • Share
      Share
      • Share on Facebook
      • Share on LinkedIn
      • Share on Twitter
      • Share on WhatsApp
  10. Asked: August 2, 2020In: General Reference

    what is autopilot

    Barry Bodhi
    Barry Bodhi Software Developer at Meiu Dev.
    Added an answer on September 4, 2021 at 5:52 am

    Autopilot simply means to put something, or a device to take control on it's own without the present help of any human. In other words, autopilot is a programmed automatic of a mechanism to move freely in time as programmed by human.

    Autopilot simply means to put something, or a device to take control on it’s own without the present help of any human. In other words, autopilot is a programmed automatic of a mechanism to move freely in time as programmed by human.

    See less
      • 3
    • Share
      Share
      • Share on Facebook
      • Share on LinkedIn
      • Share on Twitter
      • Share on WhatsApp
  11. Asked: June 12, 2021In: Science & Tech

    what is search engine

    Barry Bodhi
    Barry Bodhi Software Developer at Meiu Dev.
    Added an answer on September 4, 2021 at 5:43 am

    Search engine is a program that searches for and identifies items or information in a database that correspond to terms, phrases, keywords or characters specified by the search engine user, search engines are used especially for finding particular sites on the World Wide Web.

    Search engine is a program that searches for and identifies items or information in a database that correspond to terms, phrases, keywords or characters specified by the search engine user, search engines are used especially for finding particular sites on the World Wide Web.

    See less
      • 2
    • Share
      Share
      • Share on Facebook
      • Share on LinkedIn
      • Share on Twitter
      • Share on WhatsApp
1 2 3 4 5 6 … 32

Sidebar

Sponsored eBook

aalan

Aliens

Kago Thainyane

Kago Thainyane

  • 16 Thoughts
  • 13 Vibrations
BAKOMA HANSON

BAKOMA HANSON

  • 856 Thoughts
  • 11 Vibrations
Apostle

Apostle

  • 303 Thoughts
  • 9 Vibrations

Explore

  • Knowledge
  • Passive Income
  • Assets
  • Memoir Help

ABOUT | TERMS | BUSINESS | MONETIZE
© 2025 IOT. All Rights Reserved. The World at Your Fingertips