1.1: Describe 2 storage techniques and compare their uses, strengths and limitations.
What is the software you would suggest to protect the stored data in the above mentioned storage techniques.