Blockchain technology are in commonly used in this dispensation. The thing that sets blockchain solutions apart from conventional record-keeping solutions is simply the ability to share different versions of the same data to multiple parties.
Blockchain is known to buildup trust, security, transparency, and the traceability of data shared across a business network. It also minimize cost with new efficiencies.
It is simply known to be distributed ledger technology that helps in the storage of information in the form of blocks and no one can change or add the data.
See full question below
What sets blockchain solutions apart from conventional record-keeping solutions?
the ability for multiple parties to be certain they are using the same data
the ability to share different versions of the same data to multiple parties
a focus and priority on bitcoin and cryptocurrency
a system that maintains rigor and complexity
Learn more from
https://brainly.com/question/21105181
. Circle the correct choice for each statement 1. The number of substances in a mixture (can - cannot) be varied, for a compound they (can - cannot). 2. The different substances in a mixture (can - cannot) be joined chemically; a compound (can - cannot). 3. Substances in a mixture (do - do not) keep their own properties. 4. Substances in a compound (can - cannot) be easily separated; in a mixture, they (can - cannot). 5. Examples of (mixtures - compounds) are air, sea water, and most rocks. 6. Examples of (mixtures - compounds) are water, salt, and sugar. 7. Compounds are made of elements and have a (physical – chemical) formula. 8. A (solvent - solute) is the substance that dissolves in another substance. 9. True or False: A mixture cannot have five substances. 10. True or False: In a suspension, a substance may sink to the bottom.
Answer:
1 cannot
can
2 can
cannot
3 do not
4 can
cannot
5
1. How many colors are available in color. palette.
2. 20 colors are available in color palette. True / False
Answer:
16 colors in the palette
false only 16 colors
What is considered a relatively new science that is being developed?
O targeting advertising to number of downloads
O targeting advertising to demographics
O targeting advertising to geography
O targeting advertising to adolescents
Answer:
b
Explanation:
Targeting advertising to demographics is considered a relatively new science that is being developed. Option (b) is correct.
What do you mean by Geography?The study of places and the interactions between people and their environs is known as geography. Geographers study the surface of the Earth and the various human societies that live there.
Advertising refers to the methods used to draw attention to a good or service. In order to attract consumers' attention, advertising seeks to highlight a good or service. It is often used to market a particular product or service, although there are many other applications as well, with commercial advertising being the most popular.
Through "branding," which links a product name or image with particular traits in consumers' minds, commercial advertising frequently aim to boost consumption of their goods or services.
Therefore, Option (b) is correct. Targeting advertising to demographics is considered a relatively new science that is being developed.
Learn more about Geography, here;
https://brainly.com/question/1462956
#SPJ2
Each computer on a network is called a __________, and it can include many different systems, such as desktop and laptop computers, printers, routers, switches, and cell phones.
A host refers to each of the computer system connected to a network and it include the following different systems:
Desktop Laptop computersPrintersRoutersSwitchesCell phonesWhat is a host?
A host can be defined as an electronic computing and programmable device that can be used to transmit and receive data (packets) over the Internet, especially when it is connected to a network.
This ultimately implies that, each electronic computing and programmable device (computer) on a particular network is a host and it can include many different systems such as:
Desktop Laptop computersPrintersRoutersSwitchesCell phonesRead more on computers here: https://brainly.com/question/17402566
4.7 Code Practice: Question 1 Please help!
Which one of the following careers is the most highly resistant to economic change?
Video Game Designers
Airline Pilots
Fashion Designers
Funeral Attendants
Answer:
Video game designers bbbbbbbbbbbbb
Where to store
ammunition
What is true about client-side scripting?
Answer:
A client-side script is a program that is processed within the client browser. These kinds of scripts are small programs which are downloaded , compiled and run by the browser. JavaScript is an important client-side scripting language and widely used in dynamic websites.
Explanation:
Client-side scripting refers to the execution of scripts on the client's device (typically in a web browser) rather than on the server.
Given that,
To write about client-side scripting.
Since, Client-side scripting simply means running scripts, such as JavaScript, on the client device, usually within a browser.
All kinds of scripts can run on the client side if they are written in JavaScript because JavaScript is universally supported.
Therefore, client-side scripting enables the execution of scripts on the client's device, enhancing web interactivity and reducing server load.
JavaScript is a widely used language for client-side scripting.
To learn more about scripting visit:
https://brainly.com/question/26121358
#SPJ4
The operating system called Windows 7 is typically used for _____ a. Laptop computers b. Super computer c. All of the options d. Desktop computers
Answer:
all of these
Explanation:
,,,,,,,,,,,,,,,,
The operating system called Windows 7 is typically used for C All of these.
An operating system simply means a collection of programs that is vital for coordinating the operations of the computer software and hardware.
It should be noted that the operating system called Windows 7 is typically used for laptop computers, super computer, and desktop computers.
Therefore, the correct option is All of these.
Read related link on:
https://brainly.com/question/17252990
what is the full meaning of the following acronyms:ARPANET, BOOTP, GSM, GUI, EOM, EULA, CTSS.
Answer:
ARPANET: Advanced Research Projects Agency Network
BOOTP: Bootstrap Protocol
GSM: Global System for Mobiles
GUI: graphical user interface
EOM: Enterprise Output Management
EULA: end-user license agreement
CTSS: The Compatible Time Sharing System
Explanation:
BEFORE GOING FOWARD KNOW THAT I DO NOT OWN THESE TEXTS.
GSM= a standard developed by the European Telecommunications Standards Institute to describe the protocols for second-generation digital cellular networks used by mobile devices such as mobile phones and tablets.
ARPANET=the first public packet-switched computer network. It was first used in 1969 and finally decommissioned in 1989. ... Many of the protocols used by computer networks today were developed for ARPANET, and it is considered the forerunner of the modern internet.
BOOTP= is an internet protocol that lets a network user automatically be configured to receive an IP address and have an operating system booted without user involvement.
GUI= A graphics-based operating system interface that uses icons, menus and a mouse (to click on the icon or pull down the menus) to manage interaction with the system.
EOM= refers to the process by which enterprise organizations manage, format and distribute data created from operational applications.
EULA= An end-user license agreement (EULA) is a license that gives a user the right to use a software application in some manner. EULAs are designed to enforce specific software use limitations, such as only using the software on one computer.
CTSS=services for children who require varying therapeutic and rehabilitative levels of intervention to address conditions of mental illness or emotional disturbance that impair and interfere with development and functioning. overcome deficits or maladaptive skills acquired over the course of a psychiatric illness.
1. Briefly summarize the similarities and differences among temporary staffing firms, employee leasing organizations, and professional employment organizations. Which approach pro- vides an organization the most protection from potential coemployment situations?
A staffing firm simply refers to an organization that matches companies and job candidates. It's also known as a recruiting firm.
It should be noted that employers use staffing agencies to help recruit candidates for them and to fill certain job openings.
An employee leasing organization furnishes workers to another client on a long-term basis. It's usually a contractual agreement between the parties that are involved.
A professional employer organization simply means an organization that enters into a joint employer relationship with another employer by leasing employees to the employer.
The organization that typically gives protection from potential coemployment situations is the temporary staffing firms.
Read related link on:
https://brainly.com/question/25747300
Which two tabs appear when a table is "active" in Microsoft Word?
Insert
Table Design
Home
Layout
Answer:
Layout and Table Design
Explanation:
. A binary search has a right subtree but no left subtree. What noes contains that least element in the tree
The root node will contain the smallest element
vA student found a book on the library bookshelf last week, and recorded the source information.
Book title: My Traitor’s Heart Author: Rian Malan
Publication date: 1990 Publisher: Bodley Head Publication city: London
Use the drop-down menus to indicate how the student should format this source on a works-cited list.
My Traitor’s Heart.
London:
Answer:
3,1,2,1
Explanation:
got it right on edge
have a nice day
:)
Answer:
1. Malan, Rian
2. London:
3. Bodley Head, 1990
4. Print
Explanation:
did it
Hi! ❤️ , im looking for some help here. ill give brainliest if able to.
Answer:
I think the answer is 2
Explanation:
since your trying to search for the temperature in a specific area in New York
What are software applications?
Answer:
the first option is obviously the correct answer
What is the full form of eniac and univac ?
thanks!!
Answer:
ENIAC - Electronic Numerical Integrator and Calculator. UNIVAC - Universal Automatic Computer (First Digital Computer)
Mark brilliant please
Answer:
[tex]ENIAC - Electronic \: Numerical \: \\ Integrator \: and \: Computer[/tex]
[tex]UNIVAC- Universal \: Automatic \: Computer[/tex]
A keyboard would be considered _____. Select 2 options.
an input device
storage
an output device
software
hardware
Answer:
input devise and hardware
Explanation:
A function getints has been defined that has no parameters and returns an array of integer values. The first value in the array contains the total number of items in the array (including itself). Write code (not a function or main) to: Write a prototype for getints() Call getints() From the resulting array, print the first value (after the length) and the last value, each on a separate line.
Answer:
Explanation:In the below code : Create method getints() : with no arguments and integer array return type Inside method : Declare n integer Input n Declare integer array with n length : arrInt Assign n at 0th array index Use loop from 1 to n: i counter Input arr... view the full answer
Function getints is presented in the Prototype of the following code will be:
// Prototype
int* getints();
What is function getints?This function requests an integer from the person using it and then returns it. You can ask for the integer using a prompt argument.
Older OSes used the C method getch() to collect user input. Depending on the function call, it only allows one input character at a time. Unless the user supplies input, the program's execution is halted.
For trhe Prototype the code will be:
// Prototype
int* getints();
For the getints the code will be:
// Call getints()
int* array = getints();
The print values will be:
// Print the first and last value
printf("The first value is %d\n", array[1]);
printf("The last value is %d\n", array[array[0]]);
Learn more about function getints, here:
https://brainly.com/question/30928705
#SPJ2
Devices on one network can communicate with devices on another network via,
1)Multiplexer
2)Printer
3)Router
4)Hub
It is option 4 a hub cuz that is what it is used for
Answer:
3
Explanation:
An information of a 500GB is transferred at the speed of 10MB/s. Calculate the full time the information will be transfer.
Answer:
50,000 seconds
Explanation:
First multiply 500GB into 1000.(*1GB is equal to 1000MB so were going to multiply it so that we can get the exact MB) and we will get 500,000 MB. Then let's divide it by 10.(*since 10MB can be transfer in just one second.) and we will get 50,000 SECONDS.
Hope it can help you lovelots
write a Assembly Language program that copies only unsigned numbers from Array1 to another Array2. The Array1 has both signed and unsigned numbers.
Array1 = { -4,-1,-2,-1,0,1,2,3,4 }
Unsigned numbers do not have preceeding positive or negative signs. Hence, the program written in python 3 copies unsigned values in the given array to another array thus :
array1 = {-4,-1,-2,-1,0,1,2,3,4 }
#assigns a set of values to array 1
array2 = set()
#initialize an empty array
for ele in array1 :
#loop through the values in array1
if ele >= 0 :
#since the signed values are negative, checks for values greater than or equal to 0
array2.add(ele)
#add to array 2
print(array2)
A sample run of the program is attached.
Learn more : https://brainly.com/question/25706522
4. When working at the CLI in Linux, you specify the exact location of a file, which is the ____________________ to it, by beginning with a forward slash (/) to indicate the root directory.
Command line interface is used in form of a messenger conversation with your computer. You specify the exact location of a file, which is the pwd to it.
The Command Line Interface (CLI), is said to be a non-graphical, text-based interface attached to the computer system.It is where the user input in a command and the computer then successfully executes it.
The Terminal is known to gives the command line interface (CLI) environment to the user.
The pwd command is simply known to be used in determining an exact folder location or path in Terminal.
Learn more from
https://brainly.com/question/25435538
Online Book Merchants offers premium customers 1 free book with every purchase of 5 or more books and offers 2 free books with every purchase of 8 or more books. It offers regular customers 1 free book with every purchase of 7 or more books, and offers 2 free books with every purchase of 12 or more books.
Write a statement that assigns freeBooks the appropriate value based on the values of the bool variable isPremiumCustomer and the int variable nbooksPurchased. Assign 0 to freeBooks if no free books are offered. Assume the variables freeBooks, isPremiumCustomer, and nbooksPurchased are already declared.
In C++ please
fill in the blanks
we should our selves
philip was required to conduct training on the use of new computer systems in his company. explain two training methods that could have used.
Instructor-led training.
eLearning.
Simulation employee training.
Hands-on training.
Coaching or mentoring.
Lectures.
Group discussion and activities.
Role-playing.
How do you create speaker note changes that show the slides, related notes and company logo on each page
Answer:
The Notes Master contains two placeholders one for your text and the other for the slide. We can move or change the size of either of these objects and we can change the format of the text in the notes placeholder, we can also add or change elements that we want to appear on each handout and also notice the convenient placement of the header, footer, date and page numbers.
The date of creation can be added to a slide using the:
a.
"Insert" tab, "Add note" group
b.
"Edit" group of the ribbon
c.
"Insert" tab, "Text" group
Answer:
The answer to your question is Insert tab Tex group.
The date of creation can be added to a slide by using the: "Insert" tab, "Text" group.
What is a slide?A slide refers to a single page of a presentation that is made up of text-based information or images, which can be used by a presenter to teach, instruct and educate the audience on a topic, subject matter, event or idea.
In Microsoft Powerpoint, an end user can add the date of creation to a slide by using the "Insert" tab, "Text" group.
Read more on slides here: https://brainly.com/question/11741377
#SPJ2
Gilbert has an Excel spreadsheet open in Tableau. What did Gilbert have to do to bring the spreadsheet into Tableau?
Tableau is said to mainly connects to Excel spreadsheets to make data analysis fast and easy. What Gilbert have to do to bring the spreadsheet into Tableau is that He is to connect to an outside data source.
Tableau is often used as a form of connection to Excel spreadsheets so as the data analysis very simple.It gives room for Excel users to keep their spreadsheets even when they are polishing their ability to analyze their data, while giving simple to build, simple to read visualizations that shows information boldly.
See full question below
Gilbert has an Excel spreadsheet open in Tableau. What did Gilbert have to do to bring the spreadsheet into Tableau?
Select an answer:
A. He moved the Excel spreadsheet onto the Tableau server, and then opened it in Tableau.
B. He connected to an outside data source.
C. He dragged and dropped the file into Tableau.
He duplicated the data in Tableau.
Learn more from
https://brainly.com/question/22908883
Choose a project with a relatively simple description (e.g. building a LAN,
designing a business web page, inventing a new communication device,
etc.). Describe your project scope in 100 words and then identify at least
five significant varied risks associated with the project. Be sure that at
least one of them is a positive risk
Answer:
Design a web page
Explanation:
It is easier html is a very easy language to learn css it should take ou about a week for a solid website
An application maintains social security numbers and birth dates in a database to track medical records across multiple offices. To maintain the personally identifiable information (PII), which of the following de-identification methods should the application adopt?
There are different ways of management. To maintain the personally identifiable information (PII), Data masking as an de-identification methods should the application adopted.
Data masking is also called data obfuscation. This is simply known as the way of improving or modifying sensitive data so that it has no/little value to unauthorized intruders while still being usable by software or authorized personnel.
It often functions by shielding confidential data, such as credit card information, Social Security numbers, names, addresses, and phone numbers etc.
Learn more from
https://brainly.com/question/13438921