1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GuDViN [60]
2 years ago
11

A company wishes to begin the process of implementing a multi-party system and is looking for other companies with similar inter

ests to join them. with blockchain, every organization sees the same data.what does this provide?
Computers and Technology
1 answer:
Andre45 [30]2 years ago
7 0

If a company wishes to begin the process of implementing a multiparty system using block-chain, this provides Trust among the organizations.

<h3>What is a block chain?</h3>

A block chain is a listing of records referred to as blocks. Cryptography is used to link the blocks collectively.

Beginning a process of implementing a multi-party system provides trust among the organization, and not ownership, intent or uniqueness.

Read more about <em>systems </em>here:

brainly.com/question/14364696

You might be interested in
Overheating of a computer can be easily prevented. Explain how​
elixir [45]
Here are a few examples:

•] Keep away from windows or vents to prevent it from turning warm.

•] Clean off dust that’s on the computer.

•] Remove all the things that are blocking air to pass to let it cool down.

•] Putting a soft item below the computer is a action that is prohibited as it blocks the airways which causes it to overheat instead put it on a sturdy flat surface to prevent the aforementioned information.

•] To never overcharge your computer too 100% overnight or any time of the day since it overheats and causes battery life to be short, instead put it to charge when you’re conscious while keeping an eye on it, perhaps set a timer/alarm to notify you if you forget.
5 0
3 years ago
Which of the following best meets the requirements of a strong password?
Hoochie [10]

Answer:

having a capital and lower case letters and a special characters and numbers.

Explanation:

it should be hard but easy enough to remember and no one will know

6 0
3 years ago
Read 2 more answers
When you use the mvc pattern for a java web application, you often add ________________________ to the request object before you
aivan3 [116]
Hi,

JVM - Java Virtual Machine

Hope this helps.
r3t40
6 0
3 years ago
question 2 what are some types of software that you'd want to have an explicit application policy for? check all that apply.
zaharov [31]

The types of software that you'd want to have an explicit application policy are:

  • Filesharing software
  • video games

  • Explicit application policy are simply refered to as legal rights that are stated regarding ownership or company. It is actual substance of an agreement

  • Video games and filesharing software is of not really important in som business. So therefore, having explicit policies showing why or not this type of software is permitted on systems is okay.

Conclusively, we can say that Filesharing software and video games can require an explicit application policy.

Learn more from

brainly.com/question/12730075

4 0
3 years ago
What will you recommend to HP Mini 5103 Notebook?​
laiz [17]
Hey what are you guys going on with your dad today or tomorrow night
5 0
3 years ago
Other questions:
  • The weird suspicious box that k12 sends the parents to put on the router. im getting strange privacy error messages on google an
    8·1 answer
  • An output device is any device that displays, prints, or plays content stored on a computer. from the list below, identify the d
    14·1 answer
  • When using presentation aids A. make the aid available for the audience to look at throughout the speech. B. prepare to give you
    6·1 answer
  • How can website illustrate cooperations and kidness?
    8·1 answer
  • What is the name used for the integrated program development environment that comes with a Python installation?
    5·1 answer
  • What word describes the complexity of document
    13·1 answer
  • A network address is 131.247.160.0/19. The 19 implies that
    5·1 answer
  • A network with 6 bits remaining for the host portion will have how many usable hosts?​
    9·1 answer
  • A stateless firewall inspects each incoming packet to determine whether it belongs to a currently active connection.
    9·1 answer
  • Write a SELECT statement that returns three columns: VendorName from Vendors table, DefaultAccount No from Vendors table, Accoun
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!