1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Strike441 [17]
2 years ago
12

How is blockchain different from traditional database models?

Computers and Technology
1 answer:
Natasha2012 [34]2 years ago
5 0

Answer:

The primary difference between a blockchain and a database is centralization. While all records secured on a database are centralized, each participant on a blockchain has a secured copy of all records and all changes so each user can view the provenance of the data.

You might be interested in
In 1-2 pages, identify a social networking technology and identify at least 10 security and/or privacy risks the technology has
algol13

Answer:

One of the biggest social media giants has faced many such security and privacy risks in the past 3 years. 10 are listed below:

1. No one can forget the New Zealand attack on the mosque, and it was telecast live via it. And that is certainly a security risk. And if someone is able to stream live, the AI is in question definitely as this cannot be telecast.

2. Can you forget the various US shooting cases in the past 5 years? And many out of them where telecast lives on it. Again the AI, and the authentication is in question.

3. Many evils have many times advertised itself through it, and that is a security risk. This put up the question on the Data Scientists of the company.

4. It's a huge data on it, and many users have been able to misuse it, and that is a security risk. This put up the question mark on the application of the Big Data.

5. Once, the UK parliament questioned it to sell the secret data, and that was a privacy risk.

6. An Engineer was caught negotiating to sell secret users data to a third party, and that is a privacy risk as well as a question on management technology, as its possible now to check these kind of frauds.

7. Its accounts have been hacked many times, as well as millions of user-profiles, were stolen. This is a security and privacy risk.

8. Its data is still not safe as evils have proved they can break the authentication. However, it has reacted well, and they look like being a safe destination now.

9. Once, someone from Russia was caught collecting a lot of data from it. That was a security and privacy risk. And surely if someone is uploading a lot of complicated and confidential data, must be checked through proper AI implementation.

10. In India too there have been claims that a lot of personal information during elections 2014 was sold. That was a security and data risk. And the data scientists were proved vulnerable again. Its quite sure hence, a lot of work has to be done in Data Science and Artificial intelligence still.

However, its owner is one of the finest souls on earth. He donated all his money when he was blessed with a child. Some out of his team cheated, and else some technology failure or the huge amount of data was the reason for the fault. However, other companies are also facing such problems. And hence, he cannot be blamed for this. And the company now definitely has recovered from the nightmare that they faced in the past 3 years.

Explanation:

The answer is self explanatory.

8 0
3 years ago
PLEASE HURRY!!<br> Look at the image below
djverab [1.8K]

Answer:

The function usernameMaker.

Explanation:

strFirst is a local variable in the function usernameMaker since it is an argument that is passed into that function. This means that the scope of strFirst is the function usernameMaker, since it cannot be accessed anywhere else in the code.

Hope this helps :)

8 0
3 years ago
The _____________ loop allows the receiver to communicate with the sender in the imc process.
postnew [5]
Feedbacks
perhaps !!
<span>The feedback loop allows the receiver to communicate with the sender in the imc process.</span>
4 0
3 years ago
List two functions of the UPS​
Alja [10]

Answer:

To protect equipment in the event of power-cut

To ensure stable supply of current (protects against surges)

Explanation:

4 0
3 years ago
What is the name of the fifth Sims 3 expansion pack
olga2289 [7]
2 were released as part 5 for the Sims 3 Expansion Pack Series. These two packs were the Pets Expansion and the Master Suite pack which added buyable and ownable pets and hotels.
8 0
3 years ago
Other questions:
  • Eye injuries usually occur as a result of all of the following things, EXCEPT:
    13·2 answers
  • Consider a multiprocessor CPU scheduling policy. There are 2 options: 1) a singlecommon ready queue of jobs; when a CPU becomes
    8·1 answer
  • "This command will give you a listing of your basic IP information for the computer you are using"
    6·1 answer
  • What features are provided by most GUIs?
    7·1 answer
  • Which term describes computers (e.g., Windows PC, Mac OS X) with applications that allow a person to perform diverse tasks, from
    5·1 answer
  • Disk ___________________ helps improve the speed and efficiency of a hard disk.
    6·1 answer
  • How can the use of new technology in industry benefit the us government
    8·2 answers
  • Please help me. i will mark you brailiest
    6·1 answer
  • LIST THE BEST 10 3D PRINTERS WITH THEIR RESPECTIVE APPLICATION SOFTWARES.
    5·2 answers
  • What is a list of things we use programming for??? longest gets brainly
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!