1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksi-84 [34.3K]
2 years ago
11

How does block chain support data privacy?

Computers and Technology
1 answer:
alexdok [17]2 years ago
8 0

Answer:

Blockchain transactions allow users to control their data through private and public keys, allowing them to own it. Third-party intermediaries are not allowed to misuse and obtain data. If personal data are stored on the blockchain, owners of such data can control when and how a third party can access it.

Explanation:

hope it helps you

You might be interested in
1. What conversion factor should be used to convert from Gigaliters to liters?
Ilia_Sergeevich [38]
The conversion factor is 10 to the 9th power
5 0
3 years ago
When you're working with a word processing document and you press the del key, what happens?
LuckyWell [14K]
The correct answer is C.
6 0
3 years ago
Do you agree with the EU's decision that people should be able to ask Google to remove search results that contain incorrect, un
AnnyKZ [126]

Answer: Yes

Explanation: One should not be able to just find negative information on someone just because they googled it (unless they're famous of course)

7 0
3 years ago
Read 2 more answers
Why would a store owner want to calculate a mean
chubhunter [2.5K]

Answer:

a store owner would calculate a mean to see the how much a person spends

Explanation:

4 0
3 years ago
Which mitigation technique would prevent rogue servers from providing false ip configuration parameters to clients?
IrinaVladis [17]
DHCP snooping is a mitigation technique<span> to </span>prevent rogue<span> DHCP </span>servers  <span>from </span>providing false IP configuration parameters to clients.  DHCP snooping<span> is a security feature that acts like a firewall between untrusted hosts and trusted </span>DHCP<span> servers. It is</span><span> a series of techniques applied to improve the security of a </span>DHCP<span> infrastructure. </span>
6 0
3 years ago
Read 2 more answers
Other questions:
  • NEED ASWERS FAST
    12·1 answer
  • What tool do you use to secure remote access by users who utilize the internet??
    7·1 answer
  • Given the function definition below, what is the effect of thecall:
    7·2 answers
  • When using a file name you have to use only lower case letters<br>true or false
    11·1 answer
  • Write a program that asks the user for a CSV of the NYC Open Data Film Permits: There is a sample file for June 2019 film permit
    9·2 answers
  • Ebba received a message from one of her tech support employees. In violation of company policy, a user had downloaded a free pro
    14·1 answer
  • Que se puede observar en el escritorio de windows
    8·1 answer
  • Complete the statement below using the correct term.<br>Website managers use<br>every day​
    11·2 answers
  • Please answer me fast ​
    6·2 answers
  • The percentage of typical calls that would reach a respondent eligible to participate in a project is called the
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!