1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olganol [36]
3 years ago
6

Both ________ and ________ automatically check your previous transactions to make sure you have enough bitcoins to send

Computers and Technology
2 answers:
Colt1911 [192]3 years ago
7 0
<h2>Hello!</h2>

The answer is: Both Wallet and Bitcoin network nodes automatically check your previous transactions to make sure you have enough bitcoins to send

<h2>Why?</h2>

There are two ways of balance checking on the Bitcoin Blockchain, for each transaction there is a "link", this link is unique and it's related to an incoming transaction between wallets, these links are called "inputs".

Node's role is to verify that each input is still useful or have not been spent before yet. Every time an input is used in a transaction, it becomes invalid to future transactions. All this process is performed in the Bitcoin Wallet and then, checked again by the bitcoin network nodes.

Have a nice day!

Klio2033 [76]3 years ago
7 0

Both wallet and bitcoin network nodes automatically check your previous transactions to make sure you have enough bitcoins to send.

Further Explanation:

Bitcoin: Bitcoin is a cryptocurrency which is created in 2009 by Satoshi Nakamoto. Block chain contains several nodes for transaction. Each node consist a copy of the ledger in bitcoin. For sending a bitcoin to other person, the sender has to generate a transaction which includes link of incoming transaction. The created link for incoming transaction should be unique and between the wallets of sender and receiver. These links are known as input. The role of node is to verify that each link is unique and should not be used earlier. If the link is not unique then it is not valid for future transaction.

Learn more:

1. A company that allows you to license software monthly to use online is an example of ? brainly.com/question/10410011  

2. Prediction accuracy of a neural network depends on _______________ and ______________. brainly.com/question/10599832  

3. The shape of our galaxy was determined ‘on the inside looking out' by surveying the milky way using ____________ telescopes. brainly.com/question/7866623  

4. List 3 characteristics of the ideal encryption scheme. brainly.com/question/3000161  

Answer details:

  • Grade: Computer Engineering
  • Subject: Cryptography
  • Chapter: Bitcoin Blockchain

Keyword:

Cryptography, bitcoin, block chain, digital currency, cryptocurrency, wallet, network, nodes, previous, transaction, sender, receiver, link, unique, copy, ledger, Satoshi Nakamoto

You might be interested in
Using tracking code, google analytics can report on data from which systems?
soldier1979 [14.2K]
The correct answers are:
<span>E-commerce platformsMobile
Applications
Online point-of-sales systems
Source and explanation: https://goo.gl/guJKC9
</span>
6 0
3 years ago
XYZ Corp.’s facilities in Nashua, New Hampshire, are two office buildings 400 feet apart, each with its own LAN. To connect the
damaskus [11]

Answer:

a: Twisted pair won't span a 400-foot distance.

Explanation:

The maximum distance that twisted pair cables can support without attenuation is 100 meters which is approximately 328 feet and the two office buildings are 400 feet apart, so it is useless to install a twisted pair cable for such a large distance. A much better option would be to install optic fiber. Though it is a bit expensive but it is the best option in this case.

Hence option (a) is the correct reason for installing an optic fiber cable rather than a twisted pair cable.

6 0
3 years ago
Which part of the processing unit does the logic operations?<br> A. ALC<br> B. CU
ycow [4]

isn't it ALU I got told it was ALU

4 0
3 years ago
Money left over after the bills are paid is referred to as
sveta [45]
Change is what is left over 

ex. the cashier tells you "here is your leftover change sir/ma'am "<span />
3 0
3 years ago
Read 2 more answers
In general, WAN-specific standards identify specific security requirements for WAN devices. For example, the ___________________
allsm [11]

Answer:

WAN router security standard, Web services standard

Explanation:

Complete statement with blanks filled:

In general, WAN-specific standards identify specific security requirements for WAN devices. For example, the WAN router security standard explains the family of controls needed to secure the connection from the internal network to the WAN router, whereas the Web services standard identifies which controls are vital for use of Web services provided by suppliers and external partnerships.

7 0
3 years ago
Other questions:
  • An authenticated user can add up to how many computer accounts to the domain, by default
    6·1 answer
  • Which of the following is true of two-factor authentication?
    13·1 answer
  • If you think the user might enter 24.9, you should create a float variable. true or false
    9·1 answer
  • Which statement describes what happens if multiple users make changes simultaneously to a presentation when
    10·1 answer
  • ​if a primary key combines two or more fields, then it is called a _____.
    14·1 answer
  • A 1000 elements array is used to store integers ascending order . The array is used to search binary search algorithm for the in
    14·1 answer
  • Fill in the blanks to make the factorial function return the factorial of n. Then, print the first 10 factorials (from 0 to 9) w
    6·1 answer
  • Estoy empezando a usar una pagina llamada source filmmaker, no se que apreté y quiero el menú de nuevo (en donde se ponen los mo
    14·1 answer
  • Which quality should an experiment have to be replicable and valid? O clearly detailed results O a well-cited research paper O s
    7·1 answer
  • Use the drop-down menus to complete statements about the Quick Steps function.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!