1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergey [27]
3 years ago
9

Who is a miner?

Computers and Technology
1 answer:
aleksandr82 [10.1K]3 years ago
4 0
A) an algorithm that predicts the next part of the chain
You might be interested in
What is the difference in adware and spyware
Katarina [22]

Generally speaking, adware is a program that installs an additional component that feeds advertising to your computer, often by delivering pop-up ads or by installing a toolbar in your browser.

Some adware may hijack your browser start or search pages, redirecting you to sites other than intended. Unless you're a fan of guerrilla marketing, such tactics can be annoying. Worse, the mechanism that feeds the advertising can introduce system anomalies or incompatibilities that cause problems with other programs and can even disrupt the functioning of the operating system.

Spyware surreptitiously monitors your computer and internet use. Some of the worst examples of spyware include keyloggers who record keystrokes or screenshots, sending them to remote attackers who hope to glean user IDs, passwords, credit card numbers, and other sensitive information.

Most often, though, spyware takes a more benign but still quite offensive form. The information gathered, often referred to as "traffic data," can consist of monitoring the websites visited, ads clicked, and time spent on certain sites. But even in its more benign form, the collected data can morph into something far more insidious.

Hope this helped.. ;D

3 0
3 years ago
Read 2 more answers
Describe the concepts of Defense in Depth and Detection in Depth. Compare and contrast. What's different? What's similar?
olchik [2.2K]

Answer:

 The main concept of the defense in depth is that the various defensive mechanism series are used for protecting the data and the information in the system. This approach is basically used multiple layers to control the cyber security. It also mainly provide the redundancy for controlling the security failure in the system.

The detection in depth basically provide the redundant overlapping approach and it is used for detecting the security and also accomplish the response that are available in the security detection.  

5 0
4 years ago
___ is the most important variable that is measured and controlled in a commercial hvac system.
Pavel [41]

The parameter being monitored and controlled is the controlled variable. The dry-bulb temperature of the air leaving the cooling coil is the controllable variable in this particular instance. The sensor assesses the state of the controlled variable and provides the controller with an input signal.

<h3>What is a HVAC ?</h3>

The employment of various technologies for heating, ventilation, and air conditioning is done to regulate the temperature, humidity, and cleanliness of the air in a closed environment. Its objective is to provide adequate indoor air quality and thermal comfort.

  • To cool or heat a building, the main unit of a ducted system forces air via a network of air ducts. On the other hand, ductless systems don't have air ducts and employ different techniques to spread cleaned air across a room.

Learn more about HVAC system here:

brainly.com/question/20264838

#SPJ4

6 0
2 years ago
_____________ consists of data that have been processed, organized, and put into context to be meaningful, and to convey underst
Lyrx [107]

Answer:Knowledge

Explanation: Knowledge is the collections of the facts , figure and related data in order to make context regarding any topic. The context of knowledge is organized and formatted in such a manner which can be understood and learnt by the individuals.It is based on the theory or any practical incident to describe the information about it.

E.g.- the remembering of any particular historic incident.

4 0
4 years ago
Please help in computer subject​
VMariaS [17]

Answer:

6. Read this quote from Ben Hogan below the photograph.

purple

"People have always been telling me what I can't do. I guess I have wanted to show them.

That's been one of my driving forces all my life."

31

What does this quote mean? Use at least two direct quotes from the text that give

examples of this quote.

A

urn

Julie Bahn

3 0
3 years ago
Read 2 more answers
Other questions:
  • Write in general about ergonomic injuries and also mention the symptoms that computer users exhibit when they experience these s
    11·2 answers
  •  When using cost-benefit analysis to determine the benefits of a community project, economists measure the value in terms of (A.
    14·1 answer
  • How to turn off new macbook pro when it is frozen 2017
    11·2 answers
  • Which type of memory helps in reading as well as writing data?
    13·1 answer
  • When you search google for​ dishwashers, you are likely to see a number of inconspicuous ads for​ advertisers, including product
    11·1 answer
  • Which element is included in the shot breakdown storyboard? Which element is included in the shot breakdown storyboard?
    8·1 answer
  • __________ are hosted on dedicated computers known as 'web servers'.​
    8·2 answers
  • Files and folders in UNIX can be removed using the
    8·1 answer
  • LensForAll is a company that sells affordable contact lenses on its website. The CEO of the company realizes that an app must be
    9·1 answer
  • Which of the following should you press to insert a non-
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!