Answer:
D. smart phone
explanation;
a. what the heck is a radio going to do?
b. an HD television? is his job watching movies?
d. he already has a form of communication he uses, he needs something that can to both things at the same time
c. a smart phone can do everything he needs to do, likely faster than a landline phone or laptop.
Answer: hello your question lacks the required option, below are the missing options
A. The transaction data in the tampered block is deleted, and a copy is created with the same hash value.
B. The hash values of transaction data of subsequent blocks are validated, and the chain is broken.
C. The hash value for the entire block is nullified, creating a domino effect on all subsequent blocks.
D. The hash values of subsequent blocks are updated as soon as they are tampered with, and the chain continues.
answer : The hash values of subsequent blocks are updated as soon as they are tampered with, and the chain continues ( D )
Explanation:
What happens if a transaction data is changed in an earlier existing block in a Blockchain is that the Hash values of subsequent blocks will be updated as soon as they are tampered with and the chain will continue.
Blockchain is a specially design system for recording information, hence any change in data inputted in an earlier existing blocks that changes will automatically be updated as well in all preceding blocks.
Answer:
An array.
Explanation:
An array can be defined as a structure that organizes data in a list that is commonly 1-dimensional or 2-dimensional.
Simply stated, an array refers to a set of memory locations (data structure) that comprises of a group of elements with each memory location sharing the same name. Therefore, the elements contained in array are all of the same data type e.g strings or integers.
Basically, in computer programming, arrays are typically used by software developers to organize data, in order to search or sort them.
Binary search is an efficient algorithm used to find an item from a sorted list of items by using the run-time complexity of Ο(log n), where n is total number of elements. Binary search applies the principles of divide and conquer.
In order to do a binary search on an array, the array must first be sorted in an ascending order.
Hence, array elements are mainly stored in contiguous memory locations on computer.
The dual-layer-IP allows ipv4 and ipv6 at the network layer to access a single tcp/udp stack.
<h3>What is the dual IP layer?</h3>
The word dual-stack is a word that connote a full or total duplication of all stages in the protocol stack ranging from its applications to the network layer.
Note that the dual-layer-IP method often gives room for a computer to run IPv4 and IPv6 simultaneously at the network layer, and all of the IP stack can access a different TCP/UDP stack.
Learn more about architecture from
brainly.com/question/9760486