1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aniked [119]
3 years ago
10

Para que sirve un software

Computers and Technology
1 answer:
dedylja [7]3 years ago
6 0
No habla muy espaniol?
You might be interested in
The command to delete all the files that have filenames that starts with letter c or c and ends with a letter z or z is
dimaraw [331]
The command is : <span>rm [Aa]*[Zz] </span>
4 0
3 years ago
in a block in a blockchain what represents the transactional data, sender, receiver, and number of coins? group of answer choice
erastova [34]

In a block in a blockchain, a resource which represent the transactional data, sender, receiver, and number of coins is: A. data.

<h3>What is a blockchain?</h3>

A blockchain can be defined as a digital and dynamic financial system that is designed and developed to be used in recording and maintaining transactions that are associated with or made through the use of a bitcoin, usually as a database containing various set of data.

In this context, we can infer and logically deduce that data is a resource that typically represent all of the transactional data, sender, recipient (receiver), and the number of bitcoins in a block in a blockchain.

Read more on blockchain here: brainly.com/question/25700270

#SPJ1

6 0
1 year ago
How is the pattern matching done in the SQL?
Alinara [238K]

Answer:

SQL pattern matching allows you to search for patterns in data if you don't know the exact word or phrase you are seeking. This kind of SQL query uses wildcard characters to match a pattern, rather than specifying it exactly. For example, you can use the wildcard "C%" to match any string beginning with a capital C.

Explanation:

6 0
2 years ago
Read 2 more answers
At what depth does an employer need to use a protection system to ensure the safety of workers in a trench or excavation?
nevsk [136]
Trench 4 foot or deeper and must be located 25 foot within eachother
3 0
3 years ago
Read 2 more answers
Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption
Darya [45]

Answer:

Hardware security module.

Explanation:

Hardware security module is a Physical digital device that comes as a plug-in adapter used to secure and manage digital keys and provides crypto processing for strong authentication.

It has an onboard cryptographic keyboard and one or more crypto processors, and can be used on computers and network servers to prevent logical or physical authentication access to unauthorized users. It supports symmetric and asymmetric cryptography.

8 0
3 years ago
Other questions:
  • Why will the standard replacement algorithms (LRU, FIFO, clock) not be effective in handling this workload for a page allocation
    11·1 answer
  • Energy from sources that can be regenerated or reused is called what?
    12·1 answer
  • If you want the date in your document to update each time the document is opened, _____.
    9·2 answers
  • A major problem with alcohol adverstising is that
    15·1 answer
  • Which option should you select to ignore all tracked changes in a document? To ignore all tracked changes in a document, you sho
    15·2 answers
  • Each of the outcomes listed below is a result of executing the following script except for one. Which one? CREATE ROLE ExampleRo
    6·1 answer
  • Mingji is working to transfer photos from her digital camera to her computer. While
    11·1 answer
  • ________ are the symbolic codes used in assembly language?​
    6·1 answer
  • 8.
    9·1 answer
  • What is the difference between EPROM and EEPROM, explain why​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!