1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elza [17]
3 years ago
8

What is a example of blockchain

Computers and Technology
1 answer:
kirza4 [7]3 years ago
6 0

Answer:

MedRec

Explanation:

MedRec, a company, uses it In order to give any medical provider secure access to patients' records.

You might be interested in
The Java compiler does not check for an ArrayIndexOutorBoundsException during the compilation of a program containing arrays. O
yulyashka [42]

Answer:

TRUE

Explanation:

  • Let us first understand what is an ArrayIndexOutOfBounds Exception.
  • As the name itself suggests the index for the array has gone out of bound (permissible value) and an exception (anamoly) is resulted.
  • So, it throws an error.
  • That means if an array, Employee of size n is defined then the permissible elements are Employee[0] to Employee[n-1]. If any negative index or with the index is greater than n-1 is tried to access it throws an error saying ArrayIndexOutOfBounds Exception.
  • In java, during the compilation of the program the compiler doesn't check for the ArrayIndexOutOfBounds Exception.It checks during running the program.
  • So, it is called a Runtime Exception.
7 0
3 years ago
You have been tasked with ensuring that access to certain server managed resources is only available to client devices with TPM
elixir [45]

Answer:

Device Health Attestation Services

Explanation:

Based on the scenario being described it can be said that the Windows Server role that can be used to automate this check is known as Device Health Attestation Services. This is a role that allows the administrator to automatically check if a device has the required trustworthy BIOS, TPM, or boot software enabled, as well as Bitlocker encryption.

7 0
3 years ago
When creating a report, you should consider all of the following EXCEPT (Points : 4) who will use the report
barxatty [35]

Answer: Number of records input into the report

Explanation: Creating the report includes the factors like maintaining the record, updating data, designing content etc. The content of the report has the parameter to maintain so that it can be up to date and can be efficient to the user.

The parameters that are considered while making the report are confidential content should be specially considered ,user of the report , purpose of the report,etc. The only factor that is not accountable is input.There can be number of inputs that can be entered in the report because they have huge sheet space.

8 0
3 years ago
Write a conditional expression that assign the value 0 to a credits variable if it is less than 0; otherwise the value of the cr
Svetach [21]

Answer:

credits = (credits < 0) ? 0 : credits;

Explanation:

This is the ternary conditional operator.

6 0
3 years ago
Read 2 more answers
List the seven steps used by a laser printer to print a page
Schach [20]
T<span>he seven steps used by a laser printer to print a page are :
</span>1)  Processing, this is where he computer sends the data to the printer.
2)  Charging, where <span>the wire (primary corona) negatively charges the
     photoconductive drum.</span>
3)  Exposing, where <span>the laser scans the image to the drum. Anywhere the
     laser touches the drum causes the electrical charge to drain off.</span>
4)  Developing, where <span>negatively charged toner particles are allowed to
     attach to the painted area of the drum; since the negative charge has
     been drained off these areas</span>
5) Transferring, where the transfer corona wire charges the paper with a
     positive charge from behind. The negatively charged toner jumps to the
     positive paper, according to the image on the drum. <span>A Static Charge
     eliminator then removes any residual charge.
</span>6) Fusing, where t<span>he toner particles attached to the paper are fused or
     melted to the paper, because of the heated drum.</span>
7) Cleaning, where t<span>he drum is cleaned of excessive toner and electrical
    charges.</span>
7 0
3 years ago
Read 2 more answers
Other questions:
  • Write an application named [LastName]_MultiplicationTable and create a method that prompts the user for an integer value, for ex
    11·1 answer
  • Laurel, the manager of a software company, assumes that the male employees in his organization are more creative and innovative
    11·1 answer
  • Which statement is correct? a. choice of metric will influence the shape of the clusters b. choice of initial centroids will inf
    12·1 answer
  • Select the correct statement(s) regarding partial mesh networks.
    5·1 answer
  • What is the best way to protect against the loss of important files
    15·1 answer
  • Write a program that creates a dictionary containing the U.S. states as keys and their abbreviations as values. The program shou
    7·1 answer
  • A ____________ is a collection of commands given a name.
    11·1 answer
  • Please answer this question correctly​
    9·1 answer
  • Which word describes an important characteristic of good computer
    6·1 answer
  • while determining which antibiotics are best to treat ulcers caused by helicobacter pylori, the drugs used in the experiment are
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!