1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elza [17]
4 years ago
8

What is a example of blockchain

Computers and Technology
1 answer:
kirza4 [7]4 years ago
6 0

Answer:

MedRec

Explanation:

MedRec, a company, uses it In order to give any medical provider secure access to patients' records.

You might be interested in
Which of the formulas below are valid? Select all that apply?
Drupady [299]

Answer:

Is there a picture to go with this question?

Explanation:

Is there a picture to go with this question?

6 0
3 years ago
Rerouting traffic using arp poisoning is an attack on ________ of a network.
Arada [10]
Rerouting traffic using ARP poisoning is an attack on both the functionality  and confidentiality of a network. This is also known as ARP spoofing. This type of attack takes a legitimate IP address of another host and causes traffic redirection to an infected page. 
5 0
3 years ago
Shut down and unplug the computer. Remove the CPU case lid. Locate the various fans, and then use compressed air to blow dirt ou
svlad2 [7]

Answer:

so kind of you! I'm sure it will help someone

7 0
4 years ago
Read 2 more answers
Which of the following statement is true? Single choice. (2 Points) Views are virtual tables that are compiled at run time All o
Elenna [48]

Answer:

All of the mentioned views could be looked as an additional layer in the table which enables us to protect intricate or sensitive data based upon our needs.

Explanation:

View is a virtual table which executed a pre compiled query. It is a table in which selective portion of the data can be seen from one or more tables. Queries are not allowed in indexed views and adding column is not possible. Views can be looked as an additional layer in the virtual table which protects sensitive data.

8 0
3 years ago
Given an list of N integers, Insertion Sort will, for each element in the list starting from the second element: Compare the ele
Elena L [17]

Answer:

def insSort(arr):

ct=0;

for i in range(1, len(arr)):

key = arr[i]

j = i-1

while j >=0 and key < arr[j] :

arr[j+1] = arr[j]

j -= 1

ct=ct+1;

arr[j+1] = key

return arr,ct;

print(insSort([2,1]))

Output of the program is also attached.

8 0
4 years ago
Other questions:
  • ____ are not associated with data from the database and are used to display such things as the report's title
    15·1 answer
  • Which features can Danica use to fix the issue
    5·1 answer
  • Write a java program that declares an array "alpha" of 50 elements of type "double". Initialize the array so that the first 25 e
    11·1 answer
  • A printer is connected locally on Computer1 and is shared on the network. Computer2 installs the shared printer and connects to
    10·1 answer
  • What is LINUX?
    6·2 answers
  • A collection of wiress connecting the CPU with main memory that is used to identify particular location is called
    13·1 answer
  • window operating system popularly known as. 1) character user interface. 2) computer user interface. 3) graphic user interface.
    15·1 answer
  • List and briefly describe the major types of system in organization?​
    15·2 answers
  • A.)Distinguish between software suite and integrated software.
    7·1 answer
  • Collaboration software is designed to increase collaboration and productivity primarily by enabling team members to?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!