1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Semmy [17]
3 years ago
7

A reputable, world-renowned auction house uses blockchain to verify the authenticity of paintings prior to placing them up for s

ale. The records that are stored on the various distributed ledgers for each painting include the artist’s credentials, history of ownership, appraisal values, and previous purchase price. Paula would like to make an offer on a painting. After reviewing the distributed ledgers for the painting, why can Paula purchase the painting with confidence?
Computers and Technology
1 answer:
REY [17]3 years ago
6 0

Answer:

The ledgers are secure, shared, and incorruptible is the correct answer.

You might be interested in
write query for all products reutrn product name with its amounts due, paid, canceled, and refunded, order the result by product
spayn [35]

Answer:

SELECT product_name, amount_due, amount_paid,

              cancelled, amount_refunded

   FROM products

ORDER BY product_name ASC;

Explanation:

SQL (Structured Query Language ) was used above.

The SELECT command is used to list all the variables we want in our output.

The FROM command signifies the location.

ORDER BY command ensures that your result is ordered

ASC means Ascending Order.

; signifies the end of the query.

NOTE: Underscores were used because variables cannot be written with spaces between them

8 0
3 years ago
A malicious user in your organization was able to use the Trinity Rescue Kit to change the password on a department manager's co
netineya [11]

Answer:

The answer is "The PC should be kept in a physically secure location".

Explanation:

In general, malicious users are hackers as well as malicious users. This user indicates that even a rogue worker, contractor, student, and another consumer who uses his sensitive rights is indeed a common word of violation of information in security circles and the headlines, and to manage the data from the theft the system should be on the physically secure location, that refers to any place, a room or a group of room within facilities of physical or staff security protocols that are sufficient to support the AI-based on LEIN and related Is a physically safe room.

7 0
3 years ago
One vital component of your professional behavior with regard to computing systems today is the creation of​ _________.
zlopas [31]
<span>One vital component of your professional behavior with regard to computing systems today is the creation of​ strong passwords.
It is very important to have a good password on your computer, especially if you are dealing with sensitive data and information. It would be for the best to create such a password which won't be hacked into easily, in case somebody wants to steal your data.
</span>
3 0
3 years ago
Identify the variables listed below as either quantitative (discrete or continuous) or categorical (nominal or ordinal):
Akimi4 [234]

Answer:

Quantitative: Age, heart rate, number of pets, salary

 <em>discrete</em>: number of pets

 <em>continuous</em>: Age, heart rate, salary

Categorical: Gender, eye color, metal rankings

<em>Nominal:</em> Gender, eye color

<em>Ordinal:</em> metal rankings

Explanation:

Quantitative are those variables which are for quantity or number with units for measurement.

Categorical are qualitative variable which can be categorized or grouped in different groups or it may be ranking scales

5 0
3 years ago
2. The password dilemma refers to the fact that: A. Passwords that are easy for users to remember are also easy for attackers to
Sholpan [36]

Answer:

Option A.

Explanation:

5 0
3 years ago
Other questions:
  • "what is the name of the ipsec configuration file"
    9·1 answer
  • Data mining is ______? a process of finding meaningful patterns in data to improve decisions a strategy for locating security so
    7·1 answer
  • Gina's teacher has sent her a Word document that contains the names of all the students who are participating in the
    11·2 answers
  • What type of account should you use fro signing in to your windows 8 computer if you want to synchronize your settings on other
    6·1 answer
  • What will be the values of ans, x, and y after the following statements are executed? int ans = 35, x = 50, y =50; if ( x &gt;=
    7·2 answers
  • Samuel wanted to paste the value and the formula attached from cell B6 to cell F16. Which methods will work? Check all that appl
    5·2 answers
  • If your computer has a ________, someone else can gain access to it undetected.
    10·1 answer
  • A set of blocks contains blocks of heights 1,2, and 4 centimeters. Imagine constructing towers of piling blocks of different hei
    15·1 answer
  • JAVA
    12·1 answer
  • How to fix a blue screen
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!