1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MArishka [77]
3 years ago
12

Monero is cryptocurrency that focuses on transparency of ownership. True or false

Computers and Technology
1 answer:
dangina [55]3 years ago
4 0

Answer:

TRUE

Explanation:

You might be interested in
Code is the code or instructions used to create a Web page or<br> program.
Paha777 [63]
Answer:
HTML
Explanation:

5 0
3 years ago
Select all examples of proper keyboarding technique.
krok68 [10]

Answer:

all except keeping your hands higher than your elbows

4 0
3 years ago
What is the basic facilities, services, and installations needed to keep a
lara31 [8.8K]

Answer:

transportation and communications systems, water and power lines, and public institutions like schools, post offices, and prisons.

Explanation:

7 0
2 years ago
Describe the three-schema architecture. Why do we need mappings among schema levels? How do different schema definition language
VARVARA [1.3K]

Answer:

Three Scheme architecture contains internal level, conceptual level, and external level.

In the internal level physical structure of the database described. The internal Schema is also known as physical Schema, as it is used to define the data that stored in a block. Internal Schema describes a sophisticated level of data structure in detail.

The conceptual level design of the database has described, and it is known as a logical level. The conceptual level describes the whole structure of the database. It describes the relationships among the data. Implementation of data are hidden in a theoretical level

On the external level, databases contain schemas that represent a different view of the database. Each describes the database that the user interested in and hides the remaining database. The external database is also known as view schema.

Explanation:

The mappings between schema levels happen due to visualization and schema matching. DBMS has three schema level.

In the attached diagram

It shows the DBMS architecture.

Mapping is a way to transfer and respond to the request between the various database architecture.

Mapping takes more time to transfer data in small DBMS.

External / Conceptual mapping transforms the data from the outer level to the conceptual schema.

In Conceptual / Internal mapping, response transforms from conceptual to internal level.

Document Schema Definition Language (DSDL) is a framework in which multiple validations can be applied to achieve a complete validation result. In this way, schema definition language support this architecture.

8 0
3 years ago
Ensuring that users have access only to the files they need to complete their tasks is an example of which principle? A. Separat
Flura [38]

Answer:

Least Privilege

Explanation:

The principle of least privilege an important principle in computer security. It is the practice of limiting access rights for users to the basic minimum or least amount of privilege they require to perform their tasks. For example a user is granted privilege to execute a file or manipulate data or use resources they require to perform a function or task. Therefore, this principle can be used only to limit access rights for programs, systems, and devices to those permissions only that are required to carry out permitted activities. Conforming to principle of least privilege reduces the risk of hackers gaining access to sensitive information or a system, by compromising a user account or device. For example an individual whose task is to enter data into a database only requires option to add records to that DB by the principle of least privilege. If a virus attacks the computer of that individual, this attack is restricted only to creating DB entries.

5 0
3 years ago
Other questions:
  • What is the danger in judging someone according to his or her social networking profile
    12·1 answer
  • Car batteries have two terminals which are (blank).
    8·2 answers
  • An organization's IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
    14·1 answer
  • Write a program that displays a menu allowing the user to select air water, or steel. After the user has made a selection, the n
    10·1 answer
  • The administrators of Tiny College are so pleased with your design and implementation of their student registra- tion and tracki
    13·1 answer
  • ____ is scientifically seeking and discovering facts.
    9·1 answer
  • Suppose that a 2M x 16 main memory is built using 256kB x 8 RAM chips and memory is word addressable, how many RAM chips are nec
    6·1 answer
  • Question # 4
    5·1 answer
  • Which layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for delivering data between two
    12·1 answer
  • I need help with the code practice 9.2 Edhesive.<br><br> Thank you
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!