1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
n200080 [17]
3 years ago
6

In a blockchain, each block has a unique hash value which is dependent on the hash value of the previous block in the chain. Wha

t happens if any transaction data is changed or modified in the earlier existing blocks?
Computers and Technology
1 answer:
pantera1 [17]3 years ago
4 0

Answer: hello your question lacks the required option, below are the missing options

A. The transaction data in the tampered block is deleted, and a copy is created with the same hash value.

B. The hash values of transaction data of subsequent blocks are validated, and the chain is broken.

C. The hash value for the entire block is nullified, creating a domino effect on all subsequent blocks.

D. The hash values of subsequent blocks are updated as soon as they are tampered with, and the chain continues.

answer : The hash values of subsequent blocks are updated as soon as they are tampered with, and the chain continues ( D )

Explanation:

What happens if a transaction data is changed in an earlier existing block in a Blockchain is that the Hash values of subsequent blocks will be updated as soon as they are tampered with and the chain will continue.

Blockchain is a specially design system for recording information, hence any change in data inputted in an earlier existing blocks that changes will automatically be updated as well in all preceding blocks.

You might be interested in
The four levels of FBLA membership
Nataly_w [17]

Answer:

Future Business Leaders of America (FBLA) for high school students; FBLA-Middle Level for junior high, middle, and intermediate school students; Phi Beta Lambda (PBL) for post secondary students; and Professional Division for those not enrolled in school or post secondary school

Explanation:

7 0
3 years ago
If i cl/ear ch/at hist/ory on group/me on my comp.uter will it clear it on my phone
leonid [27]

Answer: It is likely that this can happen.

Explanation:

If you really want to go the extra mile to clear it all, I may recommend that you clear it off the phone as well. Hope this helps.

6 0
3 years ago
Read 2 more answers
In a relational database, a primary key is sometimes made up of multiple fields. What is this known as?
wlad13 [49]

Answer:

Foreign key is the correct answer for the above question.

Explanation:

  • A foreign key is a key that is used to extract the information of a foreign table with the help of primary key value. When there is a normalized table then it needs to split on two or more tables to overcome the problem of normalization.
  • So is there is a two table then the primary key is used for the first table and the combination of the primary key and foreign key is used to identify the record of the foreign table. The foreign key is made up of multiple fields because there is no single field in the foreign which can not be null for any instance of the primary table. It happens when there is data for the primary table but there is no record for the foreign table.
  • The above question wants to ask about the term which is made up of multiple fields which is a foreign key which is described as above. Hence Foreign key is the correct answer for the above question.
5 0
4 years ago
Assuming we are using the Hamming algorithm presented in your text and even parity to design an error-correcting code, find the
Rudik [331]

Answer:

Before redundancy :100101011100

After checking parity redundancy: 100101010011

Explanation:

First calculate redundant bits ,

We know that the number of redundant bits can be calculated using the following formula:

2^r ≥ m + r + 1

r = redundant bit, m = data bit

total data bits = 8

so ,

2^4 ≥ 8 + 4 + 1

16 ≥ 13

so, redundant bits is 4

Now let they denoted by r1, r2, r4, and r8, as the redundant bits are placed at positions corresponding to power of 2:    1, 2, 4, and 8.  

All the redundant bits are initialized by zero.

For the data word 10011011, we can let  the bits of the data word as  w8,w7, w6, w5, w4, w3, w2, w1

Now , put data bits and redundancy bits  as follows.

d12  d11  d10  d9  d8   d7  d6  d5  d4  d3  d2  d1

w8   w7  w6  w5   r8  w4  w3  w2 r4   w1   r2  r1

 1      0    0      1      0     1     0     1    0    0    0   0

r1 = d1  xor  d3  xor d5  xor d7  xor  d9  xor d11

r1 =  0  xor  0  xor 1  xor 1  xor  1  xor 0

r1 =  1

r2 = d2  xor  d3  xor d6  xor d7  xor  d10  xor d11

r2 = 0  xor  0  xor 0  xor 1  xor  0  xor 0

r2 = 1

r4 = d4  xor  d5  xor d6  xor d7  

r4 = 0  xor  1  xor 0  xor 1

r4 = 0

r8 = d8  xor  d9  xor d10  xor d11   xor d12

r8 = 0  xor  1  xor 0  xor 0 xor  1

r8 = 0

So, the data transferred is

d12  d11  d10  d9  d8   d7  d6  d5  d4  d3  d2  d1

w8   w7  w6  w5   r8  w4  w3  w2 r4   w1   r2  r1

 1      0    0      1      0     1     0     1    0    0    1   1

The bits give the binary number as 0011 whose decimal representation is 3. Thus, the bit 3 contains an error. To correct the error the 3th bit is changed from 1 to 0.

3 0
3 years ago
Write a program having a concrete subclass that inherits three abstract methods from a superclass. Provide the following three i
hammer [34]

Answer:

C++

Explanation:

using namespace std;

class AbstractClass {

public:  

   virtual bool checkUpperCase(string inputString);

   virtual string lowerToUppercase(string inputString);

   virtual void stringToInt(string inputString);

};

class ConcreteClass: public AbstractClass {

public:

   bool checkUpperCase(string inputString) {

       bool isUpper = false;

       for (int i=0; i < strlen(inputString);  i++) {

           if (isupper(inputString[i])) {

               isUpper = true;

               break;

           }

       return isUpper;

      }

   string lowerToUppercase(string inputString) {

       for (int i=0; i < strlen(inputString);  i++) {

           putchar(toupper(inputString[i]));

       }

       return inputString;

   }

   void stringToInt(string inputString) {

       int convertedInteger = stoi(inputString);

       convertedInteger+=10;

       cout<<convertedInteger<<endl;

   }

};

int main() {

   ConcreteClass cc;

   return 0;

}

3 0
3 years ago
Other questions:
  • Which software application should be used to create a sales pitch to a group of people? Database Email Presentation Word process
    9·1 answer
  • I would A lot of knowledge and education for computers and <br> Technology
    10·2 answers
  • This library function returns a random floating point number within a specified range of values. The function returns a random f
    12·1 answer
  • Which command will display each line in the text file based on the alphabet?
    10·1 answer
  • For this scenario related to turtle drawing, indicate whether it is better to write a loop or a function (or a set of functions)
    13·1 answer
  • How do you invite someone to a conversation on brainly
    14·1 answer
  • What is the major difference between the intranet and extranet?
    11·1 answer
  • Collisions occur when one output is mapped to two inputs. <br><br> A. True <br> B. False
    7·2 answers
  • I know I should add Family and food by default (and I will) But I wanna hear some more from other peoples perspective
    7·2 answers
  • What is algorithm and how does it works​
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!