1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mashutka [201]
3 years ago
10

In cryptocurrency, a block is only considered valid if it has a.

Computers and Technology
1 answer:
melomori [17]3 years ago
3 0

Answer: Token

Explanation: The token gives proof that it is yours.

You might be interested in
WILL MARK BRAIN LIST!
Maslowich
I think it’s a

if it isn’t a then it’s d
6 0
3 years ago
Read 2 more answers
Any websites online to make $50 daily?​
andreyandreev [35.5K]

Answer:

hmmm research some and find out because there are alot

7 0
3 years ago
Why would someone need to use tools like IECacheView or MyLastSearch on a system? Do companies have the right to search a workst
natali 33 [55]

IECacheView helps a user quickly and easily access and read the cache folder of Internet Explorer. Information such as filename, content type, number of hits, expiration time, and the full path of cache filename can be accessed. With all this information, investigators can look at what users are accessing on the web. Anything accessed on IE by an employee at his or her workstation can be searched by the company. This brings us to the question; do companies have the right to search a workstation they issued to their employees using IECacheView?

In my own opinion, I honestly think that it is not right to search an employee’s workstation using IECacheView or any other tool whatsoever. Under the law, employees have reasonable rights to privacy. These rights prevent employers from searching their employees. Unless there is evidence of computer crimes or misconduct, employees have a greater expectation of privacy

6 0
4 years ago
1. What is an object and what does it do?
Reptile [31]

Answer:

An object is an abstract data type with the addition of polymorphism and inheritance. Rather than structure programs as code and data, an object-oriented system integrates the two using the concept of an "object". An object has state (data) and behavior (code). Objects can correspond to things found in the real world.

Explanation:

3 0
3 years ago
What part of speech is contend
Amiraneli [1.4K]
Assuming the context, it would be considered a verb.

ie: "She contended to me that I was not acting maturely." 
7 0
3 years ago
Other questions:
  • The ____ is a single user, nonportable computer designed to perform engineering, cad, and software development work.
    9·1 answer
  • If a windows computer belongs to a domain, all security is managed by the network administrator for the entire network. true
    15·1 answer
  • Which option allows you to view slides on the full computer screen?
    11·1 answer
  • Describe a strategy for avoiding nested conditionals. Give your own example of a nested conditional that can be modified to beco
    15·1 answer
  • Write a method called makeStars. The method receives an int parameter that is guaranteed not to be negative. The method returns
    14·1 answer
  • What was the first video game ever invented
    11·2 answers
  • ______ norms are usually unstated rules that regulate members' interaction.
    12·1 answer
  • Where does the list of incoming mail appear in gmail
    13·2 answers
  • All the following are the basis of the World Wide Web except:
    14·2 answers
  • What pets are on Terraria and how can you get them?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!