1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mashutka [201]
3 years ago
10

In cryptocurrency, a block is only considered valid if it has a.

Computers and Technology
1 answer:
melomori [17]3 years ago
3 0

Answer: Token

Explanation: The token gives proof that it is yours.

You might be interested in
Can i have help for a ggogle class room
andrew11 [14]

Answer:

or tell ur teacher to add u in ur class

Explanation:

3 0
3 years ago
Read 2 more answers
Given the Query Data Type, which of the following is incorrectly matched with the corresponding Storage Data Type?
Tamiku [17]

Answer:

<h2>c) Date : Date</h2>

Explanation:

A type of attribute of data is called data type in computer science, data types tells the interpreter how a person wants to use the data. The basic data types are supported by most of the programming languages, the basic data types are Integers, float, characters, strings, point numbers and arrays. The terminology may differ from one language to other.

3 0
3 years ago
Which below best describes JavaScript? *
marysya [2.9K]

Answer:

it is a programing languwage that is useualy used to program visual or text based applications

Explanation:

6 0
3 years ago
Read 2 more answers
Which of the following is needed if a computer with the IP address 172.31.210.10/24 wants to communicate with a computer with th
ozzi

Answer:

The answer is <em>since both ip addresses are not within the same subnet,   only router can be used for the two computers to communicate together.</em>

Explanation:

From the statements in the question, since  the two ip addresses are not on same subnet value i.e 172.31.210.10/24 and 172.31.209.122/24 then both computers cannot communicate except a router is used for network connections for the two different subnets as they are not on the same network.

Explanation:

4 0
4 years ago
A university with remote campuses, which all use different service providers, loses Internet connectivity across all locations.
Anastaziya [24]

Answer:

A & D.

Explanation:

In real time operating system, the best description for this type of attack explained in the question is;

DOS and Race Condition.

Because race condition takes place when 2 or more threads are able to both access and change shared data simultaneously ,while DOS is a good foundation to build a custom made Real time operating system.

Thus, options A & D are correct.

5 0
3 years ago
Other questions:
  • You discover memory is corrupted, what would be an indication of a software vs. a hardware issue?
    5·1 answer
  • Click _______ to view each individual record of a mail merge document.
    5·2 answers
  • Write a program that, for four points A, B, C and P, which a) Draws a triangle formed by ABC and a small cross showing the posit
    15·1 answer
  • ___________ is the ability of a product to satisfy a customer.
    11·1 answer
  • When a subdomain has been delegated to a zone on another server, the DNS server hosting the parent zone maintains only an NS rec
    14·1 answer
  • What limited the possibilities of game development from a technical viewpoint?
    7·1 answer
  • After running this Assembly language program below, give the final values in EAX, EBX, and ECX. MOV EAX, AAAAAAAA MOV EBX, BBBBB
    7·2 answers
  • How to use function in python
    15·1 answer
  • What are output statement in QBASIC?
    5·1 answer
  • Artificial intelligence (ai) in perspective is a complex and interdisciplinary field that involves several specialties, includin
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!