1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andriy [413]
3 years ago
10

A company wishes to begin the process of implementing a multi-party system and is looking for other companies with similar inter

ests to join them. With blockchain, every organization sees the same data. What does this provide?.
Computers and Technology
1 answer:
Irina18 [472]3 years ago
6 0

Answer: almost  everything

You might be interested in
Which mechanical switches are the loudest and clickiest?
telo118 [61]

Answer:

1.Cherry MX Blue

2.most expensive is Gateron Blue

3 0
3 years ago
What is the name of the "local user" account involved in the alleged actions (Hint: where in the file structure did you find the
Sunny_sXe [5.5K]

I will assume this is a windows computer

Answer:

  • Disk (Letter)\Users\<"Answer">\Folder\Documents\SuspiciousFile.exe
  • You can use Windows Security Logs to try and find out from what IP address the user you just found logged in from.

Explanation:

The windows user folder has folders that contain each users data, Using the file path of the suspicious file you can figure out which user is associated with the file.

Windows Security Logs collect data on logon attempts so when the user logs in their IP address should be collected in these log files.

8 0
3 years ago
So my computer has be clicking random things and opening things. It’s been happening for a few days and I want to know if it’s a
soldi70 [24.7K]

Viruses and malware are common and can have drastically negative results on your computer and life.

You can often tell that your computer is infected because it acts weird or slow.

Active antivirus software is a good way to prevent these problems.

4 0
3 years ago
Sydney Bark is twenty-three years old, and is looking forward to celebrating her birthday on April 12. For her birthday, she sav
DochEvi [55]

Answer:

a future date

Explanation:

Because most people when trying to guess a password, start with basic ones like: 1234,abcde, password,l and dates (like their birthday). whereas, the person would never guess it was a future date like when the person would be 30 or when they are going on a trip .

5 0
3 years ago
You can replace a formula with its function so it remains constant. true or false.
kumpel [21]
True/Function. You can replace a formula with its function so it remains constant.
4 0
3 years ago
Other questions:
  • Given non-negative integers x and n, x taken to the nth power can be defined as: x to the 0th power is 1 x to the nth power can
    7·1 answer
  • If a ≤m b and b is regular, does that imply that a is a regular language? why or why not?
    6·1 answer
  • When creating a new user in linux, after entering the name, the username box:?
    9·1 answer
  • You may see the term FAQ on websites which stands for Frequently Asked Questions this is an example of which type of mnemonic?
    9·1 answer
  • Refer to the color wheel to identify the color scheme.
    13·1 answer
  • The advantage of an electronic ____ is that the content can be easily edited and updated to reflect changing financial condition
    8·1 answer
  • Consider the markets for monitors, USB drives, central processing units, and Microsoft’s Windows. Assume monitor manufacturers u
    7·1 answer
  • Is phone data used when connected to wifi
    12·1 answer
  • Jack started a job as a consultant with an IT firm he will be interacting with various customers and employees from different pa
    13·1 answer
  • Define file manager
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!