1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liono4ka [1.6K]
3 years ago
8

How is distributed ledger technology (DLT) used in a blockchain?

Computers and Technology
1 answer:
andrey2020 [161]3 years ago
3 0

Answer:

I believe the answer is D. To keep records of transactions in different places.

Explanation:

You might be interested in
Write a method public static ArrayList merge(ArrayList a, ArrayList b) that merges two array lists, alternating elements from bo
bogdanovich [222]
The answer would be 798 since all of them combined with the square root dividing it would give you that.
4 0
4 years ago
I can’t get answers because the ads won’t load help me
Flura [38]

Answer: Get better wifi

Explanation: This maybe a router problem, Go to your router and reset it by unplugging the power chord, After 30 seconds plug it back in and wait for your wifi to start back up. Your ads should load now. Have a good day.

7 0
3 years ago
Select the correct answer.
Naddika [18.5K]

the answer is style, because it is a game developemnt. you need style

7 0
3 years ago
Read 2 more answers
Can someone pls tell me how?​
sertanlavr [38]

Explanation:

yaaaaaaaaaassssssss

7 0
3 years ago
The type of database that is most capable of supporting complex data types is _____. Select one: a. sequential files b. relation
Anestetic [448]

Answer:

Object-Oriented DBMS.

Explanation:

Like classes in Object oriented programming Object-Oriented DBMS is can store objects.It follows an Object oriented data model with the properties of classes and the properties of Object oriented programming also.Objects can be in the form of complex data types or different data types.

6 0
3 years ago
Read 2 more answers
Other questions:
  • LAN security policies center on issues concerning connectivity; this includes determining how devices adhere to the network. Amo
    14·1 answer
  • Janice is making her resume in which section should she include information about her previous employers , positions held , and
    15·1 answer
  • Consider the expression 3 * 2 ^ 2 < 16 5 AndAlso 100 / 10 * 2 > 15 - 3. Which operation is performed second?
    6·1 answer
  • Write the definition of a class Clock. The class has no constructors and three instance variables. One is of type int called hou
    12·1 answer
  • At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host?
    7·1 answer
  • How to write a program in java that finds the max number of an array of integers?
    6·1 answer
  • What is the correct term for a piece of malware that hides inside a legitimate software program or file from trusted sources
    8·1 answer
  • How many different textile items would you find at a festival? (please list 5 items)
    7·1 answer
  • The correct banner marking for unclassified documents with cui is
    9·1 answer
  • So has anyone opened the link/file those people are giving out as answers? Like what are they, viruses, answers, nothing??? Some
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!