pharmaceutical company is using blockchain to manage their supply chain. Some of their drugs must be stored at a lower temperature throughout transport so they installed RFID chips to record the temperature of the container. Which other technology combined with blockchain would help the company in this situation?

Answers

Answer 1

Answer:

Artificial Intelligence (AI)

Explanation:

Artificial Intelligence (AI)

Answer 2

In this question, the answer is "Artificial intelligence", it is used as the simulation of human intelligence processes by machines, especially computer systems, which is called artificial intelligence.

Expert systems, natural language, voice recognition, and object detection are just a few of the specific uses of AI.Its convergence of blockchain technologies such as AI can accelerate machine learning and allow AI to produce and exchange financial goods.The blockchain enables secure storage and data sharing or anything else of value. In this, the data is analyzed, and insights and derived from it to generate value.

Learn more:

Artificial intelligence: brainly.com/question/17146621

Pharmaceutical Company Is Using Blockchain To Manage Their Supply Chain. Some Of Their Drugs Must Be

Related Questions

Order the steps to autofilter data

Answers

Answer:

Select the data you want to filter.

Click Data > Filter.

Click the arrow. ...

Choose specific values: Uncheck (Select All) to clear all of the check boxes, and then check the boxes for the specific value(s) you want to see.

Explanation:

1. Select the data you want to filter.

2. Click Data > Filter.

3. Click the arrow. ...

4. Choose specific values: Uncheck (Select All) to clear all of the check boxes, and then check the boxes for the specific value(s) you want to see.

Answer:

Select any cell in the data range > Click the data tab > Go to the sort & filter group > Click filter and select proper controls

Explanation:

i got it right lol :)

A resistor is found to have 3 A going through it with a voltage of 150 V. What is the resistance of the resistor?
10 points

Answers

Answer:

50 ohms

Explanation:

voltage = current * resistance, this is rearranged as

resistance = voltage / current, so if you plug in the numbers, you'll get

150/3,

resistance = 50 omhs

What Is the Purpose of a Web Browser? *

Answers

A web browser takes you anywhere on the internet. It retrieves information from other parts of the web and displays it on your desktop or mobile device. The information is transferred using the Hypertext Transfer Protocol, which defines how text, images and video are transmitted on the web.

Answer:

This is your answer. If I'm right so,

Please mark me as brainliest. thanks!!!

Assume in the for loop header, the range function has the three arguments: range (1, 10, 3), if you were to print out the value of the variable
in the for loop header, what will be printed out? List the values and separate them with a comma.

Answers

Answer:

1, 4, 7

Explanation:

The instruction in the question can be represented as:

for i in range(1,10,3):

   print i

What the above code does is that:

It starts printing the value of i from 1

Increment by 3

Then stop printing at 9 (i.e.. 10 - 1)

So: The sequence is as follows

Print 1

Add 3, to give 4

Print 4

Add 3, to give 7

Print 7

Add 3, to give 10 (10 > 10 - 1).

So, it stops execution.

80. A .......... is used to read or write data.
A. CD B. VDU C. ROM D. RAM​

Answers

Answer:

Depending on exactly what they mean by read and write, both A and D are valid.  In fact, if you read that as "read or write" as being a logical OR and not the logical AND that the sentence probably intends, then all four answers could be correct.

What they probably mean to say though is "..... is used as a read/write storage medium", in which case A is the correct answer.

A.  Data can be written to or read from a CD.  This is probably the "right" answer

B. A human can "read" data from a Visual Display Unit, and the computer "write" it.  That of course is not the intended meaning though.

C.  Data can be read from Read Only Memory, but not written to.

D. Data can be both read and written to Random Access Memory, but not retained after the computer is powered off.

As Jane was setting up her projector, she realized that the images on the screen appeared blurred. How would Jane sort out the issue by herself?
A.
check that the monitor is connected properly with the projector
B.
adjust the distance between the screen and the projector
C.
make changes in the system settings
D.
adjust the focus

Answers

it would be D, adjust the focus
The answer is D. Adjust the focus

Computers were originally invented to
Group of answer choices
A.to share information on the Internet.

B.make complex mathematical calculations possible and make tasks easier for humans.

C.to play video games.

Answers

Answer:

B

Explanation:

It's B because why would it me made to play video games

Answer:

B

Explanation:

A, the internet didnt exist yet, so it cant be this

C, video games would require computers, so its ruled out on a similar basis as the previous

Write a program that asks for the number of units sold and computes the total cost of the purchase. Input validation: Make sure the number of units is greater than 0. Use output (stream) manipulators: 2 digits after the decimal point g

Answers

Answer:

Explanation:

The following code is written in C++, it asks the user for input on number of units sold and places it in a variable called units_sold. Then it asks for the package price and places that value in a variable called package_price. Finally it multiplies both values together into a variable called final_price and adjusts the decimals.

#include <iostream>

#include <iomanip>

using namespace std;

       int main()

       {

       // Variables

       int units_sold,

       final_price;

       // ask user for number of units sold

       cout << "\nEnter number of units sold: ";

       cin >> units_sold;

       

       //ask for Package price

       cout << "\nEnter Package Price: ";

       cin >> package_price;

       // Total amount before discount

       final_price = units_sold * package_price;

       cout << setprecision(2) << fixed;

       cout << endl;

       return 0;

       }

Write Python code to convert miles to kilometers. This does not need to be written in a Python function, but it should use the input()function. Running your code should produce a statement asking for the user to enter a number (in miles). Then it should print out a sentence of what that number is in kilometers. Use the conversion rate of 1 mile

Answers

Answer:

It can be so frustrating that the entire planet can't just agree on one system of measurement, whether it relates to measuring distances, weights, temperatures, etc (for the record...same goes for which side of the road everyone drives on). If every country used the same units of measurement, then these formulas would be useless and obsolete, but until then, it might be a good idea to understand how to convert miles to kilometers, and vice versa. If you're a Python developer, then knowing how to write the formulas in Python might be especially useful. Keep reading to see just how it's done.

Converting miles to km isn't especially difficult. To do a rough estimate of the conversion in your head, all you really need to remember is that a mile equals about 1.6 kilometers (or that a kilometer is approximately 2/3 of a mile). When trying to find the correct conversion using a formula, we must use the more precise conversion factor, which is equal to 0.62137119.

To convert miles to kilometers, the formula is very straightforward. All you need to do is divide the number of miles by the conversion factor. To see how it would look written out in Python, check out the example below:

Explanation:

Answer:

All you need to convert the Python code is TWO variables, a Outcome variable and a income variable.

Explanation:

i Hope this helps u

Create a new Java program called MyInfo. Create one or more method(s) that pass the following information as parameters and prints it when the method is called. Full name Middle Initial Age Major GPA Once completed, paste code.

Answers

Answer:

Answered below

Explanation:

//Program in Java

class MyInfo{

public static void main (String args []){

myFullName("John", "Doe");

myAgeMajorGPA(20, "Biology", 4.3);

}

public void myFullName(String initialName, String middleName){

System.out.println(initialName);

System.out.print(middleName);

}

public void myAgeMajorGPA(int age, String major, double GPA){

System.out.println(age);

System.out.println(GPA);

System.out.print(major);

}

}

The computer scientists Richard Conway and David Gries once wrote: The absence of error messages during translation of a computer program is only a necessary and not a sufficient condition for reasonable [program] correctness. Rewrite this statement without using the words necessary or sufficient.

Answers

Answer:

A computer program is not reasonably correct if it has no error messages during translation.

 

Explanation:

First, we need to understand what the statement means, and we also need to identify the keywords.

The statement means that, when a program does not show up error during translation; this does not mean that the program is correct

Having said that:

We can replace some keywords as follows:

absence of error messages := no error messages

Where can the Field Service Manual containing Critical Callout, Disassembly and Reassembly instructions be found?

Answers

Answer:

Somewhere

Explanation:

Return a formatted string with numbers The function below takes three numerical inputs: num1, num2, and num3. Implement it to return a formatted string with an underscore between the first two numbers and space, exclamation point, and another space between the second and third number. For example, if the inputs are 1, 2, and 3, then the function should return the string '1_2 ! 3'.

Answers

Answer:

In Python:

def ret_formatted(num1,num2,num3):

   result = str(num1)+"_"+str(num2)+" ! "+str(num3)

   return result

Explanation:

This defines the function

def ret_formatted(num1,num2,num3):

This generates the output string

   result = str(num1)+"_"+str(num2)+" ! "+str(num3)

This returns the result string

   return result

When text is used as a Hyperlink, it is usually underlined and appears as a different color.

Question 3 options:
True
False

Answers

True it usually shows up with a blue underline

How have newspapers and magazines adapted to digital technology?

Answers

Answer:

Most newspapers now have online editions. Subscription models have gone beyond print-only into digital-only and print-digital combinations -- and as print-only circulation is dropping, digital and combination circulation is on the rise.

How have newspapers and magazines adapted to digital technology? Give at least two examples.

Answers

Firstly, the newspaper is a reliable source of information as the news, critics, pictures have gone through professional journalists and editors that does not publish any unreliable information. 

Secondly,  in this digital age there are still old folks that are not techno-savvy and poor people that cannot afford to be connected to the society.

Hence, at this point of time, the newspaper still comes to play as it is the most affordable and alternative method from online news while still providing information for the old and poor. Thus, newspapers still have a role in my society in this digital age. 

Answer:

They have adapted to digital technology by creating apps for their readers to access their content on their phones or computers.

Explanation:

I Hope this helps.

BINARY DATA:

00000000 00000000 00001100 00000111 10101100 00001010 01111000 00101011 11001011 10011101 00111001 11110011
00001000 00000000 01000101 00000000 00000000 00101000 00000010 10001110 01000000 00000000 10000000 00000110
00000000 00000000 00001010 01111011 00001010 00100001 01101011 00010100 11011001 10101011 00111000 00010111
00000000 01010000 01001100 00100001 00011000 00001001 10011101 01100010 10100011 10001011 01010000 00010000
01000000 10110000 01011001 01110110 00000000 00000000

Required:
a. How do you know this is an IP packet?
b. What is the embedded protocol?
c. What is the size of the embedded protocol payload?

Answers

Answer:

A.

Explanation:

Answer:

a

Explanation:

You are the administrative assistant for the Psychology Department in your college, and they have assigned you to set up a small server to provide basic file services to faculty, staff, and students in that department, which currently has 122 users. For example, faculty will use the server to post and receive class assignments. Which edition of Windows Server 2016 is most appropriate for this situation?

Answers

Answer: Standard edition

Explanation:

Based on the information given in the question, the edition of Windows Server 2016 that is most appropriate for this situation will be the standard edition.

Since it's going to be fora small server to provide basic file services to faculty, staff, and students in that department, which currently has 122 users, the standard edition is appropriate.

Standard edition is ideal in a scenario whereby there's a non-virtualized environments or low density with regards to the population.

With contention:_______.
a. computers wait until the circuit is free before they send data
b. the server or front end processor works consecutively through a list of clients to determine who should have access to the media
c. the front end processor must wait for a response from the polled client or terminal
d. one computer starts the poll and passes it to the next computer on the multipoint circuit
e. there is never a chance for collision, or two computers trying to send data at the same time

Answers

Answer:

a. computers wait until the circuit is free before they send data.

Explanation:

In Computer science, controlled access (X-ON/X-OFF) is typically the opposite of contention.

Controlled access is mainly used by computer networks that are being managed by a host mainframe computer system. X-ON is ready to receive while X-OFF isn't ready to receive.

With contention, computers wait until the circuit is free before they send data. It generally prevents collision between computer systems.

The following segment of code is meant to remove the even numbers from an ArrayList list and print the results:

int counter = 0;
while(counter < list.size())
{
if(list.get(counter) %2 == 0)
{
list.remove(counter);
}
counter++;
}
System.out.println(list.toString());
The method as written, however, is incorrect. Which ArrayList(s) list would prove that this method was written incorrectly?

I.
[1, 2, 3, 4, 5]
II.
[2, 4, 5, 6, 7]
III.
[2, 4, 6, 8, 10]
IV.
[2, 5, 6, 7, 8]
III only


II and IV


II only


I and IV


II and III

Answers

Answer:

II and III

Explanation:

I took the quiz and got this wrong, but it gives you the answer afterwards, just trying to help everyone else out.

Answer:

II and III

Explanation:

A Multi-Node computing platform utilized to share computing resources and characterized by centralized administration. This is a ..... environment

A.Multi-Programming
B.Peer-to-peer
C.Parllel.
D.Distributed
E.Cluster.​

Answers

Answer:

B

Explanation:

Multi-Node

Which option should Curt use to share his calendar with other users inside his organization?
O Email Calendar
O Share Calendar
O Publish Online
O Share Online

Answers

Answer:

Share calendar

Explanation:

Because you will be able to limit certain permissions to the organization rather than emailing it.

also, edge unit test 2022

Curt should use to share his calendar with other users inside his organization  "Share Calendar"

What is calendar ?

A calendar is a method of structuring and displaying time, typically for the purpose of planning and scheduling events or activities. It typically shows dates, days of the week, and yearly months and enables people to keep track of events like meetings, appointments, birthdays, and holidays. A desk calendar, a physical wall calendar, or an electronic calendar stored on a computer, smartphone, or other device are all examples of calendars

The correct option for Curt to share his calendar with other users inside his organization is "Share Calendar".

To know more about calendar check:

https://brainly.com/question/17524242

#SPJ6

What is not a type of text format that will automatically be converted by Outlook into a hyperlink?
O email address
O web address
O UNC path
O All will be automatically converted.

Answers

Answer:

UNC path seems to be the answer

Answer:

UNC path

Explanation:

Bugs always seem to creep into programs and code. What strategies have you learned to find bugs more easily and crush them with a fix?

Answers

The process involves in  finding bugs as well as crushing them in a debugging process is extensive and this can consist of following process;

Examination of the error symptoms

 identifying the cause of it

 fixing of the error.

 This process is usually required a large amount of work, Although no precise procedure that is set in  for fixing all error, but some  useful strategies that use in reducing the debugging effort.

One of the significant part of this process is  localizing of  the error, which is figuring out the cause as well as the symptoms. Strategies that I have learnt in finding and fixing the error in the process of debugging includes;Incremental as well as  bottom-up program development; development of the program incrementally remains one of the most effective ways that can be used in localizing the error, often testing as the piece of code is added, so with this it will be easier to find the error since any error is from the last piece of code added.And also since the last fragment of the code will be small then searching for bugs won't take much time to find and debug.Bottom-up development helps in  maximizing  the benefits that comes from incremental development. With bottom-up development, after successful testing of a code, it's behavior will not change once another piece is added to it, since existing code will never replied on new part so it will be easier to trace error in the new code and fix it.Instrument program can be used to log information and there can be insertion of print statements.Instrument program using assertions; Assertions  can be used in checking if the program actually maintains the properties or  those invariant that the code relies on,     Because the program will definitely stops once the  assertion fails, and there is actuality that the point where the program reached and  stops is closer to the cause, as well as  good indicator of how the problem looks like , then the bug can then be fixed.breakpoints can be set in the program as well as stepping and over functions, then watching program expressions, as well as  inspection of  the memory contents at a particular point during the execution can give the needed run-time information.Backtracking: this option works in a way whereby one will need to start from the point that the problem occurred then go back through the code to to detect the issue, then the bug can then be fixed.Binary search: this is exploration of the code by using divide and conquer approach, so that the  the bug be pin down quickly.

Therefore, Bugs are treat to programs and they can be dealt with using discussed methods.

Learn more at: https://brainly.com/question/15289374?referrer=searchResults

how can we achieve an effective communication with other people​

Answers

Just be yourself!
Explanation.......

____ a device receiving a process variable

Answers

Answer:

Transmitter

Maybe this is the answer or the question is wrong.

Explanation:

In the world of process control, a Transmitter is a device that converts the signal produced by a sensor into a standard instrumentation signal representing a process variable being measured and controlled.

What is a fundamental difference between the SAP platform and the AirBnB platform?

Answers

The fundamental difference between the SAP platform and the AirBnB platform is that;

SAP is an enterprise resource planning platform and AirBnb is a collaborative platform

SAP and AirBnB SAP ERP is defined as an enterprise resource planning software developed by the German company SAP SE. Thus, it is used to assist companies with the management of business areas involving finances, logistics and human resources.

Meanwhile AirBnB is collaborative platform that allows property owners to list their place as holiday accommodation in order to permit travellers to locate somewhere to stay when they are away from home and family.

Read more about management tools at; https://brainly.com/question/17493537

Fyroff consultants, a leading software consulting firm in the United States, decides to launch an Enterprise Resource Planning (ERP) solution. The company chooses the brand name Fyroff Enterprise for the new solution. However, when the company attempts to register the domain name, it finds that a small unknown firm is already registered under the same domain name. The small firm is now attempting to sell the domain name to Fyroff. Which of the following terms refers to this practice of buying a domain name only to sell it for big bucks?
a. cybersquatting
b. logic bombing
c. cyberbullying
d. bot herding
e. cyberstalking

Answers

Answer:

The correct answer is a. cybersquatting

Explanation:

Cybersquatting is the registration of a domain name that corresponds to the denomination of a brand or name, with the main objective of obtaining some economic benefit from its sale to the owner and legitimate owner of the brand. Cybersquatting can range from making money by parking domains (buying names that are then "parked", that is, left unused but generating advertising revenue based on the visits they receive) to redirecting users to another website In order for it to get more traffic, that is, with cybersquatting it is generally intended to sell the registered domain names to the legitimate owners or interested parties, at a price well above the cost of registration or also to use the domain taking advantage of the recognition associated with the legitimate owner to obtain commercial advantages, as clients in the network.

When gathering the information needed to create a database, the attributes the database must contain to store all the information an organization needs for its activities are _______ requirements.

Answers

Answer:

Access and security requirements

A spinner is divided into 4 equal sections colored red, green, blue, and orange. Ennis spins the spinner. What is the probability that he dont not spin orange?

Answers

the probability would be 3/4
Other Questions
TINUSATP is an abbreviation for adenosine triphosphate, a complex molecule that contains tphosphates. It is the energy currency of the cell. ATP is used by organisms as energy...ththat require energy.Which statements regarding the ATP-ADP cycle are true?ATP synthesis takes place in the mitochondria of eukaryotic cells. Why was Mars orbiter sent to mars? An alpha particle is composed of He2+ ions?true or false Mason makes $20 for each time he mows. Which equation represents the money he makes, d, in dollars that mason makes after he mows n lawns?A) d=20nB) n=20dC) d=20+nD) n=20+dPlease help ASAP thank you write the expression below in simplest form. 3x^2 + 8x -1+2(x^2 +5x+3) (work shown please!) Consider the following reaction occurring in a 1.0 L container: H2 (g) + I2 (g) 2 HI (g) State 2 requirements for a successful collision between H2 and I2. Question 2 of 5What is an example of anaerobic exercise?A. WalkingB. Lifting weightsC. SwimmingD. DancingSMIT Pl help its for a grade 'Distance From the sea and prevailing winds determine the climate of a place'. Justify with examples I WILL GIVE BRAINLIEST!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! starting from rest, your bicycle can reach a speed of 4.0 m/s in 50 s. Assuming that your bicycle accelerates at a constant rate, what is its acceleration? HELP !!!!Conjuguez le verbe boire au prsent pour complter la phrase.Nous souvent du caf aprs le diner. Explain how fair trade can reduce the development gap (4 marks) BRAINLIEST: In dolphins, to have spots on the skin is a recessive trait. One spotted dolphin and one solid gray dolphin have a baby spotted dolphin. Go through the following steps to figure out the genotype of the parent dolphins.1) what are the POSSIBLE genotypes of the solid grey dolphin? 2) what is the genotype of the baby spotted dolphin? In January the students in a class red 72 books in February they read 56 books what is the approximate percentage decrease in the number of books read from January to February Add. Enter a number only as your answer in the space provided. -4/5 + 4/5 How many non bonding electrons is in OH- To calculate the density of an object, its mass is ________ its volume.A. Added to B. Divided by C. Multiplied by D. Subtracted by Computing Number of SharesThe charter of Vista West Corporation specifies that it is authorized to issue 212,000 shares of common stock. Since the company was incorporated, it has sold a total of 145,000 shares (at $16 per share) to the public. It has bought back a total of 15,000. The par value of the stock is $6. When the stock was bought back from the public, the market price was $23.Required:1. Determine the authorized shares. 2. Determine the issued shares. 3. Determine the outstanding shares. Plzzz help need ASAP all blanks filled in order???