Blockchain Intermedio
Blockchain Intermedio
Blockchain Intermedio
True
False
Answer: 1)True
True
False
Answer: 1)True
3.Blockchain is a distributed______.
Ledger
Server
System
computer
Answer: 1)Ledger
Boxes
Blocks
Nodes
Algorithms
Answer: 2)Blocks
5._____ contains hash of previous block and all the important information required by the block.
block metadata
block header
block footer
chain
100 million
1 million
21 billion
21 million
7._____ are a set of rules that verify and add transactions to a blockchain
Mathematical formulas
Consensus mechanisms
Blocks
Laws
Answer: 2)Consensus mechanisms
Ripple
Bitcoin
Ethereum
R3Corda
Answer: 4)R3Corda
public
personal
private
consortium
Answer: 3)private
Computation
Capacity
Consistency
Correct
Answer: 3)Consistency
List of Fresco Play Courses without Hands-On | Fresco Play
Proof of Work
Proof of Stake
Proof of Deposit
2.In ______ mechanism, the miner is selected based on reputation built over time.
Stake-based
Power-based
Elapsed Time
Reputation-based
Answer: 4)Reputation-based
3.Which consensus algorithm requires the users to have a stake in the blockchain?
Proof of Identity
Proof of Stake
Proof of Work
True
False
Answer: 1)True
False
True
Answer: 2)True
Serenity
Casper
Constantinople
Answer: 2)Serenity
Functional
Modular
Defensive
Regular
Answer: 3)Defensive
Ether
Bitcoin
Litecoin
Gas
Answer: 1)Ether
Serpent
Solidity
Viper
Erlang
Answer: 4)Erlang
Bitcoin
Hyperledger Fabric
Corda
Ethereum
Answer: 1)Bitcoin
Gas
Bitcoin
Dollars
Ether
Answer: 1)Gas
6.______ are systems that provide external data sources to smart contracts.
Oracles
Routers
Fortunes
Tokens
Answer: 1)Oracles
1.______ is a way of verifying the authenticity of digital messages and documents over the
internet.
Digital Imprint
Digital Signature
Password
Fingerprint
2.A hash function should produce different output strings for the same input data.
False
True
Answer: 1)False
3._______ is a cryptographic method of converting any kind of data into a string of specified
length.
Dashing
Encrypting
Hashing
Decrypting
Answer: 3)Hashing
private
asymmetric
secure
Answer: 2)asymmetric
public
symmetric
asymmetric
Answer: 4)asymmetric
asymmetric
symmetric
public
private
Answer: 2)symmetric
False
True
Answer: 2)True
False
True
Answer: 2)True
D3.js
Angular
jQuery
Web3.js
Answer: 4)Web3.js
secure, open
External, contract
public, private
5.Which of the following blockchain is used for non currency, industrial application?
Bitcoin
Hyperledger
Ethereum
Litecoin
Answer: 2)Hyperledger
6.Which of the following is a Ethereum test network?
testnet3
testnet
Ethertest
Ropsten
Answer: 4)Ropsten
Final Assessment
1.In ______ mechanism, the miner is selected based on reputation built over time.
Reputation-based
Stake-based
Elapsed Time
Power-based
Answer: 1)Reputation-based
Linux foundation
IBM
Microsoft
Intel
Dollars
Gas
Ether
Bitcoin
Answer: 2)Gas
4._____ is a mechanism that allows digital assets from one blockchain to be used as a separate
blockchain.
subchain
forkchain
Sidechain
Bitcoin
Answer: 3)Sidechain
True
False
Answer: 1)True
6.Which type of cryptography is also called public key cryptography?
public
asymmetric
symmetric
Answer: 3)asymmetric
7._____ is a software defining assets, and the transaction instructions modifying those assets
Chaincode
Transaction code
Asset code
Bytecode
Answer: 1)Chaincode
False
True
Answer: 2)True
False
True
Answer: 2)True
11.______ are systems that provide external data sources to smart contracts.
Oracles
Fortunes
Routers
Tokens
Answer: 1)Oracles
Modular
Defensive
Regular
Functional
Answer: 2)Defensive
Private, public
Symmetric, Asymmetric
local, global
D3.js
Angular
jQuery
Web3.js
Answer: 4)Web3.js
Serenity
Juniper
Casper
Constantinople
Answer: 1)Serenity