On a consortium network:

On a consortium network:A . everybody can become a miner, everybody can send transactions and everything is public.B . usually only a few selected nodes can be miners. Transactions can be further limited.View AnswerAnswer: B

December 2, 2019 No Comments READ MORE +

Please Answer Questions Follow The Prompts Below

GETH:A . is the reference implementation of the Ethereum protocol and every other node implementation internally uses the closed-source from Geth.B . is the library that is used for the blockchain node Go-Ethereum. It is also used by Parity is parts, because it's closed source.C . is one of the...

December 1, 2019 No Comments READ MORE +

What are Private Keys used for?

What are Private Keys used for?A . To Protect the Public Keys by being cryptographically significant.B . To Sign Transactions And To Derive an Address From.C . To Generate An Address which can sign transactions.View AnswerAnswer: B

December 1, 2019 No Comments READ MORE +

Which is the right order for Denominations?

Which is the right order for Denominations?A . Wei, Finney, Szabo, Ether, Tether.B . Finney, Szabo, Mether, Gwei.C . Gwei, Szabo, Finney, Ether.View AnswerAnswer: C

December 1, 2019 No Comments READ MORE +

Solidity gets compiled:

Solidity gets compiled:A . to bytecode that can't be understood by humans.B . to bytecodes which are essentially opcodes running instruction by instruction.View AnswerAnswer: B

December 1, 2019 No Comments READ MORE +

Having a bug-bounty program early on:

Having a bug-bounty program early on:A . can help to engage the community in testing your smart contracts and therefore help to find bugs early.B . might be a burden as it is an administrative overhead mainly.C . is completely useless. Who wants to test beta-ware software? It’s better to...

December 1, 2019 No Comments READ MORE +

EVM assembly:

EVM assembly:A . is much better than Solidity and a viable alternative.B . can be split across multiple files, but every contract must be in a file with the same name as the contract itself.C . is another language similar to LLL, more secure than Solidity.View AnswerAnswer: B

December 1, 2019 No Comments READ MORE +

A Blockchain Node:

A Blockchain Node:A . can never become a mining node.B . can always become a mining node.C . can become a mining node, depending if the implementation has the functionality implemented.View AnswerAnswer: C

December 1, 2019 No Comments READ MORE +

Externally Owned Accounts (EoA):

Externally Owned Accounts (EoA):A . are changing their address every time a Transaction is sent because of the nonce.B . are keeping their address, but on the blockchain a nonce is increased every time they send a transaction to avoid replay attacks.View AnswerAnswer: A

November 28, 2019 No Comments READ MORE +

To store almost all data in the Ethereum Blockchain:

To store almost all data in the Ethereum Blockchain:A . a Linked List with pointers to previous blocks hashes is used.B . a Merkle Patricia Trie is used.C . a Radix Trie is used because the Merkle Patricia Trie is too inefficient.View AnswerAnswer: B

November 28, 2019 No Comments READ MORE +